HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 101 - 125 of 234) sorted by null

1 2 3 45 6 7 8 910

  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
asn1_test.c 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero "
95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected "
120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null "
128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID");
132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str);
174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
  /external/wpa_supplicant/
eap_leap.c 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
116 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
150 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
203 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
238 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
252 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
350 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
354 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
ctrl_iface_udp.c 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
l2_packet_ndis.c 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: "
268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data "
285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes"
    [all...]
tls_schannel.c 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
442 wpa_printf(MSG_DEBUG,
446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
eap_aka.c 76 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
118 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s",
154 wpa_hexdump_ascii(MSG_DEBUG,
171 wpa_hexdump_ascii(MSG_DEBUG,
208 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Authentication-Reject "
226 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Synchronization-Failure "
231 wpa_printf(MSG_DEBUG, " AT_AUTS");
268 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)",
274 wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY",
290 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)"
    [all...]
wpa.c 386 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
397 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
410 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
421 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
431 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
442 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
452 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
464 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored",
501 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
511 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version"
    [all...]
eap_ttls.c 94 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
117 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
184 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase2 EAP types",
343 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
366 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
408 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key");
415 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random",
417 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: TLS/IA inner secret",
422 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
467 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive implicit
    [all...]
eap_mschapv2.c 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
191 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge",
193 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username",
195 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-MSCHAPV2: password",
200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response,
233 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
269 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
279 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
291 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
322 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge")
    [all...]
ctrl_iface.c 47 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value);
86 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address "
91 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid));
109 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid "
114 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART " MACSTR,
140 wpa_printf(MSG_DEBUG, "CTRL_IFACE: field=%s id=%d", rsp, id);
141 wpa_hexdump_ascii_key(MSG_DEBUG, "CTRL_IFACE: value",
146 wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find SSID id=%d "
192 wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown field '%s'", rsp);
198 wpa_printf(MSG_DEBUG, "CTRL_IFACE: 802.1X not included")
    [all...]
driver_wired.c 200 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
204 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
213 wpa_printf(MSG_DEBUG, "%s: Interface is already configured "
222 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode",
238 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
244 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
252 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
260 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
mlme.c 545 wpa_printf(MSG_DEBUG, "MLME: WMM queue=%d aci=%d acm=%d "
552 wpa_printf(MSG_DEBUG, "MLME: failed to set TX queue "
601 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
642 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR
648 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR,
668 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc");
675 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
790 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
818 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
863 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACST
    [all...]
config_file.c 119 wpa_printf(MSG_DEBUG, "Line %d: removed CCMP from group cipher"
257 wpa_printf(MSG_DEBUG, "Reading configuration file '%s'", name);
317 wpa_printf(MSG_DEBUG, "ctrl_interface='%s'",
322 wpa_printf(MSG_DEBUG, "ctrl_interface_group='%s' "
336 wpa_printf(MSG_DEBUG, "eapol_version=%d",
340 wpa_printf(MSG_DEBUG, "ap_scan=%d", config->ap_scan);
343 wpa_printf(MSG_DEBUG, "fast_reauth=%d",
348 wpa_printf(MSG_DEBUG, "opensc_engine_path='%s'",
353 wpa_printf(MSG_DEBUG, "pkcs11_engine_path='%s'",
358 wpa_printf(MSG_DEBUG, "pkcs11_module_path='%s'"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_leap.c 75 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
112 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
148 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
199 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
231 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
249 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
354 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
360 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
eap_ttls.c 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
294 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key");
344 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random",
346 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: TLS/IA inner secret",
351 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
401 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive implicit "
410 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived implicit challenge"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface_udp.c 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
wps_supplicant.c 48 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
66 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
76 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
125 wpa_printf(MSG_DEBUG, "WPS: AP found from scan results");
130 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from scan "
155 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
174 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential "
207 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute",
213 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
l2_packet_ndis.c 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: "
268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data "
285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_schannel.c 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
442 wpa_printf(MSG_DEBUG,
446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
272 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
282 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
294 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as group "
302 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
313 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
324 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as "
330 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
httpread.c 161 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h);
184 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h);
411 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h);
426 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h);
431 wpa_printf(MSG_DEBUG,
442 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h);
479 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h);
484 wpa_printf(MSG_DEBUG,
490 wpa_printf(MSG_DEBUG,
506 wpa_printf(MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_test.c 79 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s",
93 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
100 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
137 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
157 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
224 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
227 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
230 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
233 wpa_hexdump(MSG_DEBUG, " key", key, key_len);
243 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d
    [all...]
driver_wired.c 208 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
212 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
221 wpa_printf(MSG_DEBUG, "%s: Interface is already configured "
230 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode",
246 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
252 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
260 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
268 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
116 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
171 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
190 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
227 wpa_printf(MSG_DEBUG, "RSN: Using CCMP for PeerKey");
230 wpa_printf(MSG_DEBUG, "RSN: Using TKIP for PeerKey");
283 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_tls.c 52 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
133 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
144 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
173 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key",
216 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key");
245 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
248 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");

Completed in 4910 milliseconds

1 2 3 45 6 7 8 910