HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 276 - 300 of 454) sorted by null

<<111213141516171819

  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 321 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
389 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
441 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
516 wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA "
543 wpa_printf(MSG_DEBUG, " old AID %d", sta->aid);
565 wpa_printf(MSG_DEBUG, " new AID %d", sta->aid);
706 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)Association "
715 wpa_printf(MSG_DEBUG, "WPS: Invalid WPS IE in "
720 wpa_printf(MSG_DEBUG, "STA did not include WPA/RSN IE in "
795 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried
    [all...]
vlan_init.c 85 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
92 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
117 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
168 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name);
215 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name);
251 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name);
343 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name);
386 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)",
420 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: "
453 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)"
    [all...]
ieee802_11_ht.c 105 wpa_printf(MSG_DEBUG, "%s current operation mode=0x%X",
151 wpa_printf(MSG_DEBUG, "%s new operation mode=0x%X changes=%d",
191 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: "
198 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num "
208 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of "
223 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
drv_callbacks.c 59 wpa_printf(MSG_DEBUG, "hostapd_notif_assoc: Skip event with "
72 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)AssocReq");
76 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq");
80 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq");
84 wpa_printf(MSG_DEBUG, "STA did not include WPS/RSN/WPA IE in "
109 wpa_printf(MSG_DEBUG, "STA did not include "
116 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA");
137 wpa_printf(MSG_DEBUG, "WPA/RSN information element "
139 wpa_hexdump(MSG_DEBUG, "IE", ie, ielen);
212 wpa_printf(MSG_DEBUG, "hostapd_notif_disassoc: Skip event
    [all...]
ieee802_1x.c 222 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
262 wpa_printf(MSG_DEBUG, "%s: Default WEP idx %d for dynamic VLAN\n",
264 wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)",
292 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Creating new group "
298 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Unknown VLAN ID %lu - "
344 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
378 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key",
471 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
586 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute");
648 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d"
    [all...]
wps_hostapd.c 95 wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA "
97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
100 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
121 wpa_printf(MSG_DEBUG, "Failed to add the PSK to "
157 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid);
235 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data");
256 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute",
259 wpa_printf(MSG_DEBUG, "WPS: Received new AP Settings");
260 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len);
261 wpa_printf(MSG_DEBUG, "WPS: Authentication Type 0x%x"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_nl80211.c 426 wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
475 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
496 wpa_printf(MSG_DEBUG, "nl80211: Ignore event for foreign "
501 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
510 wpa_printf(MSG_DEBUG, "nl80211: Interface down");
516 wpa_printf(MSG_DEBUG, "nl80211: Interface up");
552 wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s",
589 wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge "
605 wpa_printf(MSG_DEBUG, "nl80211: Too short association event "
643 wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the
    [all...]
rfkill.c 73 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size "
78 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d "
140 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size "
145 wpa_printf(MSG_DEBUG, "rfkill: initial event: idx=%u type=%d "
driver_bsd.c 236 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx);
239 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__,
294 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "
396 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)",
419 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
425 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
437 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
445 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
456 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
586 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (len %lu)", __func__
    [all...]
  /external/wpa_supplicant/
eapol_test.c 145 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
168 wpa_hexdump(MSG_DEBUG, "Learned identity from "
233 wpa_printf(MSG_DEBUG, " Copied RADIUS State "
254 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
301 wpa_hexdump(MSG_DEBUG, "PMK from AS",
307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
310 wpa_hexdump(MSG_DEBUG, "PMK from AS",
495 wpa_printf(MSG_DEBUG, "could not extract "
504 wpa_printf(MSG_DEBUG, "too short EAP packet
    [all...]
wpa_supplicant.c 195 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
205 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send "
212 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an "
218 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR
223 wpa_printf(MSG_DEBUG, "Using the source address of the"
364 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete");
420 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
433 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
452 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
477 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from
    [all...]
crypto_cryptoapi.c 67 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 "
75 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
84 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
112 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err);
124 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s);
207 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
214 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d",
221 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) "
231 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d",
287 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed:
    [all...]
driver_hostap.c 108 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
181 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "
232 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
240 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
251 wpa_printf(MSG_DEBUG, "%s: type=%d", __FUNCTION__, type);
294 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
304 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
318 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
326 wpa_printf(MSG_DEBUG, "%s: failed to set host_roaming",
360 wpa_printf(MSG_DEBUG, "hostap: Failed to configure
    [all...]
preauth.c 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
185 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: starting pre-authentication "
303 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
309 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: not in suitable state "
320 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA "
329 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA candidate "
341 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: no more pending PMKSA "
366 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
414 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: added PMKSA cache
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ps3.c 100 wpa_printf(MSG_DEBUG, "%s: <-", __func__);
153 wpa_printf(MSG_DEBUG, "%s: ->", __func__);
161 wpa_printf(MSG_DEBUG, "%s:<-", __func__);
171 wpa_printf(MSG_DEBUG, "%s:->", __func__);
  /external/wpa_supplicant_8/src/wps/
wps_er_ssdp.c 48 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s",
103 wpa_printf(MSG_DEBUG, "WPS ER: "
127 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s "
160 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: "
wps_upnp_web.c 330 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML");
344 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML");
349 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s",
426 wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo");
484 wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage");
519 wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse");
522 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage "
528 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in "
537 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in "
543 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid NewWLANEventMAC in
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 48 wpa_printf(MSG_DEBUG, "Failed to update config after "
143 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
153 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send "
159 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an "
164 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR
169 wpa_printf(MSG_DEBUG, "Using the source address of the"
184 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst));
233 wpa_printf(MSG_DEBUG, "EAPOL authentication completed %ssuccessfully",
254 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
261 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for
    [all...]
bgscan.c 78 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with "
88 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
ctrl_iface.c 62 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value);
95 wpa_printf(MSG_DEBUG, "WPS: Invalid "
99 wpa_printf(MSG_DEBUG, "WPS: Testing - force WPS "
106 wpa_printf(MSG_DEBUG, "WPS: Testing - dummy_cred=%d",
116 wpa_printf(MSG_DEBUG, "TDLS: tdls_testing=0x%x", tdls_testing);
121 wpa_printf(MSG_DEBUG, "TDLS: tdls_disabled=%d", disabled);
145 wpa_printf(MSG_DEBUG, "CTRL_IFACE GET '%s'", cmd);
170 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address "
175 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid));
193 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.c 73 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
161 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
234 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
272 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type "
283 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
290 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough "
346 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
485 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
550 wpa_printf(MSG_DEBUG, "TLSv1: Using session ticket")
    [all...]
tlsv1_cred.c 63 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
99 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
104 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
288 wpa_printf(MSG_DEBUG, "DH: DH parameters did not start with a "
301 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for p; "
323 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for g; "
355 wpa_printf(MSG_DEBUG, "TLSv1: No PEM dhparams tag found - "
360 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format dhparams into DER "
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 73 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
161 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
234 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
272 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type "
283 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
290 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough "
346 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify "
485 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify "
550 wpa_printf(MSG_DEBUG, "TLSv1: Using session ticket")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.c 188 wpa_printf(MSG_DEBUG, "EAP: Failed to "
281 wpa_printf(MSG_DEBUG, "EAP: method not initialized");
286 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d",
342 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP "
594 wpa_printf(MSG_DEBUG, "EAP: more than %d "
655 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: "
688 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
692 wpa_printf(MSG_DEBUG, "EAP: Method has completed "
708 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
714 wpa_printf(MSG_DEBUG, "EAP: Method has completed
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 192 wpa_printf(MSG_DEBUG, "EAP: Failed to "
288 wpa_printf(MSG_DEBUG, "EAP: method not initialized");
293 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d",
349 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP "
610 wpa_printf(MSG_DEBUG, "EAP: more than %d "
671 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: "
704 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
708 wpa_printf(MSG_DEBUG, "EAP: Method has completed "
724 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
730 wpa_printf(MSG_DEBUG, "EAP: Method has completed
    [all...]

Completed in 1564 milliseconds

<<111213141516171819