HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 1 - 25 of 256) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/wpa_supplicant_8/src/ap/
p2p_hostapd.c 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
wpa_auth_ft.c 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
67 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized");
319 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID",
324 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH "
336 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for "
378 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
385 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN);
386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN);
392 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN);
393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_attr_parse.c 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
155 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type
    [all...]
wps_attr_process.c 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len)
    [all...]
wps_attr_build.c 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey)
    [all...]
wps_enrollee.c 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1");
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2")
    [all...]
wps_dev_attr.c 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer");
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name");
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number");
91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number");
114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type");
128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type");
145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type",
161 wpa_printf(MSG_DEBUG, "WPS: * Device Name");
197 wpa_printf(MSG_DEBUG, "WPS: * OS Version");
208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key"
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.c 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_ikev2_common.c 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_fast_common.c 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short
    [all...]
eap_sim_common.c 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
eap_wsc_common.c 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
offchannel.c 40 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
59 wpa_printf(MSG_DEBUG,
81 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX "
93 wpa_printf(MSG_DEBUG, "Off-channel: Schedule "
98 wpa_printf(MSG_DEBUG, "Off-channel: Failed to "
111 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to "
122 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the "
153 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
159 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - "
168 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status -
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
271 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
409 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs8.c 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey")
    [all...]
tlsv1_record.c 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) -
    [all...]
tlsv1_client_read.c 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback
    [all...]
x509v3.c 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
333 wpa_printf(MSG_DEBUG, "X509: Expected SET "
346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
363 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 47 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
55 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
63 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
125 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
144 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
145 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
225 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name",
237 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: "
244 wpa_hexdump(MSG_DEBUG,
251 wpa_hexdump(MSG_DEBUG,
258 wpa_hexdump(MSG_DEBUG,
    [all...]
eap_server_gpsk.c 56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
222 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
250 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
256 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
272 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
278 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer"
    [all...]
eap_server_peap.c 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
147 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
210 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
219 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
261 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data",
305 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
308 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk));
317 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40);
324 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IMCK (IPMKj)",
331 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK (S-IPMKj)", data->ipmk, 40)
    [all...]

Completed in 167 milliseconds

1 2 3 4 5 6 7 8 91011