/external/wpa_supplicant_8/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
/external/wpa_supplicant_8/hs20/client/ |
D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node() [all …]
|
D | osu_client.c | 119 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 122 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 130 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 136 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 139 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 144 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 150 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 153 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find estPassword node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get estPassword text"); in osu_get_certificate() [all …]
|
D | oma_dm_client.c | 214 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 245 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 392 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 398 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 401 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 402 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 411 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 425 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 430 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert() [all …]
|
D | est.c | 38 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 57 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 109 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 119 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 137 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts() 143 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 153 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts() 233 wpa_printf(MSG_INFO, "TODO: csrattr challengePassword"); in add_csrattrs_oid() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 144 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv() 288 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1() 336 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax() 492 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb() 607 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap() 627 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap() 647 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap() 667 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap() 687 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap() 707 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap() [all …]
|
D | tls_openssl.c | 153 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors() 188 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error() 232 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc() 253 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc() 391 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert() 400 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert() 501 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert() 559 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb() 618 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic() 628 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic() [all …]
|
D | tls_gnutls.c | 204 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " in tls_gnutls_init_session() 229 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", in tls_gnutls_init_session() 257 wpa_printf(MSG_INFO, "Failed to configure " in tls_connection_init() 313 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session " in tls_connection_shutdown() 322 wpa_printf(MSG_INFO, "GnuTLS: Failed to configure credentials " in tls_connection_shutdown() 332 wpa_printf(MSG_INFO, "GnuTLS: Failed to set session " in tls_connection_shutdown() 351 wpa_printf(MSG_INFO, "GnuTLS: subject_match not supported"); in tls_connection_set_params() 356 wpa_printf(MSG_INFO, "GnuTLS: altsubject_match not supported"); in tls_connection_set_params() 378 wpa_printf(MSG_INFO, "GnuTLS: domain_match not supported"); in tls_connection_set_params() 386 wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported"); in tls_connection_set_params() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_server_pwd.c | 89 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 121 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init() 212 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req() 222 wpa_printf(MSG_INFO, in eap_pwd_build_commit_req() 229 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req() 237 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req() 245 wpa_printf(MSG_INFO, "EAP-PWD (server): point allocation " in eap_pwd_build_commit_req() 252 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req() 260 wpa_printf(MSG_INFO, "EAP-PWD (server): data allocation fail"); in eap_pwd_build_commit_req() [all …]
|
D | eap_server_eke.c | 248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured"); in eap_eke_build_commit() 257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key"); in eap_eke_build_commit() 278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH"); in eap_eke_build_commit() 286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S"); in eap_eke_build_commit() 393 wpa_printf(MSG_INFO, "EAP-EKE: Invalid frame"); in eap_eke_check() 412 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected EKE-Exch=%d in state=%d", in eap_eke_check() 438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); in eap_eke_process_identity() 444 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected NumProposals %d (expected 1)", in eap_eke_process_identity() 453 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected Proposal (%u:%u:%u:%u)", in eap_eke_process_identity() 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity() [all …]
|
D | eap_server_pax.c | 194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check() 236 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check() 243 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check() 251 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check() 256 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check() 262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check() 272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check() 308 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2() 320 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2() 325 wpa_printf(MSG_INFO, "EAP-PAX: Too long CID"); in eap_pax_process_std_2() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 268 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
D | eap_pwd.c | 95 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 106 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init() 117 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() 127 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init() 273 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange() 279 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange() 284 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange() 323 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_id_exchange() [all …]
|
D | eap_pax.c | 57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init() 63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init() 129 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1() 136 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1() 145 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1() 153 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1() 245 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3() 252 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3() 261 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3() 269 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | accounting.c | 48 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg() 64 wpa_printf(MSG_INFO, in accounting_msg() 75 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg() 85 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg() 110 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg() 128 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg() 264 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report() 273 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report() 281 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report() 287 wpa_printf(MSG_INFO, "Could not add Acct-Output-Packets"); in accounting_sta_report() [all …]
|
D | iapp.c | 207 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add() 234 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update() 272 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify() 322 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp() 347 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp() 352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp() 357 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp() 374 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp() 401 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init() 410 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | trace.c | 51 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 56 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 62 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 81 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 91 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 97 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 106 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 185 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 226 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 233 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init() [all …]
|
D | browser-wpadebug.c | 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout() 38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req() 73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url); in hs20_web_browser() 126 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser() 132 wpa_printf(MSG_INFO, "Failed to close wpadebug browser"); in hs20_web_browser()
|
D | browser-android.c | 24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout() 38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req() 72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url); in hs20_web_browser() 122 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser() 124 wpa_printf(MSG_INFO, "Failed to inject keyevent"); in hs20_web_browser()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() 539 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr() 557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr() 573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr() 586 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 599 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr() 607 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 626 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() [all …]
|
D | ikev2_common.c | 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt() 201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt() 231 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt() 236 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt() 262 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads() 270 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads() 334 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads() 361 wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after " in ikev2_parse_payloads() 445 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH"); in ikev2_decrypt_payload() 451 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); in ikev2_decrypt_payload() [all …]
|
D | eap_pwd_common.c | 119 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); in compute_password_element() 128 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); in compute_password_element() 138 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element() 144 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " in compute_password_element() 149 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); in compute_password_element() 153 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " in compute_password_element() 160 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element() 168 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " in compute_password_element() 242 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); in compute_password_element() 250 wpa_printf(MSG_INFO, "EAP-pwd: cannot " in compute_password_element() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_cred.c | 48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert() 300 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key() 338 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key() 450 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob() 457 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob() [all …]
|
D | pkcs1.c | 120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); in pkcs1_v15_private_key_decrypt() 158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key() 166 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in pkcs1_decrypt_public_key() 175 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in pkcs1_decrypt_public_key() 181 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key() 215 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver() 302 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver() 310 wpa_printf(MSG_INFO, in pkcs1_v15_sig_ver()
|