HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 176 - 200 of 454) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_gnutls.c 158 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
198 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
256 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
261 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
479 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: "
487 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s",
531 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - "
584 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
591 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
617 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.c 123 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
130 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
175 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
182 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
201 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
208 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
258 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES");
266 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
273 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
296 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No get_complete_cb
    [all...]
tncs.c 207 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
223 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
228 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
259 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
262 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage",
302 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
316 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
343 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
356 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
367 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.c 124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
131 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
176 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
183 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
202 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
209 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
259 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES");
267 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
274 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
297 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No get_complete_cb
    [all...]
tncs.c 207 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
223 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
228 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
259 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
262 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage",
302 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
316 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
343 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
356 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
367 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 90 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
147 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
165 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
194 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
226 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith "
240 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s",
276 wpa_hexdump_ascii(MSG_DEBUG,
293 wpa_hexdump_ascii(MSG_DEBUG,
329 wpa_printf(MSG_DEBUG, " AT_CHECKCODE")
    [all...]
eap_vendor_test.c 63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
eap_leap.c 75 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
112 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
148 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
199 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
231 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
249 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
354 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
360 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
eapol_supp_sm.c 207 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0");
212 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0");
217 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0");
222 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0");
229 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick");
240 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick");
401 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for "
567 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both "
618 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff");
628 wpa_printf(MSG_DEBUG, "EAPOL: txStart")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 88 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
145 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
160 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
163 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
192 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
224 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith "
238 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s",
274 wpa_hexdump_ascii(MSG_DEBUG,
291 wpa_hexdump_ascii(MSG_DEBUG,
327 wpa_printf(MSG_DEBUG, " AT_CHECKCODE")
    [all...]
eap_vendor_test.c 63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 209 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0");
214 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0");
219 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0");
224 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0");
231 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick");
242 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick");
409 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for "
575 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both "
626 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff");
636 wpa_printf(MSG_DEBUG, "EAPOL: txStart")
    [all...]
  /external/wpa_supplicant/
asn1_test.c 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero "
95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected "
120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null "
128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID");
132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str);
174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
eap_vendor_test.c 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
88 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
95 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
102 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
112 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
125 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
eap_leap.c 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
116 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
150 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
203 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
238 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
252 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
350 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
354 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
ctrl_iface_udp.c 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
l2_packet_ndis.c 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: "
268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data "
285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes"
    [all...]
tls_schannel.c 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
442 wpa_printf(MSG_DEBUG,
446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
asn1_test.c 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero "
95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected "
120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null "
128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID");
132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str);
174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 51 wpa_printf(MSG_DEBUG, "NSS: I/O close");
58 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
65 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
73 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
84 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
87 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
97 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
102 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
116 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
137 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface_udp.c 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
wps_supplicant.c 48 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
66 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
76 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
125 wpa_printf(MSG_DEBUG, "WPS: AP found from scan results");
130 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from scan "
155 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
174 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential "
207 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute",
213 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
l2_packet_ndis.c 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: "
268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data "
285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_udp.c 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached "
373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d"
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p.c 63 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
117 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
125 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
167 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
174 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
222 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]

Completed in 1007 milliseconds

1 2 3 4 5 6 78 91011>>