Home
last modified time | relevance | path

Searched refs:MSG_INFO (Results 1 – 25 of 209) sorted by relevance

123456789

/external/wpa_supplicant_8/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
/external/wpa_supplicant_8/hs20/client/
Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate()
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate()
157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node()
162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node()
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node()
169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node()
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node()
178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node()
205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node()
213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node()
[all …]
Dosu_client.c119 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate()
122 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate()
130 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate()
136 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate()
139 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate()
144 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate()
150 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate()
153 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate()
159 wpa_printf(MSG_INFO, "Could not find estPassword node"); in osu_get_certificate()
165 wpa_printf(MSG_INFO, "Could not get estPassword text"); in osu_get_certificate()
[all …]
Doma_dm_client.c214 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str()
245 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo()
392 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser()
398 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser()
401 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser()
402 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser()
407 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser()
411 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser()
425 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert()
430 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert()
[all …]
Dest.c49 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
57 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert()
77 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert()
134 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts()
144 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts()
155 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts()
162 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts()
168 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts()
178 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts()
187 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c144 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv()
288 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1()
336 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax()
492 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb()
611 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap()
632 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap()
653 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap()
674 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap()
695 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap()
715 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap()
[all …]
Dtls_gnutls.c207 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " in tls_gnutls_init_session()
232 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", in tls_gnutls_init_session()
260 wpa_printf(MSG_INFO, "Failed to configure " in tls_connection_init()
316 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session " in tls_connection_shutdown()
325 wpa_printf(MSG_INFO, "GnuTLS: Failed to configure credentials " in tls_connection_shutdown()
335 wpa_printf(MSG_INFO, "GnuTLS: Failed to set session " in tls_connection_shutdown()
354 wpa_printf(MSG_INFO, in tls_connection_set_params()
360 wpa_printf(MSG_INFO, in tls_connection_set_params()
366 wpa_printf(MSG_INFO, "GnuTLS: subject_match not supported"); in tls_connection_set_params()
371 wpa_printf(MSG_INFO, "GnuTLS: altsubject_match not supported"); in tls_connection_set_params()
[all …]
/external/wpa_supplicant_8/src/utils/
Dutils_module_tests.c51 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests()
56 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests()
131 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests()
228 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests()
256 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests()
283 wpa_printf(MSG_INFO, "trace tests"); in trace_tests()
298 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests()
366 wpa_printf(MSG_INFO, "common tests"); in common_tests()
450 wpa_printf(MSG_INFO, "os tests"); in os_tests()
515 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests()
[all …]
Dtrace.c51 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd()
56 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd()
62 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd()
81 wpa_printf(MSG_INFO, "No symbols"); in read_syms()
91 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms()
97 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms()
106 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms()
185 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr()
226 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init()
233 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init()
[all …]
Dbrowser-android.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout()
38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req()
72 wpa_printf(MSG_INFO, "Launching Android browser to %s", url); in hs20_web_browser()
120 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser()
122 wpa_printf(MSG_INFO, "Failed to inject keyevent"); in hs20_web_browser()
Dbrowser-wpadebug.c24 wpa_printf(MSG_INFO, "Timeout on waiting browser interaction to " in browser_timeout()
38 wpa_printf(MSG_INFO, "Browser response received: %s", url); in http_req()
73 wpa_printf(MSG_INFO, "Launching wpadebug browser to %s", url); in hs20_web_browser()
128 wpa_printf(MSG_INFO, "Closing Android browser"); in hs20_web_browser()
134 wpa_printf(MSG_INFO, "Failed to close wpadebug browser"); in hs20_web_browser()
/external/wpa_supplicant_8/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_server_pwd.c89 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init()
121 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
217 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req()
227 wpa_printf(MSG_INFO, in eap_pwd_build_commit_req()
234 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req()
242 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req()
250 wpa_printf(MSG_INFO, "EAP-PWD (server): point allocation " in eap_pwd_build_commit_req()
257 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req()
265 wpa_printf(MSG_INFO, "EAP-PWD (server): data allocation fail"); in eap_pwd_build_commit_req()
[all …]
Deap_server_eke.c248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured"); in eap_eke_build_commit()
257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key"); in eap_eke_build_commit()
278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH"); in eap_eke_build_commit()
286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S"); in eap_eke_build_commit()
393 wpa_printf(MSG_INFO, "EAP-EKE: Invalid frame"); in eap_eke_check()
412 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected EKE-Exch=%d in state=%d", in eap_eke_check()
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); in eap_eke_process_identity()
444 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected NumProposals %d (expected 1)", in eap_eke_process_identity()
453 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected Proposal (%u:%u:%u:%u)", in eap_eke_process_identity()
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity()
[all …]
Deap_server_pax.c194 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check()
236 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check()
243 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check()
251 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check()
256 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check()
262 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check()
272 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check()
308 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2()
320 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2()
325 wpa_printf(MSG_INFO, "EAP-PAX: Too long CID"); in eap_pax_process_std_2()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
208 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
217 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal()
230 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal()
244 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal()
252 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal()
268 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal()
[all …]
Deap_pwd.c95 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
106 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
111 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail"); in eap_pwd_init()
117 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
127 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
273 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
279 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
284 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
330 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_id_exchange()
[all …]
Deap_pax.c57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init()
63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init()
129 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1()
136 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1()
145 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1()
153 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1()
245 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3()
252 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3()
261 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3()
269 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3()
[all …]
/external/wpa_supplicant_8/src/ap/
Diapp.c203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add()
230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update()
268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify()
318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp()
343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp()
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp()
353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp()
370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp()
397 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init()
406 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init()
[all …]
Daccounting.c49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg()
54 wpa_printf(MSG_INFO, "Could not make Request Authenticator"); in accounting_msg()
60 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg()
72 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg()
96 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg()
114 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg()
151 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg()
160 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg()
283 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report()
291 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c512 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
518 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
524 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
539 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr()
557 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr()
573 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr()
586 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
599 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr()
607 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
626 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr()
[all …]
Dikev2_common.c195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt()
200 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt()
230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt()
235 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt()
261 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads()
269 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads()
333 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads()
360 wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after " in ikev2_parse_payloads()
444 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH"); in ikev2_decrypt_payload()
450 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); in ikev2_decrypt_payload()
[all …]
Deap_pwd_common.c139 wpa_printf(MSG_INFO, "EAP-pwd: unsupported group %d", num); in compute_password_element()
148 wpa_printf(MSG_INFO, "EAP-pwd: unable to create EC_GROUP"); in compute_password_element()
158 wpa_printf(MSG_INFO, "EAP-pwd: unable to create bignums"); in compute_password_element()
164 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " in compute_password_element()
169 wpa_printf(MSG_INFO, "EAP-pwd: unable to get order for curve"); in compute_password_element()
173 wpa_printf(MSG_INFO, "EAP-pwd: unable to get cofactor for " in compute_password_element()
180 wpa_printf(MSG_INFO, "EAP-pwd: unable to malloc space for prf " in compute_password_element()
188 wpa_printf(MSG_INFO, "EAP-pwd: unable to find random " in compute_password_element()
262 wpa_printf(MSG_INFO, "EAP-pwd: point is not on curve"); in compute_password_element()
270 wpa_printf(MSG_INFO, "EAP-pwd: cannot " in compute_password_element()
[all …]
/external/wpa_supplicant_8/src/drivers/
Drfkill.c83 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_receive()
86 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_receive()
89 wpa_printf(MSG_INFO, "rfkill: WLAN unblocked"); in rfkill_receive()
121 wpa_printf(MSG_INFO, "rfkill: Cannot get wiphy information"); in rfkill_init()
128 wpa_printf(MSG_INFO, "rfkill: Cannot open RFKILL control " in rfkill_init()
176 wpa_printf(MSG_INFO, "rfkill: WLAN hard blocked"); in rfkill_init()
179 wpa_printf(MSG_INFO, "rfkill: WLAN soft blocked"); in rfkill_init()
/external/wpa_supplicant_8/src/tls/
Dpkcs1.c120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); in pkcs1_v15_private_key_decrypt()
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
166 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in pkcs1_decrypt_public_key()
175 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in pkcs1_decrypt_public_key()
181 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
215 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver()
302 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver()
310 wpa_printf(MSG_INFO, in pkcs1_v15_sig_ver()

123456789