Home
last modified time | relevance | path

Searched refs:MSG_INFO (Results 1 – 25 of 197) sorted by relevance

12345678

/external/wpa_supplicant_8/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
/external/wpa_supplicant_8/hs20/client/
Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate()
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate()
157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node()
162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node()
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node()
169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node()
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node()
178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node()
205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node()
213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node()
[all …]
Dosu_client.c119 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate()
122 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate()
130 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate()
136 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate()
139 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate()
144 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate()
150 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate()
153 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate()
159 wpa_printf(MSG_INFO, "Could not find estPassword node"); in osu_get_certificate()
165 wpa_printf(MSG_INFO, "Could not get estPassword text"); in osu_get_certificate()
[all …]
Doma_dm_client.c214 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str()
245 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo()
392 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser()
398 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser()
401 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser()
402 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser()
407 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser()
411 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser()
425 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert()
430 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert()
[all …]
Dest.c38 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
57 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert()
109 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts()
119 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts()
130 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts()
137 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts()
143 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts()
153 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts()
162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts()
233 wpa_printf(MSG_INFO, "TODO: csrattr challengePassword"); in add_csrattrs_oid()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c144 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv()
288 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1()
336 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax()
492 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb()
607 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap()
627 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap()
647 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap()
667 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap()
687 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap()
707 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap()
[all …]
Dtls_openssl.c153 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors()
188 wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u", in cryptoapi_error()
232 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", in cryptoapi_rsa_priv_enc()
253 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", in cryptoapi_rsa_priv_enc()
391 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate " in tls_cryptoapi_cert()
400 wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER " in tls_cryptoapi_cert()
501 wpa_printf(MSG_INFO, "CryptoAPI: Could not process " in tls_cryptoapi_ca_cert()
559 wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s", in ssl_info_cb()
618 wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]", in tls_engine_load_dynamic_generic()
628 wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: " in tls_engine_load_dynamic_generic()
[all …]
Dtls_gnutls.c204 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " in tls_gnutls_init_session()
229 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", in tls_gnutls_init_session()
257 wpa_printf(MSG_INFO, "Failed to configure " in tls_connection_init()
313 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session " in tls_connection_shutdown()
322 wpa_printf(MSG_INFO, "GnuTLS: Failed to configure credentials " in tls_connection_shutdown()
332 wpa_printf(MSG_INFO, "GnuTLS: Failed to set session " in tls_connection_shutdown()
351 wpa_printf(MSG_INFO, "GnuTLS: subject_match not supported"); in tls_connection_set_params()
356 wpa_printf(MSG_INFO, "GnuTLS: altsubject_match not supported"); in tls_connection_set_params()
378 wpa_printf(MSG_INFO, "GnuTLS: domain_match not supported"); in tls_connection_set_params()
386 wpa_printf(MSG_INFO, "GnuTLS: openssl_ciphers not supported"); in tls_connection_set_params()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_server_pwd.c89 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init()
121 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
212 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req()
222 wpa_printf(MSG_INFO, in eap_pwd_build_commit_req()
229 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req()
237 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req()
245 wpa_printf(MSG_INFO, "EAP-PWD (server): point allocation " in eap_pwd_build_commit_req()
252 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req()
260 wpa_printf(MSG_INFO, "EAP-PWD (server): data allocation fail"); in eap_pwd_build_commit_req()
[all …]
Deap_server_eke.c248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured"); in eap_eke_build_commit()
257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key"); in eap_eke_build_commit()
278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH"); in eap_eke_build_commit()
286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S"); in eap_eke_build_commit()
393 wpa_printf(MSG_INFO, "EAP-EKE: Invalid frame"); in eap_eke_check()
412 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected EKE-Exch=%d in state=%d", in eap_eke_check()
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); in eap_eke_process_identity()
444 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected NumProposals %d (expected 1)", in eap_eke_process_identity()
453 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected Proposal (%u:%u:%u:%u)", in eap_eke_process_identity()
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity()
[all …]
Deap_server_pax.c194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check()
236 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check()
243 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check()
251 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check()
256 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check()
262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check()
272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check()
308 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2()
320 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2()
325 wpa_printf(MSG_INFO, "EAP-PAX: Too long CID"); in eap_pax_process_std_2()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
268 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pwd.c95 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
106 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
111 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
117 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
127 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
273 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
279 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
284 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
323 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_id_exchange()
[all …]
Deap_pax.c57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init()
63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init()
129 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1()
136 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1()
145 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1()
153 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1()
245 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3()
252 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3()
261 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3()
269 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3()
[all …]
/external/wpa_supplicant_8/src/ap/
Daccounting.c48 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg()
64 wpa_printf(MSG_INFO, in accounting_msg()
75 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg()
85 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg()
110 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg()
128 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg()
264 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report()
273 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report()
281 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report()
287 wpa_printf(MSG_INFO, "Could not add Acct-Output-Packets"); in accounting_sta_report()
[all …]
Diapp.c207 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add()
234 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update()
272 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify()
322 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp()
347 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp()
352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp()
357 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp()
374 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp()
401 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init()
410 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init()
[all …]
/external/wpa_supplicant_8/src/utils/
Dtrace.c51 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd()
56 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd()
62 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd()
81 wpa_printf(MSG_INFO, "No symbols"); in read_syms()
91 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms()
97 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms()
106 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms()
185 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr()
226 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init()
233 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init()
[all …]
Dbrowser-wpadebug.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout()
38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req()
73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url); in hs20_web_browser()
126 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser()
132 wpa_printf(MSG_INFO, "Failed to close wpadebug browser"); in hs20_web_browser()
Dbrowser-android.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout()
38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req()
72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url); in hs20_web_browser()
122 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser()
124 wpa_printf(MSG_INFO, "Failed to inject keyevent"); in hs20_web_browser()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
539 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr()
557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr()
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr()
586 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
599 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr()
607 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
626 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
[all …]
Dikev2_common.c196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt()
201 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt()
231 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt()
236 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt()
262 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads()
270 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads()
334 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads()
361 wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after " in ikev2_parse_payloads()
445 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH"); in ikev2_decrypt_payload()
451 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); in ikev2_decrypt_payload()
[all …]
Deap_pwd_common.c119 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); in compute_password_element()
128 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); in compute_password_element()
138 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element()
144 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " in compute_password_element()
149 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); in compute_password_element()
153 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " in compute_password_element()
160 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element()
168 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " in compute_password_element()
242 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); in compute_password_element()
250 wpa_printf(MSG_INFO, "EAP-pwd: cannot " in compute_password_element()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_cred.c48 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der()
123 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert()
130 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert()
136 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert()
166 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain()
199 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert()
300 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key()
338 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key()
450 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob()
457 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob()
[all …]
Dpkcs1.c120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); in pkcs1_v15_private_key_decrypt()
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
166 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in pkcs1_decrypt_public_key()
175 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in pkcs1_decrypt_public_key()
181 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
215 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver()
302 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver()
310 wpa_printf(MSG_INFO, in pkcs1_v15_sig_ver()

12345678