HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 101 - 125 of 256) sorted by null

1 2 3 45 6 7 8 91011

  /external/wpa_supplicant_8/src/wps/
http_client.c 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c);
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from "
65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from "
89 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu "
98 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s",
106 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes "
115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d",
155 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s",
163 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s"
    [all...]
wps_common.c 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available");
77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key");
96 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared);
102 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey));
113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
122 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey",
124 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey"
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_unix.c 90 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s", addr_txt);
111 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s",
129 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
141 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level to %d for %s",
211 wpa_dbg(wpa_s, MSG_DEBUG,
225 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to reinitialize ctrl_iface socket");
229 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to send response to ATTACH - detaching");
360 wpa_printf(MSG_DEBUG, "Using existing control "
390 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
402 wpa_printf(MSG_DEBUG, "ctrl_interface_group=%d"
    [all...]
autoscan_exponential.c 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d "
81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
wpa_priv.c 47 wpa_printf(MSG_DEBUG, "Cleaning up forgotten driver instance");
55 wpa_printf(MSG_DEBUG, "Cleaning up forgotten l2_packet "
66 wpa_printf(MSG_DEBUG, "Failed to initialize driver wrapper");
70 wpa_printf(MSG_DEBUG, "Driver wrapper '%s' initialized for interface "
187 wpa_printf(MSG_DEBUG, "Invalid association request");
193 wpa_printf(MSG_DEBUG, "Association request overflow");
217 wpa_printf(MSG_DEBUG, "drv->associate: res=%d", res);
278 wpa_printf(MSG_DEBUG, "Invalid set_key request");
292 wpa_printf(MSG_DEBUG, "drv->set_key: res=%d", res);
351 wpa_printf(MSG_DEBUG, "Invalid l2_register length %lu"
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 107 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
111 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
166 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
185 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
206 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
229 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey",
272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
372 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR
    [all...]
pmksa_cache.c 62 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
158 wpa_printf(MSG_DEBUG, "WPA: reusing previous "
177 wpa_printf(MSG_DEBUG, "RSN: Replace PMKSA entry for "
206 wpa_printf(MSG_DEBUG, "RSN: removed the oldest idle "
232 wpa_printf(MSG_DEBUG, "RSN: Added PMKSA cache entry for " MACSTR
260 wpa_printf(MSG_DEBUG, "RSN: Flush PMKSA cache entry "
366 wpa_printf(MSG_DEBUG, "RSN: Consider " MACSTR " for OKC", MAC2STR(aa));
373 wpa_printf(MSG_DEBUG, "RSN: added "
424 wpa_printf(MSG_DEBUG, "RSN: PMKSA cache search - network_ctx=%p "
427 wpa_hexdump(MSG_DEBUG, "RSN: Search for PMKID"
    [all...]
  /external/wpa_supplicant_8/src/ap/
wps_hostapd.c 104 wpa_printf(MSG_DEBUG,
108 wpa_printf(MSG_DEBUG,
113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to "
180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid);
282 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data");
301 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload");
324 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration");
411 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute"
    [all...]
gas_serv.c 42 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
46 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
96 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
106 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
285 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
313 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
321 wpa_hexdump(MSG_DEBUG,
329 wpa_hexdump(MSG_DEBUG,
380 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
636 wpa_hexdump_ascii(MSG_DEBUG, "HS 2.0: Requested Icon Filename"
    [all...]
acs.c 345 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu",
470 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)",
475 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg",
534 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for selected bandwidth %d MHz",
553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
581 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not enough bandwidth",
616 wpa_printf(MSG_DEBUG, "ACS: * channel %d: total interference = %Lg",
631 wpa_printf(MSG_DEBUG, "ACS: Ideal channel is %d (%d MHz) with total interference factor of %Lg",
644 wpa_printf(MSG_DEBUG, "ACS: Adjusting VHT center frequency")
    [all...]
sta_info.c 111 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
142 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
230 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
301 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
346 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
359 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
366 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
381 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR
390 wpa_printf(MSG_DEBUG, "%s: register ap_handle_timer timeout
    [all...]
  /external/wpa_supplicant_8/src/utils/
browser.c 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__);
57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__,
67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s",
80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime);
120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title,
144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);
  /external/wpa_supplicant_8/src/drivers/
linux_ioctl.c 113 wpa_printf(MSG_DEBUG, "Could not set interface %s hwaddr: %s",
139 wpa_printf(MSG_DEBUG, "Could not add bridge %s: %s",
151 wpa_printf(MSG_DEBUG, "Could not remove bridge %s: %s",
173 wpa_printf(MSG_DEBUG, "Could not add interface %s into bridge "
195 wpa_printf(MSG_DEBUG, "Could not remove interface %s from "
driver_macsec_qca.c 340 wpa_printf(MSG_DEBUG,
345 wpa_printf(MSG_DEBUG,
355 wpa_printf(MSG_DEBUG,
364 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__);
370 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active",
391 wpa_printf(MSG_DEBUG,
398 wpa_printf(MSG_DEBUG,
406 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
414 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
433 wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d"
    [all...]
driver_test.c 176 wpa_printf(MSG_DEBUG, "%s: no destination client entry",
216 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d "
267 wpa_printf(MSG_DEBUG, "%s: Send ether frame to %s",
280 wpa_printf(MSG_DEBUG, "%s: Destination " MACSTR " not found",
313 wpa_printf(MSG_DEBUG, "%s: invalid parameters (sock=%d len=%lu"
332 wpa_printf(MSG_DEBUG, "test_driver(%s): MLME TX on freq %d MHz",
346 wpa_printf(MSG_DEBUG, "%s: test_dir == NULL", __func__);
377 wpa_printf(MSG_DEBUG, "%s: Send management frame to %s",
417 wpa_printf(MSG_DEBUG, "%s: Send broadcast MLME to %s",
484 wpa_printf(MSG_DEBUG, "test_driver: SCAN")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 122 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
160 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
218 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
223 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
431 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: "
439 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s",
483 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - "
536 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
543 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
571 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]
tls_schannel.c 227 wpa_printf(MSG_DEBUG, "%s: Generating ClientHello", __func__);
294 wpa_printf(MSG_DEBUG, "%s: QueryContextAttributes("
330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
400 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
404 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
427 wpa_printf(MSG_DEBUG,
431 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
434 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
439 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 171 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0");
176 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0");
181 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0");
186 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0");
193 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick");
204 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick");
260 wpa_printf(MSG_DEBUG,
376 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for "
562 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both "
613 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff")
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_das.c 206 wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d",
209 wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client");
215 wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet "
225 wpa_printf(MSG_DEBUG, "DAS: Invalid authenticator in packet "
237 wpa_printf(MSG_DEBUG, "DAS: Unacceptable "
245 wpa_printf(MSG_DEBUG, "DAS: Missing Event-Timestamp in packet "
272 wpa_printf(MSG_DEBUG, "DAS: Unexpected RADIUS code %u in "
278 wpa_printf(MSG_DEBUG, "DAS: Reply to %s:%d", abuf, from_port);
283 wpa_printf(MSG_DEBUG, "DAS: Failed to add "
290 wpa_printf(MSG_DEBUG, "DAS: Failed to add
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.c 98 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
124 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
415 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
422 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
467 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
474 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
493 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
500 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
550 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Too long RES");
558 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed
    [all...]
eap_server_eke.c 61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code);
166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x",
187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity");
245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit");
311 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Confirm");
325 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S",
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
375 wpa_printf(MSG_DEBUG, "EAP-EKE: Unknown state %d in buildReq",
398 wpa_printf(MSG_DEBUG, "EAP-EKE: Received frame: EKE-Exch=%d", eke_exch)
    [all...]
eap_server_mschapv2.c 231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in "
257 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - "
265 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or "
272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure "
307 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response",
323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured "
365 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
368 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
400 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response")
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 190 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: DH private value",
204 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DH public value",
346 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: temp = prf(0+, password)",
355 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: ID_S | ID_P",
363 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)",
391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)",
398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)",
427 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Decrypted peer DH pubkey",
445 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: SharedSecret",
497 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Ke", sess->ke, ke_len)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
206 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
245 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
255 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P");
260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 68 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
85 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
187 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data");
199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
321 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
345 wpa_printf(MSG_DEBUG, "TLSv1: Record layer processing "
351 wpa_printf(MSG_DEBUG, "TLSv1: Need more data")
    [all...]

Completed in 443 milliseconds

1 2 3 45 6 7 8 91011