/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 68 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data"); 199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 321 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 345 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 351 wpa_printf(MSG_DEBUG, "TLSv1: Need more data") [all...] |
rsa.c | 41 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 47 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 90 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 105 wpa_hexdump(MSG_DEBUG, 174 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 187 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the " 207 wpa_hexdump(MSG_DEBUG,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
bgscan_learn.c | 114 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s", 136 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS " 169 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s", 251 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq " 288 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have " 303 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s", 308 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan"); 310 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan"); 409 wpa_printf(MSG_DEBUG, "bgscan learn: Signal strength threshold %d " 483 wpa_printf(MSG_DEBUG, "bgscan learn: scan result notification") [all...] |
ctrl_iface_unix.c | 71 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 91 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 109 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 116 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 179 wpa_printf(MSG_DEBUG, "Found %s", ifname); 324 wpa_printf(MSG_DEBUG, "Using existing control " 353 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 365 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d", 405 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s", 409 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not [all...] |
wps_supplicant.c | 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 91 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 97 wpa_printf(MSG_DEBUG, "WPS: Current network is " 106 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association " 129 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting " 166 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS " 171 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table"); 193 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA " 201 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential " 212 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential [all...] |
autoscan.c | 89 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with " 112 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
|
bgscan.c | 72 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with " 82 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
|
/external/wpa_supplicant_8/src/ap/ |
preauth_auth.c | 50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet " 53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet " 62 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address " 69 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association " 101 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname); 189 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for " 245 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
|
sta_info.c | 86 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 117 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 200 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 266 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 287 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 310 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 323 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 330 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 345 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR 354 wpa_printf(MSG_DEBUG, "%s: register ap_handle_timer timeout [all...] |
vlan_init.c | 86 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name); 93 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name); 118 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name); 169 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name); 216 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name); 252 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name); 346 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name); 389 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)", 423 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: " 456 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)" [all...] |
ieee802_11_shared.c | 55 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Request to " 57 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 83 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Request from " 85 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 90 wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignore SA Query Request " 95 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Response to " 126 wpa_printf(MSG_DEBUG, "IEEE 802.11: Unexpected SA Query " 131 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Response from " 133 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 140 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching STA with [all...] |
ieee802_1x.c | 179 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR 219 wpa_printf(MSG_DEBUG, "%s: Default WEP idx %d for dynamic VLAN\n", 221 wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)", 249 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Creating new group " 255 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Unknown VLAN ID %lu - " 301 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR, 335 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key", 560 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 612 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute"); 693 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " 153 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 " 179 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure"); 182 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
|
eap_server_sake.c | 56 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 77 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 131 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 142 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 146 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S"); 186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 202 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm"); 211 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S") [all...] |
eap_server.c | 194 wpa_printf(MSG_DEBUG, "EAP: Failed to " 295 wpa_printf(MSG_DEBUG, "EAP: method not initialized"); 300 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d", 359 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP " 623 wpa_printf(MSG_DEBUG, "EAP: more than %d " 684 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: " 717 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 721 wpa_printf(MSG_DEBUG, "EAP: Method has completed " 737 wpa_printf(MSG_DEBUG, "EAP: Method has pending " 743 wpa_printf(MSG_DEBUG, "EAP: Method has completed [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
eap_leap.c | 70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 143 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success"); 194 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response"); 226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 361 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash", 363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge" [all...] |
eap_tls.c | 54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 118 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 152 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 163 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 165 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK", 177 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived Session-Id", 203 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
|
/external/wpa_supplicant_8/src/drivers/ |
driver_test.c | 192 wpa_printf(MSG_DEBUG, "%s: no destination client entry", 232 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d " 283 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s", 296 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found", 329 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu" 348 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz", 362 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__); 393 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s", 433 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s", 487 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status - [all...] |
driver_madwifi.c | 207 wpa_printf(MSG_DEBUG, "%s: Failed to set parameter (op %d " 258 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 279 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 285 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 297 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", 304 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 317 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 349 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 361 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 372 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR [all...] |
rfkill.c | 67 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 72 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d " 134 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size " 139 wpa_printf(MSG_DEBUG, "rfkill: initial event: idx=%u type=%d "
|
driver_wext.c | 58 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " 296 wpa_printf(MSG_DEBUG, "WEXT: unrecognized " 325 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: " 350 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: " 370 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev, 391 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev, 445 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d", 469 wpa_printf(MSG_DEBUG, "Wireless event: new AP: " 492 wpa_printf(MSG_DEBUG, "WEXT: Invalid " 501 wpa_printf(MSG_DEBUG, "WEXT: Invalid [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 65 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached", 89 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached", 109 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 117 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor " 136 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr); 145 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface " 164 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr); 216 wpa_hexdump_ascii_key(MSG_DEBUG, "WPS_CHECK_PIN", 223 wpa_printf(MSG_DEBUG, "WPS: Too long PIN"); 228 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_er_ssdp.c | 42 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s", 97 wpa_printf(MSG_DEBUG, "WPS ER: " 121 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s " 154 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: "
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 85 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf)); 96 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 112 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 137 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
|