/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - [all...] |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 363 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 130 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 160 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected [all...] |
pkcs1.c | 36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); 158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " 166 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " 175 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " 181 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " 215 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); 237 wpa_printf(MSG_DEBUG [all...] |
bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 47 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 55 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 63 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 125 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 162 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 184 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_named_pipe.c | 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 149 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d", 176 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d", 182 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d", 192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for " 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request"); 254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to [all...] |
eap_server_ttls.c | 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 203 wpa_printf(MSG_WARNING, "EAP-TTLS: " 214 wpa_printf(MSG_WARNING, "EAP-TTLS: " 278 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported [all...] |
eap_server_sake.c | 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 168 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S") [all...] |
eap_server_gpsk.c | 56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 111 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data"); 123 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 158 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 218 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame"); 222 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); 230 wpa_printf(MSG_INFO, "EAP-GPSK: Unexpected opcode=%d in state=%d" [all...] |
eap_server_aka.c | 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " 185 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 211 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer [all...] |
eap_server_tls_common.c | 50 wpa_printf(MSG_ERROR, "TLS context not initialized - cannot use TLS-based EAP method"); 59 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " 72 wpa_printf(MSG_INFO, "SSL: Failed to configure verification " 150 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 152 wpa_printf(MSG_ERROR, "SSL: tls_out NULL in %s", __func__); 184 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 192 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 210 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 221 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 226 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu [all...] |
eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 175 wpa_printf(MSG_DEBUG, " AT_IV"); 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA") [all...] |
eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid " 205 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid " 224 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key included in " 242 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Key not valid anymore [all...] |
/external/wpa_supplicant_8/hs20/client/ |
oma_dm_client.c | 214 wpa_printf(MSG_INFO, "MgmtTree: %s", str); 245 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); 392 wpa_printf(MSG_INFO, "No Data node found"); 397 wpa_printf(MSG_INFO, "Data: %s", data); 398 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); 403 wpa_printf(MSG_INFO, "User response in browser completed successfully"); 407 wpa_printf(MSG_INFO, "Failed to receive user response"); 421 wpa_printf(MSG_INFO, "Client certificate enrollment"); 426 wpa_printf(MSG_INFO, "No Data node found"); 431 wpa_printf(MSG_INFO, "Data: %s", data) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " 209 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Result %d", 213 wpa_printf(MSG_DEBUG, "EAP-FAST: Result: %s", 221 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " 227 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 235 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Intermediate [all...] |
/external/wpa_supplicant_8/src/ap/ |
acs.c | 285 wpa_printf(MSG_ERROR, "ACS: Failed to start"); 303 wpa_printf(MSG_ERROR, "ACS: Survey data missing"); 345 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu", 387 wpa_printf(MSG_ERROR, "ACS: Survey is missing noise floor"); 392 wpa_printf(MSG_ERROR, "ACS: Survey is missing channel time"); 398 wpa_printf(MSG_ERROR, "ACS: Survey is missing RX and busy time (at least one is required)"); 413 wpa_printf(MSG_ERROR, "ACS: Channel %d has insufficient survey data", 470 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)", 475 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg", 520 wpa_printf(MSG_ERROR, "ACS: HT40- is not supported yet. Please try HT40+") [all...] |
accounting.c | 46 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); 57 wpa_printf(MSG_INFO, "Could not add Acct-Session-Id"); 66 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); 76 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); 101 wpa_printf(MSG_INFO, "Could not add User-Name"); 119 wpa_printf(MSG_INFO, "Could not add Class"); 129 wpa_printf(MSG_ERROR, "Could not add CUI"); 138 wpa_printf(MSG_ERROR, "Could not add CUI from ACL"); 255 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); 264 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing"); 182 wpa_printf(MSG_DEBUG, 199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response"); 236 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response"); 246 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 269 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 272 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 301 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " 314 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match [all...] |
eap_md5.c | 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 66 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in " 78 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d", 90 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d", 112 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id " 141 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d", 146 wpa_printf(MSG_INFO, "DAS: Session not found for request from " 199 wpa_printf(MSG_ERROR, "DAS: recvfrom: %s", strerror(errno)); 206 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d", 209 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client"); 215 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_event.c | 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e); 91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for " 122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p", 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s " 192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p " 200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p " 218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p " 222 wpa_printf(MSG_DEBUG [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 164 wpa_printf(level, "OpenSSL: %s - %s %s", 168 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", 203 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", 211 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 219 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 247 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", 268 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", 306 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 393 wpa_printf(MSG_WARNING, "CryptoAPI: Failed to allocate memory " 406 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate [all...] |
/external/wpa_supplicant_8/src/drivers/ |
linux_ioctl.c | 31 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s", 48 wpa_printf(MSG_ERROR, "Could not set interface %s flags (%s): " 71 wpa_printf(MSG_ERROR, "Could not read interface %s flags: %s", 87 wpa_printf(MSG_ERROR, "Could not get interface %s hwaddr: %s", 93 wpa_printf(MSG_ERROR, "%s: Invalid HW-addr family 0x%04x", 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s", 139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s", 151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s", 173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge " 195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from [all...] |