Searched refs:wpa_printf (Results 1 - 25 of 232) sorted by relevance

12345678910

/freebsd-10.3-release/contrib/wpa/src/ap/
H A Dvlan_util.c40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, "
44 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
50 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'",
57 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket");
62 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink");
68 wpa_printf(MSG_ERROR, "VLAN: failed to alloc cache");
74 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist",
83 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists",
91 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link");
96 wpa_printf(MSG_ERRO
[all...]
H A Dp2p_hostapd.c36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
H A Dvlan_init.c50 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
59 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed "
72 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed "
86 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
93 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
118 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
120 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) "
128 wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining "
143 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE,"
169 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/wps/
H A Dwps_attr_parse.c23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u",
28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
63 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor "
98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
110 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)",
114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
120 wpa_printf(MSG_DEBU
[all...]
H A Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
107 wpa_printf(MSG_INF
[all...]
H A Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
125 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/eap_common/
H A Deap_wsc_common.c23 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
H A Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBU
[all...]
H A Deap_sim_common.c82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc);
512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)");
515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d",
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow "
524 wpa_printf(MSG_INF
[all...]
H A Deap_ikev2_common.c58 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory "
66 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory "
72 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
89 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
96 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
109 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV");
114 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV");
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
H A Deap_fast_common.c52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short "
209 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Result %d",
213 wpa_printf(MSG_DEBUG, "EAP-FAST: Result: %s",
221 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short "
227 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
235 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/utils/
H A Dpcsc_funcs.c192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
271 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d",
320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record");
426 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/p2p/
H A Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/eap_server/
H A Deap_server_tls_common.c41 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS "
47 wpa_printf(MSG_INFO, "SSL: Failed to configure verification "
125 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
127 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__);
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
167 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
185 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
196 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
201 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
215 wpa_printf(MSG_DEBU
[all...]
H A Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
167 wpa_printf(MSG_DEBUG, "IKEV2: No "
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
178 wpa_printf(MSG_DEBUG, "IKEV2: "
218 wpa_printf(MSG_INF
[all...]
H A Deap_server_tnc.c66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for "
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request");
254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
303 wpa_printf(MSG_DEBU
[all...]
H A Deap_server_ttls.c70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
203 wpa_printf(MSG_WARNING, "EAP-TTLS: "
214 wpa_printf(MSG_WARNING, "EAP-TTLS: "
278 wpa_printf(MSG_WARNIN
[all...]
/freebsd-10.3-release/contrib/wpa/src/tls/
H A Dpkcs8.c33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
114 wpa_printf(MSG_DEBU
[all...]
H A Dtlsv1_server_read.c41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite "
160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
183 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL "
191 wpa_printf(MSG_DEBU
[all...]
H A Dtlsv1_record.c36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
290 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/src/eap_peer/
H A Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
142 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
178 wpa_printf(MSG_DEBUG, "IKEV2: No "
184 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
191 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
198 wpa_printf(MSG_DEBU
[all...]
H A Deap_sim.c75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
92 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
104 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
152 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
165 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM "
177 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage "
180 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage "
198 wpa_printf(MSG_DEBUG, "EAP-SIM: "
222 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/wpa_supplicant/
H A Doffchannel.c39 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
58 wpa_printf(MSG_DEBUG, "Off-channel: Send Action callback "
79 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX "
91 wpa_printf(MSG_DEBUG, "Off-channel: Schedule "
96 wpa_printf(MSG_DEBUG, "Off-channel: Failed to "
109 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to "
120 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the "
151 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
157 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
165 wpa_printf(MSG_DEBU
[all...]
H A Dctrl_iface_named_pipe.c123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
149 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d",
176 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d",
182 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d",
192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
258 wpa_printf(MSG_DEBU
[all...]
/freebsd-10.3-release/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
67 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
166 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
188 wpa_printf(MSG_DEBU
[all...]

Completed in 395 milliseconds

12345678910