/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.c | 50 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 66 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 117 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 133 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 140 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 173 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 211 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 253 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 260 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 268 wpa_printf(MSG_DEBUG, "TLSv1: Alert [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_none.c | 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
|
scan.c | 42 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured " 109 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks (%d disabled " 127 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached " 244 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan"); 256 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it"); 292 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!"); 343 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO " 351 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common " 368 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Scan only frequency %u MHz " 379 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Scan only frequency %u MHz" [all...] |
autoscan_exponential.c | 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d " 81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
|
eapol_test.c | 87 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n", 90 wpa_printf(MSG_DEBUG, "%s", txt); 177 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 200 wpa_hexdump(MSG_DEBUG, "Learned identity from " 275 wpa_printf(MSG_DEBUG, " Copied RADIUS State " 296 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 343 wpa_hexdump(MSG_DEBUG, "PMK from AS", 349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 352 wpa_hexdump(MSG_DEBUG, "PMK from AS" [all...] |
wpa_priv.c | 47 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance"); 55 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet " 66 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper"); 70 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface " 187 wpa_printf(MSG_DEBUG, "Invalid association request"); 193 wpa_printf(MSG_DEBUG, "Association request overflow"); 217 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res); 278 wpa_printf(MSG_DEBUG, "Invalid set_key request"); 292 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res); 351 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 225 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 233 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id", 263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 313 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " 321 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP " 328 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 386 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos); 407 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response", 425 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request") [all...] |
eap_sake.c | 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); 255 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P"); 260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x " 228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d " 280 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 301 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 307 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 327 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); 333 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 346 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 381 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 393 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d" [all...] |
linux_ioctl.c | 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s", 139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s", 151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s", 173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge " 195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from "
|
driver_nl80211.c | 609 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command " 643 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)", 802 wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s", 810 wpa_printf(MSG_DEBUG, "nl80211: if_removed " 817 wpa_printf(MSG_DEBUG, "nl80211: Interface %s " 824 wpa_printf(MSG_DEBUG, "nl80211: if_removed " 869 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed " 906 wpa_printf(MSG_DEBUG, "nl80211: Ignore event for foreign " 911 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x " 923 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down [all...] |
/external/wpa_supplicant_8/src/wps/ |
httpread.c | 155 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h); 178 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h); 405 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h); 420 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h); 425 wpa_printf(MSG_DEBUG, 436 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h); 473 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h); 478 wpa_printf(MSG_DEBUG, 484 wpa_printf(MSG_DEBUG, 500 wpa_printf(MSG_DEBUG, [all...] |
http_client.c | 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c); 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from " 65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from " 89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu " 98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s", 106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes " 115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d", 155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s", 163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s" [all...] |
wps_common.c | 68 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 74 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 78 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 85 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); 93 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); 99 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); 110 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 119 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", 121 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 168 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 176 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 263 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 461 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store " 478 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 491 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store " 515 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret); 525 wpa_printf(MSG_DEBUG, "SSL: %s:%s", 552 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s", 581 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already [all...] |
tls_gnutls.c | 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 162 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 220 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 225 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 433 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: " 441 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s", 485 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - " 538 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 545 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 573 wpa_printf(MSG_DEBUG, "Failed to read client cert/key [all...] |
tls_schannel.c | 227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 400 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 404 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 427 wpa_printf(MSG_DEBUG, 431 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 434 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 439 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 123 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 125 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN); 126 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN); 127 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len); 204 wpa_printf(MSG_DEBUG, "FT: Invalid R1KH-ID " 216 wpa_printf(MSG_DEBUG, "FT: Invalid R0KH-ID " 262 wpa_printf(MSG_DEBUG, "FT: Failed to parse " 308 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in " 314 wpa_printf(MSG_DEBUG, "FT: RIC IE(s) in the frame, but not [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.c | 42 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).", 54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 77 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).", 107 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).", 139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).", 213 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).", 399 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR, 468 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from " 470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); 475 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 229 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey", 272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR [all...] |
pmksa_cache.c | 62 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for " 158 wpa_printf(MSG_DEBUG, "WPA: reusing previous " 167 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for " 200 wpa_printf(MSG_DEBUG, "RSN: removed the oldest idle " 226 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 247 wpa_printf(MSG_DEBUG, "RSN: Flush PMKSA cache entry " 353 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 360 wpa_printf(MSG_DEBUG, "RSN: added " 411 wpa_printf(MSG_DEBUG, "RSN: PMKSA cache search - network_ctx=%p " 414 wpa_hexdump(MSG_DEBUG, "RSN: Search for PMKID" [all...] |
/hardware/ti/wlan/mac80211/wpa_supplicant_lib/ |
driver_mac80211.c | 104 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d", 109 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: " 183 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 260 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev, 282 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev, 337 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 362 wpa_printf(MSG_DEBUG, "Wireless event: new AP: " 395 wpa_printf(MSG_DEBUG, "WEXT: Invalid [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 151 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 162 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 198 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS " 238 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key", 241 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key"); 270 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK", 273 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
|
eap_sim_db.c | 99 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 125 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 416 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 423 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 468 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 475 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 494 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 501 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 551 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES"); 559 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 174 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d", 177 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client"); 183 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet " 193 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet " 204 wpa_printf(MSG_DEBUG, "DAS: Unacceptable " 212 wpa_printf(MSG_DEBUG, "DAS: Missing Event-Timestamp in packet " 239 wpa_printf(MSG_DEBUG, "DAS: Unexpected RADIUS code %u in " 245 wpa_printf(MSG_DEBUG, "DAS: Reply to %s:%d", abuf, from_port); 250 wpa_printf(MSG_DEBUG, "DAS: Failed to add " 257 wpa_printf(MSG_DEBUG, "DAS: Failed to add [all...] |