Home
last modified time | relevance | path

Searched refs:MSG_INFO (Results 1 – 25 of 233) sorted by relevance

12345678910

/external/wpa_supplicant_8/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Dikev2.c58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
135 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
142 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
156 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
230 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
243 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
257 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
265 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
281 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pax.c199 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check()
241 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check()
248 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check()
256 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check()
261 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check()
267 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check()
277 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check()
313 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2()
325 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2()
332 wpa_printf(MSG_INFO, "EAP-PAX: Failed to allocate memory for " in eap_pax_process_std_2()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_server_pwd.c86 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init()
106 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init()
117 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
204 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req()
217 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req()
225 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req()
233 wpa_printf(MSG_INFO, "EAP-PWD (server): point allocation " in eap_pwd_build_commit_req()
240 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req()
248 wpa_printf(MSG_INFO, "EAP-PWD (server): data allocation fail"); in eap_pwd_build_commit_req()
308 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req()
[all …]
Deap_server_pax.c194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check()
236 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check()
243 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check()
251 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check()
256 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check()
262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check()
272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check()
308 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2()
320 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2()
327 wpa_printf(MSG_INFO, "EAP-PAX: Failed to allocate memory for " in eap_pax_process_std_2()
[all …]
/external/wpa_supplicant_8/src/utils/
Dtrace.c53 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd()
58 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd()
64 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd()
83 wpa_printf(MSG_INFO, "No symbols"); in read_syms()
93 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms()
99 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms()
108 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms()
187 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr()
227 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init()
234 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
142 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
234 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
243 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
256 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
270 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
278 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
294 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pwd.c87 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
93 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
98 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
103 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
216 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
222 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
227 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
239 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_id_exchange()
[all …]
Deap_pax.c56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init()
62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init()
128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1()
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1()
144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1()
152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1()
244 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3()
251 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3()
260 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3()
268 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Dikev2.c54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
147 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
154 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
168 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
239 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
248 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
261 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
275 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
283 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
299 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pax.c63 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init()
69 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init()
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1()
142 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1()
151 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1()
159 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1()
251 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3()
258 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3()
267 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3()
275 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
Dtlsv1_cred.c54 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der()
111 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert()
118 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert()
124 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert()
154 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain()
187 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert()
217 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key()
254 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key()
366 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob()
373 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Dikev2_common.c203 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_encrypt()
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt()
235 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt()
261 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_decrypt()
267 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " in ikev2_encr_decrypt()
293 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt()
298 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt()
324 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads()
331 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads()
395 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads()
[all …]
Deap_sim_common.c512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
539 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr()
557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr()
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr()
586 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
599 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr()
607 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
626 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
[all …]
Deap_pwd_common.c116 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); in compute_password_element()
125 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); in compute_password_element()
135 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element()
141 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " in compute_password_element()
146 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); in compute_password_element()
150 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " in compute_password_element()
157 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element()
165 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " in compute_password_element()
239 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); in compute_password_element()
247 wpa_printf(MSG_INFO, "EAP-pwd: cannot " in compute_password_element()
[all …]
Deap_common.c36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_len_valid()
42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_len_valid()
84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate()
94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate()
103 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Dikev2_common.c208 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_encrypt()
235 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt()
240 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt()
266 wpa_printf(MSG_INFO, "IKEV2: Invalid encr key length"); in ikev2_encr_decrypt()
272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " in ikev2_encr_decrypt()
298 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt()
303 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt()
329 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads()
336 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads()
400 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads()
[all …]
Deap_sim_common.c517 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
523 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
529 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
544 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr()
562 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr()
578 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr()
591 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
604 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr()
612 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
631 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
[all …]
Deap_common.c47 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_validate()
53 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_validate()
63 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate()
73 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate()
82 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
Dtls_openssl.c109 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors()
144 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error()
188 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc()
209 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc()
347 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert()
355 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert()
455 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert()
512 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb()
564 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic()
574 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic()
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c212 wpa_printf(MSG_INFO, "TDLS: Failed to send message " in wpa_tdls_tpk_send()
229 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_tpk_send()
290 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " in wpa_tdls_tpk_retry_timeout()
295 wpa_printf(MSG_INFO, "TDLS: No retry buffer available " in wpa_tdls_tpk_retry_timeout()
310 wpa_printf(MSG_INFO, "TDLS: Failed to retry " in wpa_tdls_tpk_retry_timeout()
347 wpa_printf(MSG_INFO, "TDLS: Error in cancelling retry timeout " in wpa_tdls_tpk_retry_timeout_cancel()
539 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - " in wpa_supplicant_verify_tdls_mic()
566 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - " in wpa_supplicant_verify_tdls_mic_teardown()
571 wpa_printf(MSG_INFO, "TDLS: Could not verify TDLS Teardown " in wpa_supplicant_verify_tdls_mic_teardown()
658 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_send_teardown()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_cred.c48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der()
123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert()
130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert()
136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert()
166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain()
199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert()
300 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key()
338 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key()
450 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob()
457 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c113 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors()
148 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error()
192 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc()
213 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc()
351 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert()
359 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert()
459 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert()
516 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb()
577 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic()
587 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic()
[all …]
/external/wpa_supplicant_8/src/drivers/
Drfkill.c80 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_receive()
83 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_receive()
86 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked"); in rfkill_receive()
113 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control " in rfkill_init()
147 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_init()
150 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_init()

12345678910