Home
last modified time | relevance | path

Searched refs:__func__ (Results 1 – 25 of 104) sorted by relevance

12345

/hostap-latest/src/drivers/
Ddriver_zephyr.c62 wpa_printf(MSG_ERROR, "%s:%d Failed to alloc %d bytes\n", __func__, in hostapd_event_wrapper()
81 __func__, __LINE__, data->rx_mgmt.frame_len); in hostapd_event_wrapper()
120 __func__, __LINE__, event, data->auth.ies_len); in wpa_supplicant_event_wrapper()
137 __func__, __LINE__, event, data->rx_mgmt.frame_len); in wpa_supplicant_event_wrapper()
155 __func__, __LINE__, event, data->tx_status.data_len); in wpa_supplicant_event_wrapper()
172 __func__, __LINE__, event, ETH_ALEN); in wpa_supplicant_event_wrapper()
186 __func__, __LINE__, event, data->assoc_info.req_ies_len); in wpa_supplicant_event_wrapper()
202 __func__, __LINE__, event, data->assoc_info.resp_ies_len); in wpa_supplicant_event_wrapper()
220 __func__, __LINE__, event, data->assoc_info.resp_frame_len); in wpa_supplicant_event_wrapper()
241 __func__, __LINE__, event, ETH_ALEN); in wpa_supplicant_event_wrapper()
[all …]
Ddriver_wired_common.c245 __func__); in driver_wired_init_common()
250 __func__); in driver_wired_init_common()
254 __func__); in driver_wired_init_common()
259 __func__); in driver_wired_init_common()
262 wpa_printf(MSG_INFO, "%s: Failed to enable allmulti", __func__); in driver_wired_init_common()
265 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__); in driver_wired_init_common()
273 __func__); in driver_wired_init_common()
294 __func__); in driver_wired_deinit_common()
301 __func__); in driver_wired_deinit_common()
309 __func__); in driver_wired_deinit_common()
[all …]
Ddriver_macsec_qca.c91 wpa_printf(MSG_INFO, "%s: secy_id=%d", __func__, drv->secy_id); in __macsec_drv_init()
416 __func__, drv->use_es, drv->use_scb, in macsec_qca_macsec_init()
429 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_qca_macsec_deinit()
439 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_qca_get_capability()
452 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in macsec_qca_enable_protect_frames()
467 __func__, enabled, window); in macsec_qca_set_replay_protect()
494 __func__, cs); in macsec_qca_set_current_cipher_suite()
498 wpa_printf(MSG_DEBUG, "%s: CipherSuite: %016" PRIx64, __func__, cs); in macsec_qca_set_current_cipher_suite()
510 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); in macsec_qca_enable_controlled_port()
605 wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, sa->lowest_pn); in macsec_qca_get_receive_lowest_pn()
[all …]
Ddriver_atheros.c231 __func__, drv->iface, op, in set80211priv()
252 __func__, drv->iface, op, athr_get_param_name(op), in set80211param()
314 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); in atheros_configure_wpa()
344 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); in atheros_configure_wpa()
352 __func__, params->wpa_key_mgmt); in atheros_configure_wpa()
370 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); in atheros_configure_wpa()
377 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); in atheros_configure_wpa()
390 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); in atheros_set_ieee8021x()
422 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); in atheros_set_privacy()
435 __func__, ether_sprintf(addr), authorized); in atheros_set_sta_authorized()
[all …]
Ddriver_bsd.c223 wpa_printf(MSG_ERROR, "%s: SIOCGIFMEDIA %s", __func__, in bsd_get_if_media()
242 wpa_printf(MSG_ERROR, "%s: SIOCSIFMEDIA %s", __func__, in bsd_set_if_media()
271 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); in bsd_del_key()
274 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, in bsd_del_key()
329 "seq_len=%zu key_len=%zu", __func__, alg, addr, key_idx, in bsd_set_key()
353 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg); in bsd_set_key()
441 __func__, ciphernames[v], v); in bsd_configure_wpa()
465 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); in bsd_configure_wpa()
473 __func__, params->wpa_key_mgmt); in bsd_configure_wpa()
486 __func__, params->rsn_preauth); in bsd_configure_wpa()
[all …]
Ddriver_roboswitch.c220 __func__, drv->ifname); in wpa_driver_roboswitch_set_param()
226 wpa_printf(MSG_DEBUG, "%s: Ignoring unicast frames", __func__); in wpa_driver_roboswitch_set_param()
375 "interface name %s", __func__, drv->ifname); in wpa_driver_roboswitch_init()
383 "in interface name %s", __func__, ifname); in wpa_driver_roboswitch_init()
391 "interface name %s", __func__, ifname); in wpa_driver_roboswitch_init()
399 wpa_printf(MSG_INFO, "%s: Unable to create socket", __func__); in wpa_driver_roboswitch_init()
416 "RoboSwitch?)", __func__); in wpa_driver_roboswitch_init()
439 "VLAN %d", __func__, vlan & ~(1 << 13)); in wpa_driver_roboswitch_init()
447 wpa_printf(MSG_INFO, "%s: Unable to join PAE group", __func__); in wpa_driver_roboswitch_init()
452 "RoboSwitch ARL", __func__); in wpa_driver_roboswitch_init()
[all …]
Ddriver_macsec_linux.c333 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_macsec_init()
384 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_macsec_deinit()
403 wpa_printf(MSG_DEBUG, "%s", __func__); in macsec_drv_get_capability()
422 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_protect_frames()
442 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_encrypt()
464 wpa_printf(MSG_DEBUG, "%s -> %s, %u", __func__, in macsec_drv_set_replay_protect()
489 wpa_printf(MSG_DEBUG, "%s -> %02" PRIx8, __func__, offload); in macsec_drv_set_offload()
500 __func__); in macsec_drv_set_offload()
516 wpa_printf(MSG_DEBUG, "%s -> %016" PRIx64, __func__, cs); in macsec_drv_set_current_cipher_suite()
536 wpa_printf(MSG_DEBUG, "%s -> %s", __func__, enabled ? "TRUE" : "FALSE"); in macsec_drv_enable_controlled_port()
[all …]
/hostap-latest/src/pae/
Dieee802_1x_secy_ops.c33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_protect_frames()
53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_encrypt()
73 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_replay()
93 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_offload()
113 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_current_cipher_suite()
141 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_enable_port()
161 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_capability()
182 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_receive_lowest_pn()
203 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_transmit_next_pn()
224 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_set_transmit_next_pn()
[all …]
/hostap-latest/wpa_supplicant/dbus/
Ddbus_dict_helpers.c627 wpa_printf(MSG_MSGDUMP, "%s: start reading a dict entry", __func__); in wpa_dbus_dict_open_read()
639 __func__, type, in wpa_dbus_dict_open_read()
681 __func__); in _wpa_dbus_dict_entry_get_byte_array()
737 __func__); in _wpa_dbus_dict_entry_get_uint16_array()
791 __func__); in _wpa_dbus_dict_entry_get_string_array()
799 __func__, wpa_debug_show_keys ? value : "[omitted]"); in _wpa_dbus_dict_entry_get_string_array()
804 __func__); in _wpa_dbus_dict_entry_get_string_array()
813 __func__, entry->array_len); in _wpa_dbus_dict_entry_get_string_array()
848 wpa_printf(MSG_MSGDUMP, "%s: parsing binarray type %c", __func__, type); in _wpa_dbus_dict_entry_get_binarray()
855 __func__, type); in _wpa_dbus_dict_entry_get_binarray()
[all …]
Ddbus_new_handlers.c527 "%s: given type is not basic", __func__); in wpas_dbus_simple_property_getter()
537 "%s: error constructing reply", __func__); in wpas_dbus_simple_property_getter()
562 "%s: given type is not basic", __func__); in wpas_dbus_simple_property_setter()
604 "%s: given type is not basic", __func__); in wpas_dbus_simple_array_property_getter()
616 "%s: failed to construct message", __func__); in wpas_dbus_simple_array_property_getter()
646 "%s: unknown element type %d", __func__, type); in wpas_dbus_simple_array_property_getter()
656 __func__); in wpas_dbus_simple_array_property_getter()
664 "%s: failed to construct message 3", __func__); in wpas_dbus_simple_array_property_getter()
698 "%s: given type is not basic", __func__); in wpas_dbus_simple_array_array_property_getter()
711 "%s: failed to construct message", __func__); in wpas_dbus_simple_array_array_property_getter()
[all …]
/hostap-latest/src/crypto/
Dcrypto_linux.c37 __func__, strerror(errno)); in linux_af_alg_socket()
48 __func__, type, name, strerror(errno)); in linux_af_alg_socket()
73 __func__, strerror(errno)); in linux_af_alg_hash_vector()
81 __func__, strerror(errno)); in linux_af_alg_hash_vector()
91 __func__, strerror(errno)); in linux_af_alg_hash_vector()
97 __func__, (int) res, (int) len[i]); in linux_af_alg_hash_vector()
106 __func__, strerror(errno)); in linux_af_alg_hash_vector()
112 __func__, (int) res, (int) mac_len); in linux_af_alg_hash_vector()
296 __func__, strerror(errno)); in crypto_hash_init()
305 __func__, strerror(errno)); in crypto_hash_init()
[all …]
Dtls_openssl.c339 __func__); in tls_crl_cert_reload()
344 tls_show_errors(MSG_WARNING, __func__, in tls_crl_cert_reload()
395 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_pub_enc()
403 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_pub_dec()
432 __func__); in cryptoapi_rsa_priv_enc()
490 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); in cryptoapi_rsa_priv_dec()
690 "'%s': error=%d", __func__, store, in tls_cryptoapi_ca_cert()
712 tls_show_errors(MSG_WARNING, __func__, in tls_cryptoapi_ca_cert()
722 "'%s': error=%d", __func__, name + 13, in tls_cryptoapi_ca_cert()
1718 tls_show_errors(MSG_INFO, __func__, in tls_connection_init()
[all …]
/hostap-latest/src/utils/
Dbrowser.c33 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__); in win_cb_destroy()
96 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, in view_cb_notify_estimated_load_progress()
109 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); in view_cb_resource_load_starting()
119 wpa_printf(MSG_DEBUG, "BROWSER:%s type=%d", __func__, type); in view_cb_decide_policy()
145 __func__, uri); in view_cb_decide_policy()
172 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri ? uri : "N/A"); in view_cb_mouse_target_changed()
189 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title); in view_cb_notify_title()
201 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, in view_cb_notify_progress()
212 __func__, status, webkit_web_view_get_uri(view)); in view_cb_notify_load_status()
229 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); in view_cb_resource_request_starting()
[all …]
Dutils_module_tests.c617 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2()
621 __func__, t->magic); in eloop_test_read_2()
626 __func__, sock, t->pipefd2[0]); in eloop_test_read_2()
631 __func__, sock, (int) res); in eloop_test_read_2()
639 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2_wrong()
643 __func__, t->magic); in eloop_test_read_2_wrong()
648 __func__, sock, t->pipefd2[0]); in eloop_test_read_2_wrong()
658 __func__); in eloop_test_read_2_wrong()
699 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_1()
703 __func__, t->magic); in eloop_test_read_1()
[all …]
/hostap-latest/src/l2_packet/
Dl2_packet_linux.c167 __func__, MAC2STR(ll.sll_addr), (int) res); in l2_packet_receive()
198 __func__); in l2_packet_receive()
204 __func__); in l2_packet_receive()
242 __func__, MAC2STR(ll.sll_addr), (int) res); in l2_packet_receive_br()
245 wpa_printf(MSG_DEBUG, "%s: Drop RX of own frame", __func__); in l2_packet_receive_br()
254 wpa_printf(MSG_DEBUG, "%s: Drop duplicate RX", __func__); in l2_packet_receive_br()
259 wpa_printf(MSG_DEBUG, "%s: Drop duplicate RX(prev)", __func__); in l2_packet_receive_br()
296 __func__, strerror(errno)); in l2_packet_init()
304 __func__, strerror(errno)); in l2_packet_init()
318 __func__, strerror(errno)); in l2_packet_init()
[all …]
/hostap-latest/src/tls/
Dbignum.c83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_get_unsigned_bin()
102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_set_unsigned_bin()
144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_add()
162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_sub()
180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_mul()
200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_mulmod()
220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); in bignum_exptmod()
/hostap-latest/tests/hwsim/tnc/
Dhostap2_imc.c34 __func__, (unsigned) imcID, (unsigned) minVersion, in TNC_IMC_Initialize()
63 __func__, (unsigned) imcID, (unsigned) connectionID); in TNC_IMC_BeginHandshake()
89 __func__, (unsigned) imcID); in TNC_IMC_ProvideBindFunction()
129 __func__, (unsigned) imcID, (unsigned) connectionID, in TNC_IMC_NotifyConnectionChange()
147 __func__, (unsigned) imcID, (unsigned) connectionID, in TNC_IMC_ReceiveMessage()
170 __func__, (unsigned) imcID, (unsigned) connectionID); in TNC_IMC_BatchEnding()
180 __func__, (unsigned) imcID); in TNC_IMC_Terminate()
Dhostap2_imv.c35 __func__, (unsigned) imvID, (unsigned) minVersion, in TNC_IMV_Initialize()
63 __func__, (unsigned) imvID, (unsigned) connectionID, in TNC_IMV_NotifyConnectionChange()
89 __func__, (unsigned) imvID, (unsigned) connectionID, in TNC_IMV_ReceiveMessage()
126 __func__, (unsigned) imvID, (unsigned) connectionID); in TNC_IMV_SolicitRecommendation()
145 __func__, (unsigned) imvID, (unsigned) connectionID); in TNC_IMV_BatchEnding()
155 __func__, (unsigned) imvID); in TNC_IMV_Terminate()
168 __func__, (unsigned) imvID); in TNC_IMV_ProvideBindFunction()
Dhostap_imc.c23 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_Initialize()
47 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_BeginHandshake()
63 wpa_printf(MSG_INFO, "IMC(hostap) %s", __func__); in TNC_IMC_ProvideBindFunction()
/hostap-latest/src/ap/
Dvlan_full.c143 "failed: %s", __func__, strerror(errno)); in br_delif()
155 __func__, if_name); in br_delif()
170 "%s", __func__, br_name, if_name, strerror(errno)); in br_delif()
198 "failed: %s", __func__, strerror(errno)); in br_addif()
215 __func__, if_name); in br_addif()
235 "%s", __func__, br_name, if_name, strerror(errno)); in br_addif()
254 "failed: %s", __func__, strerror(errno)); in br_delbr()
267 "%s: %s", __func__, br_name, strerror(errno)); in br_delbr()
294 "failed: %s", __func__, strerror(errno)); in br_addbr()
317 __func__, br_name, strerror(errno)); in br_addbr()
[all …]
Dvlan_ioctl.c33 "failed: %s", __func__, strerror(errno)); in vlan_rem()
44 "%s", __func__, if_name, strerror(errno)); in vlan_rem()
79 "failed: %s", __func__, strerror(errno)); in vlan_add()
117 __func__, if_request.device1, strerror(errno)); in vlan_add()
137 __func__, strerror(errno)); in vlan_set_name_type()
148 __func__, name_type, strerror(errno)); in vlan_set_name_type()
Dvlan_ifconfig.c26 "failed: %s", __func__, strerror(errno)); in ifconfig_helper()
36 __func__, if_name, strerror(errno)); in ifconfig_helper()
49 __func__, if_name, up, strerror(errno)); in ifconfig_helper()
/hostap-latest/tests/fuzzing/eapol-key-supp/
Deapol-key-supp.c76 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_bssid()
84 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); in supp_set_state()
116 __func__, MAC2STR(dest), proto, (unsigned long) len); in supp_ether_send()
128 __func__, type, data_len); in supp_alloc_eapol()
166 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie()
182 __func__, alg, MAC2STR(addr), key_idx, set_tx, key_flag, in supp_set_key()
195 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection()
202 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout()
214 wpa_printf(MSG_DEBUG, "SUPP: %s(%d)", __func__, reason_code); in supp_deauthenticate()
/hostap-latest/wpa_supplicant/
Dibss_rsn.c71 __func__, MAC2STR(dest), proto, (unsigned long) len, in supp_ether_send()
91 __func__, type, data_len); in supp_alloc_eapol()
118 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie()
155 __func__, alg, MAC2STR(addr), key_idx, set_tx); in supp_set_key()
193 __func__, MAC2STR(addr), protection_type, key_type); in supp_mlme_setprotection()
200 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout()
206 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_deauthenticate()
212 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_reconnect()
287 __func__, MAC2STR(addr), prev_psk); in auth_get_psk()
302 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt); in auth_send_eapol()
[all …]
Dpreauth_test.c103 printf("%s - not implemented\n", __func__); in wpa_ether_send()
122 printf("%s - not implemented\n", __func__); in wpa_supplicant_get_beacon_ie()
129 printf("%s - not implemented\n", __func__); in wpa_supplicant_get_bssid()
140 printf("%s - not implemented\n", __func__); in wpa_supplicant_set_key()
149 printf("%s - not implemented\n", __func__); in wpa_supplicant_mlme_setprotection()
161 printf("%s - not implemented\n", __func__); in wpa_supplicant_add_pmkid()
170 printf("%s - not implemented\n", __func__); in wpa_supplicant_remove_pmkid()

12345