/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " 43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " 51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce " 59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u", 67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u", 75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication " 83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type " 91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type " 99 wpa_printf(MSG_DEBU [all...] |
H A D | wps_attr_process.c | 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 131 wpa_printf(MSG_DEBU [all...] |
H A D | wps_enrollee.c | 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); 40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); 109 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); 128 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); 167 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); 170 wpa_printf(MSG_DEBU [all...] |
H A D | wps_attr_build.c | 28 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 32 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 55 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); 65 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods); 75 wpa_printf(MSG_DEBUG, "WPS: * UUID-E"); 85 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); 95 wpa_printf(MSG_DEBUG, "WPS: * Configuration Error (%d)", err); 110 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 124 wpa_printf(MSG_DEBUG, "WPS: * Authenticator"); 135 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_wsc_common.c | 29 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 34 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
|
H A D | eap_sake_common.c | 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 72 wpa_printf(MSG_DEBU [all...] |
H A D | eap_sim_common.c | 87 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); 152 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 464 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); 467 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); 517 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); 520 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 523 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " 529 wpa_printf(MSG_INF [all...] |
H A D | eap_ikev2_common.c | 64 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory " 72 wpa_printf(MSG_ERROR, "EAP-IKEV2: Failed to allocate memory " 78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 115 wpa_printf(MSG_INFO, "EAP-IKEV2: Could not calculate ICV"); 120 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid ICV"); 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
/external/wpa_supplicant/ |
H A D | eap_sake_common.c | 30 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 32 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 39 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 41 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 48 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 50 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 57 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 59 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 71 wpa_printf(MSG_DEBU [all...] |
H A D | eap_sim_common.c | 85 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 122 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 137 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); 150 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 247 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); 250 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 253 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " 259 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); 269 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_RAND"); 274 wpa_printf(MSG_INF [all...] |
H A D | events.c | 42 wpa_printf(MSG_INFO, "No network configuration found for the " 48 wpa_printf(MSG_DEBUG, "Selected network is disabled"); 52 wpa_printf(MSG_DEBUG, "Network configuration found for the current " 119 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA " 128 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event"); 131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 206 wpa_printf(MSG_DEBUG, "Selected network is configured to use " 211 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM " 222 wpa_printf(MSG_WARNING, "Failed to initialize SIM " 271 wpa_printf(MSG_DEBU [all...] |
H A D | pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 267 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV " 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); 363 wpa_printf(MSG_DEBU [all...] |
H A D | asn1_test.c | 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) " 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero " 91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix); 95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected " 100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s", 120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null " 124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix); 128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID"); 132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str); 141 wpa_printf(MSG_MSGDUM [all...] |
H A D | eap_tlv.c | 128 wpa_printf(MSG_DEBUG, "EAP-TLV: TLV underrun " 140 wpa_printf(MSG_DEBUG, "EAP-TLV: Unsupported TLV Type " 158 wpa_printf(MSG_DEBUG, "EAP-TLV: Last TLV too short in " 169 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV " 176 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success " 179 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure" 188 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure"); 192 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result "
|
H A D | ctrl_iface_named_pipe.c | 129 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 147 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 155 wpa_printf(MSG_ERROR, "CTRL: CreateEvent failed: %d", 182 wpa_printf(MSG_ERROR, "CTRL: CreateNamedPipe failed: %d", 188 wpa_printf(MSG_ERROR, "CTRL: ConnectNamedPipe failed: %d", 198 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 208 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 230 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 264 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 209 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 258 wpa_printf(MSG_DEBU [all...] |
H A D | asn1_test.c | 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) " 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero " 91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix); 95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected " 100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s", 120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null " 124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix); 128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID"); 132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str); 141 wpa_printf(MSG_MSGDUM [all...] |
H A D | tlsv1_server_read.c | 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", 89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 142 wpa_printf(MSG_INFO, "TLSv1: No supported cipher suite " 150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 173 wpa_printf(MSG_INFO, "TLSv1: Client does not accept NULL " 181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " 191 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_osx.m | 41 wpa_printf(MSG_DEBUG, "Key:"); 43 wpa_printf(MSG_DEBUG, "Value:"); 52 wpa_printf(MSG_DEBUG, "OSX: Dump dictionary %s - %u entries", 68 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d", 73 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off"); 94 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d", 99 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off"); 131 wpa_printf(MSG_DEBUG, "CFStringCreateWithBytes " 140 wpa_printf(MSG_DEBUG, "OSX: WirelessDirectedScan " 147 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 58 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 135 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); 142 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", 150 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 151 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 156 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); 172 wpa_printf(MSG_DEBUG, "IKEV2: No " 177 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 183 wpa_printf(MSG_DEBUG, "IKEV2: " 223 wpa_printf(MSG_INF [all...] |
H A D | eap_tls_common.c | 32 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " 38 wpa_printf(MSG_INFO, "SSL: Failed to configure verification " 116 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 118 wpa_printf(MSG_ERROR, "SSL: out_buf NULL in %s", __func__); 151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 178 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 208 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 54 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 147 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); 154 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", 162 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 163 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 168 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); 183 wpa_printf(MSG_DEBUG, "IKEV2: No " 189 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 196 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 203 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 267 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV " 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); 363 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
H A D | test_wpa.c | 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 65 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 73 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 81 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 113 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 143 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 171 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 180 wpa_printf(MSG_DEBU [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 151 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)", 168 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", 185 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)", 262 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); 309 wpa_printf(MSG_DEBUG, "FT: Invalid R1KH-ID " 321 wpa_printf(MSG_DEBUG, "FT: Invalid R0KH-ID " 365 wpa_printf(MSG_DEBUG, "FT: Failed to parse " 399 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); 411 wpa_printf(MSG_WARNIN [all...] |