HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 51 - 75 of 243) sorted by null

1 23 4 5 6 7 8 910

  /external/wpa_supplicant_8/src/tls/
pkcs5.c 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found "
122 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value "
127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x",
163 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8);
164 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8)
    [all...]
asn1.c 31 wpa_printf(MSG_DEBUG, "ASN.1: Identifier "
46 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length "
53 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field");
58 wpa_printf(MSG_DEBUG, "ASN.1: Length "
70 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow");
101 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value");
132 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d "
201 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
  /external/wpa_supplicant_8/wpa_supplicant/
wifi_display.c 41 wpa_printf(MSG_DEBUG, "WFD: Update WFD IE");
44 wpa_printf(MSG_DEBUG, "WFD: Wi-Fi Display disabled - do not "
128 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Beacon", ie);
132 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for (Re)Association Request",
137 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for GO Negotiation", ie);
141 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery "
151 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Request", ie);
158 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Response", ie);
168 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for P2P Invitation", ie);
172 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery
    [all...]
autoscan_periodic.c 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d",
74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
gas_query.c 133 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response");
145 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
170 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to "
184 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
198 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
211 wpa_printf(MSG_DEBUG, "GAS: Received initial response from "
243 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from "
252 wpa_printf(MSG_DEBUG, "GAS: Advertisement Protocol changed "
261 wpa_printf(MSG_DEBUG, "GAS: Invalid comeback response "
272 wpa_printf(MSG_DEBUG, "GAS: Unexpected frag_id in response
    [all...]
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
events.c 76 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association "
86 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled");
92 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed");
98 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily "
103 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the "
110 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
214 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
223 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
227 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
306 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to
    [all...]
bgscan_simple.c 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
251 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ikev2.c 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
137 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
155 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
160 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
191 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
198 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
218 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
230 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
eap_server_wsc.c 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P "
178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in
    [all...]
eap_server_sim.c 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ");
135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
175 wpa_printf(MSG_DEBUG, " AT_IV");
176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter)
    [all...]
eap_server_tls_common.c 125 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
167 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
185 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
196 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
201 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
215 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a "
241 wpa_printf(MSG_DEBUG, "SSL: No memory for message");
245 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first "
274 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to
    [all...]
eap_server_aka.c 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
340 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_pd.c 144 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
151 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
157 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
169 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unsupported "
183 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: PD "
193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
198 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
215 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
234 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/drivers/
ndis_events.c 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
207 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
256 wpa_printf(MSG_DEBUG, "Could not get "
267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event "
278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len);
290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival");
297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval")
    [all...]
driver_ndis_.c 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
  /external/wpa_supplicant_8/src/eap_peer/
eap_wsc.c 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid");
88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth");
98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth");
104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr");
116 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr");
131 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key");
226 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to parse new AP "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for "
239 wpa_printf(MSG_DEBUG, "EAP-WSC: wps_init failed")
    [all...]
eap_ikev2.c 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
274 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow")
    [all...]
eap_gpsk.c 68 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
140 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
146 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
151 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
166 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow");
170 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
194 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d",
210 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d",
227 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet")
    [all...]
  /hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 85 wpa_printf(MSG_DEBUG, "%s: %s ", __func__, cmd);
87 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")",
90 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
92 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
94 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
105 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
121 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
146 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
  /external/wpa_supplicant_8/src/utils/
ext_password_test.c 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
state_machine.h 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ap.c 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
  /external/wpa_supplicant_8/src/ap/
gas_serv.c 35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
309 wpa_hexdump(MSG_DEBUG,
317 wpa_hexdump(MSG_DEBUG,
368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
563 wpa_printf(MSG_DEBUG, "GAS: Timeout triggered, clearing dialog for
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
171 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
290 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
296 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
302 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
316 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len)
    [all...]

Completed in 1115 milliseconds

1 23 4 5 6 7 8 910