/freebsd/contrib/wpa/src/wps/ |
H A D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
/freebsd/contrib/wpa/hs20/client/ |
H A D | spp_client.c | 57 wpa_printf(MSG_INFO, "Unexpected SOAP method name '%s' (expected '%s')", in hs20_spp_validate() 66 wpa_printf(MSG_INFO, "XML schema validation error(s)\n%s", err); in hs20_spp_validate() 157 wpa_printf(MSG_INFO, "Processing updateNode"); in process_update_node() 162 wpa_printf(MSG_INFO, "No managementTreeURI present"); in process_update_node() 165 wpa_printf(MSG_INFO, "managementTreeUri: '%s'", uri); in process_update_node() 169 wpa_printf(MSG_INFO, "Unexpected URI"); in process_update_node() 174 wpa_printf(MSG_INFO, "Update interior node: '%s'", name); in process_update_node() 178 wpa_printf(MSG_INFO, "Could not extract MO text"); in process_update_node() 205 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer text"); in process_update_node() 213 wpa_printf(MSG_INFO, "[hs20] Could not parse nodeContainer TNDS text"); in process_update_node() [all …]
|
H A D | osu_client.c | 121 wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s", in android_update_permission() 127 wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s", in android_update_permission() 148 wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto); in osu_get_certificate() 151 wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol"); in osu_get_certificate() 159 wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node"); in osu_get_certificate() 165 wpa_printf(MSG_INFO, "Could not get URL text"); in osu_get_certificate() 168 wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url); in osu_get_certificate() 173 wpa_printf(MSG_INFO, "Could not find estUserID node"); in osu_get_certificate() 179 wpa_printf(MSG_INFO, "Could not get estUserID text"); in osu_get_certificate() 182 wpa_printf(MSG_INFO, "estUserID: %s", user); in osu_get_certificate() [all …]
|
H A D | oma_dm_client.c | 220 wpa_printf(MSG_INFO, "MgmtTree: %s", str); in mo_str() 251 wpa_printf(MSG_INFO, "Could not read devinfo.xml"); in add_replace_devinfo() 398 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_browser() 404 wpa_printf(MSG_INFO, "Invalid data"); in oma_dm_exec_browser() 407 wpa_printf(MSG_INFO, "Data: %s", data); in oma_dm_exec_browser() 408 wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data); in oma_dm_exec_browser() 413 wpa_printf(MSG_INFO, "User response in browser completed successfully"); in oma_dm_exec_browser() 417 wpa_printf(MSG_INFO, "Failed to receive user response"); in oma_dm_exec_browser() 431 wpa_printf(MSG_INFO, "Client certificate enrollment"); in oma_dm_exec_get_cert() 436 wpa_printf(MSG_INFO, "No Data node found"); in oma_dm_exec_get_cert() [all …]
|
H A D | est.c | 47 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 55 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", in pkcs7_to_cert() 75 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); in pkcs7_to_cert() 132 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); in est_load_cacerts() 142 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", in est_load_cacerts() 153 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); in est_load_cacerts() 160 …wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was bi… in est_load_cacerts() 166 …wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); in est_load_cacerts() 176 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); in est_load_cacerts() 185 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); in est_load_cacerts() [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 149 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); in test_siv() 293 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); in test_omac1() 341 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); in test_eax() 497 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); in test_ecb() 616 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); in test_key_wrap() 637 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); in test_key_wrap() 658 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); in test_key_wrap() 679 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); in test_key_wrap() 700 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); in test_key_wrap() 720 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); in test_key_wrap() [all …]
|
/freebsd/contrib/wpa/src/utils/ |
H A D | utils_module_tests.c | 54 wpa_printf(MSG_INFO, "printf encode/decode tests"); in printf_encode_decode_tests() 59 wpa_printf(MSG_INFO, "%d: -> \"%s\"", i, buf); in printf_encode_decode_tests() 134 wpa_printf(MSG_INFO, "bitfield tests"); in bitfield_tests() 231 wpa_printf(MSG_INFO, "int_array tests"); in int_array_tests() 259 wpa_printf(MSG_INFO, "ext_password tests"); in ext_password_tests() 286 wpa_printf(MSG_INFO, "trace tests"); in trace_tests() 302 wpa_printf(MSG_INFO, "base64 tests"); in base64_tests() 370 wpa_printf(MSG_INFO, "common tests"); in common_tests() 454 wpa_printf(MSG_INFO, "os tests"); in os_tests() 519 wpa_printf(MSG_INFO, "wpabuf tests"); in wpabuf_tests() [all …]
|
H A D | trace.c | 77 wpa_printf(MSG_INFO, "bfd_openr failed"); in open_bfd() 82 wpa_printf(MSG_INFO, "bfd_check_format failed"); in open_bfd() 88 wpa_printf(MSG_INFO, "bfd_check_format_matches failed"); in open_bfd() 107 wpa_printf(MSG_INFO, "No symbols"); in read_syms() 117 wpa_printf(MSG_INFO, "Unknown symtab upper bound"); in read_syms() 123 wpa_printf(MSG_INFO, "Failed to allocate memory for symtab " in read_syms() 132 wpa_printf(MSG_INFO, "Failed to canonicalize %ssymtab", in read_syms() 222 wpa_printf(MSG_INFO, " %s() %s:%u", in wpa_trace_bfd_addr() 263 wpa_printf(MSG_INFO, "Failed to open bfd"); in wpa_trace_bfd_init() 270 wpa_printf(MSG_INFO, "Failed to read symbols"); in wpa_trace_bfd_init() [all …]
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 53 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 130 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 137 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 151 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 218 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 225 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 238 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 252 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 260 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 276 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
H A D | eap_server_pwd.c | 91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init() 111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init() 125 wpa_printf(MSG_INFO, in eap_pwd_init() 214 wpa_printf(MSG_INFO, in eap_pwd_build_id_req() 259 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req() 270 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req() 277 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req() 302 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req() 336 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req() 363 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_build_confirm_req() [all …]
|
H A D | eap_server_pax.c | 209 wpa_printf(MSG_INFO, "EAP-PAX: Invalid frame"); in eap_pax_check() 251 wpa_printf(MSG_INFO, "EAP-PAX: Expected DH Group ID 0x%x, " in eap_pax_check() 258 wpa_printf(MSG_INFO, "EAP-PAX: Expected Public Key ID 0x%x, " in eap_pax_check() 266 wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported"); in eap_pax_check() 271 wpa_printf(MSG_INFO, "EAP-PAX: Unexpected CE flag"); in eap_pax_check() 277 wpa_printf(MSG_INFO, "EAP-PAX: No ICV in the packet"); in eap_pax_check() 286 wpa_printf(MSG_INFO, in eap_pax_check() 292 wpa_printf(MSG_INFO, "EAP-PAX: Invalid ICV"); in eap_pax_check() 328 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (B)"); in eap_pax_process_std_2() 340 wpa_printf(MSG_INFO, "EAP-PAX: Too short PAX_STD-2 (CID)"); in eap_pax_process_std_2() [all …]
|
H A D | eap_server_eke.c | 248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured"); in eap_eke_build_commit() 257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key"); in eap_eke_build_commit() 278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH"); in eap_eke_build_commit() 287 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S"); in eap_eke_build_commit() 394 wpa_printf(MSG_INFO, "EAP-EKE: Invalid frame"); in eap_eke_check() 413 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected EKE-Exch=%d in state=%d", in eap_eke_check() 439 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); in eap_eke_process_identity() 445 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected NumProposals %d (expected 1)", in eap_eke_process_identity() 454 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected Proposal (%u:%u:%u:%u)", in eap_eke_process_identity() 473 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity() [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 49 wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); in ikev2_derive_keys() 125 wpa_printf(MSG_INFO, "IKEV2: Too short transform"); in ikev2_parse_transform() 132 wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", in ikev2_parse_transform() 146 wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); in ikev2_parse_transform() 209 wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); in ikev2_parse_proposal() 218 wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", in ikev2_parse_proposal() 231 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); in ikev2_parse_proposal() 245 wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); in ikev2_parse_proposal() 253 wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " in ikev2_parse_proposal() 269 wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); in ikev2_parse_proposal() [all …]
|
H A D | eap_pwd.c | 103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init() 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init() 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init() 119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init() 128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init() 279 wpa_printf(MSG_INFO, in eap_pwd_perform_id_exchange() 311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange() 318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange() 324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange() 329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange() [all …]
|
H A D | eap_pax.c | 57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " in eap_pax_init() 63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); in eap_pax_init() 128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " in eap_pax_process_std_1() 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " in eap_pax_process_std_1() 144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " in eap_pax_process_std_1() 152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " in eap_pax_process_std_1() 244 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " in eap_pax_process_std_3() 251 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " in eap_pax_process_std_3() 260 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " in eap_pax_process_std_3() 268 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " in eap_pax_process_std_3() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | iapp.c | 203 wpa_printf(MSG_INFO, "sendto[IAPP-ADD]: %s", strerror(errno)); in iapp_send_add() 230 wpa_printf(MSG_INFO, "send[L2 Update]: %s", strerror(errno)); in iapp_send_layer2_update() 268 wpa_printf(MSG_INFO, "Invalid IAPP-ADD packet length %d (expected %lu)", in iapp_process_add_notify() 318 wpa_printf(MSG_INFO, "iapp_receive_udp - recvfrom: %s", in iapp_receive_udp() 343 wpa_printf(MSG_INFO, "Dropping IAPP frame with unknown version %d", in iapp_receive_udp() 348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", in iapp_receive_udp() 353 wpa_printf(MSG_INFO, "Ignoring %d extra bytes from IAPP frame", in iapp_receive_udp() 370 wpa_printf(MSG_INFO, "Unknown IAPP command %d", hdr->command); in iapp_receive_udp() 398 wpa_printf(MSG_INFO, "iapp_init - socket[PF_INET,SOCK_DGRAM]: %s", in iapp_init() 407 wpa_printf(MSG_INFO, "iapp_init - ioctl(SIOCGIFINDEX): %s", in iapp_init() [all …]
|
H A D | accounting.c | 49 wpa_printf(MSG_INFO, "Could not create new RADIUS packet"); in accounting_msg() 55 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type"); in accounting_msg() 67 wpa_printf(MSG_INFO, "Could not add Acct-Authentic"); in accounting_msg() 91 wpa_printf(MSG_INFO, "Could not add User-Name"); in accounting_msg() 112 wpa_printf(MSG_INFO, "Could not add Class"); in accounting_msg() 149 wpa_printf(MSG_INFO, "Could not add Event-Timestamp"); in accounting_msg() 158 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time"); in accounting_msg() 281 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message"); in accounting_sta_report() 289 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time"); in accounting_sta_report() 297 wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets"); in accounting_sta_report() [all …]
|
H A D | dpp_hostapd.c | 69 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_qr_code() 124 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_req() 155 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_sel() 161 wpa_printf(MSG_INFO, in hostapd_dpp_nfc_handover_sel() 181 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_auth_resp_retry_timeout() 205 wpa_printf(MSG_INFO, in hostapd_dpp_auth_resp_retry() 323 wpa_printf(MSG_INFO, in hostapd_dpp_pkex_done() 329 wpa_printf(MSG_INFO, in hostapd_dpp_pkex_done() 408 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in hostapd_dpp_pkex_init() 439 wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_FAIL in hostapd_dpp_pkex_retry_timeout() [all …]
|
/freebsd/contrib/wpa/src/common/ |
H A D | dpp_auth.c | 112 wpa_printf(MSG_INFO, in dpp_auth_build_req() 135 wpa_printf(MSG_INFO, "DPP: TESTING - no Wrapped Data"); in dpp_auth_build_req() 145 wpa_printf(MSG_INFO, "DPP: TESTING - no I-nonce"); in dpp_auth_build_req() 149 wpa_printf(MSG_INFO, "DPP: TESTING - invalid I-nonce"); in dpp_auth_build_req() 171 wpa_printf(MSG_INFO, "DPP: TESTING - no I-capab"); in dpp_auth_build_req() 185 wpa_printf(MSG_INFO, "DPP: TESTING - zero I-capabilities"); in dpp_auth_build_req() 220 wpa_printf(MSG_INFO, "DPP: TESTING - attr after Wrapped Data"); in dpp_auth_build_req() 303 wpa_printf(MSG_INFO, "DPP: TESTING - no Wrapped Data"); in dpp_auth_build_resp() 330 wpa_printf(MSG_INFO, "DPP: TESTING - I-nonce mismatch"); in dpp_auth_build_resp() 339 wpa_printf(MSG_INFO, "DPP: TESTING - no R-capab"); in dpp_auth_build_resp() [all …]
|
H A D | dpp_pkex.c | 53 wpa_printf(MSG_INFO, in dpp_pkex_build_exchange_req() 103 wpa_printf(MSG_INFO, "DPP: TESTING - no Finite Cyclic Group"); in dpp_pkex_build_exchange_req() 126 wpa_printf(MSG_INFO, "DPP: TESTING - no Encrypted Key"); in dpp_pkex_build_exchange_req() 137 wpa_printf(MSG_INFO, "DPP: TESTING - invalid Encrypted Key"); in dpp_pkex_build_exchange_req() 160 wpa_printf(MSG_INFO, "DPP: Failed to build PKEX Exchange Request"); in dpp_pkex_build_exchange_req() 169 wpa_msg(pkex->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_pkex_fail() 182 wpa_printf(MSG_INFO, "DPP: TESTING - own_mac override " MACSTR, in dpp_pkex_init() 240 wpa_printf(MSG_INFO, "DPP: TESTING - no Status"); in dpp_pkex_build_exchange_resp() 245 wpa_printf(MSG_INFO, "DPP: TESTING - invalid Status"); in dpp_pkex_build_exchange_resp() 278 wpa_printf(MSG_INFO, "DPP: TESTING - no Encrypted Key"); in dpp_pkex_build_exchange_resp() [all …]
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_das.c | 69 wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in " in radius_das_disconnect() 81 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d", in radius_das_disconnect() 93 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d", in radius_das_disconnect() 115 wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id " in radius_das_disconnect() 150 wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d", in radius_das_disconnect() 155 wpa_printf(MSG_INFO, "DAS: Session not found for request from " in radius_das_disconnect() 160 wpa_printf(MSG_INFO, in radius_das_disconnect() 233 wpa_printf(MSG_INFO, "DAS: CoA not supported"); in radius_das_coa() 239 wpa_printf(MSG_INFO, in radius_das_coa() 251 wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d", in radius_das_coa() [all …]
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 510 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow(1)"); in eap_sim_parse_attr() 516 wpa_printf(MSG_INFO, "EAP-SIM: Attribute overflow " in eap_sim_parse_attr() 522 wpa_printf(MSG_INFO, "EAP-SIM: Attribute underflow"); in eap_sim_parse_attr() 537 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_RAND" in eap_sim_parse_attr() 555 wpa_printf(MSG_INFO, "EAP-AKA: Invalid AT_AUTN" in eap_sim_parse_attr() 571 wpa_printf(MSG_INFO, "EAP-SIM: (encr) " in eap_sim_parse_attr() 584 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 597 wpa_printf(MSG_INFO, "EAP-SIM: Invalid AT_MAC " in eap_sim_parse_attr() 605 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() 624 wpa_printf(MSG_INFO, "EAP-SIM: Invalid " in eap_sim_parse_attr() [all …]
|
H A D | ikev2_common.c | 195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_encrypt() 200 wpa_printf(MSG_INFO, "IKEV2: Encryption failed"); in ikev2_encr_encrypt() 230 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); in ikev2_encr_decrypt() 235 wpa_printf(MSG_INFO, "IKEV2: Decryption failed"); in ikev2_encr_decrypt() 261 wpa_printf(MSG_INFO, "IKEV2: Too short message for " in ikev2_parse_payloads() 269 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " in ikev2_parse_payloads() 333 wpa_printf(MSG_INFO, "IKEV2: Unsupported " in ikev2_parse_payloads() 360 wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after " in ikev2_parse_payloads() 444 wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH"); in ikev2_decrypt_payload() 450 wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type"); in ikev2_decrypt_payload() [all …]
|
H A D | eap_teap_common.c | 337 wpa_printf(MSG_INFO, in eap_teap_tls_mac() 432 wpa_printf(MSG_INFO, in eap_teap_parse_tlv() 444 wpa_printf(MSG_INFO, in eap_teap_parse_tlv() 450 wpa_printf(MSG_INFO, "EAP-TEAP: Too short Result TLV"); in eap_teap_parse_tlv() 457 wpa_printf(MSG_INFO, "EAP-TEAP: Unknown Result %d", in eap_teap_parse_tlv() 468 wpa_printf(MSG_INFO, "EAP-TEAP: Too short NAK TLV"); in eap_teap_parse_tlv() 477 wpa_printf(MSG_INFO, "EAP-TEAP: Too short Error TLV"); in eap_teap_parse_tlv() 488 wpa_printf(MSG_INFO, in eap_teap_parse_tlv() 494 wpa_printf(MSG_INFO, in eap_teap_parse_tlv() 509 wpa_printf(MSG_INFO, in eap_teap_parse_tlv() [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | dpp_supplicant.c | 88 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_qr_code() 146 wpa_printf(MSG_INFO, in wpas_dpp_nfc_handover_req() 178 wpa_printf(MSG_INFO, in wpas_dpp_nfc_handover_sel() 184 wpa_printf(MSG_INFO, in wpas_dpp_nfc_handover_sel() 203 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR in wpas_dpp_auth_resp_retry_timeout() 229 wpa_printf(MSG_INFO, "DPP: No confirm received from initiator - stopping exchange"); in wpas_dpp_auth_resp_retry() 423 wpa_msg(wpa_s, MSG_INFO, in wpas_dpp_send_conn_status_result() 515 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_TX_STATUS "dst=" MACSTR in wpas_dpp_tx_status() 649 wpa_printf(MSG_INFO, in wpas_dpp_reply_wait_timeout() 651 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_AUTH_INIT_FAILED); in wpas_dpp_reply_wait_timeout() [all …]
|