/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for " 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request"); 254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to [all...] |
eap_server_ttls.c | 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 203 wpa_printf(MSG_WARNING, "EAP-TTLS: " 214 wpa_printf(MSG_WARNING, "EAP-TTLS: " 278 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported [all...] |
eap_server_sake.c | 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 168 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S") [all...] |
eap_server_gpsk.c | 56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 111 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data"); 123 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 158 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 218 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame"); 222 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); 230 wpa_printf(MSG_INFO, "EAP-GPSK: Unexpected opcode=%d in state=%d" [all...] |
eap_server_aka.c | 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " 185 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 211 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer [all...] |
eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 175 wpa_printf(MSG_DEBUG, " AT_IV"); 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA") [all...] |
eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid " 205 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid " 223 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key included in " 241 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Key not valid anymore [all...] |
eap_server_wsc.c | 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 173 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 208 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); 114 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); 172 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); 175 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); 203 wpa_printf(MSG_DEBUG, "WPS: Building Message M5") [all...] |
wps_upnp_event.c | 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e); 91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for " 122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p", 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s " 192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p " 200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p " 218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p " 222 wpa_printf(MSG_DEBUG [all...] |
wps_er.c | 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 202 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 208 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 231 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 236 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 243 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 332 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 339 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 364 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 375 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " 209 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Result %d", 213 wpa_printf(MSG_DEBUG, "EAP-FAST: Result: %s", 221 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " 227 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 235 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Intermediate [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 130 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 160 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected [all...] |
bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
/external/wpa_supplicant_8/src/ap/ |
acs.c | 284 wpa_printf(MSG_ERROR, "ACS: Failed to start"); 301 wpa_printf(MSG_ERROR, "ACS: Survey data missing"); 343 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu", 382 wpa_printf(MSG_ERROR, "ACS: Survey is missing noise floor"); 387 wpa_printf(MSG_ERROR, "ACS: Survey is missing channel time"); 393 wpa_printf(MSG_ERROR, "ACS: Survey is missing RX and busy time (at least one is required)"); 416 wpa_printf(MSG_ERROR, "ACS: Channel %d has insufficient survey data", 439 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)", 444 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg", 488 wpa_printf(MSG_ERROR, "ACS: HT40- is not supported yet. Please try HT40+") [all...] |
wnm_ap.c | 27 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 37 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 64 wpa_printf(MSG_DEBUG, "%s: station not found", __func__); 93 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 113 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d", 124 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d", 147 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response " 177 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame"); 211 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized", 217 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
linux_ioctl.c | 31 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s", 48 wpa_printf(MSG_ERROR, "Could not set interface %s flags (%s): " 71 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s", 87 wpa_printf(MSG_ERROR, "Could not get interface %s hwaddr: %s", 93 wpa_printf(MSG_ERROR, "%s: Invalid HW-addr family 0x%04x", 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s", 139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s", 151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s", 173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge " 195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from [all...] |
ndis_events.c | 124 wpa_printf(MSG_ERROR, "CreatePipe() failed: %d", 130 wpa_printf(MSG_ERROR, "CreateEvent() failed: %d", 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 221 wpa_printf(MSG_INFO, "WriteFile() failed: %d", (int) GetLastError()); 228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 256 wpa_printf(MSG_DEBUG, "Could not get " 267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event [all...] |
driver_ndis.c | 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", 88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " 98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " 102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " 108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); 111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); 114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); 120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); 123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled") [all...] |
eap_aka.c | 82 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 149 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 164 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 167 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 196 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " 209 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " 228 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith " 244 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym"); 251 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old reauth_id"); 257 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old eap_id") [all...] |
eap_md5.c | 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
|
/external/wpa_supplicant_8/src/utils/ |
trace.c | 53 wpa_printf(MSG_INFO, "bfd_openr failed"); 58 wpa_printf(MSG_INFO, "bfd_check_format failed"); 64 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); 83 wpa_printf(MSG_INFO, "No symbols"); 93 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); 99 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " 108 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", 187 wpa_printf(MSG_INFO, " %s() %s:%u", 227 wpa_printf(MSG_INFO, "Failed to open bfd"); 234 wpa_printf(MSG_INFO, "Failed to read symbols") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
random.c | 139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u", 160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u", 189 wpa_printf(MSG_ERROR, "random: No entropy available " 238 wpa_printf(MSG_ERROR, "random: Cannot open /dev/random: %s", 247 wpa_printf(MSG_ERROR, "random: Cannot read from /dev/random: " 251 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 264 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong " 270 wpa_printf(MSG_INFO, "random: Allow operation to proceed " 275 wpa_printf(MSG_INFO, "random: Not enough entropy pool available for " 288 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be [all...] |
tls_openssl.c | 151 wpa_printf(level, "OpenSSL: %s - %s %s", 155 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", 190 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", 198 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 206 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 234 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", 255 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", 293 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 380 wpa_printf(MSG_WARNING, "CryptoAPI: Failed to allocate memory " 393 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate [all...] |