/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 96 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); in test_siv() 100 wpa_printf(MSG_ERROR, in test_siv() 106 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); in test_siv() 110 wpa_printf(MSG_ERROR, in test_siv() 125 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); in test_siv() 129 wpa_printf(MSG_ERROR, in test_siv() 135 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); in test_siv() 139 wpa_printf(MSG_ERROR, in test_siv() 144 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv() 227 wpa_printf(MSG_ERROR, "OMAC1-AES-128 test vector %u failed", i); in test_omac1_vector() [all …]
|
D | tls_gnutls.c | 91 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, in tls_log_func() 102 wpa_printf(MSG_DEBUG, in tls_init() 170 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); in tls_pull_func() 175 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", in tls_pull_func() 207 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " in tls_gnutls_init_session() 219 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at " in tls_gnutls_init_session() 232 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", in tls_gnutls_init_session() 260 wpa_printf(MSG_INFO, "Failed to configure " in tls_connection_init() 316 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session " in tls_connection_shutdown() 325 wpa_printf(MSG_INFO, "GnuTLS: Failed to configure credentials " in tls_connection_shutdown() [all …]
|
D | tls_openssl_ocsp.c | 29 wpa_printf(level, "OpenSSL: %s - %s %s", in tls_show_errors() 33 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors() 357 wpa_printf(MSG_DEBUG, in ocsp_resp_valid() 365 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid"); in ocsp_resp_valid() 373 wpa_printf(MSG_DEBUG, in ocsp_resp_valid() 380 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired"); in ocsp_resp_valid() 385 wpa_printf(MSG_DEBUG, in ocsp_resp_valid() 407 wpa_printf(MSG_DEBUG, in issuer_match() 425 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerNameHash: %s", in issuer_match() 445 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerKeyHash: %s", in issuer_match() [all …]
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
D | wps_attr_parse.c | 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", in wps_set_vendor_ext_wfa_subelem() 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem() 71 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem() 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 118 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", in wps_parse_vendor_ext() 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() [all …]
|
D | wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() 114 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1() 170 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3() 173 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3() 179 wpa_printf(MSG_INFO, in wps_build_m3() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 125 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_auth_type() [all …]
|
D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key() 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key() 32 wpa_printf(MSG_DEBUG, in wps_build_public_key() 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key() 52 wpa_printf(MSG_DEBUG, in wps_build_public_key() 57 wpa_printf(MSG_DEBUG, in wps_build_public_key() 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key() 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key() 98 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type() 108 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type); in wps_build_resp_type() [all …]
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_secy_ops.c | 33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_protect_frames() 39 wpa_printf(MSG_ERROR, in secy_cp_control_protect_frames() 53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_replay() 59 wpa_printf(MSG_ERROR, in secy_cp_control_replay() 74 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_current_cipher_suite() 80 wpa_printf(MSG_ERROR, in secy_cp_control_current_cipher_suite() 102 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_enable_port() 108 wpa_printf(MSG_ERROR, in secy_cp_control_enable_port() 123 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_get_receive_lowest_pn() 129 wpa_printf(MSG_ERROR, in secy_get_receive_lowest_pn() [all …]
|
/external/wpa_supplicant_8/hs20/client/ |
D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 85 wpa_printf(MSG_ERROR, in add_mo_container() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 182 wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text: '%s'", str); in process_update_node() [all …]
|
D | osu_client.c | 81 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str); in debug_dump_node() 119 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 122 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 130 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 136 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 139 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 144 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 150 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 153 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find estPassword node"); in osu_get_certificate() [all …]
|
D | oma_dm_client.c | 214 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 245 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 392 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 398 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 401 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 402 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 411 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 425 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 430 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 289 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", in scard_parse_fsp_templ() 325 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 338 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 413 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 422 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 428 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() 433 wpa_printf(MSG_DEBUG, "SCARD: Failed to read " in scard_get_aid() [all …]
|
D | utils_module_tests.c | 51 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 56 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 78 wpa_printf(MSG_ERROR, "Error in bounds checking#1"); in printf_encode_decode_tests() 86 wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)", in printf_encode_decode_tests() 117 wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors); in printf_encode_decode_tests() 131 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 211 wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors); in bitfield_tests() 228 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 242 wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors); in int_array_tests() 256 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute() 51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute() 57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute() 62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute() 67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute() 72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute() 77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute() 82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute() 86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute() 91 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys() 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() 147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys_reauth() 459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime() 462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime() 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 515 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", in eap_sim_parse_attr() 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() [all …]
|
D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 167 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 178 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() [all …]
|
D | eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state() 79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); in eap_sim_init() 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); in eap_sim_build_start() 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); in eap_sim_build_start() 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); in eap_sim_build_start() 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); in eap_sim_build_start() 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); in eap_sim_build_start() 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " in eap_sim_build_encr() 175 wpa_printf(MSG_DEBUG, " AT_IV"); in eap_sim_build_encr() 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); in eap_sim_build_encr() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_read.c | 52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); in tls_process_server_hello_extensions() 62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); in tls_process_server_hello_extensions() 66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions() 87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 129 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 137 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 158 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 179 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() [all …]
|
D | tlsv1_cred.c | 53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); in tlsv1_add_cert_der() 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " in tlsv1_add_cert() 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " in tlsv1_add_cert() 128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 201 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 208 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | vlan_util.c | 31 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " in vlan_add() 35 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add() 41 wpa_printf(MSG_ERROR, "VLAN: Interface name too long: '%s'", in vlan_add() 48 wpa_printf(MSG_ERROR, "VLAN: failed to open netlink socket"); in vlan_add() 54 wpa_printf(MSG_ERROR, "VLAN: failed to connect to netlink: %s", in vlan_add() 62 wpa_printf(MSG_ERROR, "VLAN: interface %s does not exist", in vlan_add() 75 wpa_printf(MSG_ERROR, "VLAN: interface %s already exists", in vlan_add() 83 wpa_printf(MSG_ERROR, "VLAN: failed to allocate new link"); in vlan_add() 89 wpa_printf(MSG_ERROR, "VLAN: failed to set link type: %s", in vlan_add() 99 wpa_printf(MSG_ERROR, "VLAN: failed to set link vlan id: %s", in vlan_add() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform() 141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 161 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform() 166 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform() 172 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform() 208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 180 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " in wpa_tdls_del_key() 203 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " in wpa_tdls_set_key() 207 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", in wpa_tdls_set_key() 214 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the " in wpa_tdls_set_key() 239 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send() 248 wpa_printf(MSG_INFO, "TDLS: Failed to send message " in wpa_tdls_tpk_send() 265 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_tpk_send() 293 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " in wpa_tdls_tpk_send() 324 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " in wpa_tdls_tpk_retry_timeout() 329 wpa_printf(MSG_INFO, "TDLS: No retry buffer available " in wpa_tdls_tpk_retry_timeout() [all …]
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_wired.c | 104 wpa_printf(MSG_ERROR, "setsockopt: %s", strerror(errno)); in wired_multicast_membership() 126 wpa_printf(MSG_MSGDUMP, "handle_data: too short (%lu)", in handle_data() 135 wpa_printf(MSG_MSGDUMP, "Received EAPOL packet"); in handle_data() 147 wpa_printf(MSG_DEBUG, "Unknown ethertype 0x%04x in data frame", in handle_data() 162 wpa_printf(MSG_ERROR, "recv: %s", strerror(errno)); in handle_read() 180 wpa_printf(MSG_ERROR, "recv: %s", strerror(errno)); in handle_dhcp() 186 wpa_printf(MSG_MSGDUMP, "handle_dhcp: too short (%d)", len); in handle_dhcp() 193 wpa_printf(MSG_MSGDUMP, "Got DHCP broadcast packet from " MACSTR, in handle_dhcp() 213 wpa_printf(MSG_ERROR, "socket[PF_PACKET,SOCK_RAW]: %s", in wired_init_sockets() 219 wpa_printf(MSG_INFO, "Could not register read socket"); in wired_init_sockets() [all …]
|