HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 151 - 175 of 256) sorted by null

1 2 3 4 5 67 8 91011

  /external/wpa_supplicant_8/src/drivers/
driver_privsep.c 89 wpa_printf(MSG_DEBUG, "PRIVSEP: Timeout while waiting "
105 wpa_printf(MSG_DEBUG, "%s: priv=%p", __func__, priv);
131 wpa_printf(MSG_DEBUG, "privsep: Received %lu bytes of scan results",
134 wpa_printf(MSG_DEBUG, "privsep: Invalid scan result len %lu",
196 wpa_printf(MSG_DEBUG, "%s: priv=%p alg=%d key_idx=%d set_tx=%d",
229 wpa_printf(MSG_DEBUG, "%s: priv=%p freq=%d pairwise_suite=%d "
288 wpa_printf(MSG_DEBUG, "privsep: Invalid get SSID reply");
300 wpa_printf(MSG_DEBUG, "%s addr=" MACSTR " reason_code=%d",
302 wpa_printf(MSG_DEBUG, "%s - TODO", __func__);
447 wpa_printf(MSG_DEBUG, "privsep_driver: received %u bytes", res)
    [all...]
netlink.c 74 wpa_printf(MSG_DEBUG, "netlink: %d extra bytes in the end of "
216 wpa_printf(MSG_DEBUG, "netlink: Operstate: ifindex=%d linkmode=%d (%s), operstate=%d (%s)",
222 wpa_printf(MSG_DEBUG, "netlink: Sending operstate IFLA "
driver_bsd.c 233 wpa_printf(MSG_DEBUG, "%s: key_idx=%d", __func__, key_idx);
236 wpa_printf(MSG_DEBUG, "%s: addr=" MACSTR, __func__,
299 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d "
411 wpa_printf(MSG_DEBUG, "%s: group key cipher=%s (%u)",
434 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
440 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
452 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x",
460 wpa_printf(MSG_DEBUG, "%s: enable WPA= 0x%x", __func__, params->wpa);
471 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (len %lu)", __func__
    [all...]
driver_wired.c 146 wpa_printf(MSG_DEBUG, "Unknown ethertype 0x%04x in data frame",
231 wpa_printf(MSG_DEBUG, "Opening raw packet socket for ifindex %d",
568 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
572 wpa_printf(MSG_DEBUG, "%s: Added multicast membership with "
581 wpa_printf(MSG_DEBUG, "%s: Interface is already configured "
590 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode",
597 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active",
618 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
624 wpa_printf(MSG_DEBUG, "%s: Failed to remove PAE multicast "
632 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 88 wpa_printf(MSG_DEBUG, "EAP: Status notification: %s (param=%s)",
112 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
158 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
289 wpa_printf(MSG_DEBUG, "EAP: Using previous method data"
301 wpa_printf(MSG_DEBUG, "EAP: Could not find selected method: "
309 wpa_printf(MSG_DEBUG, "EAP: Initialize selected EAP method: "
335 wpa_printf(MSG_DEBUG, "EAP: Pending PIN/passphrase "
401 wpa_printf(MSG_DEBUG, "EAP: method process -> ignore=%s "
426 wpa_hexdump(MSG_DEBUG, "EAP: Session-Id"
    [all...]
eap_tls.c 54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
154 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
199 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key",
201 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived EMSK",
213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived Session-Id",
239 wpa_printf(MSG_DEBUG, "EAP-TLS: Start");
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface.c 81 wpa_hexdump(MSG_DEBUG, "bssid_filter", filter, count * ETH_ALEN);
115 wpa_printf(MSG_DEBUG, "Invalid disallow_aps "
154 wpa_printf(MSG_DEBUG, "Invalid disallow_aps "
159 wpa_hexdump_ascii(MSG_DEBUG, "disallow_aps SSID",
165 wpa_printf(MSG_DEBUG, "Unexpected disallow_aps value "
177 wpa_hexdump(MSG_DEBUG, "disallow_aps_bssid", bssid, count * ETH_ALEN);
182 wpa_printf(MSG_DEBUG, "disallow_aps_ssid_count %d", (int) ssid_count);
198 wpa_printf(MSG_DEBUG, "Disconnect and try to find another network "
227 wpa_printf(MSG_DEBUG, "CTRL: Set blob '%s'", name);
239 wpa_printf(MSG_DEBUG, "CTRL: Invalid blob hex data")
    [all...]
wpas_glue.c 42 wpa_printf(MSG_DEBUG, "Failed to update config after "
137 wpa_printf(MSG_DEBUG, "WPA: drop TX EAPOL in non-IEEE 802.1X "
161 wpa_printf(MSG_DEBUG,
164 wpa_printf(MSG_DEBUG,
171 wpa_printf(MSG_DEBUG, "BSSID not set when trying to send an "
176 wpa_printf(MSG_DEBUG, "Using current BSSID " MACSTR
181 wpa_printf(MSG_DEBUG, "Using the source address of the"
196 wpa_printf(MSG_DEBUG, "TX EAPOL: dst=" MACSTR, MAC2STR(dst));
260 wpa_printf(MSG_DEBUG, "EAPOL authentication completed - result=%s",
287 wpa_printf(MSG_DEBUG, "Configure PMK for driver-based RSN 4-way
    [all...]
wpas_kay.c 257 wpa_printf(MSG_DEBUG,
264 wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
290 wpa_printf(MSG_DEBUG,
317 wpa_printf(MSG_DEBUG,
349 wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len);
360 wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 57 wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
178 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG,
295 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
302 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: not in suitable "
313 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA "
323 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate "
335 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: no more pending PMKSA "
361 wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
402 wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: added PMKSA cache
    [all...]
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_kay.c 120 wpa_printf(MSG_DEBUG, "*** MKA Basic Parameter set ***");
121 wpa_printf(MSG_DEBUG, "\tVersion.......: %d", body->version);
122 wpa_printf(MSG_DEBUG, "\tPriority......: %d", body->priority);
123 wpa_printf(MSG_DEBUG, "\tKeySvr........: %d", body->key_server);
124 wpa_printf(MSG_DEBUG, "\tMACSecDesired.: %d", body->macsec_desired);
125 wpa_printf(MSG_DEBUG, "\tMACSecCapable.: %d", body->macsec_capbility);
126 wpa_printf(MSG_DEBUG, "\tBody Length...: %d", (int) body_len);
127 wpa_printf(MSG_DEBUG, "\tSCI MAC.......: " MACSTR,
129 wpa_printf(MSG_DEBUG, "\tSCI Port .....: %d",
131 wpa_hexdump(MSG_DEBUG, "\tMember Id.....:"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 54 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 "
62 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
89 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d", msg, (int) err);
101 wpa_printf(MSG_DEBUG, "CryptoAPI: %s: %d: (%s)", msg, (int) err, s);
184 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
191 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d",
198 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptSetKeyParam(KP_MODE) "
208 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptEncrypt failed: %d",
263 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptAcquireContext failed: "
271 wpa_printf(MSG_DEBUG, "CryptoAPI: CryptImportKey failed: %d"
    [all...]
random.c 251 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from "
288 wpa_printf(MSG_DEBUG, "random: Mark internal entropy pool to be "
323 wpa_printf(MSG_DEBUG, "random: Got %u/%u bytes from /dev/random",
352 wpa_printf(MSG_DEBUG, "random: Invalid entropy file %s",
362 wpa_printf(MSG_DEBUG, "random: Added entropy from %s "
399 wpa_printf(MSG_DEBUG, "random: Updated entropy file %s "
428 wpa_printf(MSG_DEBUG, "random: Trying to read entropy from "
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 288 wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
333 wpa_printf(MSG_DEBUG, "SAE: No password available");
341 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
346 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit");
426 wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
471 wpa_printf(MSG_DEBUG, "SAE: Drop commit message with "
479 wpa_printf(MSG_DEBUG, "SAE: Request anti-"
587 wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
643 wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
725 wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA
    [all...]
ap_list.c 160 wpa_printf(MSG_DEBUG, "Removing the least recently used AP "
224 wpa_printf(MSG_DEBUG, "OLBC AP detected: " MACSTR
238 wpa_printf(MSG_DEBUG, "OLBC HT AP detected: " MACSTR
286 wpa_printf(MSG_DEBUG, "OLBC not detected anymore");
292 wpa_printf(MSG_DEBUG, "OLBC HT not detected anymore");
dfs.c 111 wpa_printf(MSG_DEBUG, "Unknown width for %d channels", n_chans);
184 wpa_printf(MSG_DEBUG, "DFS new chan checking %d channels", n_chans);
202 wpa_printf(MSG_DEBUG, "Selected ch. #%d", chan->chan);
206 wpa_printf(MSG_DEBUG, "Adding channel: %d", chan->chan);
248 wpa_printf(MSG_DEBUG, "DFS adjusting VHT center frequency: %d, %d",
324 wpa_printf(MSG_DEBUG,
332 wpa_printf(MSG_DEBUG, "Available channel: %d",
426 wpa_printf(MSG_DEBUG, "DFS: Selecting random channel");
472 wpa_printf(MSG_DEBUG, "set_dfs_state 0x%X for %d MHz", state, freq);
532 wpa_printf(MSG_DEBUG, "DFS freq: %dMHz, n_chans: %d", frequency
    [all...]
hostapd.c 121 wpa_printf(MSG_DEBUG, "Reconfigured interface %s", hapd->conf->iface);
206 wpa_printf(MSG_DEBUG, "Failed to clear default "
217 wpa_printf(MSG_DEBUG, "Failed to clear "
262 wpa_printf(MSG_DEBUG, "%s(%s)", __func__, hapd->conf->iface);
332 wpa_printf(MSG_DEBUG, "%s(hapd=%p (%s))", __func__, hapd,
343 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
363 wpa_printf(MSG_DEBUG, "%s(%p)", __func__, iface);
372 wpa_printf(MSG_DEBUG, "%s: free iface=%p", __func__, iface);
431 wpa_dbg(hapd->msg_ctx, MSG_DEBUG,
440 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "Deauthenticate all stations")
    [all...]
ieee802_11_auth.c 173 wpa_printf(MSG_DEBUG, "Could not add User-Name");
181 wpa_printf(MSG_DEBUG, "Could not add User-Password");
193 wpa_printf(MSG_DEBUG, "Could not add Calling-Station-Id");
200 wpa_printf(MSG_DEBUG, "Could not add Connect-Info");
311 wpa_printf(MSG_DEBUG, "Failed to send Access-Request "
351 wpa_printf(MSG_DEBUG, "Cached ACL entry for " MACSTR
381 wpa_printf(MSG_DEBUG, "ACL query for " MACSTR
497 wpa_printf(MSG_DEBUG, "Found matching Access-Request for RADIUS "
508 wpa_printf(MSG_DEBUG, "Unknown RADIUS message code %d to ACL "
516 wpa_printf(MSG_DEBUG, "Failed to add ACL cache entry")
    [all...]
ieee802_1x.c 102 wpa_printf(MSG_DEBUG, "Could not set station " MACSTR
183 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key to " MACSTR
201 wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
229 wpa_hexdump_key(MSG_DEBUG, "Individual WEP key",
548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
599 wpa_printf(MSG_DEBUG, "Copied RADIUS State Attribute");
715 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d",
718 wpa_printf(MSG_DEBUG, " Invalid EAP length");
721 wpa_printf(MSG_DEBUG, " Too short frame to contain this EAP "
725 wpa_printf(MSG_DEBUG, " Ignoring %lu extra bytes after EAP
    [all...]
vlan_util.c 40 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d, "
135 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(if_name=%s)", if_name);
  /external/wpa_supplicant_8/src/tls/
rsa.c 41 wpa_printf(MSG_DEBUG, "RSA: Expected INTEGER - found class %d "
47 wpa_printf(MSG_DEBUG, "RSA: Failed to parse INTEGER");
90 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
105 wpa_hexdump(MSG_DEBUG,
197 wpa_printf(MSG_DEBUG, "RSA: Expected SEQUENCE "
210 wpa_printf(MSG_DEBUG, "RSA: Expected zero INTEGER in the "
230 wpa_hexdump(MSG_DEBUG,
tlsv1_cred.c 69 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
111 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
116 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
248 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key "
372 wpa_printf(MSG_DEBUG, "DH: DH parameters did not start with a "
385 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for p; "
407 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for g; "
439 wpa_printf(MSG_DEBUG, "TLSv1: No PEM dhparams tag found - "
444 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format dhparams into DER "
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 78 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
175 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown state %d in buildReq",
201 wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x "
211 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX_STD-2 - "
218 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected PAX-ACK - "
225 wpa_printf(MSG_DEBUG, "EAP-PAX: Unknown op_code 0x%x",
230 wpa_printf(MSG_DEBUG, "EAP-PAX: Expected MAC ID 0x%x, "
296 wpa_printf(MSG_DEBUG, "EAP-PAX: Received PAX_STD-2");
353 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: unknown CID"
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ssdp.c 310 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_DOWN->UP");
324 wpa_printf(MSG_DEBUG, "WPS UPnP: ADVERTISE_UP (#%u); "
381 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH stop");
419 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply sendto "
428 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply done");
466 wpa_printf(MSG_DEBUG, "WPS UPnP: M-SEARCH reply start (%d "
628 wpa_printf(MSG_DEBUG, "WPS UPnP: Unexpected "
648 wpa_printf(MSG_DEBUG, "WPS UPnP: Invalid M-SEARCH: %d %d %d "
653 wpa_printf(MSG_DEBUG, "WPS UPnP: Ignored M-SEARCH (no ST "
841 wpa_printf(MSG_DEBUG, "add_ssdp_network: No
    [all...]
  /hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/
driver_cmd_wext.c 62 wpa_printf(MSG_DEBUG, "Scan requested - scan timeout %d seconds",
84 wpa_printf(MSG_DEBUG, "%s: Driver stopped", __func__);
88 wpa_printf(MSG_DEBUG, "%s: Start", __func__);
96 wpa_printf(MSG_DEBUG, "For Scan: %s", params->ssids[i].ssid);
138 wpa_printf(MSG_DEBUG, "%s: %s", __func__, cmd);
238 wpa_printf(MSG_DEBUG, "For PNO Scan: %s", ssid_conf->ssid);
288 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len);
306 wpa_printf(MSG_DEBUG,"Reload command");
367 wpa_printf(MSG_DEBUG, "%s %s len = %d, %d", __func__, buf, ret, strlen(buf));

Completed in 342 milliseconds

1 2 3 4 5 67 8 91011