HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 26 - 50 of 243) sorted by null

12 3 4 5 6 7 8 910

  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
60 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized");
313 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH "
325 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for "
358 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
365 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN);
366 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN);
372 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN);
373 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len)
    [all...]
wnm_ap.c 27 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
37 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
64 wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
93 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
113 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d",
124 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d",
147 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response "
177 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame");
211 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized",
217 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found")
    [all...]
wmm.c 113 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
119 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
125 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
174 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
177 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
179 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
181 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
184 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
189 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)");
194 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d"
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_invitation.c 169 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
178 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
184 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
202 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
217 wpa_printf(MSG_DEBUG, "P2P: Mandatory Invitation Flags "
225 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
239 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Invitation "
243 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
254 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_wsc_common.c 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
  /external/wpa_supplicant_8/src/wps/
wps_upnp_event.c 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e);
91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for "
122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p",
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event "
178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s "
192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p "
200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p "
218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p "
222 wpa_printf(MSG_DEBUG,
    [all...]
wps_dev_attr.c 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer");
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name");
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number");
92 wpa_printf(MSG_DEBUG, "WPS: * Serial Number");
115 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type");
129 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type");
146 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type",
162 wpa_printf(MSG_DEBUG, "WPS: * Device Name");
198 wpa_printf(MSG_DEBUG, "WPS: * OS Version");
209 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1"
    [all...]
wps_er.c 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
202 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
208 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
231 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
236 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
243 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
332 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
339 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
364 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
375 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)"
    [all...]
wps_registrar.c 201 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR,
205 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was "
213 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
222 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR,
229 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the "
238 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
383 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for "
385 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E",
406 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap");
409 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID")
    [all...]
  /external/wpa_supplicant_8/src/tls/
bignum.c 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
tlsv1_server_write.c 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello");
107 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
117 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
143 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
166 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
173 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
193 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
218 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
228 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
260 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed")
    [all...]
tlsv1_client_write.c 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
240 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value",
247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
hs20_supplicant.c 89 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
98 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
101 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
133 wpa_hexdump_ascii(MSG_DEBUG, "HS Capability List", pos, slen);
138 wpa_hexdump_ascii(MSG_DEBUG, "oper friendly name", pos, slen);
146 wpa_hexdump(MSG_DEBUG, "WAN Metrics", pos, slen);
148 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short WAN "
164 wpa_hexdump_ascii(MSG_DEBUG, "conn capability", pos, slen);
174 wpa_hexdump_ascii(MSG_DEBUG, "Operating Class", pos, slen);
182 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype)
    [all...]
ibss_rsn.c 61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
77 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
105 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
126 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
127 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
136 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
167 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
173 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__)
    [all...]
wnm_sta.c 25 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
36 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
56 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request "
71 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element",
96 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element",
101 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
131 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
156 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
162 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE");
181 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total)
    [all...]
ctrl_iface_named_pipe.c 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p "
270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d",
275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst);
294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque",
193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid
    [all...]
eap_server_tnc.c 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request");
254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d",
352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag")
    [all...]
eap_server_peap.c 95 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
111 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV");
114 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory "
175 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
238 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
249 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
291 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data",
335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk));
347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d",
88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key "
94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on "
98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success "
102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after "
108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding");
111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding");
114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding");
120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled");
123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled")
    [all...]
eap_sim.c 75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
152 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
165 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM "
177 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage "
180 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage "
198 wpa_printf(MSG_DEBUG, "EAP-SIM: "
203 wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND",
205 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES",
207 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc"
    [all...]
  /external/wpa_supplicant_8/src/common/
sae.c 159 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR
183 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN);
191 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value",
204 wpa_printf(MSG_DEBUG, "SAE: No solution found");
209 wpa_printf(MSG_DEBUG, "SAE: PWE found");
224 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN);
232 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value,
237 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p");
273 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE");
279 wpa_printf(MSG_DEBUG, "SAE: PWE <= 1")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_wps.c 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, "
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val);
75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, "
87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s",
108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, "
117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length "
137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, "
161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key)
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
  /external/wpa_supplicant_8/src/crypto/
milenage.c 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16);
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16);
287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16);
288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6);
293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6);
299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6);
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2)
    [all...]

Completed in 8382 milliseconds

12 3 4 5 6 7 8 910