HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 26 - 50 of 279) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) -
    [all...]
x509v3.c 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
333 wpa_printf(MSG_DEBUG, "X509: Expected SET "
346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
363 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
tlsv1_client_read.c 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
130 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected "
138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
160 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected
    [all...]
pkcs1.c 36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding");
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB "
166 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature "
175 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature "
181 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB "
215 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed");
237 wpa_printf(MSG_DEBUG
    [all...]
bignum.c 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 47 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
55 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
63 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
125 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
162 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
184 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_named_pipe.c 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
149 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d",
176 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d",
182 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d",
192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tnc.c 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for "
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request");
254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to
    [all...]
eap_server_ttls.c 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
203 wpa_printf(MSG_WARNING, "EAP-TTLS: "
214 wpa_printf(MSG_WARNING, "EAP-TTLS: "
278 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported
    [all...]
eap_server_sake.c 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
168 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S")
    [all...]
eap_server_gpsk.c 56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
111 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data");
123 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
158 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
218 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame");
222 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
230 wpa_printf(MSG_INFO, "EAP-GPSK: Unexpected opcode=%d in state=%d"
    [all...]
eap_server_aka.c 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
185 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
211 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer
    [all...]
eap_server_tls_common.c 50 wpa_printf(MSG_ERROR, "TLS context not initialized - cannot use TLS-based EAP method");
59 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS "
72 wpa_printf(MSG_INFO, "SSL: Failed to configure verification "
150 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
152 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__);
184 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
192 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
210 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
221 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
226 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu
    [all...]
eap_server_sim.c 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured");
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ");
135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
175 wpa_printf(MSG_DEBUG, " AT_IV");
176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA")
    [all...]
eap_server_fast.c 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid "
205 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid "
224 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key included in "
242 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Key not valid anymore
    [all...]
  /external/wpa_supplicant_8/hs20/client/
oma_dm_client.c 214 wpa_printf(MSG_INFO, "MgmtTree: %s", str);
245 wpa_printf(MSG_INFO, "Could not read devinfo.xml");
392 wpa_printf(MSG_INFO, "No Data node found");
397 wpa_printf(MSG_INFO, "Data: %s", data);
398 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data);
403 wpa_printf(MSG_INFO, "User response in browser completed successfully");
407 wpa_printf(MSG_INFO, "Failed to receive user response");
421 wpa_printf(MSG_INFO, "Client certificate enrollment");
426 wpa_printf(MSG_INFO, "No Data node found");
431 wpa_printf(MSG_INFO, "Data: %s", data)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short "
209 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Result %d",
213 wpa_printf(MSG_DEBUG, "EAP-FAST: Result: %s",
221 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short "
227 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
235 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Intermediate
    [all...]
  /external/wpa_supplicant_8/src/ap/
acs.c 285 wpa_printf(MSG_ERROR, "ACS: Failed to start");
303 wpa_printf(MSG_ERROR, "ACS: Survey data missing");
345 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu",
387 wpa_printf(MSG_ERROR, "ACS: Survey is missing noise floor");
392 wpa_printf(MSG_ERROR, "ACS: Survey is missing channel time");
398 wpa_printf(MSG_ERROR, "ACS: Survey is missing RX and busy time (at least one is required)");
413 wpa_printf(MSG_ERROR, "ACS: Channel %d has insufficient survey data",
470 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)",
475 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg",
520 wpa_printf(MSG_ERROR, "ACS: HT40- is not supported yet. Please try HT40+")
    [all...]
accounting.c 46 wpa_printf(MSG_INFO, "Could not create new RADIUS packet");
57 wpa_printf(MSG_INFO, "Could not add Acct-Session-Id");
66 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type");
76 wpa_printf(MSG_INFO, "Could not add Acct-Authentic");
101 wpa_printf(MSG_INFO, "Could not add User-Name");
119 wpa_printf(MSG_INFO, "Could not add Class");
129 wpa_printf(MSG_ERROR, "Could not add CUI");
138 wpa_printf(MSG_ERROR, "Could not add CUI from ACL");
255 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message");
264 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
182 wpa_printf(MSG_DEBUG,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
236 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response");
246 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
269 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
272 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
301 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
314 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match
    [all...]
eap_md5.c 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
  /external/wpa_supplicant_8/src/radius/
radius_das.c 66 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in "
78 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d",
90 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d",
112 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id "
141 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d",
146 wpa_printf(MSG_INFO, "DAS: Session not found for request from "
199 wpa_printf(MSG_ERROR, "DAS: recvfrom: %s", strerror(errno));
206 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d",
209 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client");
215 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_event.c 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e);
91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for "
122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p",
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event "
178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s "
192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p "
200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p "
218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p "
222 wpa_printf(MSG_DEBUG
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 164 wpa_printf(level, "OpenSSL: %s - %s %s",
168 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s",
203 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u",
211 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
219 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
247 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported",
268 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)",
306 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
393 wpa_printf(MSG_WARNING, "CryptoAPI: Failed to allocate memory "
406 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate
    [all...]
  /external/wpa_supplicant_8/src/drivers/
linux_ioctl.c 31 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s",
48 wpa_printf(MSG_ERROR, "Could not set interface %s flags (%s): "
71 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s",
87 wpa_printf(MSG_ERROR, "Could not get interface %s hwaddr: %s",
93 wpa_printf(MSG_ERROR, "%s: Invalid HW-addr family 0x%04x",
113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s",
139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s",
151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s",
173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge "
195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from
    [all...]

Completed in 564 milliseconds

12 3 4 5 6 7 8 91011>>