HomeSort by relevance Sort by last modified time
    Searched refs:wpa_printf (Results 51 - 75 of 279) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/hs20/client/
osu_client.c 76 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str);
114 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto);
117 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol");
125 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node");
131 wpa_printf(MSG_INFO, "Could not get URL text");
134 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url);
139 wpa_printf(MSG_INFO, "Could not find estUserID node");
145 wpa_printf(MSG_INFO, "Could not get estUserID text");
148 wpa_printf(MSG_INFO, "estUserID: %s", user);
154 wpa_printf(MSG_INFO, "Could not find estPassword node")
    [all...]
est.c 38 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s",
57 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object");
109 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf);
119 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s",
130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt");
137 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary",
143 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
153 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts");
162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response");
233 wpa_printf(MSG_INFO, "TODO: csrattr challengePassword")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
ndis_events.c 124 wpa_printf(MSG_ERROR, "CreatePipe() failed: %d",
130 wpa_printf(MSG_ERROR, "CreateEvent() failed: %d",
184 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
207 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
221 wpa_printf(MSG_INFO, "WriteFile() failed: %d", (int) GetLastError());
228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
256 wpa_printf(MSG_DEBUG, "Could not get "
267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event
    [all...]
driver_ndis.c 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_wsc.c 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not "
123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P "
173 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
208 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes
    [all...]
eap_server_ikev2.c 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
eap_server_peap.c 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
147 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
155 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL.");
187 wpa_printf(MSG_ERROR, "EAP-PEAP: Failed to allocate memory for"
210 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
377 wpa_printf(MSG_DEBUG, "EAP-PEAP: Adding MS-SOH "
477 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase1 done, "
513 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s - unexpected state %d",
531 wpa_printf(MSG_INFO, "EAP-PEAP: Invalid frame");
568 wpa_printf(MSG_DEBUG, "EAP-PEAP: Invalid cryptobinding TLV
    [all...]
  /external/wpa_supplicant_8/src/utils/
trace.c 51 wpa_printf(MSG_INFO, "bfd_openr failed");
56 wpa_printf(MSG_INFO, "bfd_check_format failed");
62 wpa_printf(MSG_INFO, "bfd_check_format_matches failed");
81 wpa_printf(MSG_INFO, "No symbols");
91 wpa_printf(MSG_INFO, "Unknown symtab upper bound");
97 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab "
106 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab",
185 wpa_printf(MSG_INFO, " %s() %s:%u",
226 wpa_printf(MSG_INFO, "Failed to open bfd");
233 wpa_printf(MSG_INFO, "Failed to read symbols")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_unix.c 90 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s", addr_txt);
111 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s",
129 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
141 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level to %d for %s",
167 wpa_printf(MSG_ERROR, "recvfrom(ctrl_iface): %s",
360 wpa_printf(MSG_DEBUG, "Using existing control "
363 wpa_printf(MSG_ERROR, "mkdir[ctrl_interface=%s]: %s",
379 wpa_printf(MSG_ERROR, "CTRL: Could not chmod directory: %s",
390 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
397 wpa_printf(MSG_ERROR, "CTRL: Invalid group
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 176 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
210 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the "
235 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
244 wpa_printf(MSG_INFO, "TDLS: Failed to send message "
261 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
289 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
320 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message "
325 wpa_printf(MSG_INFO, "TDLS: No retry buffer available
    [all...]
wpa_ft.c 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
177 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)",
192 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)",
213 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)",
306 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC");
324 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
327 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d",
337 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
358 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 73 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
90 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
102 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
109 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing");
187 wpa_printf(MSG_DEBUG,
194 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response");
229 wpa_printf(MSG_DEBUG, "EAP-SIM: Invalid external SIM processing GSM-AUTH response");
239 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
260 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM
    [all...]
eap_wsc.c 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid");
88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth");
98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth");
104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr");
118 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr");
133 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key");
159 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available");
190 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not "
225 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1
    [all...]
eap_peap.c 81 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d",
87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key "
93 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on "
97 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success "
101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after "
107 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding");
110 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding");
113 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding");
119 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled");
122 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled")
    [all...]
eap_ttls.c 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id");
272 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
322 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
330 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP "
337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
370 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize "
390 wpa_printf(MSG_INFO, "EAP-TTLS: too short
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_er.c 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)"
    [all...]
wps_dev_attr.c 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer");
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name");
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number");
91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number");
114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type");
128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type");
161 wpa_printf(MSG_DEBUG, "WPS: * Device Name");
197 wpa_printf(MSG_DEBUG, "WPS: * OS Version");
249 wpa_printf(MSG_DEBUG, "WPS: No Manufacturer received");
268 wpa_printf(MSG_DEBUG, "WPS: No Model Name received")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
random.c 139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u",
160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u",
189 wpa_printf(MSG_ERROR, "random: No entropy available "
238 wpa_printf(MSG_ERROR, "random: Cannot open /dev/random: %s",
247 wpa_printf(MSG_ERROR, "random: Cannot read from /dev/random: "
251 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from "
264 wpa_printf(MSG_INFO, "random: Only %u/%u bytes of strong "
270 wpa_printf(MSG_INFO, "random: Allow operation to proceed "
275 wpa_printf(MSG_INFO, "random: Not enough entropy pool available for "
288 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be
    [all...]
tls_nss.c 45 wpa_printf(MSG_DEBUG, "NSS: I/O close");
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
115 wpa_printf(MSG_ERROR, "NSS: Failed to allocate memory for the
    [all...]
tls_gnutls.c 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
166 wpa_printf(MSG_INFO, "Untested gnutls version %s - this needs "
218 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
223 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
260 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS "
273 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at "
294 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s",
321 wpa_printf(MSG_INFO, "Failed to configure "
377 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
231 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
236 wpa_printf(MSG_INFO, "IKEV2: Decryption failed");
256 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
259 wpa_printf(MSG_INFO, "IKEV2: Too short message for "
266 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header "
271 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x
    [all...]
  /external/wpa_supplicant_8/src/tls/
asn1.c 42 wpa_printf(MSG_DEBUG, "ASN.1: Identifier "
47 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: "
57 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length "
64 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field");
69 wpa_printf(MSG_DEBUG, "ASN.1: Length "
81 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow");
112 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value");
143 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d "
212 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
pkcs5.c 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
69 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption "
84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found "
127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x",
130 wpa_printf(MSG_INFO, "PKCS #5: Unsupported "
180 wpa_printf(MSG_DEBUG, "PKCS #5: Unsupported parameters");
186 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to initialize crypto")
    [all...]
  /external/wpa_supplicant_8/src/ap/
wmm.c 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
113 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
119 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
154 wpa_printf(MSG_INFO, "wmm_send_action: send failed");
168 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
171 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
173 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
175 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
178 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
183 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)")
    [all...]
  /external/wpa_supplicant_8/src/common/
common_module_tests.c 56 wpa_printf(MSG_INFO, "ieee802_11_parse tests");
67 wpa_printf(MSG_ERROR, "ieee802_11_parse test %d failed",
75 wpa_printf(MSG_ERROR,
143 wpa_printf(MSG_INFO, "rsn_ie_parse tests");
152 wpa_printf(MSG_ERROR, "rsn_ie_parse test %d failed", i);
165 wpa_printf(MSG_INFO, "common module tests");

Completed in 874 milliseconds

1 23 4 5 6 7 8 91011>>