/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 45 wpa_printf(MSG_DEBUG, "NSS: I/O close"); 52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); 59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); 67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); 78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); 115 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the [all...] |
tls_gnutls.c | 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 162 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 168 wpa_printf(MSG_INFO, "Untested gnutls version %s - this needs " 220 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 225 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 262 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " 275 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at " 296 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", 323 wpa_printf(MSG_INFO, "Failed to configure " 379 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ikev2.c | 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
eap_server_md5.c | 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); 133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
|
/external/wpa_supplicant_8/src/tls/ |
asn1.c | 31 wpa_printf(MSG_DEBUG, "ASN.1: Identifier " 36 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: " 46 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length " 53 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field"); 58 wpa_printf(MSG_DEBUG, "ASN.1: Length " 70 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow"); 101 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value"); 132 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d " 201 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
|
tlsv1_server_write.c | 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); 58 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 67 wpa_printf(MSG_ERROR, "TLSv1: Could not generate " 107 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 117 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 143 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 166 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 173 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 193 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 218 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain [all...] |
pkcs5.c | 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption " 84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " 127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", 130 wpa_printf(MSG_INFO, "PKCS #5: Unsupported " 180 wpa_printf(MSG_DEBUG, "PKCS #5: Unsupported parameters"); 186 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to initialize crypto") [all...] |
pkcs1.c | 34 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 57 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 68 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 149 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " 158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " 167 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " 177 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " 183 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB "
|
/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 73 wpa_printf(MSG_ERROR, "%s: failed to issue private commands\n", __func__); 85 wpa_printf(MSG_DEBUG, "%s: %s ", __func__, cmd); 87 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")", 90 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 92 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 94 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf)); 105 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 121 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 146 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_wps.c | 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, " 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val); 75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, " 87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s", 108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, " 161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 164 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " 187 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 191 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 198 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the " 221 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 228 wpa_printf(MSG_INFO, "TDLS: Failed to send message " 245 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " 272 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " 303 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " 308 wpa_printf(MSG_INFO, "TDLS: No retry buffer available [all...] |
wpa_ft.c | 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", 177 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)", 192 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", 211 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)", 304 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 322 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 325 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d", 335 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 356 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid"); 88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth"); 98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth"); 104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr"); 116 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr"); 131 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key"); 156 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available"); 187 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not " 213 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1 [all...] |
eap_ttls.c | 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 221 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 236 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id"); 263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 313 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " 321 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP " 328 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 361 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize " 381 wpa_printf(MSG_INFO, "EAP-TTLS: too short [all...] |
tncc.c | 162 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 167 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 199 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 238 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 256 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 266 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 278 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 330 wpa_printf(MSG_ERROR, "TNC: IMC does not export " 337 wpa_printf(MSG_ERROR, "TNC: IMC does not export " 345 wpa_printf(MSG_ERROR, "TNC: IMC does not export [all...] |
eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 66 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes [all...] |
/external/wpa_supplicant_8/src/ap/ |
hw_features.c | 92 wpa_printf(MSG_MSGDUMP, "Allowed channel: mode=%d " 148 wpa_printf(MSG_ERROR, "Failed to allocate memory for rate " 167 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x", 174 wpa_printf(MSG_ERROR, "No rates remaining in supported/basic " 196 wpa_printf(MSG_DEBUG, "HT40: control channel: %d " 213 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 240 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 316 wpa_printf(MSG_INFO, "Switch own primary and secondary " 344 wpa_printf(MSG_INFO, "Switch own primary and " 372 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz" [all...] |
wmm.c | 113 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 119 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 125 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 174 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 177 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 179 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 181 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 184 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 189 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)"); 194 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d" [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 64 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in " 80 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id " 109 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d", 114 wpa_printf(MSG_INFO, "DAS: Session not found for request from " 167 wpa_printf(MSG_ERROR, "DAS: recvfrom: %s", strerror(errno)); 174 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d", 177 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client"); 183 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet " 193 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet " 204 wpa_printf(MSG_DEBUG, "DAS: Unacceptable [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
bgscan_simple.c | 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 100 wpa_printf(MSG_ERROR, "bgscan simple: Missing scan interval " 131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 138 wpa_printf(MSG_ERROR, "bgscan simple: Failed to enable " 151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed [all...] |
gas_query.c | 133 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response"); 145 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 170 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to " 184 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 198 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 211 wpa_printf(MSG_DEBUG, "GAS: Received initial response from " 243 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from " 252 wpa_printf(MSG_DEBUG, "GAS: Advertisement Protocol changed " 261 wpa_printf(MSG_DEBUG, "GAS: Invalid comeback response " 272 wpa_printf(MSG_DEBUG, "GAS: Unexpected frag_id in response [all...] |
autoscan_periodic.c | 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d", 74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
|
ctrl_iface_unix.c | 117 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 153 wpa_printf(MSG_ERROR, "recvfrom(ctrl_iface): %s", 328 wpa_printf(MSG_DEBUG, "Using existing control " 331 wpa_printf(MSG_ERROR, "mkdir[ctrl_interface=%s]: %s", 347 wpa_printf(MSG_ERROR, "CTRL: Could not chmod directory: %s", 358 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 365 wpa_printf(MSG_ERROR, "CTRL: Invalid group " 370 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d", 376 wpa_printf(MSG_ERROR, "chown[ctrl_interface=%s,gid=%d]: %s", 384 wpa_printf(MSG_ERROR, "CTRL: chmod[ctrl_interface]: %s" [all...] |
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); 223 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed"); 238 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default() [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending " 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): " 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 164 wpa_printf(MSG_MSGDUMP, "l2_packet_rx_thread: -> ReadFile"); 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped") [all...] |