HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 1 - 25 of 241) sorted by null

1 2 3 4 5 6 7 8 910

  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_parse.c 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type "
43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce "
51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce "
59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u",
67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u",
75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication "
83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type "
91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type "
99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods
    [all...]
wps_attr_process.c 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
131 wpa_printf(MSG_DEBUG, "WPS: Credential did not include
    [all...]
wps_enrollee.c 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address");
40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1");
109 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2");
128 wpa_printf(MSG_DEBUG, "WPS: Building Message M1");
167 wpa_printf(MSG_DEBUG, "WPS: Building Message M3");
170 wpa_printf(MSG_DEBUG, "WPS: No Device Password available")
    [all...]
wps_attr_build.c 28 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
32 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
55 wpa_printf(MSG_DEBUG, "WPS: * Request Type");
65 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods);
75 wpa_printf(MSG_DEBUG, "WPS: * UUID-E");
85 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id);
95 wpa_printf(MSG_DEBUG, "WPS: * Configuration Error (%d)", err);
110 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
124 wpa_printf(MSG_DEBUG, "WPS: * Authenticator");
135 wpa_printf(MSG_DEBUG, "WPS: * Version")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_wsc_common.c 29 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
34 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
eap_sake_common.c 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_sim_common.c 87 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
152 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
464 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
467 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc);
517 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)");
520 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d",
523 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow "
529 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow")
    [all...]
eap_ikev2_common.c 64 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory "
72 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory "
78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
115 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV");
120 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV");
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
  /external/wpa_supplicant/
eap_sake_common.c 30 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
32 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
39 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
41 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
48 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
50 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
57 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
59 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
71 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_sim_common.c 85 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
122 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
137 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
150 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
247 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)");
250 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d",
253 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow "
259 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow");
269 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_RAND");
274 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND
    [all...]
events.c 42 wpa_printf(MSG_INFO, "No network configuration found for the "
48 wpa_printf(MSG_DEBUG, "Selected network is disabled");
52 wpa_printf(MSG_DEBUG, "Network configuration found for the current "
119 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA "
128 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event");
131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
206 wpa_printf(MSG_DEBUG, "Selected network is configured to use "
211 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM "
222 wpa_printf(MSG_WARNING, "Failed to initialize SIM "
271 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed")
    [all...]
pcsc_funcs.c 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
267 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV "
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record");
363 wpa_printf(MSG_DEBUG, "SCARD: Failed to read
    [all...]
asn1_test.c 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) "
86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero "
91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix);
95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected "
100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s",
120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null "
124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix);
128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID");
132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str);
141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix)
    [all...]
eap_tlv.c 128 wpa_printf(MSG_DEBUG, "EAP-TLV: TLV underrun "
140 wpa_printf(MSG_DEBUG, "EAP-TLV: Unsupported TLV Type "
158 wpa_printf(MSG_DEBUG, "EAP-TLV: Last TLV too short in "
169 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV "
176 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success "
179 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure"
188 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure");
192 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result "
ctrl_iface_named_pipe.c 129 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
147 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
155 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d",
182 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d",
188 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d",
198 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
208 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
230 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
264 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
209 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)"
    [all...]
asn1_test.c 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) "
86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero "
91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix);
95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected "
100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s",
120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null "
124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix);
128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID");
132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str);
141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix)
    [all...]
tlsv1_server_read.c 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
142 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite "
150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
173 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL "
181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the "
191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_osx.m 41 wpa_printf(MSG_DEBUG, "Key:");
43 wpa_printf(MSG_DEBUG, "Value:");
52 wpa_printf(MSG_DEBUG, "OSX: Dump dictionary %s - %u entries",
68 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d",
73 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off");
94 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d",
99 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off");
131 wpa_printf(MSG_DEBUG, "CFStringCreateWithBytes "
140 wpa_printf(MSG_DEBUG, "OSX: WirelessDirectedScan "
147 wpa_printf(MSG_DEBUG, "OSX: WirelessScan failed:
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
ikev2.c 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
135 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
142 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
150 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
151 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
156 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
172 wpa_printf(MSG_DEBUG, "IKEV2: No "
177 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
183 wpa_printf(MSG_DEBUG, "IKEV2: "
223 wpa_printf(MSG_INFO, "IKEV2: Too short proposal")
    [all...]
eap_tls_common.c 32 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS "
38 wpa_printf(MSG_INFO, "SSL: Failed to configure verification "
116 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
118 wpa_printf(MSG_ERROR, "SSL: out_buf NULL in %s", __func__);
151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
178 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
208 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
147 wpa_printf(MSG_INFO, "IKEV2: Too short transform");
154 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
162 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
163 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
168 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
183 wpa_printf(MSG_DEBUG, "IKEV2: No "
189 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
196 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
203 wpa_printf(MSG_DEBUG, "IKEV2:
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.c 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
267 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV "
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record");
363 wpa_printf(MSG_DEBUG, "SCARD: Failed to read
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
65 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
73 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
81 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
113 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
143 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
171 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
180 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
151 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)",
168 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)",
185 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)",
262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
309 wpa_printf(MSG_DEBUG, "FT: Invalid R1KH-ID "
321 wpa_printf(MSG_DEBUG, "FT: Invalid R0KH-ID "
365 wpa_printf(MSG_DEBUG, "FT: Failed to parse "
399 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
411 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d"
    [all...]

Completed in 228 milliseconds

1 2 3 4 5 6 7 8 910