/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_hostap.c | 106 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 179 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 230 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 238 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 249 wpa_printf(MSG_DEBUG, "%s: type=%d", __FUNCTION__, type); 292 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 302 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 316 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 324 wpa_printf(MSG_DEBUG, "%s: failed to set host_roaming", 358 wpa_printf(MSG_DEBUG, "hostap: Failed to configure [all...] |
driver_wext.c | 91 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d", 96 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: " 118 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " 355 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 384 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 409 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 429 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev, 450 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev, 504 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 528 wpa_printf(MSG_DEBUG, "Wireless event: new AP: [all...] |
driver_privsep.c | 95 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting " 108 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 117 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); 143 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results", 146 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu", 207 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 240 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d " 299 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 311 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d", 313 wpa_printf(MSG_DEBUG, "%s - TODO", __func__) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
preauth.c | 67 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 102 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 186 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: starting pre-authentication " 303 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 310 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: not in suitable state " 321 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA " 331 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: PMKSA candidate " 343 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: no more pending PMKSA " 369 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without " 417 wpa_msg(sm->ctx->ctx, MSG_DEBUG, "RSN: added PMKSA cache [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_upnp_event.c | 191 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 208 wpa_printf(MSG_DEBUG, "WPS UPnP: Event send timeout"); 230 wpa_printf(MSG_DEBUG, 236 wpa_printf(MSG_DEBUG, "WPS UPnP: Got event " 243 wpa_printf(MSG_DEBUG, "WPS UPnP: Got bogus event " 248 wpa_printf(MSG_DEBUG, "WPS UPnP: Event response timeout/fail " 268 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription due to errors"); 323 wpa_printf(MSG_DEBUG, "WPS UPnP: Sending event to %s", 449 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing " 513 wpa_printf(MSG_DEBUG, "WPS UPnP: Too many events queued for [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 64 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 99 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 183 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, 300 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 307 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: not in suitable " 318 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA " 328 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate " 340 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: no more pending PMKSA " 366 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without " 407 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: added PMKSA cache [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 229 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 292 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 326 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 341 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 350 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 356 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 362 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 367 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 372 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate"); 377 wpa_printf(MSG_DEBUG, "IKEV2: Payload: [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 230 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 293 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 327 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 342 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 351 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 357 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 363 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 368 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 373 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate"); 378 wpa_printf(MSG_DEBUG, "IKEV2: Payload: [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_cryptoapi.c | 61 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 " 69 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 97 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err); 109 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s); 192 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 199 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d", 206 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) " 216 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d", 272 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 280 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 60 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 " 68 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 95 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err); 107 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s); 190 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 197 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d", 204 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) " 214 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d", 269 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 277 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wext.c | 67 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " 305 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 334 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 359 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 379 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev, 400 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev, 454 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 478 wpa_printf(MSG_DEBUG, "Wireless event: new AP: " 510 wpa_printf(MSG_DEBUG, "WEXT: Invalid " 519 wpa_printf(MSG_DEBUG, "WEXT: Invalid [all...] |
netlink.c | 80 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of " 193 wpa_printf(MSG_DEBUG, "netlink: Operstate: linkmode=%d, operstate=%d", 198 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.c | 231 wpa_dbg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec " 248 wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout"); 459 wpa_dbg(wpa_s, MSG_DEBUG, "No keys have been configured - " 530 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize " 568 wpa_dbg(wpa_s, MSG_DEBUG, "State: %s -> %s", 743 wpa_dbg(wpa_s, MSG_DEBUG, "Reconfiguration completed"); 753 wpa_dbg(wpa_s, MSG_DEBUG, "Signal %d received - reconfiguring", 821 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set " 889 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 896 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.c | 54 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).", 81 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 103 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).", 182 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 244 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).", 440 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 531 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 533 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); 538 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from [all...] |
/external/wpa_supplicant/ |
eap.c | 92 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method " 110 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for " 200 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 218 wpa_printf(MSG_DEBUG, "EAP: Using previous method data" 230 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: " 236 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: " 262 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 325 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s " 513 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected " 519 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d [all...] |
driver_wext.c | 139 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d", 144 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: " 166 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " 403 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 430 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 455 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 475 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev, 496 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev, 550 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 574 wpa_printf(MSG_DEBUG, "Wireless event: new AP: [all...] |
pmksa_cache.c | 97 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for " 191 wpa_printf(MSG_DEBUG, "WPA: reusing previous " 209 wpa_printf(MSG_DEBUG, "RSN: replacing current " 213 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for " 226 wpa_printf(MSG_DEBUG, "RSN: removed the oldest PMKSA cache " 251 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR, 363 wpa_printf(MSG_DEBUG, "RSN: added " 423 wpa_hexdump(MSG_DEBUG, "RSN: PMKID",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 95 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method " 140 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for " 230 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 254 wpa_printf(MSG_DEBUG, "EAP: Using previous method data" 266 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: " 274 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: " 300 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 361 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s " 538 wpa_printf(MSG_DEBUG, "EAP: Workaround for unexpected " 544 wpa_printf(MSG_DEBUG, "EAP: EAP-Success Id mismatch - reqId=%d [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 83 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)"); 130 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)"); 180 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq", 206 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x " 216 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - " 223 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - " 230 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x", 235 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 301 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2"); 353 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 84 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)"); 131 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)"); 181 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq", 207 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x " 217 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - " 224 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - " 231 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x", 236 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 302 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2"); 354 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID" [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 315 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP"); 329 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); " 386 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop"); 424 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto " 433 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done"); 471 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply start (%d " 633 wpa_printf(MSG_DEBUG, "WPS UPnP: Unexpected " 653 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid M-SEARCH: %d %d %d " 658 wpa_printf(MSG_DEBUG, "WPS UPnP: Ignored M-SEARCH (no ST " 846 wpa_printf(MSG_DEBUG, "add_ssdp_network: No [all...] |
/hardware/broadcom/wlan/bcm4329/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 56 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds", 79 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__); 83 wpa_printf(MSG_DEBUG, "%s: Start", __func__); 91 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 133 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd); 233 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 283 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len); 301 wpa_printf(MSG_DEBUG,"Reload command"); 362 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 57 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds", 80 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__); 84 wpa_printf(MSG_DEBUG, "%s: Start", __func__); 92 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 134 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd); 234 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 284 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len); 302 wpa_printf(MSG_DEBUG,"Reload command"); 363 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpas_glue.c | 43 wpa_printf(MSG_DEBUG, "Failed to update config after " 138 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 148 wpa_printf(MSG_DEBUG, "RSN: PMKSA caching - do not send " 154 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an " 159 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR 164 wpa_printf(MSG_DEBUG, "Using the source address of the" 179 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst)); 229 wpa_printf(MSG_DEBUG, "EAPOL authentication completed %ssuccessfully", 250 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way " 265 wpa_printf(MSG_DEBUG, "Failed to get PMK from EAPOL state [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 40 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 63 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 74 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
|