Lines Matching refs:MSG_INFO

54 	wpa_printf(MSG_INFO, "printf encode/decode tests");  in printf_encode_decode_tests()
59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests()
134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests()
231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests()
259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests()
286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests()
302 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests()
370 wpa_printf(MSG_INFO, "common tests"); in common_tests()
454 wpa_printf(MSG_INFO, "os tests"); in os_tests()
519 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests()
575 wpa_printf(MSG_INFO, "ip_addr tests"); in ip_addr_tests()
617 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2()
620 wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x", in eloop_test_read_2()
625 wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d", in eloop_test_read_2()
630 wpa_printf(MSG_INFO, "%s: sock=%d --> res=%d", in eloop_test_read_2()
639 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_2_wrong()
642 wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x", in eloop_test_read_2_wrong()
647 wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d", in eloop_test_read_2_wrong()
665 wpa_printf(MSG_INFO, "pipefd2 had been closed"); in reopen_pipefd2()
669 wpa_printf(MSG_INFO, "close pipefd2"); in reopen_pipefd2()
678 wpa_printf(MSG_INFO, "pipe: %s", strerror(errno)); in reopen_pipefd2()
684 wpa_printf(MSG_INFO, in reopen_pipefd2()
699 wpa_printf(MSG_INFO, "%s: sock=%d", __func__, sock); in eloop_test_read_1()
702 wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x", in eloop_test_read_1()
707 wpa_printf(MSG_INFO, "%s: unexpected sock %d != %d", in eloop_test_read_1()
712 wpa_printf(MSG_INFO, "%s: sock=%d --> res=%d", in eloop_test_read_1()
724 wpa_printf(MSG_INFO, "%s", __func__); in eloop_test_cb()
727 wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x", in eloop_test_cb()
741 wpa_printf(MSG_INFO, "%s", __func__); in eloop_test_timeout()
744 wpa_printf(MSG_INFO, "%s: unexpected magic 0x%x", in eloop_test_timeout()
749 wpa_printf(MSG_INFO, "pipefd1 had not been closed"); in eloop_test_timeout()
758 wpa_printf(MSG_INFO, "pipefd2 had not been closed"); in eloop_test_timeout()
768 wpa_printf(MSG_INFO, "%s - free(%p)", __func__, t); in eloop_test_timeout()
787 wpa_printf(MSG_INFO, "starting eloop tests (%p) (close_in_timeout=%d)", in eloop_tests_start()
792 wpa_printf(MSG_INFO, "pipe: %s", strerror(errno)); in eloop_tests_start()
799 wpa_printf(MSG_INFO, "pipe: %s", strerror(errno)); in eloop_tests_start()
806 wpa_printf(MSG_INFO, "pipe fds: %d,%d %d,%d", in eloop_tests_start()
816 wpa_printf(MSG_INFO, "write: %s", strerror(errno)); in eloop_tests_start()
818 wpa_printf(MSG_INFO, "write: %s", strerror(errno)); in eloop_tests_start()
820 wpa_printf(MSG_INFO, "waiting for eloop callbacks"); in eloop_tests_start()
832 wpa_printf(MSG_INFO, "schedule eloop tests to be run"); in eloop_tests()
895 wpa_printf(MSG_INFO, "JSON tests"); in json_tests()
903 wpa_printf(MSG_INFO, "JSON test %u failed", i); in json_tests()
908 wpa_printf(MSG_INFO, in json_tests()
1069 wpa_printf(MSG_INFO, "constant time tests"); in const_time_tests()
1216 wpa_printf(MSG_INFO, "utils module tests"); in utils_module_tests()