Searched refs:MSG_INFO (Results 1 - 25 of 544) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/
H A Dhapd_module_tests.c16 wpa_printf(MSG_INFO, "hostapd module tests");
/external/strace/xlat/
H A Dmsgctl_flags.h5 #if !(defined(MSG_INFO) || (defined(HAVE_DECL_MSG_INFO) && HAVE_DECL_MSG_INFO))
6 # define MSG_INFO 12 macro
32 XLAT(MSG_INFO),
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
107 wpa_printf(MSG_INFO, "WP
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
107 wpa_printf(MSG_INFO, "WP
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
107 wpa_printf(MSG_INFO, "WP
[all...]
/external/wpa_supplicant_8/hs20/client/
H A Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')",
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err);
157 wpa_printf(MSG_INFO, "Processing updateNode");
162 wpa_printf(MSG_INFO, "No managementTreeURI present");
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri);
169 wpa_printf(MSG_INFO, "Unexpected URI");
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name);
178 wpa_printf(MSG_INFO, "Could not extract MO text");
205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text");
213 wpa_printf(MSG_INFO, "[hs2
[all...]
H A Doma_dm_client.c214 wpa_printf(MSG_INFO, "MgmtTree: %s", str);
245 wpa_printf(MSG_INFO, "Could not read devinfo.xml");
392 wpa_printf(MSG_INFO, "No Data node found");
398 wpa_printf(MSG_INFO, "Invalid data");
401 wpa_printf(MSG_INFO, "Data: %s", data);
402 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data);
407 wpa_printf(MSG_INFO, "User response in browser completed successfully");
411 wpa_printf(MSG_INFO, "Failed to receive user response");
425 wpa_printf(MSG_INFO, "Client certificate enrollment");
430 wpa_printf(MSG_INFO, "N
[all...]
H A Dosu_client.c119 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto);
122 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol");
130 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node");
136 wpa_printf(MSG_INFO, "Could not get URL text");
139 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url);
144 wpa_printf(MSG_INFO, "Could not find estUserID node");
150 wpa_printf(MSG_INFO, "Could not get estUserID text");
153 wpa_printf(MSG_INFO, "estUserID: %s", user);
159 wpa_printf(MSG_INFO, "Could not find estPassword node");
165 wpa_printf(MSG_INFO, "Coul
[all...]
H A Dest.c49 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s",
57 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s",
77 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object");
134 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf);
144 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s",
155 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt");
162 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary",
168 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
178 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts");
187 wpa_printf(MSG_INFO, "Coul
[all...]
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dutils_module_tests.c53 wpa_printf(MSG_INFO, "printf encode/decode tests");
58 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf);
133 wpa_printf(MSG_INFO, "bitfield tests");
230 wpa_printf(MSG_INFO, "int_array tests");
258 wpa_printf(MSG_INFO, "ext_password tests");
285 wpa_printf(MSG_INFO, "trace tests");
300 wpa_printf(MSG_INFO, "base64 tests");
368 wpa_printf(MSG_INFO, "common tests");
452 wpa_printf(MSG_INFO, "os tests");
517 wpa_printf(MSG_INFO, "wpabu
[all...]
H A Dbrowser-android.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url);
120 wpa_printf(MSG_INFO, "Closing Android browser");
122 wpa_printf(MSG_INFO, "Failed to inject keyevent");
H A Dbrowser-wpadebug.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url);
128 wpa_printf(MSG_INFO, "Closing Android browser");
134 wpa_printf(MSG_INFO, "Failed to close wpadebug browser");
/external/wpa_supplicant_8/src/utils/
H A Dutils_module_tests.c53 wpa_printf(MSG_INFO, "printf encode/decode tests");
58 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf);
133 wpa_printf(MSG_INFO, "bitfield tests");
230 wpa_printf(MSG_INFO, "int_array tests");
258 wpa_printf(MSG_INFO, "ext_password tests");
285 wpa_printf(MSG_INFO, "trace tests");
300 wpa_printf(MSG_INFO, "base64 tests");
368 wpa_printf(MSG_INFO, "common tests");
452 wpa_printf(MSG_INFO, "os tests");
517 wpa_printf(MSG_INFO, "wpabu
[all...]
H A Dbrowser-android.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url);
120 wpa_printf(MSG_INFO, "Closing Android browser");
122 wpa_printf(MSG_INFO, "Failed to inject keyevent");
H A Dbrowser-wpadebug.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url);
128 wpa_printf(MSG_INFO, "Closing Android browser");
134 wpa_printf(MSG_INFO, "Failed to close wpadebug browser");
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dutils_module_tests.c53 wpa_printf(MSG_INFO, "printf encode/decode tests");
58 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf);
133 wpa_printf(MSG_INFO, "bitfield tests");
230 wpa_printf(MSG_INFO, "int_array tests");
258 wpa_printf(MSG_INFO, "ext_password tests");
285 wpa_printf(MSG_INFO, "trace tests");
300 wpa_printf(MSG_INFO, "base64 tests");
368 wpa_printf(MSG_INFO, "common tests");
452 wpa_printf(MSG_INFO, "os tests");
517 wpa_printf(MSG_INFO, "wpabu
[all...]
H A Dbrowser-android.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url);
120 wpa_printf(MSG_INFO, "Closing Android browser");
122 wpa_printf(MSG_INFO, "Failed to inject keyevent");
H A Dbrowser-wpadebug.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to "
38 wpa_printf(MSG_INFO, "Browser response received: %s", url);
73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url);
128 wpa_printf(MSG_INFO, "Closing Android browser");
134 wpa_printf(MSG_INFO, "Failed to close wpadebug browser");
/external/autotest/client/tests/monotonic_time/src/
H A Dlogging.h12 MSG_INFO, enumerator in enum:msg_type
21 #define INFO(fmt, args...) msg(MSG_INFO, 0, fmt, ##args)
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI "
276 wpa_printf(MSG_INFO, "IKEV
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI "
276 wpa_printf(MSG_INFO, "IKEV
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI "
276 wpa_printf(MSG_INFO, "IKEV
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Diapp.c203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno));
230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno));
268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)",
318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s",
343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d",
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)",
353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame",
370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command);
398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s",
407 wpa_printf(MSG_INFO, "iapp_ini
[all...]
/external/wpa_supplicant_8/src/ap/
H A Diapp.c203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno));
230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno));
268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)",
318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s",
343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d",
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)",
353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame",
370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command);
398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s",
407 wpa_printf(MSG_INFO, "iapp_ini
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Diapp.c203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno));
230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno));
268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)",
318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s",
343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d",
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)",
353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame",
370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command);
398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s",
407 wpa_printf(MSG_INFO, "iapp_ini
[all...]

Completed in 608 milliseconds

1234567891011>>