/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 89 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting " 105 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv); 131 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results", 134 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu", 196 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d", 229 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d " 288 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply"); 300 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d", 302 wpa_printf(MSG_DEBUG, "%s - TODO", __func__); 447 wpa_printf(MSG_DEBUG, "privsep_driver: received %u bytes", res) [all...] |
netlink.c | 74 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of " 216 wpa_printf(MSG_DEBUG, "netlink: Operstate: ifindex=%d linkmode=%d (%s), operstate=%d (%s)", 222 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
|
driver_bsd.c | 233 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx); 236 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__, 299 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 411 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)", 434 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 440 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 452 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", 460 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa); 471 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (len %lu)", __func__ [all...] |
driver_wired.c | 146 wpa_printf(MSG_DEBUG, "Unknown ethertype 0x%04x in data frame", 231 wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d", 568 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 572 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with " 581 wpa_printf(MSG_DEBUG, "%s: Interface is already configured " 590 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", 597 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active", 618 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 624 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast " 632 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 88 wpa_printf(MSG_DEBUG, "EAP: Status notification: %s (param=%s)", 112 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method " 158 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for " 261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 289 wpa_printf(MSG_DEBUG, "EAP: Using previous method data" 301 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: " 309 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: " 335 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase " 401 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s " 426 wpa_hexdump(MSG_DEBUG, "EAP: Session-Id" [all...] |
eap_tls.c | 54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 154 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 199 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key", 201 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK", 213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived Session-Id", 239 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 81 wpa_hexdump(MSG_DEBUG, "bssid_filter", filter, count * ETH_ALEN); 115 wpa_printf(MSG_DEBUG, "Invalid disallow_aps " 154 wpa_printf(MSG_DEBUG, "Invalid disallow_aps " 159 wpa_hexdump_ascii(MSG_DEBUG, "disallow_aps SSID", 165 wpa_printf(MSG_DEBUG, "Unexpected disallow_aps value " 177 wpa_hexdump(MSG_DEBUG, "disallow_aps_bssid", bssid, count * ETH_ALEN); 182 wpa_printf(MSG_DEBUG, "disallow_aps_ssid_count %d", (int) ssid_count); 198 wpa_printf(MSG_DEBUG, "Disconnect and try to find another network " 227 wpa_printf(MSG_DEBUG, "CTRL: Set blob '%s'", name); 239 wpa_printf(MSG_DEBUG, "CTRL: Invalid blob hex data") [all...] |
wpas_glue.c | 42 wpa_printf(MSG_DEBUG, "Failed to update config after " 137 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X " 161 wpa_printf(MSG_DEBUG, 164 wpa_printf(MSG_DEBUG, 171 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an " 176 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR 181 wpa_printf(MSG_DEBUG, "Using the source address of the" 196 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst)); 260 wpa_printf(MSG_DEBUG, "EAPOL authentication completed - result=%s", 287 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way [all...] |
wpas_kay.c | 257 wpa_printf(MSG_DEBUG, 264 wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough"); 290 wpa_printf(MSG_DEBUG, 317 wpa_printf(MSG_DEBUG, 349 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); 360 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr)); 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 178 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, 295 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate " 302 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: not in suitable " 313 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA " 323 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate " 335 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: no more pending PMKSA " 361 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without " 402 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: added PMKSA cache [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay.c | 120 wpa_printf(MSG_DEBUG, "*** MKA Basic Parameter set ***"); 121 wpa_printf(MSG_DEBUG, "\tVersion.......: %d", body->version); 122 wpa_printf(MSG_DEBUG, "\tPriority......: %d", body->priority); 123 wpa_printf(MSG_DEBUG, "\tKeySvr........: %d", body->key_server); 124 wpa_printf(MSG_DEBUG, "\tMACSecDesired.: %d", body->macsec_desired); 125 wpa_printf(MSG_DEBUG, "\tMACSecCapable.: %d", body->macsec_capbility); 126 wpa_printf(MSG_DEBUG, "\tBody Length...: %d", (int) body_len); 127 wpa_printf(MSG_DEBUG, "\tSCI MAC.......: " MACSTR, 129 wpa_printf(MSG_DEBUG, "\tSCI Port .....: %d", 131 wpa_hexdump(MSG_DEBUG, "\tMember Id.....:" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 54 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 " 62 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 89 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err); 101 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s); 184 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 191 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d", 198 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) " 208 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d", 263 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: " 271 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d" [all...] |
random.c | 251 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from " 288 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be " 323 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random", 352 wpa_printf(MSG_DEBUG, "random: Invalid entropy file %s", 362 wpa_printf(MSG_DEBUG, "random: Added entropy from %s " 399 wpa_printf(MSG_DEBUG, "random: Updated entropy file %s " 428 wpa_printf(MSG_DEBUG, "random: Trying to read entropy from "
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR 333 wpa_printf(MSG_DEBUG, "SAE: No password available"); 341 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 346 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); 426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key", 471 wpa_printf(MSG_DEBUG, "SAE: Drop commit message with " 479 wpa_printf(MSG_DEBUG, "SAE: Request anti-" 587 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d " 643 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR 725 wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA [all...] |
ap_list.c | 160 wpa_printf(MSG_DEBUG, "Removing the least recently used AP " 224 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR 238 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR 286 wpa_printf(MSG_DEBUG, "OLBC not detected anymore"); 292 wpa_printf(MSG_DEBUG, "OLBC HT not detected anymore");
|
dfs.c | 111 wpa_printf(MSG_DEBUG, "Unknown width for %d channels", n_chans); 184 wpa_printf(MSG_DEBUG, "DFS new chan checking %d channels", n_chans); 202 wpa_printf(MSG_DEBUG, "Selected ch. #%d", chan->chan); 206 wpa_printf(MSG_DEBUG, "Adding channel: %d", chan->chan); 248 wpa_printf(MSG_DEBUG, "DFS adjusting VHT center frequency: %d, %d", 324 wpa_printf(MSG_DEBUG, 332 wpa_printf(MSG_DEBUG, "Available channel: %d", 426 wpa_printf(MSG_DEBUG, "DFS: Selecting random channel"); 472 wpa_printf(MSG_DEBUG, "set_dfs_state 0x%X for %d MHz", state, freq); 532 wpa_printf(MSG_DEBUG, "DFS freq: %dMHz, n_chans: %d", frequency [all...] |
hostapd.c | 121 wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface); 206 wpa_printf(MSG_DEBUG, "Failed to clear default " 217 wpa_printf(MSG_DEBUG, "Failed to clear " 262 wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface); 332 wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s))", __func__, hapd, 343 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 363 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface); 372 wpa_printf(MSG_DEBUG, "%s: free iface=%p", __func__, iface); 431 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, 440 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "Deauthenticate all stations") [all...] |
ieee802_11_auth.c | 173 wpa_printf(MSG_DEBUG, "Could not add User-Name"); 181 wpa_printf(MSG_DEBUG, "Could not add User-Password"); 193 wpa_printf(MSG_DEBUG, "Could not add Calling-Station-Id"); 200 wpa_printf(MSG_DEBUG, "Could not add Connect-Info"); 311 wpa_printf(MSG_DEBUG, "Failed to send Access-Request " 351 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR 381 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR 497 wpa_printf(MSG_DEBUG, "Found matching Access-Request for RADIUS " 508 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL " 516 wpa_printf(MSG_DEBUG, "Failed to add ACL cache entry") [all...] |
ieee802_1x.c | 102 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR 183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR 201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR, 229 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key", 548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 599 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute"); 715 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d", 718 wpa_printf(MSG_DEBUG, " Invalid EAP length"); 721 wpa_printf(MSG_DEBUG, " Too short frame to contain this EAP " 725 wpa_printf(MSG_DEBUG, " Ignoring %lu extra bytes after EAP [all...] |
vlan_util.c | 40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, " 135 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(if_name=%s)", if_name);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.c | 41 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d " 47 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER"); 90 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 105 wpa_hexdump(MSG_DEBUG, 197 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE " 210 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the " 230 wpa_hexdump(MSG_DEBUG,
|
tlsv1_cred.c | 69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 248 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key " 372 wpa_printf(MSG_DEBUG, "DH: DH parameters did not start with a " 385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for p; " 407 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for g; " 439 wpa_printf(MSG_DEBUG, "TLSv1: No PEM dhparams tag found - " 444 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format dhparams into DER "
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 78 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)"); 125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)"); 175 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq", 201 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x " 211 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - " 218 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - " 225 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x", 230 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, " 296 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2"); 353 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID" [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 310 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP"); 324 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); " 381 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop"); 419 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto " 428 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done"); 466 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply start (%d " 628 wpa_printf(MSG_DEBUG, "WPS UPnP: Unexpected " 648 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid M-SEARCH: %d %d %d " 653 wpa_printf(MSG_DEBUG, "WPS UPnP: Ignored M-SEARCH (no ST " 841 wpa_printf(MSG_DEBUG, "add_ssdp_network: No [all...] |
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds", 84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__); 88 wpa_printf(MSG_DEBUG, "%s: Start", __func__); 96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid); 138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd); 238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid); 288 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len); 306 wpa_printf(MSG_DEBUG,"Reload command"); 367 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));
|