HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 226 - 250 of 454) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant/
eapol_sm.c 207 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0");
212 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0");
217 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0");
222 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0");
377 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for "
542 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both "
593 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff");
603 wpa_printf(MSG_DEBUG, "EAPOL: txStart");
630 wpa_printf(MSG_DEBUG, "EAPOL: processKey");
648 wpa_printf(MSG_DEBUG, "EAPOL: RX IEEE 802.1X ver=%d type=%d len=%d
    [all...]
eap_peap.c 85 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version "
91 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for "
97 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate "
101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled "
106 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK "
171 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 EAP types",
250 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: Nak type=%d", *pos);
251 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Allowed Phase2 EAP types",
294 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: type=%d", *pos);
329 wpa_printf(MSG_DEBUG, "EAP-PEAP: Selected
    [all...]
eap_tls.c 52 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
58 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
85 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
119 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
129 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key",
131 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
160 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
rsa.c 48 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d "
54 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER");
97 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
112 wpa_hexdump(MSG_DEBUG,
181 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
194 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
214 wpa_hexdump(MSG_DEBUG,
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface.c 51 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value);
91 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address "
96 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid));
114 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid "
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART " MACSTR,
134 wpa_printf(MSG_DEBUG, "CTRL_IFACE FT_DS: invalid "
139 wpa_printf(MSG_DEBUG, "CTRL_IFACE FT_DS " MACSTR, MAC2STR(target_ap));
156 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PBC: invalid BSSID '%s'",
180 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PIN: invalid BSSID '%s'",
221 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_REG: invalid BSSID '%s'"
    [all...]
wpa_supplicant.c 217 wpa_msg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec "
234 wpa_msg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout");
414 wpa_printf(MSG_DEBUG, "No keys have been configured - "
487 wpa_printf(MSG_DEBUG, "State: %s -> %s",
609 wpa_msg(wpa_s, MSG_DEBUG, "Reconfiguration completed");
619 wpa_printf(MSG_DEBUG, "Signal %d received - reconfiguring", sig);
687 wpa_printf(MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set cipher "
756 wpa_msg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
763 wpa_msg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0");
783 wpa_printf(MSG_DEBUG, "WPA: Set cipher suites based
    [all...]
eapol_test.c 89 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n",
92 wpa_printf(MSG_DEBUG, "%s", txt);
179 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
202 wpa_hexdump(MSG_DEBUG, "Learned identity from "
276 wpa_printf(MSG_DEBUG, " Copied RADIUS State "
297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
344 wpa_hexdump(MSG_DEBUG, "PMK from AS",
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
353 wpa_hexdump(MSG_DEBUG, "PMK from AS"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wps_supplicant.c 59 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
80 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
85 wpa_printf(MSG_DEBUG, "WPS: Current network is "
97 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
132 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS "
137 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table");
159 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
167 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
178 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential "
213 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute"
    [all...]
sme.c 95 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
99 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: "
200 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
217 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports "
278 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
284 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
290 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication with "
296 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
306 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication failed (status "
321 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying SHARED auth")
    [all...]
wpa_priv.c 53 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance");
61 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet "
72 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper");
76 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface "
193 wpa_printf(MSG_DEBUG, "Invalid association request");
199 wpa_printf(MSG_DEBUG, "Association request overflow");
223 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res);
284 wpa_printf(MSG_DEBUG, "Invalid set_key request");
298 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res);
357 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu"
    [all...]
scan.c 47 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured "
103 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached "
258 wpa_dbg(wpa_s, MSG_DEBUG, "Skip scan - interface disabled");
269 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks - do not scan");
276 wpa_dbg(wpa_s, MSG_DEBUG, "Using wired authentication - "
317 wpa_printf(MSG_DEBUG, "Start a pre-selected network "
355 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID",
391 wpa_dbg(wpa_s, MSG_DEBUG, "Include wildcard SSID in "
395 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for specific "
400 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for wildcard
    [all...]
mlme.c 183 wpa_printf(MSG_DEBUG, "MLME: WMM aci=%d acm=%d aifs=%d "
233 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
277 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR
283 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR,
301 wpa_printf(MSG_DEBUG, "MLME: Trying to use FT "
327 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc");
339 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
476 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
504 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
549 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACST
    [all...]
bgscan_learn.c 120 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s",
142 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS "
175 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s",
254 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq "
291 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have "
306 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s",
311 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan");
313 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan");
416 wpa_printf(MSG_DEBUG, "bgscan learn: Signal strength threshold %d "
490 wpa_printf(MSG_DEBUG, "bgscan learn: scan result notification")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_schannel.c 233 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
300 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
336 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
403 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
406 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
410 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
433 wpa_printf(MSG_DEBUG,
437 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
440 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
445 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
random.c 235 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from "
272 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be "
307 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random",
336 wpa_printf(MSG_DEBUG, "random: Invalid entropy file %s",
346 wpa_printf(MSG_DEBUG, "random: Added entropy from %s "
375 wpa_printf(MSG_DEBUG, "random: Updated entropy file %s "
404 wpa_printf(MSG_DEBUG, "random: Trying to read entropy from "
  /external/wpa_supplicant_8/src/wps/
wps_common.c 75 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available");
81 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
85 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
92 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key");
100 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared);
106 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey));
117 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
126 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey",
128 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_test.c 198 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
238 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
289 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
302 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
335 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
354 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz",
368 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
399 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
439 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
493 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status -
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c 94 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
139 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
229 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
247 wpa_printf(MSG_DEBUG, "EAP: Using previous method data"
259 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: "
265 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: "
291 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase "
352 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s "
529 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected "
535 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d
    [all...]
eap_tls.c 53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key",
134 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
161 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gtc.c 39 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
117 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
140 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
185 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure");
188 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
rsa.c 49 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d "
55 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER");
98 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
113 wpa_hexdump(MSG_DEBUG,
182 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
195 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
215 wpa_hexdump(MSG_DEBUG,
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps.c 75 wpa_hexdump_buf(MSG_DEBUG, "WPS: WPS IE from (Re)AssocReq",
78 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE "
81 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute "
84 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE "
102 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and "
249 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association "
289 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request");
  /external/wpa_supplicant_8/src/ap/
preauth_auth.c 56 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet "
59 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet "
68 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address "
75 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association "
107 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname);
195 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for "
251 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls.c 53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key",
134 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
161 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 39 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
117 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
140 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
185 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure");
188 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");

Completed in 140 milliseconds

1 2 3 4 5 6 7 8 91011>>