HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 101 - 125 of 243) sorted by null

1 2 3 45 6 7 8 910

  /external/wpa_supplicant_8/src/tls/
tlsv1_server.c 50 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
66 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
117 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
133 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
140 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not "
173 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop");
211 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
253 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
260 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not "
268 wpa_printf(MSG_DEBUG, "TLSv1: Alert
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config_none.c 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
scan.c 42 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured "
109 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks (%d disabled "
127 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached "
244 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan");
256 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it");
292 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!");
343 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO "
351 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common "
368 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Scan only frequency %u MHz "
379 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Scan only frequency %u MHz"
    [all...]
autoscan_exponential.c 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d "
81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
eapol_test.c 87 wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n",
90 wpa_printf(MSG_DEBUG, "%s", txt);
177 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
200 wpa_hexdump(MSG_DEBUG, "Learned identity from "
275 wpa_printf(MSG_DEBUG, " Copied RADIUS State "
296 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
343 wpa_hexdump(MSG_DEBUG, "PMK from AS",
349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
352 wpa_hexdump(MSG_DEBUG, "PMK from AS"
    [all...]
wpa_priv.c 47 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance");
55 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet "
66 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper");
70 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface "
187 wpa_printf(MSG_DEBUG, "Invalid association request");
193 wpa_printf(MSG_DEBUG, "Association request overflow");
217 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res);
278 wpa_printf(MSG_DEBUG, "Invalid set_key request");
292 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res);
351 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
225 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
233 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
313 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
321 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP "
328 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
386 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos);
407 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response",
425 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request")
    [all...]
eap_sake.c 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
255 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P");
260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d "
280 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
301 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
307 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
327 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v);
333 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
346 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
381 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
393 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d"
    [all...]
linux_ioctl.c 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s",
139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s",
151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s",
173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge "
195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from "
driver_nl80211.c 609 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
643 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
802 wpa_printf(MSG_DEBUG, "RTM_%sLINK, IFLA_IFNAME: Interface '%s' %s",
810 wpa_printf(MSG_DEBUG, "nl80211: if_removed "
817 wpa_printf(MSG_DEBUG, "nl80211: Interface %s "
824 wpa_printf(MSG_DEBUG, "nl80211: if_removed "
869 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
906 wpa_printf(MSG_DEBUG, "nl80211: Ignore event for foreign "
911 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: operstate=%d ifi_flags=0x%x "
923 wpa_printf(MSG_DEBUG, "nl80211: Ignore interface down
    [all...]
  /external/wpa_supplicant_8/src/wps/
httpread.c 155 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h);
178 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h);
405 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h);
420 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h);
425 wpa_printf(MSG_DEBUG,
436 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h);
473 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h);
478 wpa_printf(MSG_DEBUG,
484 wpa_printf(MSG_DEBUG,
500 wpa_printf(MSG_DEBUG,
    [all...]
http_client.c 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c);
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from "
65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from "
89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu "
98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s",
106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes "
115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d",
155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s",
163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s"
    [all...]
wps_common.c 68 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available");
74 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
78 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
85 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key");
93 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared);
99 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey));
110 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
119 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey",
121 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 168 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
176 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
263 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
461 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
478 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
491 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
515 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret);
525 wpa_printf(MSG_DEBUG, "SSL: %s:%s",
552 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s",
581 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already
    [all...]
tls_gnutls.c 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
162 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
220 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
225 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
433 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: "
441 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s",
485 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - "
538 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
545 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
573 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]
tls_schannel.c 227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
400 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
404 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
427 wpa_printf(MSG_DEBUG,
431 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
434 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
439 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 123 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
125 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN);
126 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN);
127 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
128 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
204 wpa_printf(MSG_DEBUG, "FT: Invalid R1KH-ID "
216 wpa_printf(MSG_DEBUG, "FT: Invalid R0KH-ID "
262 wpa_printf(MSG_DEBUG, "FT: Failed to parse "
308 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in "
314 wpa_printf(MSG_DEBUG, "FT: RIC IE(s) in the frame, but not
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.c 42 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
54 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
77 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
107 wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
139 wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
213 wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
399 wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
468 wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from "
470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len);
475 wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
229 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey",
272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR
    [all...]
pmksa_cache.c 62 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
158 wpa_printf(MSG_DEBUG, "WPA: reusing previous "
167 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for "
200 wpa_printf(MSG_DEBUG, "RSN: removed the oldest idle "
226 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR
247 wpa_printf(MSG_DEBUG, "RSN: Flush PMKSA cache entry "
353 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa));
360 wpa_printf(MSG_DEBUG, "RSN: added "
411 wpa_printf(MSG_DEBUG, "RSN: PMKSA cache search - network_ctx=%p "
414 wpa_hexdump(MSG_DEBUG, "RSN: Search for PMKID"
    [all...]
  /hardware/ti/wlan/mac80211/wpa_supplicant_lib/
driver_mac80211.c 104 wpa_printf(MSG_DEBUG, "WEXT: Operstate: linkmode=%d, operstate=%d",
109 wpa_printf(MSG_DEBUG, "WEXT: Sending operstate IFLA failed: "
183 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
213 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
239 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
260 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
282 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
337 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
362 wpa_printf(MSG_DEBUG, "Wireless event: new AP: "
395 wpa_printf(MSG_DEBUG, "WEXT: Invalid
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
151 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
162 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
198 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
238 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key",
241 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key");
270 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
273 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive EMSK");
eap_sim_db.c 99 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
125 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
416 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
423 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
468 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
475 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
494 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
501 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
551 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES");
559 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_das.c 174 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d",
177 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client");
183 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet "
193 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet "
204 wpa_printf(MSG_DEBUG, "DAS: Unacceptable "
212 wpa_printf(MSG_DEBUG, "DAS: Missing Event-Timestamp in packet "
239 wpa_printf(MSG_DEBUG, "DAS: Unexpected RADIUS code %u in "
245 wpa_printf(MSG_DEBUG, "DAS: Reply to %s:%d", abuf, from_port);
250 wpa_printf(MSG_DEBUG, "DAS: Failed to add "
257 wpa_printf(MSG_DEBUG, "DAS: Failed to add
    [all...]

Completed in 1603 milliseconds

1 2 3 45 6 7 8 910