/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 60 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized"); 313 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " 325 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " 358 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 365 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN); 366 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); 372 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN); 373 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 381 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len) [all...] |
wnm_ap.c | 27 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 37 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 64 wpa_printf(MSG_DEBUG, "%s: station not found", __func__); 93 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 113 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d", 124 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d", 147 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response " 177 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame"); 211 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized", 217 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found") [all...] |
wmm.c | 113 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 119 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 125 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 174 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 177 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 179 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 181 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 184 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 189 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)"); 194 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d" [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_invitation.c | 169 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 178 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 184 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 202 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 217 wpa_printf(MSG_DEBUG, "P2P: Mandatory Invitation Flags " 225 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 239 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Invitation " 243 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 254 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_wsc_common.c | 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_event.c | 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e); 91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for " 122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p", 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s " 192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p " 200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p " 218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p " 222 wpa_printf(MSG_DEBUG, [all...] |
wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 92 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 115 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 129 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); 146 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", 162 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 198 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 209 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1" [all...] |
wps_er.c | 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 202 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 208 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 231 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 236 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 243 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 332 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 339 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 364 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 375 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
wps_registrar.c | 201 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 205 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 213 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 222 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 229 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 238 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 383 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 385 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", 406 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); 409 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID") [all...] |
/external/wpa_supplicant_8/src/tls/ |
bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
tlsv1_server_write.c | 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); 107 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 117 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 143 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 166 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 173 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 193 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 218 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 228 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 260 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed") [all...] |
tlsv1_client_write.c | 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 240 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", 247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
hs20_supplicant.c | 89 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 98 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 101 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 133 wpa_hexdump_ascii(MSG_DEBUG, "HS Capability List", pos, slen); 138 wpa_hexdump_ascii(MSG_DEBUG, "oper friendly name", pos, slen); 146 wpa_hexdump(MSG_DEBUG, "WAN Metrics", pos, slen); 148 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short WAN " 164 wpa_hexdump_ascii(MSG_DEBUG, "conn capability", pos, slen); 174 wpa_hexdump_ascii(MSG_DEBUG, "Operating Class", pos, slen); 182 wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype) [all...] |
ibss_rsn.c | 61 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 77 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 105 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 123 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 126 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 127 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 136 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 158 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 167 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 173 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__) [all...] |
wnm_sta.c | 25 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 36 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 56 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " 71 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element", 96 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element", 101 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 131 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " 156 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); 162 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); 181 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total) [all...] |
ctrl_iface_named_pipe.c | 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p " 270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d", 275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst); 294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid [all...] |
eap_server_tnc.c | 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request"); 254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d", 352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag") [all...] |
eap_server_peap.c | 95 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s", 111 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV"); 114 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory " 175 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d", 238 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready"); 249 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data", 291 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data", 335 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk)); 347 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", 88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " 98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " 102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " 108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); 111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); 114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); 120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); 123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled") [all...] |
eap_sim.c | 75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 152 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 165 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM " 177 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage " 180 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage " 198 wpa_printf(MSG_DEBUG, "EAP-SIM: " 203 wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND", 205 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES", 207 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc" [all...] |
/external/wpa_supplicant_8/src/common/ |
sae.c | 159 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR 183 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); 191 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", 204 wpa_printf(MSG_DEBUG, "SAE: No solution found"); 209 wpa_printf(MSG_DEBUG, "SAE: PWE found"); 224 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); 232 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, 237 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p"); 273 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE"); 279 wpa_printf(MSG_DEBUG, "SAE: PWE <= 1") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_wps.c | 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, " 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val); 75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, " 87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s", 108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, " 161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16); 287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16); 288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6); 293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6); 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2) [all...] |