/external/wpa_supplicant_8/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | ikev2.c | 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 135 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 142 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 156 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 243 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 257 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 265 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 281 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pax.c | 199 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check() 241 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check() 248 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check() 256 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check() 261 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check() 267 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check() 277 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check() 313 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2() 325 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2() 332 wpa_printf(MSG_INFO, "EAP-PAX: Failed to allocate memory for " in eap_pax_process_std_2() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_server_pwd.c | 86 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 106 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 117 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init() 204 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req() 217 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req() 225 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req() 233 wpa_printf(MSG_INFO, "EAP-PWD (server): point allocation " in eap_pwd_build_commit_req() 240 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req() 248 wpa_printf(MSG_INFO, "EAP-PWD (server): data allocation fail"); in eap_pwd_build_commit_req() 308 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req() [all …]
|
D | eap_server_pax.c | 194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check() 236 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check() 243 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check() 251 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check() 256 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check() 262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check() 272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check() 308 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2() 320 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2() 327 wpa_printf(MSG_INFO, "EAP-PAX: Failed to allocate memory for " in eap_pax_process_std_2() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | trace.c | 53 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 58 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 64 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 83 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 93 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 99 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 108 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 187 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 227 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 234 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 142 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 256 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 270 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 278 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 294 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pwd.c | 87 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 93 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 98 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 103 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init() 216 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange() 222 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange() 227 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange() 239 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_id_exchange() [all …]
|
D | eap_pax.c | 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init() 62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init() 128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1() 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1() 144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1() 152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1() 244 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3() 251 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3() 260 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3() 268 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | ikev2.c | 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 147 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 154 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 168 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 261 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 275 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 283 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 299 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pax.c | 63 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init() 69 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init() 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1() 142 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1() 151 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1() 159 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1() 251 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3() 258 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3() 267 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3() 275 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
D | tlsv1_cred.c | 54 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 111 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 118 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 124 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 154 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 187 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert() 217 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key() 254 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key() 366 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob() 373 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 203 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_encrypt() 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt() 235 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt() 261 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_decrypt() 267 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " in ikev2_encr_decrypt() 293 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt() 298 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt() 324 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads() 331 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads() 395 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads() [all …]
|
D | eap_sim_common.c | 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() 539 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr() 557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr() 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr() 586 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 599 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr() 607 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 626 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() [all …]
|
D | eap_pwd_common.c | 116 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); in compute_password_element() 125 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); in compute_password_element() 135 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element() 141 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " in compute_password_element() 146 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); in compute_password_element() 150 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " in compute_password_element() 157 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element() 165 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " in compute_password_element() 239 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); in compute_password_element() 247 wpa_printf(MSG_INFO, "EAP-pwd: cannot " in compute_password_element() [all …]
|
D | eap_common.c | 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_len_valid() 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_len_valid() 84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate() 94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate() 103 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | ikev2_common.c | 208 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_encrypt() 235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt() 240 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt() 266 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_decrypt() 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " in ikev2_encr_decrypt() 298 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt() 303 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt() 329 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads() 336 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads() 400 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads() [all …]
|
D | eap_sim_common.c | 517 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 523 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 529 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() 544 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr() 562 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr() 578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr() 591 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 604 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr() 612 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 631 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() [all …]
|
D | eap_common.c | 47 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_validate() 53 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_validate() 63 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate() 73 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate() 82 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | tls_openssl.c | 109 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors() 144 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error() 188 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc() 209 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc() 347 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert() 355 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert() 455 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert() 512 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb() 564 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic() 574 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 212 wpa_printf(MSG_INFO, "TDLS: Failed to send message " in wpa_tdls_tpk_send() 229 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_tpk_send() 290 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " in wpa_tdls_tpk_retry_timeout() 295 wpa_printf(MSG_INFO, "TDLS: No retry buffer available " in wpa_tdls_tpk_retry_timeout() 310 wpa_printf(MSG_INFO, "TDLS: Failed to retry " in wpa_tdls_tpk_retry_timeout() 347 wpa_printf(MSG_INFO, "TDLS: Error in cancelling retry timeout " in wpa_tdls_tpk_retry_timeout_cancel() 539 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - " in wpa_supplicant_verify_tdls_mic() 566 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - " in wpa_supplicant_verify_tdls_mic_teardown() 571 wpa_printf(MSG_INFO, "TDLS: Could not verify TDLS Teardown " in wpa_supplicant_verify_tdls_mic_teardown() 658 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_send_teardown() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_cred.c | 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert() 300 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key() 338 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key() 450 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob() 457 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 113 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors() 148 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error() 192 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc() 213 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc() 351 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert() 359 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert() 459 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert() 516 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb() 577 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic() 587 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic() [all …]
|
/external/wpa_supplicant_8/src/drivers/ |
D | rfkill.c | 80 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_receive() 83 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_receive() 86 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked"); in rfkill_receive() 113 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control " in rfkill_init() 147 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_init() 150 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_init()
|