/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_gnutls.c | 158 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 198 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 256 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 261 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 479 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: " 487 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s", 531 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - " 584 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 591 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 617 wpa_printf(MSG_DEBUG, "Failed to read client cert/key [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 123 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 130 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 175 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 182 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 201 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 208 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 258 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES"); 266 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 273 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 296 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No get_complete_cb [all...] |
tncs.c | 207 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found", 223 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu " 228 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 259 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu " 262 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage", 302 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry"); 316 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu " 343 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute"); 356 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute"); 367 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 131 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 176 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 183 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 202 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 209 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 259 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES"); 267 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 274 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 297 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No get_complete_cb [all...] |
tncs.c | 207 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found", 223 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu " 228 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 259 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu " 262 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage", 302 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry"); 316 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu " 343 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute"); 356 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute"); 367 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 90 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 147 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 165 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 194 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " 226 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith " 240 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s", 276 wpa_hexdump_ascii(MSG_DEBUG, 293 wpa_hexdump_ascii(MSG_DEBUG, 329 wpa_printf(MSG_DEBUG, " AT_CHECKCODE") [all...] |
eap_vendor_test.c | 63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
eap_leap.c | 75 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 112 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 148 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 199 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 231 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 249 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 354 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 360 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 207 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0"); 212 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0"); 217 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0"); 222 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0"); 229 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick"); 240 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick"); 401 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for " 567 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 618 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff"); 628 wpa_printf(MSG_DEBUG, "EAPOL: txStart") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 88 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 145 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 160 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 163 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 192 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " 224 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith " 238 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s", 274 wpa_hexdump_ascii(MSG_DEBUG, 291 wpa_hexdump_ascii(MSG_DEBUG, 327 wpa_printf(MSG_DEBUG, " AT_CHECKCODE") [all...] |
eap_vendor_test.c | 63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 209 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0"); 214 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0"); 219 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0"); 224 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0"); 231 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick"); 242 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick"); 409 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for " 575 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 626 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff"); 636 wpa_printf(MSG_DEBUG, "EAPOL: txStart") [all...] |
/external/wpa_supplicant/ |
asn1_test.c | 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero " 95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected " 120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null " 128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID"); 132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str); 174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
|
eap_vendor_test.c | 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 88 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 95 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 102 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 112 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 125 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
eap_leap.c | 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 116 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 150 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 203 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 238 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 252 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 350 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 354 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
ctrl_iface_udp.c | 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
l2_packet_ndis.c | 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: " 268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data " 285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes" [all...] |
tls_schannel.c | 234 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 302 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 442 wpa_printf(MSG_DEBUG, 446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
asn1_test.c | 86 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero " 95 wpa_printf(MSG_DEBUG, "ASN.1: Unexpected " 120 wpa_printf(MSG_DEBUG, "ASN.1: Non-zero Null " 128 wpa_printf(MSG_DEBUG, "ASN.1: Invalid OID"); 132 wpa_printf(MSG_DEBUG, "ASN.1:%s OID %s", prefix, str); 174 wpa_printf(MSG_DEBUG, "ASN.1: Unknown tag %d",
|
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 51 wpa_printf(MSG_DEBUG, "NSS: I/O close"); 58 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); 65 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); 73 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); 84 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); 87 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 97 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 102 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 116 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); 137 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_udp.c | 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
wps_supplicant.c | 48 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 66 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 76 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting " 125 wpa_printf(MSG_DEBUG, "WPS: AP found from scan results"); 130 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from scan " 155 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA " 163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " 174 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential " 207 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute", 213 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_ndis.c | 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: " 268 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile returned data " 285 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Read %d bytes" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 73 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 94 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 198 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 204 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 210 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 327 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached " 373 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor send %s:%d" [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p.c | 63 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer " 117 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s", 125 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 135 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)", 167 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 174 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 222 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |