/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
asn1_test.c | 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero " 95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected " 120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null " 128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID"); 132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str); 174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
|
/external/wpa_supplicant/ |
eap_leap.c | 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 116 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 150 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 203 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 238 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 252 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 350 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 354 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
ctrl_iface_udp.c | 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
l2_packet_ndis.c | 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: " 268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data " 285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes" [all...] |
tls_schannel.c | 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 442 wpa_printf(MSG_DEBUG, 446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
eap_aka.c | 76 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 118 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s", 154 wpa_hexdump_ascii(MSG_DEBUG, 171 wpa_hexdump_ascii(MSG_DEBUG, 208 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Authentication-Reject " 226 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Synchronization-Failure " 231 wpa_printf(MSG_DEBUG, " AT_AUTS"); 268 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", 274 wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY", 290 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)" [all...] |
wpa.c | 386 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 397 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 410 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 421 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 431 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 442 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " 452 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)", 464 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored", 501 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 511 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version" [all...] |
eap_ttls.c | 94 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 117 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 184 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase2 EAP types", 343 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 366 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 408 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key"); 415 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random", 417 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: TLS/IA inner secret", 422 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 467 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive implicit [all...] |
eap_mschapv2.c | 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 191 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge", 193 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: username", 195 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-MSCHAPV2: password", 200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response, 233 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 269 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 279 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 291 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 322 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge") [all...] |
ctrl_iface.c | 47 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value); 86 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address " 91 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid)); 109 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid " 114 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART " MACSTR, 140 wpa_printf(MSG_DEBUG, "CTRL_IFACE: field=%s id=%d", rsp, id); 141 wpa_hexdump_ascii_key(MSG_DEBUG, "CTRL_IFACE: value", 146 wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find SSID id=%d " 192 wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown field '%s'", rsp); 198 wpa_printf(MSG_DEBUG, "CTRL_IFACE: 802.1X not included") [all...] |
driver_wired.c | 200 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 204 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 213 wpa_printf(MSG_DEBUG, "%s: Interface is already configured " 222 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", 238 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 244 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 252 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode", 260 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
|
mlme.c | 545 wpa_printf(MSG_DEBUG, "MLME: WMM queue=%d aci=%d acm=%d " 552 wpa_printf(MSG_DEBUG, "MLME: failed to set TX queue " 601 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 642 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR 648 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR, 668 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc"); 675 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 790 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 818 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 863 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACST [all...] |
config_file.c | 119 wpa_printf(MSG_DEBUG, "Line %d: removed CCMP from group cipher" 257 wpa_printf(MSG_DEBUG, "Reading configuration file '%s'", name); 317 wpa_printf(MSG_DEBUG, "ctrl_interface='%s'", 322 wpa_printf(MSG_DEBUG, "ctrl_interface_group='%s' " 336 wpa_printf(MSG_DEBUG, "eapol_version=%d", 340 wpa_printf(MSG_DEBUG, "ap_scan=%d", config->ap_scan); 343 wpa_printf(MSG_DEBUG, "fast_reauth=%d", 348 wpa_printf(MSG_DEBUG, "opensc_engine_path='%s'", 353 wpa_printf(MSG_DEBUG, "pkcs11_engine_path='%s'", 358 wpa_printf(MSG_DEBUG, "pkcs11_module_path='%s'" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_leap.c | 75 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 112 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 148 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 199 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 231 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 249 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 354 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 360 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
eap_ttls.c | 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 294 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key"); 344 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random", 346 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: TLS/IA inner secret", 351 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 401 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive implicit " 410 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived implicit challenge" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_udp.c | 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
wps_supplicant.c | 48 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 66 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 76 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting " 125 wpa_printf(MSG_DEBUG, "WPS: AP found from scan results"); 130 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from scan " 155 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA " 163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " 174 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential " 207 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute", 213 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_ndis.c | 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: " 268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data " 285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_schannel.c | 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 442 wpa_printf(MSG_DEBUG, 446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 129 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 130 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 272 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 282 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 294 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as group " 302 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 313 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 324 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as " 330 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
httpread.c | 161 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h); 184 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h); 411 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h); 426 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h); 431 wpa_printf(MSG_DEBUG, 442 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h); 479 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h); 484 wpa_printf(MSG_DEBUG, 490 wpa_printf(MSG_DEBUG, 506 wpa_printf(MSG_DEBUG, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_test.c | 79 wpa_printf(MSG_DEBUG, "%s: lost connection to AP: %s", 93 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 100 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results"); 137 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name); 157 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); 224 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 227 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr)); 230 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len); 233 wpa_hexdump(MSG_DEBUG, " key", key, key_len); 243 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d [all...] |
driver_wired.c | 208 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 212 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 221 wpa_printf(MSG_DEBUG, "%s: Interface is already configured " 230 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", 246 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 252 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 260 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode", 268 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 116 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 171 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 190 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 211 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 227 wpa_printf(MSG_DEBUG, "RSN: Using CCMP for PeerKey"); 230 wpa_printf(MSG_DEBUG, "RSN: Using TKIP for PeerKey"); 283 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 383 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls.c | 52 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 133 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 144 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 173 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS " 213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key", 216 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key"); 245 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK", 248 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
|