HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 251 - 275 of 454) sorted by null

<<111213141516171819

  /external/wpa_supplicant_8/src/tls/
rsa.c 47 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d "
53 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER");
96 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
111 wpa_hexdump(MSG_DEBUG,
180 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
193 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
213 wpa_hexdump(MSG_DEBUG,
tlsv1_server.c 55 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
120 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
135 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
168 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop");
208 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
246 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type "
257 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
264 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough "
323 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 91 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n",
94 wpa_printf(MSG_DEBUG, "%s", txt);
181 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
204 wpa_hexdump(MSG_DEBUG, "Learned identity from "
279 wpa_printf(MSG_DEBUG, " Copied RADIUS State "
299 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
343 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
346 wpa_hexdump(MSG_DEBUG, "PMK from AS",
352 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
355 wpa_hexdump(MSG_DEBUG, "PMK from AS"
    [all...]
ctrl_iface_unix.c 75 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
95 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
120 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
303 wpa_printf(MSG_DEBUG, "Using existing control "
316 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
328 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
368 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
372 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
387 wpa_printf(MSG_DEBUG, "Successfully replaced leftover
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_madwifi.c 215 wpa_printf(MSG_DEBUG, "%s: Failed to set parameter (op %d "
266 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
287 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
293 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
305 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
312 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
325 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
357 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
369 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
380 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR
    [all...]
driver_atheros.c 205 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
227 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d "
279 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
300 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
306 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
326 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
333 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
346 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
381 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
393 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d"
    [all...]
driver_privsep.c 95 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting "
111 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
137 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results",
140 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu",
202 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
235 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
294 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
306 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
308 wpa_printf(MSG_DEBUG, "%s - TODO", __func__);
317 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d"
    [all...]
driver_iphone.m 58 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(SSID) "
85 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(BSSID) "
123 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Scan failed: %d",
268 wpa_printf(MSG_DEBUG, "iPhone: No scan results - cannot "
295 wpa_printf(MSG_DEBUG, "iPhone: Could not find SSID from scan "
300 wpa_printf(MSG_DEBUG, "iPhone: Trying to associate with a BSS found "
305 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Associate() failed: "
395 wpa_printf(MSG_DEBUG, "iPhone: Apple80211GetPower failed: %d",
398 wpa_printf(MSG_DEBUG, "iPhone: Power=%d", power);
404 wpa_printf(MSG_DEBUG, "iPhone: Apple80211SetPower
    [all...]
  /external/wpa_supplicant/
eap_gtc.c 34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
73 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
129 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
ctrl_iface_unix.c 74 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
96 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
115 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
122 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
298 wpa_printf(MSG_DEBUG, "Using existing control "
311 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
323 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
350 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
354 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
369 wpa_printf(MSG_DEBUG, "Successfully replaced leftover
    [all...]
eap_sake.c 64 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
189 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
213 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
221 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
260 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
270 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P");
277 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
284 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P")
    [all...]
driver_bsd.c 197 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d",
213 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
230 wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d",
235 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx);
270 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",
276 wpa_printf(MSG_DEBUG,
282 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big",
287 wpa_printf(MSG_DEBUG, "%s: key length %zu too big",
323 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
333 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gtc.c 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ie.c 77 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
88 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
101 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
112 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
122 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
133 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
143 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
155 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored",
267 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
505 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key Key Data
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server.c 55 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
70 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
120 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
135 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
168 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop");
208 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
246 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type "
257 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
264 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough "
323 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
eap_leap.c 76 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
113 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
149 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
200 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
232 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
256 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
367 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
371 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
373 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
eap_tls_common.c 109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options");
112 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options");
225 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in "
369 wpa_printf(MSG_DEBUG, "SSL: Need %lu bytes more input "
492 wpa_printf(MSG_DEBUG, "SSL: %lu bytes left to be sent out (of total "
504 wpa_printf(MSG_DEBUG, "SSL: sending %lu bytes, more fragments "
590 wpa_printf(MSG_DEBUG, "SSL: Received non-ACK when output "
628 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to "
640 wpa_printf(MSG_DEBUG, "SSL: No data to be sent out");
668 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id=%d ver=%d)"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface_unix.c 75 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
99 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
119 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
127 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
310 wpa_printf(MSG_DEBUG, "Using existing control "
323 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
335 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
375 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
379 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not"
394 wpa_printf(MSG_DEBUG, "Successfully replaced leftover
    [all...]
mlme.c 186 wpa_printf(MSG_DEBUG, "MLME: WMM queue=%d aci=%d acm=%d "
193 wpa_printf(MSG_DEBUG, "MLME: failed to set TX queue "
242 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
286 wpa_printf(MSG_DEBUG, "MLME: authentication with AP " MACSTR
292 wpa_printf(MSG_DEBUG, "MLME: authenticate with AP " MACSTR,
310 wpa_printf(MSG_DEBUG, "MLME: Trying to use FT "
336 wpa_printf(MSG_DEBUG, "MLME: curr_rates not set for assoc");
348 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
489 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for "
517 wpa_printf(MSG_DEBUG, "MLME: failed to allocate buffer for
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
82 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
147 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
191 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
207 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
216 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 62 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
83 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
137 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
148 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
152 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
168 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
187 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
192 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
208 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
217 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_bsd.c 201 wpa_printf(MSG_DEBUG, "%s: wpa=%d privacy=%d",
217 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
234 wpa_printf(MSG_DEBUG, "%s: addr=%s keyidx=%d",
239 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __func__, key_idx);
274 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",
280 wpa_printf(MSG_DEBUG,
286 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big",
291 wpa_printf(MSG_DEBUG, "%s: key length %zu too big",
327 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
337 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled)
    [all...]
driver_iphone.m 58 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(SSID) "
85 wpa_printf(MSG_DEBUG, "iPhone: Apple80211CopyValue(BSSID) "
123 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Scan failed: %d",
268 wpa_printf(MSG_DEBUG, "iPhone: No scan results - cannot "
295 wpa_printf(MSG_DEBUG, "iPhone: Could not find SSID from scan "
300 wpa_printf(MSG_DEBUG, "iPhone: Trying to associate with a BSS found "
305 wpa_printf(MSG_DEBUG, "iPhone: Apple80211Associate() failed: "
395 wpa_printf(MSG_DEBUG, "iPhone: Apple80211GetPower failed: %d",
398 wpa_printf(MSG_DEBUG, "iPhone: Power=%d", power);
404 wpa_printf(MSG_DEBUG, "iPhone: Apple80211SetPower
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 71 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
95 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
115 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
123 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
142 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr);
151 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface "
177 wpa_printf(MSG_DEBUG, "P2P: Disconnect STA " MACSTR " with minor "
222 wpa_printf(MSG_DEBUG, "CTRL_IFACE DEAUTHENTICATE %s", txtaddr);
278 wpa_printf(MSG_DEBUG, "CTRL_IFACE DISASSOCIATE %s", txtaddr);
335 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr)
    [all...]

Completed in 813 milliseconds

<<111213141516171819