/external/wpa_supplicant_8/hs20/client/ |
osu_client.c | 76 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str); 114 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); 117 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); 125 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); 131 wpa_printf(MSG_INFO, "Could not get URL text"); 134 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); 139 wpa_printf(MSG_INFO, "Could not find estUserID node"); 145 wpa_printf(MSG_INFO, "Could not get estUserID text"); 148 wpa_printf(MSG_INFO, "estUserID: %s", user); 154 wpa_printf(MSG_INFO, "Could not find estPassword node") [all...] |
est.c | 38 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", 57 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); 109 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); 119 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", 130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); 137 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary", 143 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); 153 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); 162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); 233 wpa_printf(MSG_INFO, "TODO: csrattr challengePassword") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
ndis_events.c | 124 wpa_printf(MSG_ERROR, "CreatePipe() failed: %d", 130 wpa_printf(MSG_ERROR, "CreateEvent() failed: %d", 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 221 wpa_printf(MSG_INFO, "WriteFile() failed: %d", (int) GetLastError()); 228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 256 wpa_printf(MSG_DEBUG, "Could not get " 267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event [all...] |
driver_ndis.c | 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 173 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 208 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes [all...] |
eap_server_ikev2.c | 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
eap_server_peap.c | 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s", 147 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d", 155 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); 187 wpa_printf(MSG_ERROR, "EAP-PEAP: Failed to allocate memory for" 210 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready"); 377 wpa_printf(MSG_DEBUG, "EAP-PEAP: Adding MS-SOH " 477 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase1 done, " 513 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s - unexpected state %d", 531 wpa_printf(MSG_INFO, "EAP-PEAP: Invalid frame"); 568 wpa_printf(MSG_DEBUG, "EAP-PEAP: Invalid cryptobinding TLV [all...] |
/external/wpa_supplicant_8/src/utils/ |
trace.c | 51 wpa_printf(MSG_INFO, "bfd_openr failed"); 56 wpa_printf(MSG_INFO, "bfd_check_format failed"); 62 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); 81 wpa_printf(MSG_INFO, "No symbols"); 91 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); 97 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " 106 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", 185 wpa_printf(MSG_INFO, " %s() %s:%u", 226 wpa_printf(MSG_INFO, "Failed to open bfd"); 233 wpa_printf(MSG_INFO, "Failed to read symbols") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_unix.c | 90 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s", addr_txt); 111 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s", 129 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 141 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level to %d for %s", 167 wpa_printf(MSG_ERROR, "recvfrom(ctrl_iface): %s", 360 wpa_printf(MSG_DEBUG, "Using existing control " 363 wpa_printf(MSG_ERROR, "mkdir[ctrl_interface=%s]: %s", 379 wpa_printf(MSG_ERROR, "CTRL: Could not chmod directory: %s", 390 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 397 wpa_printf(MSG_ERROR, "CTRL: Invalid group [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 176 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " 199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 210 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the " 235 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 244 wpa_printf(MSG_INFO, "TDLS: Failed to send message " 261 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " 289 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " 320 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message " 325 wpa_printf(MSG_INFO, "TDLS: No retry buffer available [all...] |
wpa_ft.c | 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", 177 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)", 192 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", 213 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)", 306 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 324 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 327 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d", 337 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); 358 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 73 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 90 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " 102 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid " 109 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing"); 187 wpa_printf(MSG_DEBUG, 194 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response"); 229 wpa_printf(MSG_DEBUG, "EAP-SIM: Invalid external SIM processing GSM-AUTH response"); 239 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 260 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM [all...] |
eap_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid"); 88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth"); 98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth"); 104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr"); 118 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr"); 133 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key"); 159 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available"); 190 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not " 225 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1 [all...] |
eap_peap.c | 81 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", 87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 93 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " 97 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " 101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " 107 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); 110 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); 113 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); 119 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); 122 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled") [all...] |
eap_ttls.c | 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id"); 272 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 322 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " 330 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP " 337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 370 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize " 390 wpa_printf(MSG_INFO, "EAP-TTLS: too short [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_er.c | 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 249 wpa_printf(MSG_DEBUG, "WPS: No Manufacturer received"); 268 wpa_printf(MSG_DEBUG, "WPS: No Model Name received") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
random.c | 139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u", 160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u", 189 wpa_printf(MSG_ERROR, "random: No entropy available " 238 wpa_printf(MSG_ERROR, "random: Cannot open /dev/random: %s", 247 wpa_printf(MSG_ERROR, "random: Cannot read from /dev/random: " 251 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 264 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong " 270 wpa_printf(MSG_INFO, "random: Allow operation to proceed " 275 wpa_printf(MSG_INFO, "random: Not enough entropy pool available for " 288 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be [all...] |
tls_nss.c | 45 wpa_printf(MSG_DEBUG, "NSS: I/O close"); 52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); 59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); 67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); 78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); 115 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the [all...] |
tls_gnutls.c | 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 166 wpa_printf(MSG_INFO, "Untested gnutls version %s - this needs " 218 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 223 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 260 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " 273 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at " 294 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", 321 wpa_printf(MSG_INFO, "Failed to configure " 377 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); 225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 231 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 236 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); 256 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 259 wpa_printf(MSG_INFO, "IKEV2: Too short message for " 266 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " 271 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x [all...] |
/external/wpa_supplicant_8/src/tls/ |
asn1.c | 42 wpa_printf(MSG_DEBUG, "ASN.1: Identifier " 47 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: " 57 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length " 64 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field"); 69 wpa_printf(MSG_DEBUG, "ASN.1: Length " 81 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow"); 112 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value"); 143 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d " 212 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
|
pkcs5.c | 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption " 84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " 127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", 130 wpa_printf(MSG_INFO, "PKCS #5: Unsupported " 180 wpa_printf(MSG_DEBUG, "PKCS #5: Unsupported parameters"); 186 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to initialize crypto") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wmm.c | 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 113 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 119 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 154 wpa_printf(MSG_INFO, "wmm_send_action: send failed"); 168 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 171 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 173 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 175 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 178 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 183 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)") [all...] |
/external/wpa_supplicant_8/src/common/ |
common_module_tests.c | 56 wpa_printf(MSG_INFO, "ieee802_11_parse tests"); 67 wpa_printf(MSG_ERROR, "ieee802_11_parse test %d failed", 75 wpa_printf(MSG_ERROR, 143 wpa_printf(MSG_INFO, "rsn_ie_parse tests"); 152 wpa_printf(MSG_ERROR, "rsn_ie_parse test %d failed", i); 165 wpa_printf(MSG_INFO, "common module tests");
|