/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | 152 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 160 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 247 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 445 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store " 462 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 475 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store " 499 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret); 509 wpa_printf(MSG_DEBUG, "SSL: %s:%s", 527 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s", 556 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_wsc.c | 60 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 75 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 164 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 209 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 217 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 240 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 252 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 281 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " 289 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow"); 295 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting for %lu [all...] |
eap_tls_common.c | 116 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 178 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 208 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " 226 wpa_printf(MSG_DEBUG, "SSL: No memory for message"); 230 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first " 283 wpa_printf(MSG_DEBUG, "SSL: TLS Message Length: %d" [all...] |
eap_aka.c | 89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 191 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 257 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE"); 271 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Identity"); 276 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 284 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 309 wpa_printf(MSG_DEBUG, "EAP-AKA: Max fast re-authentication " 318 wpa_printf(MSG_DEBUG, " AT_IV") [all...] |
ikev2.c | 115 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 150 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 151 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 162 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 172 wpa_printf(MSG_DEBUG, "IKEV2: No " 177 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 183 wpa_printf(MSG_DEBUG, "IKEV2: " 234 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 236 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 239 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d" [all...] |
eap_sim.c | 70 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 110 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 115 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 122 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 125 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 146 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 155 wpa_printf(MSG_DEBUG, " AT_IV"); 156 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); 160 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter); 165 wpa_printf(MSG_DEBUG, " *AT_NONCE_S") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 121 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 130 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 144 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 153 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 168 wpa_printf(MSG_DEBUG, "P2P: Mandatory Invitation Flags " 176 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 192 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 203 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 217 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
p2p_build.c | 31 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 45 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 58 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); 77 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", 88 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", 102 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " 116 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " 141 wpa_printf(MSG_DEBUG, "P2P: * Channel List"); 151 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); 214 wpa_printf(MSG_DEBUG, "P2P: * Device Info") [all...] |
/external/wpa_supplicant/ |
eap_tlv.c | 119 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); 128 wpa_printf(MSG_DEBUG, "EAP-TLV: TLV underrun " 140 wpa_printf(MSG_DEBUG, "EAP-TLV: Unsupported TLV Type " 158 wpa_printf(MSG_DEBUG, "EAP-TLV: Last TLV too short in " 166 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV",
|
driver_test.c | 53 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 60 wpa_printf(MSG_DEBUG, "Scan timeout - try to get results"); 79 wpa_printf(MSG_DEBUG, "%s: SCAN %s", __func__, dent->d_name); 98 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); 138 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 141 wpa_printf(MSG_DEBUG, " addr=" MACSTR, MAC2STR(addr)); 144 wpa_hexdump(MSG_DEBUG, " seq", seq, seq_len); 147 wpa_hexdump(MSG_DEBUG, " key", key, key_len); 157 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d " 163 wpa_printf(MSG_DEBUG, " bssid=" MACSTR [all...] |
tlsv1_client.c | 132 wpa_printf(MSG_DEBUG, "TLSv1: Send Alert(%d:%d)", level, description); 172 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 236 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 257 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 272 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 278 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 297 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 322 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 351 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 360 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ikev2.c | 57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 280 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow") [all...] |
eap_mschapv2.c | 165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 198 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 347 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 364 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 373 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate [all...] |
eap_tnc.c | 83 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 97 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 131 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 138 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 154 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 160 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for " 176 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a " 186 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for " 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first " 237 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d" [all...] |
tncc.c | 168 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 173 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 205 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 208 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage", 244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 262 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 272 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 372 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'", 376 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 280 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow") [all...] |
eap_mschapv2.c | 166 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 199 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 209 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 228 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 283 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 290 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 353 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 370 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 379 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate [all...] |
eap_tnc.c | 84 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 98 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 139 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 155 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 161 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for " 177 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a " 187 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for " 193 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first " 238 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
scan.c | 38 wpa_printf(MSG_DEBUG, "Already associated with a configured network - " 95 wpa_printf(MSG_DEBUG, "%s: scan_req = %d, ap_scan = %d", __func__, 105 wpa_printf(MSG_DEBUG, "No enabled networks - do not scan"); 114 wpa_printf(MSG_DEBUG, "Using wired authentication - " 151 wpa_printf(MSG_DEBUG, "wpa_supplicant_scan: Reached " 176 wpa_printf(MSG_DEBUG, "Trying to get current scan results " 196 wpa_printf(MSG_DEBUG, "Starting AP scan (%s SSID)", 199 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID", 254 wpa_msg(wpa_s, MSG_DEBUG, "Not rescheduling scan to " 261 wpa_msg(wpa_s, MSG_DEBUG, "Setting scan request: %d sec %d usec" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
bgscan_simple.c | 56 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 58 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 72 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 129 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 148 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 180 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 199 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 217 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed " 222 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short " 242 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan [all...] |
p2p_supplicant.c | 70 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)", 280 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s", 293 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network"); 315 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not " 345 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether " 353 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether " 356 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs", 358 wpa_hexdump(MSG_DEBUG, "P2P: Beacon IEs", 366 wpa_printf(MSG_DEBUG, "P2P: Checking whether group is persistent: " 370 wpa_printf(MSG_DEBUG, "P2P: GO Device Address " MACSTR [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 191 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 230 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 242 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 257 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE"); 271 wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Identity"); 276 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 284 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 309 wpa_printf(MSG_DEBUG, "EAP-AKA: Max fast re-authentication " 318 wpa_printf(MSG_DEBUG, " AT_IV") [all...] |
ikev2.c | 116 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 151 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 152 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 163 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 173 wpa_printf(MSG_DEBUG, "IKEV2: No " 178 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 184 wpa_printf(MSG_DEBUG, "IKEV2: " 235 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 237 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 240 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d" [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 127 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 129 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN); 130 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN); 131 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 132 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 274 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 284 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 296 wpa_printf(MSG_DEBUG, "%s: AES-128-CMAC used as group " 304 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 315 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 159 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 199 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 257 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 262 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 475 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: " 483 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s", 527 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - " 580 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 587 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 613 wpa_printf(MSG_DEBUG, "Failed to read client cert/key [all...] |