HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 301 - 325 of 454) sorted by null

<<111213141516171819

  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_hostap.c 106 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
179 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "
230 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
238 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
249 wpa_printf(MSG_DEBUG, "%s: type=%d", __FUNCTION__, type);
292 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
302 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
316 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
324 wpa_printf(MSG_DEBUG, "%s: failed to set host_roaming",
358 wpa_printf(MSG_DEBUG, "hostap: Failed to configure
    [all...]
driver_wext.c 91 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
96 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
118 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
355 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
384 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
409 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
429 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
450 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
504 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
528 wpa_printf(MSG_DEBUG, "Wireless event: new AP:
    [all...]
driver_privsep.c 95 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting "
108 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
117 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
143 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results",
146 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu",
207 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
240 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
299 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
311 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
313 wpa_printf(MSG_DEBUG, "%s - TODO", __func__)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
preauth.c 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
186 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: starting pre-authentication "
303 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
310 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: not in suitable state "
321 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA "
331 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA candidate "
343 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: no more pending PMKSA "
369 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
417 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: added PMKSA cache
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_upnp_event.c 191 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event "
208 wpa_printf(MSG_DEBUG, "WPS UPnP: Event send timeout");
230 wpa_printf(MSG_DEBUG,
236 wpa_printf(MSG_DEBUG, "WPS UPnP: Got event "
243 wpa_printf(MSG_DEBUG, "WPS UPnP: Got bogus event "
248 wpa_printf(MSG_DEBUG, "WPS UPnP: Event response timeout/fail "
268 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription due to errors");
323 wpa_printf(MSG_DEBUG, "WPS UPnP: Sending event to %s",
449 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing "
513 wpa_printf(MSG_DEBUG, "WPS UPnP: Too many events queued for
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 64 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
99 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
183 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG,
300 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
307 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: not in suitable "
318 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA "
328 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate "
340 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: no more pending PMKSA "
366 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
407 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: added PMKSA cache
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.c 229 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
292 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
326 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
341 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
350 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
356 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
362 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
367 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
372 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
377 wpa_printf(MSG_DEBUG, "IKEV2: Payload:
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 230 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
293 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
327 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
342 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
351 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
357 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
363 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
368 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
373 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
378 wpa_printf(MSG_DEBUG, "IKEV2: Payload:
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_cryptoapi.c 61 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 "
69 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
97 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err);
109 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s);
192 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
199 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d",
206 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) "
216 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d",
272 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
280 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 60 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 "
68 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
95 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err);
107 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s);
190 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
197 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d",
204 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) "
214 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d",
269 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
277 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_wext.c 67 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
305 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
334 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
359 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
379 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
400 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
454 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
478 wpa_printf(MSG_DEBUG, "Wireless event: new AP: "
510 wpa_printf(MSG_DEBUG, "WEXT: Invalid "
519 wpa_printf(MSG_DEBUG, "WEXT: Invalid
    [all...]
netlink.c 80 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of "
193 wpa_printf(MSG_DEBUG, "netlink: Operstate: linkmode=%d, operstate=%d",
198 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.c 231 wpa_dbg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec "
248 wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout");
459 wpa_dbg(wpa_s, MSG_DEBUG, "No keys have been configured - "
530 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize "
568 wpa_dbg(wpa_s, MSG_DEBUG, "State: %s -> %s",
743 wpa_dbg(wpa_s, MSG_DEBUG, "Reconfiguration completed");
753 wpa_dbg(wpa_s, MSG_DEBUG, "Signal %d received - reconfiguring",
821 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set "
889 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
896 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0")
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.c 54 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
81 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
103 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
139 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
182 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
244 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
440 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
531 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from "
533 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len);
538 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from
    [all...]
  /external/wpa_supplicant/
eap.c 92 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
110 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
200 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
218 wpa_printf(MSG_DEBUG, "EAP: Using previous method data"
230 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: "
236 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: "
262 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase "
325 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s "
513 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected "
519 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d
    [all...]
driver_wext.c 139 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
144 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
166 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
403 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
430 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
455 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
475 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
496 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
550 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
574 wpa_printf(MSG_DEBUG, "Wireless event: new AP:
    [all...]
pmksa_cache.c 97 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
191 wpa_printf(MSG_DEBUG, "WPA: reusing previous "
209 wpa_printf(MSG_DEBUG, "RSN: replacing current "
213 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for "
226 wpa_printf(MSG_DEBUG, "RSN: removed the oldest PMKSA cache "
251 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
363 wpa_printf(MSG_DEBUG, "RSN: added "
423 wpa_hexdump(MSG_DEBUG, "RSN: PMKID",
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 95 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
140 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
230 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
254 wpa_printf(MSG_DEBUG, "EAP: Using previous method data"
266 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: "
274 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: "
300 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase "
361 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s "
538 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected "
544 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 83 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
130 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
180 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq",
206 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x "
216 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - "
223 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - "
230 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x",
235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
301 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2");
353 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 84 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
131 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
181 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq",
207 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x "
217 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - "
224 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - "
231 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x",
236 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
302 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2");
354 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID"
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ssdp.c 315 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP");
329 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); "
386 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop");
424 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto "
433 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done");
471 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply start (%d "
633 wpa_printf(MSG_DEBUG, "WPS UPnP: Unexpected "
653 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid M-SEARCH: %d %d %d "
658 wpa_printf(MSG_DEBUG, "WPS UPnP: Ignored M-SEARCH (no ST "
846 wpa_printf(MSG_DEBUG, "add_ssdp_network: No
    [all...]
  /hardware/broadcom/wlan/bcm4329/wpa_supplicant_8_lib/
driver_cmd_wext.c 56 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds",
79 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__);
83 wpa_printf(MSG_DEBUG, "%s: Start", __func__);
91 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid);
133 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd);
233 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid);
283 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len);
301 wpa_printf(MSG_DEBUG,"Reload command");
362 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_wext.c 57 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds",
80 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__);
84 wpa_printf(MSG_DEBUG, "%s: Start", __func__);
92 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid);
134 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd);
234 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid);
284 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len);
302 wpa_printf(MSG_DEBUG,"Reload command");
363 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
  /external/wpa_supplicant_6/wpa_supplicant/
wpas_glue.c 43 wpa_printf(MSG_DEBUG, "Failed to update config after "
138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
148 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send "
154 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an "
159 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR
164 wpa_printf(MSG_DEBUG, "Using the source address of the"
179 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst));
229 wpa_printf(MSG_DEBUG, "EAPOL authentication completed %ssuccessfully",
250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way "
265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 40 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
63 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
74 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "

Completed in 1025 milliseconds

<<111213141516171819