/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_parse.c | 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", in wps_set_vendor_ext_wfa_subelem() 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 63 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem() 98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 110 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", in wps_parse_vendor_ext() 114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() 120 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext() [all …]
|
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_auth_type() [all …]
|
D | wps_enrollee.c | 21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr() 36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 105 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() 124 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1() 181 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3() 184 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
D | wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr() 35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr() 43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " in wps_set_attr() 51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce " in wps_set_attr() 59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u", in wps_set_attr() 67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u", in wps_set_attr() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication " in wps_set_attr() 83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type " in wps_set_attr() 91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type " in wps_set_attr() 99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods " in wps_set_attr() [all …]
|
D | wps_attr_process.c | 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 131 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_auth_type() [all …]
|
D | wps_enrollee.c | 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr() 40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 109 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() 128 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1() 167 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3() 170 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", in scard_parse_fsp_templ() 320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() 426 wpa_printf(MSG_DEBUG, "SCARD: Failed to read " in scard_get_aid() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | vlan_util.c | 40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " in vlan_add() 44 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add() 50 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add() 57 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket"); in vlan_add() 62 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink"); in vlan_add() 68 wpa_printf(MSG_ERROR, "VLAN: failed to alloc cache"); in vlan_add() 74 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist", in vlan_add() 83 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists", in vlan_add() 91 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link"); in vlan_add() 96 wpa_printf(MSG_ERROR, "VLAN: failed to set link type"); in vlan_add() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
D | tlsv1_server_read.c | 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello() 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello() 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello() 86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello() 89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello() 142 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " in tls_process_client_hello() 150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello() 173 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL " in tls_process_client_hello() 181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello() 191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello() [all …]
|
D | tlsv1_client_read.c | 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 129 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() 137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 159 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() 182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys() 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() 147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys_reauth() 459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime() 462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime() 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", in eap_sim_parse_attr() 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() [all …]
|
D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.c | 87 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys() 124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() 152 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys_reauth() 464 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime() 467 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime() 517 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 520 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", in eap_sim_parse_attr() 523 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 529 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() [all …]
|
D | eap_sake_common.c | 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 267 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV " in scard_parse_fsp_templ() 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() 363 wpa_printf(MSG_DEBUG, "SCARD: Failed to read " in scard_get_aid() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello() 56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello() 62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello() 81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello() 84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello() 104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello() 152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " in tls_process_client_hello() 160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello() 183 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL " in tls_process_client_hello() 191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello() [all …]
|
D | tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 130 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 160 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute() 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute() 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute() 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute() 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute() 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute() 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute() 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute() 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute() 73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state() 79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); in eap_sim_init() 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); in eap_sim_build_start() 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); in eap_sim_build_start() 131 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); in eap_sim_build_start() 134 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); in eap_sim_build_start() 137 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); in eap_sim_build_start() 165 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " in eap_sim_build_encr() 174 wpa_printf(MSG_DEBUG, " AT_IV"); in eap_sim_build_encr() 175 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); in eap_sim_build_encr() [all …]
|
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 167 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 178 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() [all …]
|
D | eap_server_aka.c | 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state() 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); in eap_aka_check_identity_reauth() 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " in eap_aka_check_identity_reauth() 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); in eap_aka_check_identity_reauth() 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", in eap_aka_check_identity() 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " in eap_aka_check_identity() 185 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); in eap_aka_init() 211 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); in eap_aka_prime_init() 274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); in eap_aka_add_checkcode() 313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " in eap_aka_verify_checkcode() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | ikev2.c | 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 135 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 142 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 150 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 151 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 156 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 172 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 177 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 183 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() 223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 142 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 178 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 184 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 191 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 198 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | ikev2.c | 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 147 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 154 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 162 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 163 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 168 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 183 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 189 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 196 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 203 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() [all …]
|