/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 120 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " 139 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 147 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " 155 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce [all...] |
wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len) [all...] |
wps_enrollee.c | 21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); 36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 54 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 87 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1") [all...] |
wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 43 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 45 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, 59 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 65 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 70 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 71 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey) [all...] |
/external/wpa_supplicant_8/src/ap/ |
p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key" [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short [all...] |
eap_ikev2_common.c | 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 72 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 89 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 96 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 115 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 117 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
eap_sim_common.c | 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth") [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 409 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel [all...] |
p2p_go_neg.c | 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 79 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d " 197 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 214 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 234 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 257 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating " 357 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick own channel " 369 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best overall [all...] |
p2p_dev_disc.c | 45 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 59 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 77 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 87 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 100 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 134 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 150 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 159 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 173 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 181 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
p2p_sd.c | 160 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 238 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 249 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 264 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 309 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 318 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 325 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 345 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 354 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey") [all...] |
tlsv1_server_read.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", 84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", 160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " 201 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " 204 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello [all...] |
tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - [all...] |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 363 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " 183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
offchannel.c | 39 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s " 58 wpa_printf(MSG_DEBUG, "Off-channel: Send Action callback " 79 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX " 91 wpa_printf(MSG_DEBUG, "Off-channel: Schedule " 96 wpa_printf(MSG_DEBUG, "Off-channel: Failed to " 109 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to " 120 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the " 151 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " 157 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " 165 wpa_printf(MSG_DEBUG, "Off-channel: TX status result=%d cb=%p" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 67 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); 77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", 88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 225 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name", 237 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: " 244 wpa_hexdump(MSG_DEBUG, 251 wpa_hexdump(MSG_DEBUG, 258 wpa_hexdump(MSG_DEBUG, [all...] |
eap_server_gpsk.c | 58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 116 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 158 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 209 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 230 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); 258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2"); 264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 272 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 280 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store " 286 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer" [all...] |