| /hostap-latest/src/drivers/ |
| D | driver_zephyr.c | 62 wpa_printf(MSG_ERROR, "%s:%d Failed to alloc %d bytes\n", __func__, in hostapd_event_wrapper() 81 __func__, __LINE__, data->rx_mgmt.frame_len); in hostapd_event_wrapper() 120 __func__, __LINE__, event, data->auth.ies_len); in wpa_supplicant_event_wrapper() 137 __func__, __LINE__, event, data->rx_mgmt.frame_len); in wpa_supplicant_event_wrapper() 155 __func__, __LINE__, event, data->tx_status.data_len); in wpa_supplicant_event_wrapper() 172 __func__, __LINE__, event, ETH_ALEN); in wpa_supplicant_event_wrapper() 186 __func__, __LINE__, event, data->assoc_info.req_ies_len); in wpa_supplicant_event_wrapper() 202 __func__, __LINE__, event, data->assoc_info.resp_ies_len); in wpa_supplicant_event_wrapper() 220 __func__, __LINE__, event, data->assoc_info.resp_frame_len); in wpa_supplicant_event_wrapper() 241 __func__, __LINE__, event, ETH_ALEN); in wpa_supplicant_event_wrapper() [all …]
|
| D | driver_wired_common.c | 245 __func__); in driver_wired_init_common() 250 __func__); in driver_wired_init_common() 254 __func__); in driver_wired_init_common() 259 __func__); in driver_wired_init_common() 262 wpa_printf(MSG_INFO, "%s: Failed to enable allmulti", __func__); in driver_wired_init_common() 265 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__); in driver_wired_init_common() 273 __func__); in driver_wired_init_common() 294 __func__); in driver_wired_deinit_common() 301 __func__); in driver_wired_deinit_common() 309 __func__); in driver_wired_deinit_common() [all …]
|
| D | driver_macsec_qca.c | 91 wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id); in __macsec_drv_init() 416 __func__, drv->use_es, drv->use_scb, in macsec_qca_macsec_init() 429 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_qca_macsec_deinit() 439 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_qca_get_capability() 452 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in macsec_qca_enable_protect_frames() 467 __func__, enabled, window); in macsec_qca_set_replay_protect() 494 __func__, cs); in macsec_qca_set_current_cipher_suite() 498 wpa_printf(MSG_DEBUG, "%s: CipherSuite: %016" PRIx64, __func__, cs); in macsec_qca_set_current_cipher_suite() 510 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); in macsec_qca_enable_controlled_port() 605 wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, sa->lowest_pn); in macsec_qca_get_receive_lowest_pn() [all …]
|
| D | driver_atheros.c | 231 __func__, drv->iface, op, in set80211priv() 252 __func__, drv->iface, op, athr_get_param_name(op), in set80211param() 314 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); in atheros_configure_wpa() 344 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); in atheros_configure_wpa() 352 __func__, params->wpa_key_mgmt); in atheros_configure_wpa() 370 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); in atheros_configure_wpa() 377 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); in atheros_configure_wpa() 390 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in atheros_set_ieee8021x() 422 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in atheros_set_privacy() 435 __func__, ether_sprintf(addr), authorized); in atheros_set_sta_authorized() [all …]
|
| D | driver_bsd.c | 223 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__, in bsd_get_if_media() 242 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__, in bsd_set_if_media() 271 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); in bsd_del_key() 274 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, in bsd_del_key() 329 "seq_len=%zu key_len=%zu", __func__, alg, addr, key_idx, in bsd_set_key() 353 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg); in bsd_set_key() 441 __func__, ciphernames[v], v); in bsd_configure_wpa() 465 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); in bsd_configure_wpa() 473 __func__, params->wpa_key_mgmt); in bsd_configure_wpa() 486 __func__, params->rsn_preauth); in bsd_configure_wpa() [all …]
|
| D | driver_roboswitch.c | 220 __func__, drv->ifname); in wpa_driver_roboswitch_set_param() 226 wpa_printf(MSG_DEBUG, "%s: Ignoring unicast frames", __func__); in wpa_driver_roboswitch_set_param() 375 "interface name %s", __func__, drv->ifname); in wpa_driver_roboswitch_init() 383 "in interface name %s", __func__, ifname); in wpa_driver_roboswitch_init() 391 "interface name %s", __func__, ifname); in wpa_driver_roboswitch_init() 399 wpa_printf(MSG_INFO, "%s: Unable to create socket", __func__); in wpa_driver_roboswitch_init() 416 "RoboSwitch?)", __func__); in wpa_driver_roboswitch_init() 439 "VLAN %d", __func__, vlan & ~(1 << 13)); in wpa_driver_roboswitch_init() 447 wpa_printf(MSG_INFO, "%s: Unable to join PAE group", __func__); in wpa_driver_roboswitch_init() 452 "RoboSwitch ARL", __func__); in wpa_driver_roboswitch_init() [all …]
|
| D | driver_macsec_linux.c | 333 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_macsec_init() 384 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_macsec_deinit() 403 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_get_capability() 422 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_protect_frames() 442 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_encrypt() 464 wpa_printf(MSG_DEBUG, "%s -> %s, %u", __func__, in macsec_drv_set_replay_protect() 489 wpa_printf(MSG_DEBUG, "%s -> %02" PRIx8, __func__, offload); in macsec_drv_set_offload() 500 __func__); in macsec_drv_set_offload() 516 wpa_printf(MSG_DEBUG, "%s -> %016" PRIx64, __func__, cs); in macsec_drv_set_current_cipher_suite() 536 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_controlled_port() [all …]
|
| /hostap-latest/src/pae/ |
| D | ieee802_1x_secy_ops.c | 33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_protect_frames() 53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_encrypt() 73 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_replay() 93 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_offload() 113 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_current_cipher_suite() 141 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_enable_port() 161 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_capability() 182 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_receive_lowest_pn() 203 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_transmit_next_pn() 224 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_set_transmit_next_pn() [all …]
|
| /hostap-latest/wpa_supplicant/dbus/ |
| D | dbus_dict_helpers.c | 627 wpa_printf(MSG_MSGDUMP, "%s: start reading a dict entry", __func__); in wpa_dbus_dict_open_read() 639 __func__, type, in wpa_dbus_dict_open_read() 681 __func__); in _wpa_dbus_dict_entry_get_byte_array() 737 __func__); in _wpa_dbus_dict_entry_get_uint16_array() 791 __func__); in _wpa_dbus_dict_entry_get_string_array() 799 __func__, wpa_debug_show_keys ? value : "[omitted]"); in _wpa_dbus_dict_entry_get_string_array() 804 __func__); in _wpa_dbus_dict_entry_get_string_array() 813 __func__, entry->array_len); in _wpa_dbus_dict_entry_get_string_array() 848 wpa_printf(MSG_MSGDUMP, "%s: parsing binarray type %c", __func__, type); in _wpa_dbus_dict_entry_get_binarray() 855 __func__, type); in _wpa_dbus_dict_entry_get_binarray() [all …]
|
| D | dbus_new_handlers.c | 527 "%s: given type is not basic", __func__); in wpas_dbus_simple_property_getter() 537 "%s: error constructing reply", __func__); in wpas_dbus_simple_property_getter() 562 "%s: given type is not basic", __func__); in wpas_dbus_simple_property_setter() 604 "%s: given type is not basic", __func__); in wpas_dbus_simple_array_property_getter() 616 "%s: failed to construct message", __func__); in wpas_dbus_simple_array_property_getter() 646 "%s: unknown element type %d", __func__, type); in wpas_dbus_simple_array_property_getter() 656 __func__); in wpas_dbus_simple_array_property_getter() 664 "%s: failed to construct message 3", __func__); in wpas_dbus_simple_array_property_getter() 698 "%s: given type is not basic", __func__); in wpas_dbus_simple_array_array_property_getter() 711 "%s: failed to construct message", __func__); in wpas_dbus_simple_array_array_property_getter() [all …]
|
| /hostap-latest/src/crypto/ |
| D | crypto_linux.c | 37 __func__, strerror(errno)); in linux_af_alg_socket() 48 __func__, type, name, strerror(errno)); in linux_af_alg_socket() 73 __func__, strerror(errno)); in linux_af_alg_hash_vector() 81 __func__, strerror(errno)); in linux_af_alg_hash_vector() 91 __func__, strerror(errno)); in linux_af_alg_hash_vector() 97 __func__, (int) res, (int) len[i]); in linux_af_alg_hash_vector() 106 __func__, strerror(errno)); in linux_af_alg_hash_vector() 112 __func__, (int) res, (int) mac_len); in linux_af_alg_hash_vector() 296 __func__, strerror(errno)); in crypto_hash_init() 305 __func__, strerror(errno)); in crypto_hash_init() [all …]
|
| D | tls_openssl.c | 339 __func__); in tls_crl_cert_reload() 344 tls_show_errors(MSG_WARNING, __func__, in tls_crl_cert_reload() 395 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_pub_enc() 403 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_pub_dec() 432 __func__); in cryptoapi_rsa_priv_enc() 490 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_priv_dec() 690 "'%s': error=%d", __func__, store, in tls_cryptoapi_ca_cert() 712 tls_show_errors(MSG_WARNING, __func__, in tls_cryptoapi_ca_cert() 722 "'%s': error=%d", __func__, name + 13, in tls_cryptoapi_ca_cert() 1718 tls_show_errors(MSG_INFO, __func__, in tls_connection_init() [all …]
|
| /hostap-latest/src/utils/ |
| D | browser.c | 33 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__); in win_cb_destroy() 96 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, in view_cb_notify_estimated_load_progress() 109 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); in view_cb_resource_load_starting() 119 wpa_printf(MSG_DEBUG, "BROWSER:%s type=%d", __func__, type); in view_cb_decide_policy() 145 __func__, uri); in view_cb_decide_policy() 172 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri ? uri : "N/A"); in view_cb_mouse_target_changed() 189 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title); in view_cb_notify_title() 201 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, in view_cb_notify_progress() 212 __func__, status, webkit_web_view_get_uri(view)); in view_cb_notify_load_status() 229 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); in view_cb_resource_request_starting() [all …]
|
| D | utils_module_tests.c | 617 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2() 621 __func__, t->magic); in eloop_test_read_2() 626 __func__, sock, t->pipefd2[0]); in eloop_test_read_2() 631 __func__, sock, (int) res); in eloop_test_read_2() 639 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2_wrong() 643 __func__, t->magic); in eloop_test_read_2_wrong() 648 __func__, sock, t->pipefd2[0]); in eloop_test_read_2_wrong() 658 __func__); in eloop_test_read_2_wrong() 699 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_1() 703 __func__, t->magic); in eloop_test_read_1() [all …]
|
| /hostap-latest/src/l2_packet/ |
| D | l2_packet_linux.c | 167 __func__, MAC2STR(ll.sll_addr), (int) res); in l2_packet_receive() 198 __func__); in l2_packet_receive() 204 __func__); in l2_packet_receive() 242 __func__, MAC2STR(ll.sll_addr), (int) res); in l2_packet_receive_br() 245 wpa_printf(MSG_DEBUG, "%s: Drop RX of own frame", __func__); in l2_packet_receive_br() 254 wpa_printf(MSG_DEBUG, "%s: Drop duplicate RX", __func__); in l2_packet_receive_br() 259 wpa_printf(MSG_DEBUG, "%s: Drop duplicate RX(prev)", __func__); in l2_packet_receive_br() 296 __func__, strerror(errno)); in l2_packet_init() 304 __func__, strerror(errno)); in l2_packet_init() 318 __func__, strerror(errno)); in l2_packet_init() [all …]
|
| /hostap-latest/src/tls/ |
| D | bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_get_unsigned_bin() 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_set_unsigned_bin() 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_add() 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_sub() 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_mul() 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_mulmod() 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_exptmod()
|
| /hostap-latest/tests/hwsim/tnc/ |
| D | hostap2_imc.c | 34 __func__, (unsigned) imcID, (unsigned) minVersion, in TNC_IMC_Initialize() 63 __func__, (unsigned) imcID, (unsigned) connectionID); in TNC_IMC_BeginHandshake() 89 __func__, (unsigned) imcID); in TNC_IMC_ProvideBindFunction() 129 __func__, (unsigned) imcID, (unsigned) connectionID, in TNC_IMC_NotifyConnectionChange() 147 __func__, (unsigned) imcID, (unsigned) connectionID, in TNC_IMC_ReceiveMessage() 170 __func__, (unsigned) imcID, (unsigned) connectionID); in TNC_IMC_BatchEnding() 180 __func__, (unsigned) imcID); in TNC_IMC_Terminate()
|
| D | hostap2_imv.c | 35 __func__, (unsigned) imvID, (unsigned) minVersion, in TNC_IMV_Initialize() 63 __func__, (unsigned) imvID, (unsigned) connectionID, in TNC_IMV_NotifyConnectionChange() 89 __func__, (unsigned) imvID, (unsigned) connectionID, in TNC_IMV_ReceiveMessage() 126 __func__, (unsigned) imvID, (unsigned) connectionID); in TNC_IMV_SolicitRecommendation() 145 __func__, (unsigned) imvID, (unsigned) connectionID); in TNC_IMV_BatchEnding() 155 __func__, (unsigned) imvID); in TNC_IMV_Terminate() 168 __func__, (unsigned) imvID); in TNC_IMV_ProvideBindFunction()
|
| D | hostap_imc.c | 23 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_Initialize() 47 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_BeginHandshake() 63 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_ProvideBindFunction()
|
| /hostap-latest/src/ap/ |
| D | vlan_full.c | 143 "failed: %s", __func__, strerror(errno)); in br_delif() 155 __func__, if_name); in br_delif() 170 "%s", __func__, br_name, if_name, strerror(errno)); in br_delif() 198 "failed: %s", __func__, strerror(errno)); in br_addif() 215 __func__, if_name); in br_addif() 235 "%s", __func__, br_name, if_name, strerror(errno)); in br_addif() 254 "failed: %s", __func__, strerror(errno)); in br_delbr() 267 "%s: %s", __func__, br_name, strerror(errno)); in br_delbr() 294 "failed: %s", __func__, strerror(errno)); in br_addbr() 317 __func__, br_name, strerror(errno)); in br_addbr() [all …]
|
| D | vlan_ioctl.c | 33 "failed: %s", __func__, strerror(errno)); in vlan_rem() 44 "%s", __func__, if_name, strerror(errno)); in vlan_rem() 79 "failed: %s", __func__, strerror(errno)); in vlan_add() 117 __func__, if_request.device1, strerror(errno)); in vlan_add() 137 __func__, strerror(errno)); in vlan_set_name_type() 148 __func__, name_type, strerror(errno)); in vlan_set_name_type()
|
| D | vlan_ifconfig.c | 26 "failed: %s", __func__, strerror(errno)); in ifconfig_helper() 36 __func__, if_name, strerror(errno)); in ifconfig_helper() 49 __func__, if_name, up, strerror(errno)); in ifconfig_helper()
|
| /hostap-latest/tests/fuzzing/eapol-key-supp/ |
| D | eapol-key-supp.c | 76 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_bssid() 84 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); in supp_set_state() 116 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send() 128 __func__, type, data_len); in supp_alloc_eapol() 166 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie() 182 __func__, alg, MAC2STR(addr), key_idx, set_tx, key_flag, in supp_set_key() 195 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection() 202 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout() 214 wpa_printf(MSG_DEBUG, "SUPP: %s(%d)", __func__, reason_code); in supp_deauthenticate()
|
| /hostap-latest/wpa_supplicant/ |
| D | ibss_rsn.c | 71 __func__, MAC2STR(dest), proto, (unsigned long) len, in supp_ether_send() 91 __func__, type, data_len); in supp_alloc_eapol() 118 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie() 155 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key() 193 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection() 200 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout() 206 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_deauthenticate() 212 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_reconnect() 287 __func__, MAC2STR(addr), prev_psk); in auth_get_psk() 302 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol() [all …]
|
| D | preauth_test.c | 103 printf("%s - not implemented\n", __func__); in wpa_ether_send() 122 printf("%s - not implemented\n", __func__); in wpa_supplicant_get_beacon_ie() 129 printf("%s - not implemented\n", __func__); in wpa_supplicant_get_bssid() 140 printf("%s - not implemented\n", __func__); in wpa_supplicant_set_key() 149 printf("%s - not implemented\n", __func__); in wpa_supplicant_mlme_setprotection() 161 printf("%s - not implemented\n", __func__); in wpa_supplicant_add_pmkid() 170 printf("%s - not implemented\n", __func__); in wpa_supplicant_remove_pmkid()
|