/external/wpa_supplicant_8/src/tls/ |
rsa.c | 47 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 53 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 96 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 111 wpa_hexdump(MSG_DEBUG, 180 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 193 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the " 213 wpa_hexdump(MSG_DEBUG,
|
tlsv1_server.c | 55 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 120 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 135 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 168 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 208 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 246 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type " 257 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 264 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough " 323 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 91 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n", 94 wpa_printf(MSG_DEBUG, "%s", txt); 181 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 204 wpa_hexdump(MSG_DEBUG, "Learned identity from " 279 wpa_printf(MSG_DEBUG, " Copied RADIUS State " 299 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 343 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 346 wpa_hexdump(MSG_DEBUG, "PMK from AS", 352 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 355 wpa_hexdump(MSG_DEBUG, "PMK from AS" [all...] |
ctrl_iface_unix.c | 75 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 95 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 120 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 303 wpa_printf(MSG_DEBUG, "Using existing control " 316 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 328 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d", 368 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s", 372 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not" 387 wpa_printf(MSG_DEBUG, "Successfully replaced leftover [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_madwifi.c | 215 wpa_printf(MSG_DEBUG, "%s: Failed to set parameter (op %d " 266 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 287 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 293 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 305 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", 312 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 325 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 357 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 369 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 380 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR [all...] |
driver_atheros.c | 205 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x " 227 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d " 279 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 300 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 306 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 326 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", 333 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 346 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 381 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 393 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d" [all...] |
driver_privsep.c | 95 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting " 111 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); 137 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results", 140 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu", 202 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 235 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d " 294 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 306 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d", 308 wpa_printf(MSG_DEBUG, "%s - TODO", __func__); 317 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d" [all...] |
driver_iphone.m | 58 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(SSID) " 85 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(BSSID) " 123 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Scan failed: %d", 268 wpa_printf(MSG_DEBUG, "iPhone: No scan results - cannot " 295 wpa_printf(MSG_DEBUG, "iPhone: Could not find SSID from scan " 300 wpa_printf(MSG_DEBUG, "iPhone: Trying to associate with a BSS found " 305 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Associate() failed: " 395 wpa_printf(MSG_DEBUG, "iPhone: Apple80211GetPower failed: %d", 398 wpa_printf(MSG_DEBUG, "iPhone: Power=%d", power); 404 wpa_printf(MSG_DEBUG, "iPhone: Apple80211SetPower [all...] |
/external/wpa_supplicant/ |
eap_gtc.c | 34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 73 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 129 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
ctrl_iface_unix.c | 74 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 96 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 115 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 122 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 298 wpa_printf(MSG_DEBUG, "Using existing control " 311 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 323 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d", 350 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s", 354 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not" 369 wpa_printf(MSG_DEBUG, "Successfully replaced leftover [all...] |
eap_sake.c | 64 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 189 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 213 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 221 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 260 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); 270 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P"); 277 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 284 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P") [all...] |
driver_bsd.c | 197 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d", 213 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 230 wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d", 235 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx); 270 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d", 276 wpa_printf(MSG_DEBUG, 282 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big", 287 wpa_printf(MSG_DEBUG, "%s: key length %zu too big", 323 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 333 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ie.c | 77 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 88 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 101 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 112 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 122 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 133 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " 143 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)", 155 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored", 267 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)", 505 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key Key Data [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server.c | 55 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 120 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 135 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 168 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 208 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 246 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type " 257 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 264 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough " 323 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
eap_leap.c | 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 113 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 149 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 200 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 232 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 256 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 367 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 371 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 373 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
eap_tls_common.c | 109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 112 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options"); 225 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in " 369 wpa_printf(MSG_DEBUG, "SSL: Need %lu bytes more input " 492 wpa_printf(MSG_DEBUG, "SSL: %lu bytes left to be sent out (of total " 504 wpa_printf(MSG_DEBUG, "SSL: sending %lu bytes, more fragments " 590 wpa_printf(MSG_DEBUG, "SSL: Received non-ACK when output " 628 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to " 640 wpa_printf(MSG_DEBUG, "SSL: No data to be sent out"); 668 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id=%d ver=%d)" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_unix.c | 75 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 99 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 119 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 127 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 310 wpa_printf(MSG_DEBUG, "Using existing control " 323 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 335 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d", 375 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s", 379 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not" 394 wpa_printf(MSG_DEBUG, "Successfully replaced leftover [all...] |
mlme.c | 186 wpa_printf(MSG_DEBUG, "MLME: WMM queue=%d aci=%d acm=%d " 193 wpa_printf(MSG_DEBUG, "MLME: failed to set TX queue " 242 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 286 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR 292 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR, 310 wpa_printf(MSG_DEBUG, "MLME: Trying to use FT " 336 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc"); 348 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 489 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for " 517 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 82 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 147 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S"); 191 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 207 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm"); 216 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 62 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 83 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 137 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 148 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 152 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 168 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 187 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S"); 192 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 208 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm"); 217 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_bsd.c | 201 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d", 217 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 234 wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d", 239 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx); 274 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d", 280 wpa_printf(MSG_DEBUG, 286 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big", 291 wpa_printf(MSG_DEBUG, "%s: key length %zu too big", 327 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 337 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled) [all...] |
driver_iphone.m | 58 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(SSID) " 85 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(BSSID) " 123 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Scan failed: %d", 268 wpa_printf(MSG_DEBUG, "iPhone: No scan results - cannot " 295 wpa_printf(MSG_DEBUG, "iPhone: Could not find SSID from scan " 300 wpa_printf(MSG_DEBUG, "iPhone: Trying to associate with a BSS found " 305 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Associate() failed: " 395 wpa_printf(MSG_DEBUG, "iPhone: Apple80211GetPower failed: %d", 398 wpa_printf(MSG_DEBUG, "iPhone: Power=%d", power); 404 wpa_printf(MSG_DEBUG, "iPhone: Apple80211SetPower [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 71 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 95 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 115 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 123 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 142 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr); 151 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface " 177 wpa_printf(MSG_DEBUG, "P2P: Disconnect STA " MACSTR " with minor " 222 wpa_printf(MSG_DEBUG, "CTRL_IFACE DEAUTHENTICATE %s", txtaddr); 278 wpa_printf(MSG_DEBUG, "CTRL_IFACE DISASSOCIATE %s", txtaddr); 335 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr) [all...] |