HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 126 - 150 of 243) sorted by null

1 2 3 4 56 7 8 910

  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 68 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data");
199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
321 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
345 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
351 wpa_printf(MSG_DEBUG, "TLSv1: Need more data")
    [all...]
rsa.c 41 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d "
47 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER");
90 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
105 wpa_hexdump(MSG_DEBUG,
174 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
187 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
207 wpa_hexdump(MSG_DEBUG,
  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_learn.c 114 wpa_printf(MSG_DEBUG, "bgscan learn: Loading data from %s",
136 wpa_printf(MSG_DEBUG, "bgscan learn: Loaded BSS "
169 wpa_printf(MSG_DEBUG, "bgscan learn: Saving data to %s",
251 wpa_printf(MSG_DEBUG, "bgscan learn: Probe new freq "
288 wpa_printf(MSG_DEBUG, "bgscan learn: BSSes in this ESS have "
303 wpa_printf(MSG_DEBUG, "bgscan learn: Scanning frequencies:%s",
308 wpa_printf(MSG_DEBUG, "bgscan learn: Request a background scan");
310 wpa_printf(MSG_DEBUG, "bgscan learn: Failed to trigger scan");
409 wpa_printf(MSG_DEBUG, "bgscan learn: Signal strength threshold %d "
483 wpa_printf(MSG_DEBUG, "bgscan learn: scan result notification")
    [all...]
ctrl_iface_unix.c 71 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
91 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
109 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
116 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
179 wpa_printf(MSG_DEBUG, "Found %s", ifname);
324 wpa_printf(MSG_DEBUG, "Using existing control "
353 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
365 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d",
405 wpa_printf(MSG_DEBUG, "ctrl_iface bind(PF_UNIX) failed: %s",
409 wpa_printf(MSG_DEBUG, "ctrl_iface exists, but does not
    [all...]
wps_supplicant.c 64 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
91 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
97 wpa_printf(MSG_DEBUG, "WPS: Current network is "
106 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association "
129 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
166 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS "
171 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table");
193 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
201 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
212 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential
    [all...]
autoscan.c 89 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with "
112 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
bgscan.c 72 wpa_printf(MSG_DEBUG, "bgscan: Initialized module '%s' with "
82 wpa_printf(MSG_DEBUG, "bgscan: Deinitializing module '%s'",
  /external/wpa_supplicant_8/src/ap/
preauth_auth.c 50 wpa_printf(MSG_DEBUG, "RSN: receive pre-auth packet "
53 wpa_printf(MSG_DEBUG, "RSN: too short pre-auth packet "
62 wpa_printf(MSG_DEBUG, "RSN: pre-auth for foreign address "
69 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association "
101 wpa_printf(MSG_DEBUG, "RSN pre-auth interface '%s'", ifname);
189 wpa_printf(MSG_DEBUG, "RSN: Removing pre-authentication STA entry for "
245 wpa_printf(MSG_DEBUG, "RSN: Could not find pre-authentication "
sta_info.c 86 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
117 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
200 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
266 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
287 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
310 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
323 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
330 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
345 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
354 wpa_printf(MSG_DEBUG, "%s: register ap_handle_timer timeout
    [all...]
vlan_init.c 86 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
93 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
118 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
169 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name);
216 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name);
252 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name);
346 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name);
389 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)",
423 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: "
456 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)"
    [all...]
ieee802_11_shared.c 55 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Request to "
57 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
83 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Request from "
85 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
90 wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignore SA Query Request "
95 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Response to "
126 wpa_printf(MSG_DEBUG, "IEEE 802.11: Unexpected SA Query "
131 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Response from "
133 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
140 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching STA with
    [all...]
ieee802_1x.c 179 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
219 wpa_printf(MSG_DEBUG, "%s: Default WEP idx %d for dynamic VLAN\n",
221 wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)",
249 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Creating new group "
255 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Unknown VLAN ID %lu - "
301 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
335 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key",
560 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
612 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute");
693 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
153 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
179 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure");
182 wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
eap_server_sake.c 56 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
77 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
131 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
142 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
146 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
181 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
202 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
211 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S")
    [all...]
eap_server.c 194 wpa_printf(MSG_DEBUG, "EAP: Failed to "
295 wpa_printf(MSG_DEBUG, "EAP: method not initialized");
300 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d",
359 wpa_printf(MSG_DEBUG, "EAP: Failed to initialize EAP "
623 wpa_printf(MSG_DEBUG, "EAP: more than %d "
684 wpa_printf(MSG_DEBUG, "EAP: RECEIVED->DISCARD: "
717 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
721 wpa_printf(MSG_DEBUG, "EAP: Method has completed "
737 wpa_printf(MSG_DEBUG, "EAP: Method has pending "
743 wpa_printf(MSG_DEBUG, "EAP: Method has completed
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
119 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
eap_leap.c 70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
143 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
194 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
361 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge"
    [all...]
eap_tls.c 54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
118 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
152 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
163 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key",
165 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
177 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived Session-Id",
203 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
  /external/wpa_supplicant_8/src/drivers/
driver_test.c 192 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
232 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
283 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
296 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
329 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
348 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz",
362 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
393 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
433 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
487 wpa_printf(MSG_DEBUG, "P2P: Ignore Action TX status -
    [all...]
driver_madwifi.c 207 wpa_printf(MSG_DEBUG, "%s: Failed to set parameter (op %d "
258 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
279 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
285 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
297 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
304 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
317 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
349 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
361 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
372 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR
    [all...]
rfkill.c 67 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size "
72 wpa_printf(MSG_DEBUG, "rfkill: event: idx=%u type=%d "
134 wpa_printf(MSG_DEBUG, "rfkill: Unexpected event size "
139 wpa_printf(MSG_DEBUG, "rfkill: initial event: idx=%u type=%d "
driver_wext.c 58 wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
296 wpa_printf(MSG_DEBUG, "WEXT: unrecognized "
325 wpa_printf(MSG_DEBUG, "Michael MIC failure wireless event: "
350 wpa_printf(MSG_DEBUG, "PMKID candidate wireless event: "
370 wpa_hexdump(MSG_DEBUG, "AssocReq IE wireless event", (const u8 *) ev,
391 wpa_hexdump(MSG_DEBUG, "AssocResp IE wireless event", (const u8 *) ev,
445 wpa_printf(MSG_DEBUG, "Wireless event: cmd=0x%x len=%d",
469 wpa_printf(MSG_DEBUG, "Wireless event: new AP: "
492 wpa_printf(MSG_DEBUG, "WEXT: Invalid "
501 wpa_printf(MSG_DEBUG, "WEXT: Invalid
    [all...]
  /external/wpa_supplicant_8/hostapd/
ctrl_iface.c 65 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor attached",
89 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE monitor detached",
109 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
117 wpa_hexdump(MSG_DEBUG, "CTRL_IFACE changed monitor "
136 wpa_printf(MSG_DEBUG, "CTRL_IFACE NEW_STA %s", txtaddr);
145 wpa_printf(MSG_DEBUG, "Add new STA " MACSTR " based on ctrl_iface "
164 wpa_printf(MSG_DEBUG, "CTRL_IFACE SA_QUERY %s", txtaddr);
216 wpa_hexdump_ascii_key(MSG_DEBUG, "WPS_CHECK_PIN",
223 wpa_printf(MSG_DEBUG, "WPS: Too long PIN");
228 wpa_printf(MSG_DEBUG, "WPS: Invalid PIN length %d", (int) len)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_er_ssdp.c 42 wpa_printf(MSG_DEBUG, "WPS ER: Received SSDP from %s",
97 wpa_printf(MSG_DEBUG, "WPS ER: "
121 wpa_printf(MSG_DEBUG, "WPS ER: AP discovered: %s "
154 wpa_printf(MSG_DEBUG, "WPS ER: M-SEARCH sendto failed: "
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 85 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
96 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
112 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
137 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);

Completed in 1371 milliseconds

1 2 3 4 56 7 8 910