Home
last modified time | relevance | path

Searched refs:wpa_printf (Results 1 – 25 of 393) sorted by relevance

12345678910>>...16

/hostap-latest/src/crypto/
Dcrypto_module_tests.c98 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); in test_siv()
102 wpa_printf(MSG_ERROR, in test_siv()
109 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); in test_siv()
113 wpa_printf(MSG_ERROR, in test_siv()
129 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); in test_siv()
133 wpa_printf(MSG_ERROR, in test_siv()
140 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); in test_siv()
144 wpa_printf(MSG_ERROR, in test_siv()
149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv()
232 wpa_printf(MSG_ERROR, "OMAC1-AES-128 test vector %u failed", i); in test_omac1_vector()
[all …]
Dtls_gnutls.c91 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, in tls_log_func()
102 wpa_printf(MSG_DEBUG, in tls_init()
170 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); in tls_pull_func()
175 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", in tls_pull_func()
207 wpa_printf(MSG_INFO, "TLS: Failed to initialize new TLS " in tls_gnutls_init_session()
219 wpa_printf(MSG_ERROR, "GnuTLS: Priority string failure at " in tls_gnutls_init_session()
232 wpa_printf(MSG_INFO, "TLS: Failed to setup new TLS connection: %s", in tls_gnutls_init_session()
260 wpa_printf(MSG_INFO, "Failed to configure " in tls_connection_init()
324 wpa_printf(MSG_INFO, "GnuTLS: Failed to preparare new session " in tls_connection_shutdown()
333 wpa_printf(MSG_INFO, "GnuTLS: Failed to configure credentials " in tls_connection_shutdown()
[all …]
Dtls_wolfssl.c170 wpa_printf(MSG_DEBUG, "SSL: adding %d bytes", sz); in wolfssl_send_cb()
190 wpa_printf(MSG_DEBUG, in remove_session_cb()
202 wpa_printf(MSG_INFO, in wcFipsCb()
205 wpa_printf(MSG_INFO, "wolfFIPS: message = %s", wc_GetErrorString(err)); in wcFipsCb()
206 wpa_printf(MSG_INFO, "wolfFIPS: hash = %s", hash); in wcFipsCb()
208 wpa_printf(MSG_ERROR, in wcFipsCb()
210 wpa_printf(MSG_ERROR, "wolfFIPS: into verifyCore[] in fips_test.c and rebuild"); in wcFipsCb()
221 wpa_printf(MSG_DEBUG, "wolfSSL log:%s", log_message); in wolfSSL_logging_cb()
287 wpa_printf(MSG_DEBUG, "wolfSSL: cipher suites: %s", ciphers); in tls_init()
289 wpa_printf(MSG_ERROR, in tls_init()
[all …]
Dtls_openssl_ocsp.c29 wpa_printf(level, "OpenSSL: %s - %s %s", in tls_show_errors()
33 wpa_printf(MSG_INFO, "OpenSSL: pending error: %s", in tls_show_errors()
351 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
359 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid"); in ocsp_resp_valid()
367 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
374 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired"); in ocsp_resp_valid()
379 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
401 wpa_printf(MSG_DEBUG, in issuer_match()
419 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerNameHash: %s", in issuer_match()
439 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerKeyHash: %s", in issuer_match()
[all …]
/hostap-latest/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
Dwps_attr_parse.c23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", in wps_set_vendor_ext_wfa_subelem()
28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem()
72 wpa_printf(MSG_DEBUG, in wps_set_vendor_ext_wfa_subelem()
78 wpa_printf(MSG_DEBUG, "WPS: Multi-AP Extension 0x%02x", in wps_set_vendor_ext_wfa_subelem()
82 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem()
117 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
[all …]
Dwps_enrollee.c26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2()
115 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1()
174 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3()
177 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3()
184 wpa_printf(MSG_INFO, in wps_build_m3()
[all …]
Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key()
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key()
32 wpa_printf(MSG_DEBUG, in wps_build_public_key()
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key()
52 wpa_printf(MSG_DEBUG, in wps_build_public_key()
57 wpa_printf(MSG_DEBUG, in wps_build_public_key()
67 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key()
73 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key()
99 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type()
109 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type); in wps_build_resp_type()
[all …]
/hostap-latest/src/pae/
Dieee802_1x_secy_ops.c33 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_protect_frames()
39 wpa_printf(MSG_ERROR, in secy_cp_control_protect_frames()
53 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_encrypt()
59 wpa_printf(MSG_ERROR, in secy_cp_control_encrypt()
73 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_replay()
79 wpa_printf(MSG_ERROR, in secy_cp_control_replay()
93 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_offload()
99 wpa_printf(MSG_ERROR, in secy_cp_control_offload()
113 wpa_printf(MSG_ERROR, "KaY: %s params invalid", __func__); in secy_cp_control_current_cipher_suite()
119 wpa_printf(MSG_ERROR, in secy_cp_control_current_cipher_suite()
[all …]
/hostap-latest/hs20/client/
Dspp_client.c57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate()
66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate()
85 wpa_printf(MSG_ERROR, in add_mo_container()
157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node()
162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node()
165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node()
169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node()
174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node()
178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node()
182 wpa_printf(MSG_DEBUG, "[hs20] nodeContainer text: '%s'", str); in process_update_node()
[all …]
Dosu_client.c81 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str); in debug_dump_node()
114 wpa_printf(MSG_ERROR, "file path null"); in android_update_permission()
121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission()
127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission()
148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate()
151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate()
159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate()
165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate()
168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate()
173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate()
[all …]
Doma_dm_client.c115 wpa_printf(MSG_ERROR, in oma_dm_build_hdr()
220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str()
251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo()
398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser()
404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser()
407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser()
408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser()
413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser()
417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser()
431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert()
[all …]
/hostap-latest/src/p2p/
Dp2p_parse.c46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute()
51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute()
57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute()
62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute()
67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute()
72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute()
77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute()
82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute()
86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute()
91 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute()
[all …]
/hostap-latest/wlantest/
Dtest_vectors.c49 wpa_printf(MSG_INFO, "\nIEEE Std 802.11-2012, M.6.3 TKIP test " in test_vector_tkip()
58 wpa_printf(MSG_ERROR, "Failed to encrypt TKIP frame"); in test_vector_tkip()
71 wpa_printf(MSG_ERROR, "Failed to decrypt TKIP frame"); in test_vector_tkip()
102 wpa_printf(MSG_INFO, "\nIEEE Std 802.11-2012, M.6.4 CCMP test " in test_vector_ccmp()
113 wpa_printf(MSG_ERROR, "Failed to encrypt CCMP frame"); in test_vector_ccmp()
129 wpa_printf(MSG_ERROR, "Failed to decrypt CCMP frame"); in test_vector_ccmp()
184 wpa_printf(MSG_INFO, in test_vector_ccmp_pv1()
187 wpa_printf(MSG_INFO, "BSSID: " MACSTR, MAC2STR(bssid)); in test_vector_ccmp_pv1()
188 wpa_printf(MSG_INFO, "DA: " MACSTR, MAC2STR(da)); in test_vector_ccmp_pv1()
189 wpa_printf(MSG_INFO, "SA: " MACSTR, MAC2STR(sa)); in test_vector_ccmp_pv1()
[all …]
/hostap-latest/src/utils/
Dpcsc_funcs.c200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols()
227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols()
279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ()
297 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", in scard_parse_fsp_templ()
333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ()
346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ()
421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid()
430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid()
436 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid()
441 wpa_printf(MSG_DEBUG, "SCARD: Failed to read " in scard_get_aid()
[all …]
Dutils_module_tests.c54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests()
59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests()
81 wpa_printf(MSG_ERROR, "Error in bounds checking#1"); in printf_encode_decode_tests()
89 wpa_printf(MSG_ERROR, "Error in bounds checking#2(%d)", in printf_encode_decode_tests()
120 wpa_printf(MSG_ERROR, "%d printf test(s) failed", errors); in printf_encode_decode_tests()
134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests()
214 wpa_printf(MSG_ERROR, "%d bitfield test(s) failed", errors); in bitfield_tests()
231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests()
245 wpa_printf(MSG_ERROR, "%d int_array test(s) failed", errors); in int_array_tests()
259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests()
[all …]
/hostap-latest/src/eap_common/
Deap_sim_common.c82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys()
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth()
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth()
147 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); in eap_sim_derive_keys_reauth()
457 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)"); in eap_aka_prime_derive_ck_ik_prime()
460 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc); in eap_aka_prime_derive_ck_ik_prime()
510 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr()
513 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", in eap_sim_parse_attr()
516 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr()
522 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr()
[all …]
Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
[all …]
/hostap-latest/src/pasn/
Dpasn_responder.c57 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short. len=%zu", in pasn_wd_handle_sae_commit()
66 wpa_printf(MSG_DEBUG, "PASN: SAE commit: alg=%u, seq=%u, status=%u", in pasn_wd_handle_sae_commit()
71 wpa_printf(MSG_DEBUG, "PASN: Dropping peer SAE commit"); in pasn_wd_handle_sae_commit()
80 wpa_printf(MSG_DEBUG, "PASN: Failed to set SAE group"); in pasn_wd_handle_sae_commit()
85 wpa_printf(MSG_DEBUG, "PASN: No SAE PT found"); in pasn_wd_handle_sae_commit()
92 wpa_printf(MSG_DEBUG, "PASN: Failed to prepare SAE commit"); in pasn_wd_handle_sae_commit()
99 wpa_printf(MSG_DEBUG, "PASN: Failed parsing SAE commit"); in pasn_wd_handle_sae_commit()
106 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); in pasn_wd_handle_sae_commit()
130 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short. len=%zu", in pasn_wd_handle_sae_confirm()
139 wpa_printf(MSG_DEBUG, "PASN: SAE confirm: alg=%u, seq=%u, status=%u", in pasn_wd_handle_sae_confirm()
[all …]
Dpasn_initiator.c46 wpa_printf(MSG_DEBUG, "PASN: Failed to set SAE group"); in wpas_pasn_wd_sae_commit()
54 wpa_printf(MSG_DEBUG, "PASN: Failed to prepare SAE commit"); in wpas_pasn_wd_sae_commit()
61 wpa_printf(MSG_DEBUG, "PASN: Failed to allocate SAE buffer"); in wpas_pasn_wd_sae_commit()
92 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (commit)"); in wpas_pasn_wd_sae_rx()
98 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short for commit"); in wpas_pasn_wd_sae_rx()
109 wpa_printf(MSG_DEBUG, "PASN: SAE: commit: alg=%u, seq=%u, status=%u", in wpas_pasn_wd_sae_rx()
114 wpa_printf(MSG_DEBUG, "PASN: SAE: dropping peer commit"); in wpas_pasn_wd_sae_rx()
121 wpa_printf(MSG_DEBUG, "PASN: SAE failed parsing commit"); in wpas_pasn_wd_sae_rx()
128 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); in wpas_pasn_wd_sae_rx()
137 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (confirm)"); in wpas_pasn_wd_sae_rx()
[all …]
/hostap-latest/src/eap_server/
Dikev2.c53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform()
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform()
151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
167 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform()
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform()
178 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform()
218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
[all …]
/hostap-latest/src/tls/
Dtlsv1_client_read.c52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); in tls_process_server_hello_extensions()
62 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); in tls_process_server_hello_extensions()
66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions()
87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
129 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
137 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
158 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
179 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello()
[all …]
/hostap-latest/src/eap_peer/
Dikev2.c49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys()
125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform()
132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform()
140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); in ikev2_parse_transform()
141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " in ikev2_parse_transform()
146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform()
161 wpa_printf(MSG_DEBUG, "IKEV2: No " in ikev2_parse_transform()
166 wpa_printf(MSG_DEBUG, "IKEV2: Not a " in ikev2_parse_transform()
172 wpa_printf(MSG_DEBUG, "IKEV2: " in ikev2_parse_transform()
209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal()
[all …]
/hostap-latest/src/rsn_supp/
Dtdls.c199 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from " in wpa_tdls_del_key()
222 wpa_printf(MSG_INFO, "TDLS: TPK-TK for the peer " MACSTR in wpa_tdls_set_key()
236 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " in wpa_tdls_set_key()
240 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", in wpa_tdls_set_key()
245 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, in wpa_tdls_set_key()
250 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the " in wpa_tdls_set_key()
278 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send()
287 wpa_printf(MSG_INFO, "TDLS: Failed to send message " in wpa_tdls_tpk_send()
304 wpa_printf(MSG_INFO, "TDLS: No matching entry found for " in wpa_tdls_tpk_send()
331 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " in wpa_tdls_tpk_send()
[all …]
/hostap-latest/src/drivers/
Ddriver_zephyr.c50 wpa_printf(MSG_ERROR, "Failed to allocate data for event: %d", event); in hostapd_event_wrapper()
62 wpa_printf(MSG_ERROR, "%s:%d Failed to alloc %d bytes\n", __func__, in hostapd_event_wrapper()
80 wpa_printf(MSG_ERROR, "%s:%d Failed to alloc %d bytes\n", in hostapd_event_wrapper()
106 wpa_printf(MSG_ERROR, "Failed to allocated for event: %d", event); in wpa_supplicant_event_wrapper()
118 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
135 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
153 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
170 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
184 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
200 wpa_printf(MSG_ERROR, in wpa_supplicant_event_wrapper()
[all …]

12345678910>>...16