/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 321 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 389 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " 441 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR 516 wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA " 543 wpa_printf(MSG_DEBUG, " old AID %d", sta->aid); 565 wpa_printf(MSG_DEBUG, " new AID %d", sta->aid); 706 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)Association " 715 wpa_printf(MSG_DEBUG, "WPS: Invalid WPS IE in " 720 wpa_printf(MSG_DEBUG, "STA did not include WPA/RSN IE in " 795 wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried [all...] |
vlan_init.c | 85 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name); 92 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name); 117 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name); 168 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name); 215 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name); 251 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name); 343 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name); 386 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)", 420 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: " 453 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)" [all...] |
ieee802_11_ht.c | 105 wpa_printf(MSG_DEBUG, "%s current operation mode=0x%X", 151 wpa_printf(MSG_DEBUG, "%s new operation mode=0x%X changes=%d", 191 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: " 198 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num " 208 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of " 223 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
|
drv_callbacks.c | 59 wpa_printf(MSG_DEBUG, "hostapd_notif_assoc: Skip event with " 72 wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)AssocReq"); 76 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq"); 80 wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq"); 84 wpa_printf(MSG_DEBUG, "STA did not include WPS/RSN/WPA IE in " 109 wpa_printf(MSG_DEBUG, "STA did not include " 116 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA"); 137 wpa_printf(MSG_DEBUG, "WPA/RSN information element " 139 wpa_hexdump(MSG_DEBUG, "IE", ie, ielen); 212 wpa_printf(MSG_DEBUG, "hostapd_notif_disassoc: Skip event [all...] |
ieee802_1x.c | 222 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR 262 wpa_printf(MSG_DEBUG, "%s: Default WEP idx %d for dynamic VLAN\n", 264 wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)", 292 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Creating new group " 298 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Unknown VLAN ID %lu - " 344 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR, 378 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key", 471 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 586 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute"); 648 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d" [all...] |
wps_hostapd.c | 95 wpa_printf(MSG_DEBUG, "Received new WPA/WPA2-PSK from WPS for STA " 97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 100 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 121 wpa_printf(MSG_DEBUG, "Failed to add the PSK to " 157 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid); 235 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data"); 256 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute", 259 wpa_printf(MSG_DEBUG, "WPS: Received new AP Settings"); 260 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len); 261 wpa_printf(MSG_DEBUG, "WPS: Authentication Type 0x%x" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_nl80211.c | 426 wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s", 475 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed " 496 wpa_printf(MSG_DEBUG, "nl80211: Ignore event for foreign " 501 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x " 510 wpa_printf(MSG_DEBUG, "nl80211: Interface down"); 516 wpa_printf(MSG_DEBUG, "nl80211: Interface up"); 552 wpa_printf(MSG_DEBUG, "nl80211: Add ifindex %u for bridge %s", 589 wpa_printf(MSG_DEBUG, "nl80211: Remove ifindex %u for bridge " 605 wpa_printf(MSG_DEBUG, "nl80211: Too short association event " 643 wpa_printf(MSG_DEBUG, "nl80211: Operating frequency for the [all...] |
rfkill.c | 73 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 78 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d " 140 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 145 wpa_printf(MSG_DEBUG, "rfkill: initial event: idx=%u type=%d "
|
driver_bsd.c | 236 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); 239 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, 294 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 396 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)", 419 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 425 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 437 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", 445 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 456 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 586 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (len %lu)", __func__ [all...] |
/external/wpa_supplicant/ |
eapol_test.c | 145 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 168 wpa_hexdump(MSG_DEBUG, "Learned identity from " 233 wpa_printf(MSG_DEBUG, " Copied RADIUS State " 254 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 298 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 301 wpa_hexdump(MSG_DEBUG, "PMK from AS", 307 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 310 wpa_hexdump(MSG_DEBUG, "PMK from AS", 495 wpa_printf(MSG_DEBUG, "could not extract " 504 wpa_printf(MSG_DEBUG, "too short EAP packet [all...] |
wpa_supplicant.c | 195 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 205 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send " 212 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an " 218 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR 223 wpa_printf(MSG_DEBUG, "Using the source address of the" 364 wpa_msg(wpa_s, MSG_DEBUG, "WPA: EAPOL processing complete"); 420 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 433 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 452 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 477 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from [all...] |
crypto_cryptoapi.c | 67 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 " 75 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 84 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 112 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err); 124 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s); 207 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 214 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d", 221 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) " 231 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d", 287 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: [all...] |
driver_hostap.c | 108 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 181 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 232 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 240 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 251 wpa_printf(MSG_DEBUG, "%s: type=%d", __FUNCTION__, type); 294 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 304 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 318 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 326 wpa_printf(MSG_DEBUG, "%s: failed to set host_roaming", 360 wpa_printf(MSG_DEBUG, "hostap: Failed to configure [all...] |
preauth.c | 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 103 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 185 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: starting pre-authentication " 303 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 309 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: not in suitable state " 320 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA " 329 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA candidate " 341 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: no more pending PMKSA " 366 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without " 414 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: added PMKSA cache [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ps3.c | 100 wpa_printf(MSG_DEBUG, "%s: <-", __func__); 153 wpa_printf(MSG_DEBUG, "%s: ->", __func__); 161 wpa_printf(MSG_DEBUG, "%s:<-", __func__); 171 wpa_printf(MSG_DEBUG, "%s:->", __func__);
|
/external/wpa_supplicant_8/src/wps/ |
wps_er_ssdp.c | 48 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s", 103 wpa_printf(MSG_DEBUG, "WPS ER: " 127 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s " 160 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: "
|
wps_upnp_web.c | 330 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for device XML"); 344 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET for SCPD XML"); 349 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP GET file not found: %s", 426 wpa_printf(MSG_DEBUG, "WPS UPnP: GetDeviceInfo"); 484 wpa_printf(MSG_DEBUG, "WPS UPnP: PutMessage"); 519 wpa_printf(MSG_DEBUG, "WPS UPnP: PutWLANResponse"); 522 wpa_printf(MSG_DEBUG, "WPS UPnP: Could not extract NewMessage " 528 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventType in " 537 wpa_printf(MSG_DEBUG, "WPS UPnP: No NewWLANEventMAC in " 543 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid NewWLANEventMAC in [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 48 wpa_printf(MSG_DEBUG, "Failed to update config after " 143 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 153 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send " 159 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an " 164 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR 169 wpa_printf(MSG_DEBUG, "Using the source address of the" 184 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst)); 233 wpa_printf(MSG_DEBUG, "EAPOL authentication completed %ssuccessfully", 254 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 261 wpa_printf(MSG_DEBUG, "RSN: Use FT XXKey as PMK for [all...] |
bgscan.c | 78 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with " 88 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
|
ctrl_iface.c | 62 wpa_printf(MSG_DEBUG, "CTRL_IFACE SET '%s'='%s'", cmd, value); 95 wpa_printf(MSG_DEBUG, "WPS: Invalid " 99 wpa_printf(MSG_DEBUG, "WPS: Testing - force WPS " 106 wpa_printf(MSG_DEBUG, "WPS: Testing - dummy_cred=%d", 116 wpa_printf(MSG_DEBUG, "TDLS: tdls_testing=0x%x", tdls_testing); 121 wpa_printf(MSG_DEBUG, "TDLS: tdls_disabled=%d", disabled); 145 wpa_printf(MSG_DEBUG, "CTRL_IFACE GET '%s'", cmd); 170 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH: invalid address " 175 wpa_printf(MSG_DEBUG, "CTRL_IFACE PREAUTH " MACSTR, MAC2STR(bssid)); 193 wpa_printf(MSG_DEBUG, "CTRL_IFACE STKSTART: invalid [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 73 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 161 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 234 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 272 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type " 283 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 290 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough " 346 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify " 485 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify " 550 wpa_printf(MSG_DEBUG, "TLSv1: Using session ticket") [all...] |
tlsv1_cred.c | 63 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 99 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 104 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 288 wpa_printf(MSG_DEBUG, "DH: DH parameters did not start with a " 301 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for p; " 323 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for g; " 355 wpa_printf(MSG_DEBUG, "TLSv1: No PEM dhparams tag found - " 360 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format dhparams into DER "
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 73 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 88 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 161 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 234 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 272 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected content type " 283 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 290 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough " 346 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize verify " 485 wpa_printf(MSG_DEBUG, "TLSv1: Failed to re-initialize verify " 550 wpa_printf(MSG_DEBUG, "TLSv1: Using session ticket") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.c | 188 wpa_printf(MSG_DEBUG, "EAP: Failed to " 281 wpa_printf(MSG_DEBUG, "EAP: method not initialized"); 286 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d", 342 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP " 594 wpa_printf(MSG_DEBUG, "EAP: more than %d " 655 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: " 688 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 692 wpa_printf(MSG_DEBUG, "EAP: Method has completed " 708 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 714 wpa_printf(MSG_DEBUG, "EAP: Method has completed [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 192 wpa_printf(MSG_DEBUG, "EAP: Failed to " 288 wpa_printf(MSG_DEBUG, "EAP: method not initialized"); 293 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d", 349 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP " 610 wpa_printf(MSG_DEBUG, "EAP: more than %d " 671 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: " 704 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 708 wpa_printf(MSG_DEBUG, "EAP: Method has completed " 724 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 730 wpa_printf(MSG_DEBUG, "EAP: Method has completed [all...] |