/external/wpa_supplicant/ |
eapol_sm.c | 207 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0"); 212 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0"); 217 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0"); 222 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0"); 377 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for " 542 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 593 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff"); 603 wpa_printf(MSG_DEBUG, "EAPOL: txStart"); 630 wpa_printf(MSG_DEBUG, "EAPOL: processKey"); 648 wpa_printf(MSG_DEBUG, "EAPOL: RX IEEE 802.1X ver=%d type=%d len=%d [all...] |
eap_peap.c | 85 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version " 91 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for " 97 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate " 101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled " 106 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK " 171 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 EAP types", 250 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: Nak type=%d", *pos); 251 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Allowed Phase2 EAP types", 294 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: type=%d", *pos); 329 wpa_printf(MSG_DEBUG, "EAP-PEAP: Selected [all...] |
eap_tls.c | 52 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 58 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 85 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 119 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 129 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 131 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK", 160 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
|
rsa.c | 48 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 54 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 97 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 112 wpa_hexdump(MSG_DEBUG, 181 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 194 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the " 214 wpa_hexdump(MSG_DEBUG,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 51 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value); 91 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address " 96 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid)); 114 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid " 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART " MACSTR, 134 wpa_printf(MSG_DEBUG, "CTRL_IFACE FT_DS: invalid " 139 wpa_printf(MSG_DEBUG, "CTRL_IFACE FT_DS " MACSTR, MAC2STR(target_ap)); 156 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PBC: invalid BSSID '%s'", 180 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_PIN: invalid BSSID '%s'", 221 wpa_printf(MSG_DEBUG, "CTRL_IFACE WPS_REG: invalid BSSID '%s'" [all...] |
wpa_supplicant.c | 217 wpa_msg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec " 234 wpa_msg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout"); 414 wpa_printf(MSG_DEBUG, "No keys have been configured - " 487 wpa_printf(MSG_DEBUG, "State: %s -> %s", 609 wpa_msg(wpa_s, MSG_DEBUG, "Reconfiguration completed"); 619 wpa_printf(MSG_DEBUG, "Signal %d received - reconfiguring", sig); 687 wpa_printf(MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set cipher " 756 wpa_msg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 763 wpa_msg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0"); 783 wpa_printf(MSG_DEBUG, "WPA: Set cipher suites based [all...] |
eapol_test.c | 89 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n", 92 wpa_printf(MSG_DEBUG, "%s", txt); 179 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 202 wpa_hexdump(MSG_DEBUG, "Learned identity from " 276 wpa_printf(MSG_DEBUG, " Copied RADIUS State " 297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 344 wpa_hexdump(MSG_DEBUG, "PMK from AS", 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 353 wpa_hexdump(MSG_DEBUG, "PMK from AS" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wps_supplicant.c | 59 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 80 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 85 wpa_printf(MSG_DEBUG, "WPS: Current network is " 97 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting " 132 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS " 137 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table"); 159 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA " 167 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " 178 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential " 213 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute" [all...] |
sme.c | 95 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", 99 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: " 200 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT " 217 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports " 278 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event " 284 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event " 290 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication with " 296 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR 306 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication failed (status " 321 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying SHARED auth") [all...] |
wpa_priv.c | 53 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance"); 61 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet " 72 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper"); 76 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface " 193 wpa_printf(MSG_DEBUG, "Invalid association request"); 199 wpa_printf(MSG_DEBUG, "Association request overflow"); 223 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res); 284 wpa_printf(MSG_DEBUG, "Invalid set_key request"); 298 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res); 357 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu" [all...] |
scan.c | 47 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured " 103 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached " 258 wpa_dbg(wpa_s, MSG_DEBUG, "Skip scan - interface disabled"); 269 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks - do not scan"); 276 wpa_dbg(wpa_s, MSG_DEBUG, "Using wired authentication - " 317 wpa_printf(MSG_DEBUG, "Start a pre-selected network " 355 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID", 391 wpa_dbg(wpa_s, MSG_DEBUG, "Include wildcard SSID in " 395 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for specific " 400 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for wildcard [all...] |
mlme.c | 183 wpa_printf(MSG_DEBUG, "MLME: WMM aci=%d acm=%d aifs=%d " 233 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 277 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR 283 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR, 301 wpa_printf(MSG_DEBUG, "MLME: Trying to use FT " 327 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc"); 339 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 476 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 504 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 549 wpa_printf(MSG_DEBUG, "MLME: association with AP " MACST [all...] |
bgscan_learn.c | 120 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s", 142 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS " 175 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s", 254 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq " 291 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have " 306 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s", 311 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan"); 313 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan"); 416 wpa_printf(MSG_DEBUG, "bgscan learn: Signal strength threshold %d " 490 wpa_printf(MSG_DEBUG, "bgscan learn: scan result notification") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_schannel.c | 233 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 300 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 336 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 403 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 406 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 410 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 433 wpa_printf(MSG_DEBUG, 437 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 440 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 445 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
random.c | 235 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 272 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be " 307 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random", 336 wpa_printf(MSG_DEBUG, "random: Invalid entropy file %s", 346 wpa_printf(MSG_DEBUG, "random: Added entropy from %s " 375 wpa_printf(MSG_DEBUG, "random: Updated entropy file %s " 404 wpa_printf(MSG_DEBUG, "random: Trying to read entropy from "
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 75 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 81 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 85 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 86 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 92 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); 100 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); 106 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); 117 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 126 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", 128 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_test.c | 198 wpa_printf(MSG_DEBUG, "%s: no destination client entry", 238 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d " 289 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s", 302 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found", 335 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu" 354 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz", 368 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__); 399 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s", 439 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s", 493 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 94 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method " 139 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for " 229 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 247 wpa_printf(MSG_DEBUG, "EAP: Using previous method data" 259 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: " 265 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: " 291 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 352 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s " 529 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected " 535 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d [all...] |
eap_tls.c | 53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 134 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK", 161 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 39 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 117 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 140 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " 159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 " 185 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure"); 188 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
rsa.c | 49 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 55 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 98 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 113 wpa_hexdump(MSG_DEBUG, 182 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 195 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the " 215 wpa_hexdump(MSG_DEBUG,
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps.c | 75 wpa_hexdump_buf(MSG_DEBUG, "WPS: WPS IE from (Re)AssocReq", 78 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE " 81 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute " 84 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE " 102 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " 249 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association " 289 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request");
|
/external/wpa_supplicant_8/src/ap/ |
preauth_auth.c | 56 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet " 59 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet " 68 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address " 75 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association " 107 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname); 195 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for " 251 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 134 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK", 161 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 39 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 117 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 140 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " 159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 " 185 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure"); 188 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
|