/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 169 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 546 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV " 553 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success " 556 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure" 565 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure"); 569 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result " 624 wpa_printf(MSG_INFO, "EAP-PEAP: too short " 725 wpa_printf(MSG_INFO, "EAP-PEAP: failed to initialize " 846 wpa_printf(MSG_INFO, "EAP-PEAPv2: Too short Phase 2 " 854 wpa_printf(MSG_INFO, "EAP-PEAPv2: Not an EAP TLV") [all...] |
eap_psk.c | 45 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 69 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 103 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message " 112 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 0)", 201 wpa_printf(MSG_INFO, "EAP-PSK: Invalid third message " 212 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 2)", 224 wpa_printf(MSG_INFO, "EAP-PSK: Too short PCHANNEL data in " 310 wpa_printf(MSG_INFO, "EAP-PSK: Authentication server rejected "
|
eap_sake.c | 81 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 167 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 217 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 279 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 313 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Confirm did not " 324 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_S"); 352 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 395 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)",
|
eap_mschapv2.c | 253 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 262 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 269 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 302 wpa_msg(sm->msg_ctx, MSG_INFO, 366 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Authentication succeeded"); 475 wpa_msg(sm->msg_ctx, MSG_INFO, 691 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Identity not configured"); 697 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured"); 714 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid header: len=%lu " 719 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: workaround, ignore [all...] |
eap_otp.c | 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
|
/external/wpa_supplicant_8/src/crypto/ |
tls_internal.c | 178 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA " 187 wpa_printf(MSG_INFO, "TLS: Failed to configure client " 197 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); 204 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters"); 241 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA " 248 wpa_printf(MSG_INFO, "TLS: Failed to configure server " 257 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); 263 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
|
/external/wpa_supplicant_8/src/drivers/ |
driver_roboswitch.c | 223 wpa_printf(MSG_INFO, "%s: Unable to listen on %s", 370 wpa_printf(MSG_INFO, "%s: No <interface>.<vlan> pair in " 378 wpa_printf(MSG_INFO, "%s: Invalid vlan specification " 386 wpa_printf(MSG_INFO, "%s: VLAN out of range in " 395 wpa_printf(MSG_INFO, "%s: Unable to create socket", __func__); 408 wpa_printf(MSG_INFO, "%s: Invalid phy address (not a " 431 wpa_printf(MSG_INFO, "%s: Could not get port information for " 440 wpa_printf(MSG_INFO, "%s: Unable to join PAE group", __func__);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 115 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV"); 120 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 85 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame"); 102 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 156 wpa_printf(MSG_INFO, "EAP-LEAP: EAP-Success received in " 208 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Response frame"); 225 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid response " 286 wpa_printf(MSG_INFO, "EAP-LEAP: Password not configured"); 301 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid frame"); 321 wpa_printf(MSG_INFO, "EAP-LEAP: Unexpected EAP code (%d) - "
|
eap_peap.c | 169 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 546 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV " 553 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success " 556 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure" 565 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure"); 569 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result " 624 wpa_printf(MSG_INFO, "EAP-PEAP: too short " 725 wpa_printf(MSG_INFO, "EAP-PEAP: failed to initialize " 846 wpa_printf(MSG_INFO, "EAP-PEAPv2: Too short Phase 2 " 854 wpa_printf(MSG_INFO, "EAP-PEAPv2: Not an EAP TLV") [all...] |
eap_psk.c | 46 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 70 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 104 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message " 113 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 0)", 202 wpa_printf(MSG_INFO, "EAP-PSK: Invalid third message " 213 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 2)", 225 wpa_printf(MSG_INFO, "EAP-PSK: Too short PCHANNEL data in " 311 wpa_printf(MSG_INFO, "EAP-PSK: Authentication server rejected "
|
eap_sake.c | 82 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 168 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 218 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Challenge did not " 280 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 314 wpa_printf(MSG_INFO, "EAP-SAKE: Request/Confirm did not " 325 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_S"); 353 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 396 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)",
|
eap_mschapv2.c | 259 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " 268 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " 275 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" 308 wpa_msg(sm->msg_ctx, MSG_INFO, 372 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Authentication succeeded"); 481 wpa_msg(sm->msg_ctx, MSG_INFO, 697 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Identity not configured"); 703 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured"); 720 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid header: len=%lu " 725 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: workaround, ignore [all...] |
eap_otp.c | 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 193 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for " 200 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2"); 206 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in " 215 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 221 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2"); 233 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 453 wpa_printf(MSG_INFO, "RSN: PNonce in SMK KDE does not " 459 wpa_printf(MSG_INFO, "RSN: INonce in SMK M4 did not " 482 wpa_printf(MSG_INFO, "RSN: No RSN IE in SMK M5"); 488 wpa_printf(MSG_INFO, "RSN: Key Nonce in SMK M5 does [all...] |
wpa.c | 183 wpa_printf(MSG_INFO, "WPA: Sending EAPOL-Key Request (error=%d " 465 wpa_msg(sm->ctx->ctx, MSG_INFO, "WPA: Key negotiation completed with " 682 wpa_printf(MSG_INFO, "WPA: Tx bit set for GTK, but pairwise " 789 wpa_hexdump(MSG_INFO, "WPA: WPA IE in Beacon/ProbeResp", 794 wpa_printf(MSG_INFO, "WPA: No WPA IE in " 797 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg", 802 wpa_hexdump(MSG_INFO, "WPA: RSN IE in Beacon/ProbeResp", 807 wpa_printf(MSG_INFO, "WPA: No RSN IE in " 810 wpa_hexdump(MSG_INFO, "WPA: RSN IE in 3/4 msg", 1034 wpa_printf(MSG_INFO, "RSN: Failed to configure GTK") [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 194 wpa_printf(MSG_INFO, "RSN: SMK handshake not allowed for " 201 wpa_printf(MSG_INFO, "RSN: Failed to parse KDEs in SMK M2"); 207 wpa_printf(MSG_INFO, "RSN: No RSN IE or MAC address KDE in " 216 wpa_printf(MSG_INFO, "RSN: Too long Initiator RSN IE in SMK " 222 wpa_printf(MSG_INFO, "RSN: Failed to parse RSN IE in SMK M2"); 234 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 454 wpa_printf(MSG_INFO, "RSN: PNonce in SMK KDE does not " 460 wpa_printf(MSG_INFO, "RSN: INonce in SMK M4 did not " 483 wpa_printf(MSG_INFO, "RSN: No RSN IE in SMK M5"); 489 wpa_printf(MSG_INFO, "RSN: Key Nonce in SMK M5 does [all...] |
/external/kernel-headers/original/linux/ |
msg.h | 8 #define MSG_INFO 12 40 /* buffer for msgctl calls IPC_INFO, MSG_INFO */
|
/external/wpa_supplicant/ |
eap_fast.c | 323 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " 333 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " 348 wpa_printf(MSG_INFO, "EAP-FAST: Unrecognized header line in " 365 wpa_printf(MSG_INFO, "EAP-FAST: START line " 373 wpa_printf(MSG_INFO, "EAP-FAST: No memory for " 380 wpa_printf(MSG_INFO, "EAP-FAST: END line " 395 wpa_printf(MSG_INFO, "EAP-FAST: Invalid " 409 wpa_printf(MSG_INFO, "EAP-FAST: Invalid " 419 wpa_printf(MSG_INFO, "EAP-FAST: Invalid " 428 wpa_printf(MSG_INFO, "EAP-FAST: Invalid [all...] |
eap_tls_common.c | 103 wpa_printf(MSG_INFO, "SSL: Failed to get configuration blobs"); 120 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " 133 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); 142 wpa_printf(MSG_INFO, "TLS: Failed to set TLS connection " 323 wpa_printf(MSG_INFO, "SSL: Too long TLS fragment (size" 332 wpa_printf(MSG_INFO, "SSL: Could not allocate memory " 340 wpa_printf(MSG_INFO, "SSL: more data than TLS message " 384 wpa_printf(MSG_INFO, "SSL: eap_tls_process_helper - pending " 636 wpa_printf(MSG_INFO, "SSL: TLS errors detected"); 653 wpa_printf(MSG_INFO, "SSL: Short frame with TLS [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 266 wpa_printf(MSG_INFO, "EAP-SAKE: Invalid frame"); 276 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version); 281 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)", 300 wpa_printf(MSG_INFO, "EAP-SAKE: Unexpected subtype=%d in state=%d", 338 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Challenge did not " 358 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with " 375 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P"); 401 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Confirm did not " 412 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 226 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC"); 267 wpa_printf(MSG_INFO, "EAP-SAKE: Invalid frame"); 277 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version); 282 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)", 301 wpa_printf(MSG_INFO, "EAP-SAKE: Unexpected subtype=%d in state=%d", 339 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Challenge did not " 359 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with " 376 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P"); 402 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Confirm did not " 413 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P") [all...] |
/external/wpa_supplicant_8/src/utils/ |
os_unix.c | 280 wpa_printf(MSG_INFO, "MEMLEAK[%p]: invalid magic 0x%x " 285 wpa_printf(MSG_INFO, "MEMLEAK[%p]: len %lu", 290 wpa_printf(MSG_INFO, "MEMLEAK: total %lu bytes", 412 wpa_printf(MSG_INFO, "REALLOC[%p]: invalid magic 0x%x%s", 438 wpa_printf(MSG_INFO, "FREE[%p]: invalid magic 0x%x%s",
|
/external/wpa_supplicant_8/wpa_supplicant/ |
notify.c | 97 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE 250 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR, 259 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR, 564 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT 577 wpa_msg_ctrl(wpa_s, MSG_INFO,
|
wps_supplicant.c | 75 wpa_msg(wpa_s, MSG_INFO, WPS_EVENT_FAIL); 204 wpa_msg(wpa_s, MSG_INFO, "%s%s", 211 wpa_msg(wpa_s, MSG_INFO, WPS_EVENT_CRED_RECEIVED); 331 wpa_msg(wpa_s, MSG_INFO, WPS_EVENT_OPEN_NETWORK 420 wpa_msg(wpa_s, MSG_INFO, WPS_EVENT_M2D 426 wpa_msg(wpa_s->parent, MSG_INFO, WPS_EVENT_M2D 453 wpa_msg(wpa_s, MSG_INFO, 458 wpa_msg(wpa_s->parent, MSG_INFO, WPS_EVENT_FAIL 464 wpa_msg(wpa_s, MSG_INFO, 468 wpa_msg(wpa_s->parent, MSG_INFO, WPS_EVENT_FAI [all...] |