Home
last modified time | relevance | path

Searched refs:wpa_printf (Results 1 – 25 of 252) sorted by relevance

1234567891011

/external/wpa_supplicant_8/src/wps/
Dwps_attr_parse.c23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", in wps_set_vendor_ext_wfa_subelem()
28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
63 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem()
98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
110 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", in wps_parse_vendor_ext()
114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext()
120 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext()
[all …]
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_auth_type()
[all …]
Dwps_enrollee.c21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr()
36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
105 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2()
124 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1()
181 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3()
184 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3()
[all …]
Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key()
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key()
32 wpa_printf(MSG_DEBUG, in wps_build_public_key()
43 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key()
45 wpa_printf(MSG_DEBUG, in wps_build_public_key()
50 wpa_printf(MSG_DEBUG, in wps_build_public_key()
59 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key()
65 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key()
91 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type()
101 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type); in wps_build_resp_type()
[all …]
/external/wpa_supplicant_8/src/utils/
Dpcsc_funcs.c192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols()
219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols()
271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ()
285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", in scard_parse_fsp_templ()
320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ()
333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ()
406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid()
415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid()
421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid()
426 wpa_printf(MSG_DEBUG, "SCARD: Failed to read " in scard_get_aid()
[all …]
/external/wpa_supplicant_8/src/ap/
Dvlan_util.c40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " in vlan_add()
44 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add()
50 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add()
57 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket"); in vlan_add()
62 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink"); in vlan_add()
68 wpa_printf(MSG_ERROR, "VLAN: failed to alloc cache"); in vlan_add()
74 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist", in vlan_add()
83 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists", in vlan_add()
91 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link"); in vlan_add()
96 wpa_printf(MSG_ERROR, "VLAN: failed to set link type"); in vlan_add()
[all …]
Dvlan_init.c50 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " in ifconfig_helper()
59 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCGIFFLAGS) failed " in ifconfig_helper()
72 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl(SIOCSIFFLAGS) failed " in ifconfig_helper()
86 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name); in ifconfig_up()
93 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name); in ifconfig_down()
118 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name); in br_delif()
120 wpa_printf(MSG_ERROR, "VLAN: %s: socket(AF_INET,SOCK_STREAM) " in br_delif()
128 wpa_printf(MSG_ERROR, "VLAN: %s: Failure determining " in br_delif()
143 wpa_printf(MSG_ERROR, "VLAN: %s: ioctl[SIOCDEVPRIVATE," in br_delif()
169 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name); in br_addif()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys()
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth()
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth()
147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys_reauth()
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime()
462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime()
512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", in eap_sim_parse_attr()
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
[all …]
Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server_read.c41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello()
56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello()
62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello()
81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello()
84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello()
104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello()
152 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " in tls_process_client_hello()
160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello()
183 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL " in tls_process_client_hello()
191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello()
[all …]
Dtlsv1_client_read.c39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
130 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello()
138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
160 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello()
[all …]
Dx509v3.c50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free()
197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_algorithm_identifier()
239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_public_key()
258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " in x509_parse_public_key()
267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", in x509_parse_public_key()
279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key()
315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name()
333 wpa_printf(MSG_DEBUG, "X509: Expected SET " in x509_parse_name()
346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name()
363 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name()
[all …]
/external/wpa_supplicant_8/src/p2p/
Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute()
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute()
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute()
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute()
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute()
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute()
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute()
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute()
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute()
73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sim.c67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state()
79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); in eap_sim_init()
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); in eap_sim_build_start()
116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); in eap_sim_build_start()
132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); in eap_sim_build_start()
135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); in eap_sim_build_start()
138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); in eap_sim_build_start()
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " in eap_sim_build_encr()
175 wpa_printf(MSG_DEBUG, " AT_IV"); in eap_sim_build_encr()
176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); in eap_sim_build_encr()
[all …]
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform()
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
167 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform()
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform()
178 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
[all …]
Deap_server_aka.c83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state()
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); in eap_aka_check_identity_reauth()
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " in eap_aka_check_identity_reauth()
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); in eap_aka_check_identity_reauth()
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", in eap_aka_check_identity()
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " in eap_aka_check_identity()
185 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); in eap_aka_init()
211 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); in eap_aka_prime_init()
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); in eap_aka_add_checkcode()
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " in eap_aka_verify_checkcode()
[all …]
Deap_server_tls_common.c41 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " in eap_server_tls_ssl_init()
47 wpa_printf(MSG_INFO, "SSL: Failed to configure verification " in eap_server_tls_ssl_init()
125 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); in eap_server_tls_build_msg()
127 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); in eap_server_tls_build_msg()
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " in eap_server_tls_build_msg()
167 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " in eap_server_tls_build_msg()
185 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); in eap_server_tls_build_ack()
196 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); in eap_server_tls_process_cont()
201 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " in eap_server_tls_process_cont()
215 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " in eap_server_tls_process_fragment()
[all …]
Deap_server_gpsk.c58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state()
116 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); in eap_gpsk_build_gpsk_1()
119 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data"); in eap_gpsk_build_gpsk_1()
131 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " in eap_gpsk_build_gpsk_1()
158 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); in eap_gpsk_build_gpsk_3()
166 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " in eap_gpsk_build_gpsk_3()
209 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", in eap_gpsk_buildReq()
226 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame"); in eap_gpsk_check()
230 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); in eap_gpsk_check()
238 wpa_printf(MSG_INFO, "EAP-GPSK: Unexpected opcode=%d in state=%d", in eap_gpsk_check()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
142 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
149 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform()
158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform()
163 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
178 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform()
184 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform()
191 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform()
198 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform()
[all …]
Deap_sim.c75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state()
92 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " in eap_sim_init()
104 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid " in eap_sim_init()
111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " in eap_sim_init()
152 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); in eap_sim_gsm_auth()
165 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM " in eap_sim_gsm_auth()
177 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage " in eap_sim_gsm_auth()
180 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage " in eap_sim_gsm_auth()
198 wpa_printf(MSG_DEBUG, "EAP-SIM: " in eap_sim_gsm_auth()
222 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES " in eap_sim_gsm_auth()
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c156 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " in wpa_tdls_del_key()
179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " in wpa_tdls_set_key()
183 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", in wpa_tdls_set_key()
190 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the " in wpa_tdls_set_key()
213 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send()
220 wpa_printf(MSG_INFO, "TDLS: Failed to send message " in wpa_tdls_tpk_send()
237 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_tpk_send()
259 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " in wpa_tdls_tpk_send()
298 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " in wpa_tdls_tpk_retry_timeout()
303 wpa_printf(MSG_INFO, "TDLS: No retry buffer available " in wpa_tdls_tpk_retry_timeout()
[all …]
Dwpa_ft.c29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft()
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params()
177 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)", in wpa_ft_gen_req_ies()
192 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", in wpa_ft_gen_req_ies()
211 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)", in wpa_ft_gen_req_ies()
304 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); in wpa_ft_gen_req_ies()
322 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); in wpa_ft_install_ptk()
325 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d", in wpa_ft_install_ptk()
335 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); in wpa_ft_install_ptk()
356 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); in wpa_ft_prepare_auth_request()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dtls_nss.c45 wpa_printf(MSG_DEBUG, "NSS: I/O close"); in nss_io_close()
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); in nss_io_read()
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); in nss_io_write()
67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); in nss_io_writev()
78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); in nss_io_recv()
81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); in nss_io_recv()
91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); in nss_io_recv()
96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", in nss_io_recv()
110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); in nss_io_send()
115 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the " in nss_io_send()
[all …]
/external/wpa_supplicant_8/src/drivers/
Dndis_events.c124 wpa_printf(MSG_ERROR, "CreatePipe() failed: %d", in ndis_events_constructor()
130 wpa_printf(MSG_ERROR, "CreateEvent() failed: %d", in ndis_events_constructor()
184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); in ndis_events_release()
207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " in ndis_events_send_event()
221 wpa_printf(MSG_INFO, "WriteFile() failed: %d", (int) GetLastError()); in ndis_events_send_event()
228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); in ndis_events_media_connect()
235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); in ndis_events_media_disconnect()
250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); in ndis_events_media_specific()
256 wpa_printf(MSG_DEBUG, "Could not get " in ndis_events_media_specific()
267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " in ndis_events_media_specific()
[all …]

1234567891011