/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 148 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options"); 268 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in " 462 wpa_printf(MSG_DEBUG, "SSL: Need %lu bytes more input " 585 wpa_printf(MSG_DEBUG, "SSL: %lu bytes left to be sent out (of total " 597 wpa_printf(MSG_DEBUG, "SSL: sending %lu bytes, more fragments " 682 wpa_printf(MSG_DEBUG, "SSL: Received non-ACK when output " 720 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to " 732 wpa_printf(MSG_DEBUG, "SSL: No data to be sent out"); 759 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id=%d ver=%d)" [all...] |
eap_otp.c | 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
eap_md5.c | 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
|
eap_pwd.c | 77 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", 241 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d", 274 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): computed %d bit PWE...", 601 wpa_printf(MSG_DEBUG, "EAP-pwd (peer): confirm verified"); 713 wpa_printf(MSG_DEBUG, "EAP-pwd: Got a frame but pos is %s and " 740 wpa_printf(MSG_DEBUG, "EAP-pwd: Got an ACK for a fragment"); 769 wpa_printf(MSG_DEBUG, "EAP-pwd: Send %s fragment of %d bytes", 787 wpa_printf(MSG_DEBUG, "EAP-pwd: Incoming fragments whose " 822 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a %d byte fragment", 831 wpa_printf(MSG_DEBUG, "EAP-pwd: Last fragment, %d bytes" [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 180 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 539 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt " 557 wpa_printf(MSG_DEBUG, "TLSv1: Using random premaster secret " 561 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 577 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys"); 612 wpa_printf(MSG_DEBUG, "TLSv1: Implicit public value encoding " 637 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", 642 wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available"); 653 wpa_printf(MSG_DEBUG, "TLSv1: Could not allocate memory for " 669 wpa_hexdump_key(MSG_DEBUG, "TLSv1: Shared secret from DH key exchange" [all...] |
tlsv1_common.c | 176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 " 429 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature"); 442 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature"); 472 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-256"); 476 wpa_printf(MSG_DEBUG, "TLSv1.2: Unrecognized DigestInfo"); 486 wpa_printf(MSG_DEBUG, "TLSv1: Invalid Signature in CertificateVerify - did not match calculated hash");
|
tlsv1_server.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf); 75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block"); 142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received " 165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 198 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop"); 236 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record"); 284 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not " 330 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | 330 wpa_printf(MSG_DEBUG, "WPS UPnP: Adding URL '%s'", scratch_mem); 421 wpa_printf(MSG_DEBUG, "WPS UPnP: Parsing URL list '%s'", url_list); 491 wpa_printf(MSG_DEBUG, "WPS UPnP: Throttle " 539 wpa_printf(MSG_DEBUG, "WPS UPnP: Destroy subscription %p", s); 557 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing aged subscription"); 643 wpa_printf(MSG_DEBUG, "WPS UPnP: Use a fake WSC_ACK as the " 656 wpa_printf(MSG_DEBUG, "WPS UPnP: WLANEvent not known for " 720 wpa_printf(MSG_DEBUG, "WPS UPnP: No valid callback URLs in " 738 wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription %p started with %s", 755 wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription renewed") [all...] |
wps.c | 57 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password", 83 wpa_hexdump_key(MSG_DEBUG, "WPS: NFC dev_password", 105 wpa_hexdump_buf(MSG_DEBUG, "WPS: WPS IE from (Re)AssocReq", 108 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE " 111 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute " 114 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE " 165 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " 421 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association " 455 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association " 500 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request") [all...] |
/external/wpa_supplicant_8/src/ap/ |
hw_features.c | 206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x", 235 wpa_printf(MSG_DEBUG, "HT40: control channel: %d " 409 wpa_printf(MSG_DEBUG, "Found overlapping legacy BSS: " 420 wpa_printf(MSG_DEBUG, "Found overlapping 20 MHz HT BSS: " 442 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz", 454 wpa_printf(MSG_DEBUG, 472 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR 478 wpa_printf(MSG_DEBUG, "40 MHz pri/sec " 500 wpa_printf(MSG_DEBUG, 581 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz" [all...] |
tkip_countermeasures.c | 84 wpa_printf(MSG_DEBUG,
|
vlan_init.c | 80 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name); 87 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name); 112 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name); 163 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name); 210 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name); 246 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name); 340 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name); 383 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)", 417 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: " 450 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)" [all...] |
ieee802_11_ht.c | 130 wpa_printf(MSG_DEBUG, "%s current operation mode=0x%X", 171 wpa_printf(MSG_DEBUG, "%s new operation mode=0x%X changes=%d", 351 wpa_printf(MSG_DEBUG, 366 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: " 373 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num " 383 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of " 401 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
|
peerkey_auth.c | 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR 293 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK"); 315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN); 351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not "
|
pmksa_cache_auth.c | 100 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for " 166 wpa_hexdump_ascii(MSG_DEBUG, "STA identity from PMKSA", 180 wpa_printf(MSG_DEBUG, "Copied %lu Class attribute(s) from " 219 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR, 221 wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN); 279 wpa_printf(MSG_DEBUG, "RSN: removed the oldest PMKSA cache "
|
eap_user_db.c | 182 wpa_printf(MSG_DEBUG, "DB: %s", cmd); 185 wpa_printf(MSG_DEBUG, "DB: Failed to complete SQL operation"); 192 wpa_printf(MSG_DEBUG, "DB: %s", cmd); 195 wpa_printf(MSG_DEBUG, "DB: Failed to complete SQL "
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_privsep.c | 109 wpa_printf(MSG_DEBUG, "L2: Too show packet received"); 116 wpa_printf(MSG_DEBUG, "L2: Received message from unexpected " 205 wpa_printf(MSG_DEBUG, "L2: Timeout while waiting for " 211 wpa_printf(MSG_DEBUG, "L2: Unexpected registration reply "
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config_winreg.c | 60 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config " 80 wpa_printf(MSG_DEBUG, "RegEnumValue failed: 0x%x", 128 wpa_printf(MSG_DEBUG, TSTR "=%d", name, (int) val); 158 wpa_printf(MSG_DEBUG, TSTR "=%s", name, (char *) val); 294 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config " 357 wpa_printf(MSG_DEBUG, "Removed CCMP from group cipher " 400 wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x", 454 wpa_printf(MSG_DEBUG, "Reading configuration profile '%s'", name); 641 wpa_printf(MSG_DEBUG, "WINREG: Could not open key '" TSTR 659 wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x (%d)" [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 134 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_IN - %d", 138 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_OUT - %d", 142 wpa_printf(MSG_DEBUG, "debug - CURLINFO_END - %d", 527 wpa_printf(MSG_DEBUG, "OpenSSL: No SHA256 hash found for the logo"); 779 wpa_hexdump(MSG_DEBUG, "logotypeExtn", 953 wpa_printf(MSG_DEBUG, "curl_cb_ssl_verify"); 1023 wpa_printf(MSG_DEBUG, "OpenSSL: %s - %s %s", 1027 wpa_printf(MSG_DEBUG, "OpenSSL: pending error: %s", 1047 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received"); 1053 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", p, len) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 75 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", 97 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", 164 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request"); 196 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request"); 305 wpa_printf(MSG_DEBUG, "EAP-pwd: Confirm/Request"); 435 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a fragment!!"); 503 wpa_printf(MSG_DEBUG, "EAP-pwd: Fragmenting output, " 506 wpa_printf(MSG_DEBUG, "EAP-pwd: Send a %d byte fragment", 555 wpa_printf(MSG_DEBUG, "EAP-pwd: Received frame: exch = %d, len = %d", 604 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PWD (server): peer sent id of" [all...] |
eap_server_identity.c | 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
|
eap_server_md5.c | 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success"); 133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 340 wpa_printf(MSG_DEBUG, "LibTomCrypt: Cipher start " 366 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 390 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 504 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 527 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 538 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 565 wpa_printf(MSG_DEBUG, "LibTomCrypt: rsa_exptmod failed: %s", 623 wpa_printf(MSG_DEBUG, "LibTomCrypt: rsa_exptmod failed: %s",
|
crypto_internal-rsa.c | 57 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 996 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: " 1019 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids " 1032 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids " 1043 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: " 1057 wpa_printf(MSG_DEBUG, 1069 wpa_printf(MSG_DEBUG, 1106 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1119 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1138 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: " [all...] |