/external/wpa_supplicant_8/src/wps/ |
http_client.c | 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c); 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from " 65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from " 89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu " 98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s", 106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes " 115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d", 155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s", 163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s" [all...] |
wps_common.c | 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); 96 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); 102 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); 113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 122 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", 124 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_unix.c | 90 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s", addr_txt); 111 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s", 129 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 141 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level to %d for %s", 211 wpa_dbg(wpa_s, MSG_DEBUG, 225 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to reinitialize ctrl_iface socket"); 229 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to send response to ATTACH - detaching"); 360 wpa_printf(MSG_DEBUG, "Using existing control " 390 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" 402 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d" [all...] |
autoscan_exponential.c | 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d " 81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
|
wpa_priv.c | 47 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance"); 55 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet " 66 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper"); 70 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface " 187 wpa_printf(MSG_DEBUG, "Invalid association request"); 193 wpa_printf(MSG_DEBUG, "Association request overflow"); 217 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res); 278 wpa_printf(MSG_DEBUG, "Invalid set_key request"); 292 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res); 351 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu" [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 229 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey", 272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR [all...] |
pmksa_cache.c | 62 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for " 158 wpa_printf(MSG_DEBUG, "WPA: reusing previous " 177 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for " 206 wpa_printf(MSG_DEBUG, "RSN: removed the oldest idle " 232 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR 260 wpa_printf(MSG_DEBUG, "RSN: Flush PMKSA cache entry " 366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa)); 373 wpa_printf(MSG_DEBUG, "RSN: added " 424 wpa_printf(MSG_DEBUG, "RSN: PMKSA cache search - network_ctx=%p " 427 wpa_hexdump(MSG_DEBUG, "RSN: Search for PMKID" [all...] |
/external/wpa_supplicant_8/src/ap/ |
wps_hostapd.c | 104 wpa_printf(MSG_DEBUG, 108 wpa_printf(MSG_DEBUG, 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to " 180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid); 282 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data"); 301 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload"); 324 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration"); 411 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute" [all...] |
gas_serv.c | 42 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for " 46 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR 96 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR, 106 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for " 285 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx], 313 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query", 321 wpa_hexdump(MSG_DEBUG, 329 wpa_hexdump(MSG_DEBUG, 380 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d", 636 wpa_hexdump_ascii(MSG_DEBUG, "HS 2.0: Requested Icon Filename" [all...] |
acs.c | 345 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu", 470 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)", 475 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg", 534 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for selected bandwidth %d MHz", 553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80", 581 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not enough bandwidth", 616 wpa_printf(MSG_DEBUG, "ACS: * channel %d: total interference = %Lg", 631 wpa_printf(MSG_DEBUG, "ACS: Ideal channel is %d (%d MHz) with total interference factor of %Lg", 644 wpa_printf(MSG_DEBUG, "ACS: Adjusting VHT center frequency") [all...] |
sta_info.c | 111 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 142 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 230 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 301 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 346 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 359 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 366 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 381 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR 390 wpa_printf(MSG_DEBUG, "%s: register ap_handle_timer timeout [all...] |
/external/wpa_supplicant_8/src/utils/ |
browser.c | 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__); 57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, 67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s", 80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime); 120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title, 144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);
|
/external/wpa_supplicant_8/src/drivers/ |
linux_ioctl.c | 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s", 139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s", 151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s", 173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge " 195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from "
|
driver_macsec_qca.c | 340 wpa_printf(MSG_DEBUG, 345 wpa_printf(MSG_DEBUG, 355 wpa_printf(MSG_DEBUG, 364 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__); 370 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active", 391 wpa_printf(MSG_DEBUG, 398 wpa_printf(MSG_DEBUG, 406 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode", 414 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down", 433 wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d" [all...] |
driver_test.c | 176 wpa_printf(MSG_DEBUG, "%s: no destination client entry", 216 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d " 267 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s", 280 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found", 313 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu" 332 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz", 346 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__); 377 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s", 417 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s", 484 wpa_printf(MSG_DEBUG, "test_driver: SCAN") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 218 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 223 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 431 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: " 439 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s", 483 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - " 536 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 543 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 571 wpa_printf(MSG_DEBUG, "Failed to read client cert/key [all...] |
tls_schannel.c | 227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__); 294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes(" 330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process", 397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE"); 400 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED"); 404 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake " 427 wpa_printf(MSG_DEBUG, 431 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL"); 434 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR"); 439 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 171 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0"); 176 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0"); 181 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0"); 186 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0"); 193 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick"); 204 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick"); 260 wpa_printf(MSG_DEBUG, 376 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for " 562 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 613 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff") [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 206 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d", 209 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client"); 215 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet " 225 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet " 237 wpa_printf(MSG_DEBUG, "DAS: Unacceptable " 245 wpa_printf(MSG_DEBUG, "DAS: Missing Event-Timestamp in packet " 272 wpa_printf(MSG_DEBUG, "DAS: Unexpected RADIUS code %u in " 278 wpa_printf(MSG_DEBUG, "DAS: Reply to %s:%d", abuf, from_port); 283 wpa_printf(MSG_DEBUG, "DAS: Failed to add " 290 wpa_printf(MSG_DEBUG, "DAS: Failed to add [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 98 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 415 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 422 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 474 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 493 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 500 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 550 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES"); 558 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed [all...] |
eap_server_eke.c | 61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s", 70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code); 166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x", 187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity"); 245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit"); 311 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Confirm"); 325 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S", 355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); 375 wpa_printf(MSG_DEBUG, "EAP-EKE: Unknown state %d in buildReq", 398 wpa_printf(MSG_DEBUG, "EAP-EKE: Received frame: EKE-Exch=%d", eke_exch) [all...] |
eap_server_mschapv2.c | 231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in " 257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - " 265 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or " 272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure " 307 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response", 323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured " 365 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 368 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 400 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response") [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 190 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: DH private value", 204 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DH public value", 346 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)", 355 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: ID_S | ID_P", 363 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)", 391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)", 398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)", 427 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Decrypted peer DH pubkey", 445 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: SharedSecret", 497 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); 255 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P"); 260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P") [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 68 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data"); 199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 321 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 345 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing " 351 wpa_printf(MSG_DEBUG, "TLSv1: Need more data") [all...] |