HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 126 - 150 of 454) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_openssl.c 152 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
160 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
247 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
445 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
462 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
475 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
499 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret);
509 wpa_printf(MSG_DEBUG, "SSL: %s:%s",
527 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s",
556 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_wsc.c 60 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
75 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
164 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
209 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
217 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
240 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
252 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
281 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in "
289 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow");
295 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting for %lu
    [all...]
eap_tls_common.c 116 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
178 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
208 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a "
226 wpa_printf(MSG_DEBUG, "SSL: No memory for message");
230 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first "
283 wpa_printf(MSG_DEBUG, "SSL: TLS Message Length: %d"
    [all...]
eap_aka.c 89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
191 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
257 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE");
271 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Identity");
276 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
284 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
309 wpa_printf(MSG_DEBUG, "EAP-AKA: Max fast re-authentication "
318 wpa_printf(MSG_DEBUG, " AT_IV")
    [all...]
ikev2.c 115 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
150 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
151 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
162 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
172 wpa_printf(MSG_DEBUG, "IKEV2: No "
177 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
183 wpa_printf(MSG_DEBUG, "IKEV2: "
234 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
236 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
239 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_sim.c 70 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
110 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
115 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
122 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
125 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
146 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
155 wpa_printf(MSG_DEBUG, " AT_IV");
156 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
160 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter);
165 wpa_printf(MSG_DEBUG, " *AT_NONCE_S")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_invitation.c 121 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
130 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
144 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
153 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
168 wpa_printf(MSG_DEBUG, "P2P: Mandatory Invitation Flags "
176 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
192 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
203 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
217 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
p2p_build.c 31 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
45 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
58 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header");
77 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x",
88 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u",
102 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u "
116 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u "
141 wpa_printf(MSG_DEBUG, "P2P: * Channel List");
151 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status);
214 wpa_printf(MSG_DEBUG, "P2P: * Device Info")
    [all...]
  /external/wpa_supplicant/
eap_tlv.c 119 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left);
128 wpa_printf(MSG_DEBUG, "EAP-TLV: TLV underrun "
140 wpa_printf(MSG_DEBUG, "EAP-TLV: Unsupported TLV Type "
158 wpa_printf(MSG_DEBUG, "EAP-TLV: Last TLV too short in "
166 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV",
driver_test.c 53 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
60 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results");
79 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name);
98 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
138 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
141 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr));
144 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len);
147 wpa_hexdump(MSG_DEBUG, " key", key, key_len);
157 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
163 wpa_printf(MSG_DEBUG, " bssid=" MACSTR
    [all...]
tlsv1_client.c 132 wpa_printf(MSG_DEBUG, "TLSv1: Send Alert(%d:%d)", level, description);
172 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
236 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
257 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
272 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
278 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
297 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
322 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
351 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
360 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_ikev2.c 57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
280 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow")
    [all...]
eap_mschapv2.c 165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
198 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
347 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
364 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
373 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate
    [all...]
eap_tnc.c 83 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
97 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
131 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
138 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
154 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
160 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
176 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
186 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first "
237 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d"
    [all...]
tncc.c 168 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
173 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
205 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
208 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
262 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
272 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
372 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
376 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ikev2.c 57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
280 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow")
    [all...]
eap_mschapv2.c 166 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
199 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
209 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
228 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
283 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
290 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
353 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
370 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
379 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate
    [all...]
eap_tnc.c 84 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
98 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
139 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
155 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
161 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
177 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
187 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
193 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first "
238 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
scan.c 38 wpa_printf(MSG_DEBUG, "Already associated with a configured network - "
95 wpa_printf(MSG_DEBUG, "%s: scan_req = %d, ap_scan = %d", __func__,
105 wpa_printf(MSG_DEBUG, "No enabled networks - do not scan");
114 wpa_printf(MSG_DEBUG, "Using wired authentication - "
151 wpa_printf(MSG_DEBUG, "wpa_supplicant_scan: Reached "
176 wpa_printf(MSG_DEBUG, "Trying to get current scan results "
196 wpa_printf(MSG_DEBUG, "Starting AP scan (%s SSID)",
199 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID",
254 wpa_msg(wpa_s, MSG_DEBUG, "Not rescheduling scan to "
261 wpa_msg(wpa_s, MSG_DEBUG, "Setting scan request: %d sec %d usec"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_simple.c 56 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
58 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
72 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
129 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
148 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
180 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
199 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
217 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
222 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
242 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan
    [all...]
p2p_supplicant.c 70 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)",
280 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s",
293 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network");
315 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not "
345 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
353 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
356 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs",
358 wpa_hexdump(MSG_DEBUG, "P2P: Beacon IEs",
366 wpa_printf(MSG_DEBUG, "P2P: Checking whether group is persistent: "
370 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
191 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
257 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE");
271 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Identity");
276 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
284 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
309 wpa_printf(MSG_DEBUG, "EAP-AKA: Max fast re-authentication "
318 wpa_printf(MSG_DEBUG, " AT_IV")
    [all...]
ikev2.c 116 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
151 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
152 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
163 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
173 wpa_printf(MSG_DEBUG, "IKEV2: No "
178 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
184 wpa_printf(MSG_DEBUG, "IKEV2: "
235 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
237 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
240 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
129 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN);
130 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN);
131 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
274 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
284 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
296 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as group "
304 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
315 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise),
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 159 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
199 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
257 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
262 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
475 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: "
483 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s",
527 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - "
580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
587 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]

Completed in 1358 milliseconds

1 2 3 4 56 7 8 91011>>