/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", 111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " 122 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " 127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", 163 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8); 164 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8) [all...] |
asn1.c | 31 wpa_printf(MSG_DEBUG, "ASN.1: Identifier " 46 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length " 53 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field"); 58 wpa_printf(MSG_DEBUG, "ASN.1: Length " 70 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow"); 101 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value"); 132 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d " 201 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wifi_display.c | 41 wpa_printf(MSG_DEBUG, "WFD: Update WFD IE"); 44 wpa_printf(MSG_DEBUG, "WFD: Wi-Fi Display disabled - do not " 128 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Beacon", ie); 132 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for (Re)Association Request", 137 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for GO Negotiation", ie); 141 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery " 151 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Request", ie); 158 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Response", ie); 168 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for P2P Invitation", ie); 172 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery [all...] |
autoscan_periodic.c | 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d", 74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
|
gas_query.c | 133 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response"); 145 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 170 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to " 184 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 198 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 211 wpa_printf(MSG_DEBUG, "GAS: Received initial response from " 243 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from " 252 wpa_printf(MSG_DEBUG, "GAS: Advertisement Protocol changed " 261 wpa_printf(MSG_DEBUG, "GAS: Invalid comeback response " 272 wpa_printf(MSG_DEBUG, "GAS: Unexpected frag_id in response [all...] |
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
events.c | 76 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association " 86 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled"); 92 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed"); 98 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily " 103 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the " 110 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 214 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 223 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 227 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 306 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to [all...] |
bgscan_simple.c | 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed " 225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short " 251 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ikev2.c | 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 137 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 155 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 160 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 191 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 198 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 218 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 230 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
eap_server_wsc.c | 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in [all...] |
eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 175 wpa_printf(MSG_DEBUG, " AT_IV"); 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); 180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter) [all...] |
eap_server_tls_common.c | 125 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 167 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 185 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 196 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 201 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 215 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " 241 wpa_printf(MSG_DEBUG, "SSL: No memory for message"); 245 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first " 274 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to [all...] |
eap_server_aka.c | 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " 274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 340 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 144 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 151 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 157 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 169 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unsupported " 183 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: PD " 193 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 198 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 215 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 234 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/drivers/ |
ndis_events.c | 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 256 wpa_printf(MSG_DEBUG, "Could not get " 267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " 278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len); 290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival"); 297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval") [all...] |
driver_ndis_.c | 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type); 59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow"); 96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid"); 88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth"); 98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth"); 104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr"); 116 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr"); 131 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key"); 226 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to parse new AP " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for " 239 wpa_printf(MSG_DEBUG, "EAP-WSC: wps_init failed") [all...] |
eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 274 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow") [all...] |
eap_gpsk.c | 68 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); 140 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); 146 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); 151 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", 166 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 170 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 194 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", 210 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d", 227 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet") [all...] |
/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 85 wpa_printf(MSG_DEBUG, "%s: %s ", __func__, cmd); 87 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")", 90 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 92 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf); 94 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf)); 105 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 121 wpa_printf(MSG_DEBUG, "%s: Entry", __func__); 146 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
|
/external/wpa_supplicant_8/src/utils/ |
ext_password_test.c | 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name); 68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value", 79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
|
state_machine.h | 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \ 68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \ 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ap.c | 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out"); 48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable " 65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
|
/external/wpa_supplicant_8/src/ap/ |
gas_serv.c | 35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for " 39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR 88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR, 98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for " 273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx], 301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query", 309 wpa_hexdump(MSG_DEBUG, 317 wpa_hexdump(MSG_DEBUG, 368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d", 563 wpa_printf(MSG_DEBUG, "GAS: Timeout triggered, clearing dialog for [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 171 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 290 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)", 296 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len); 302 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory " 316 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len) [all...] |