HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 1 - 25 of 243) sorted by null

1 2 3 4 5 6 7 8 910

  /external/wpa_supplicant_8/src/wps/
wps_attr_parse.c 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
98 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
114 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
120 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
139 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type "
155 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce
    [all...]
wps_attr_process.c 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len)
    [all...]
wps_enrollee.c 21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address");
36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
54 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
87 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1")
    [all...]
wps_attr_build.c 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
43 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
45 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG,
59 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
65 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
70 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
71 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey)
    [all...]
  /external/wpa_supplicant_8/src/ap/
p2p_hostapd.c 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key"
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.c 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_fast_common.c 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short
    [all...]
eap_ikev2_common.c 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
72 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
89 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
96 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
115 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
117 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_sim_common.c 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
271 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
409 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel
    [all...]
p2p_go_neg.c 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
79 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d "
197 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
214 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
234 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
257 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating "
357 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick own channel "
369 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best overall
    [all...]
p2p_dev_disc.c 45 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
59 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
77 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
87 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
100 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
134 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
150 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
159 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
173 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
181 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
p2p_sd.c 160 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
238 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
249 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
264 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
309 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
318 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
325 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
345 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
354 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs8.c 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey")
    [all...]
tlsv1_server_read.c 41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the "
201 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello "
204 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello
    [all...]
tlsv1_record.c 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) -
    [all...]
x509v3.c 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
333 wpa_printf(MSG_DEBUG, "X509: Expected SET "
346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
363 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
tlsv1_client_read.c 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
offchannel.c 39 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
58 wpa_printf(MSG_DEBUG, "Off-channel: Send Action callback "
79 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX "
91 wpa_printf(MSG_DEBUG, "Off-channel: Schedule "
96 wpa_printf(MSG_DEBUG, "Off-channel: Failed to "
109 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to "
120 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the "
151 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
157 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
165 wpa_printf(MSG_DEBUG, "Off-channel: TX status result=%d cb=%p"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 51 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
59 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
67 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
78 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
129 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
145 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
148 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
157 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
225 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name",
237 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: "
244 wpa_hexdump(MSG_DEBUG,
251 wpa_hexdump(MSG_DEBUG,
258 wpa_hexdump(MSG_DEBUG,
    [all...]
eap_server_gpsk.c 58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
116 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
158 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
209 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
230 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
272 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
280 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
286 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer"
    [all...]

Completed in 2293 milliseconds

1 2 3 4 5 6 7 8 910