HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 176 - 200 of 256) sorted by null

1 2 3 4 5 6 78 91011

  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options");
148 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options");
268 wpa_printf(MSG_DEBUG, "TLS: Include TLS Message Length in "
462 wpa_printf(MSG_DEBUG, "SSL: Need %lu bytes more input "
585 wpa_printf(MSG_DEBUG, "SSL: %lu bytes left to be sent out (of total "
597 wpa_printf(MSG_DEBUG, "SSL: sending %lu bytes, more fragments "
682 wpa_printf(MSG_DEBUG, "SSL: Received non-ACK when output "
720 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to "
732 wpa_printf(MSG_DEBUG, "SSL: No data to be sent out");
759 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id=%d ver=%d)"
    [all...]
eap_otp.c 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
eap_md5.c 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
eap_pwd.c 77 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s",
241 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d",
274 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): computed %d bit PWE...",
601 wpa_printf(MSG_DEBUG, "EAP-pwd (peer): confirm verified");
713 wpa_printf(MSG_DEBUG, "EAP-pwd: Got a frame but pos is %s and "
740 wpa_printf(MSG_DEBUG, "EAP-pwd: Got an ACK for a fragment");
769 wpa_printf(MSG_DEBUG, "EAP-pwd: Send %s fragment of %d bytes",
787 wpa_printf(MSG_DEBUG, "EAP-pwd: Incoming fragments whose "
822 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a %d byte fragment",
831 wpa_printf(MSG_DEBUG, "EAP-pwd: Last fragment, %d bytes"
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 180 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
539 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt "
557 wpa_printf(MSG_DEBUG, "TLSv1: Using random premaster secret "
561 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
577 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys");
612 wpa_printf(MSG_DEBUG, "TLSv1: Implicit public value encoding "
637 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)",
642 wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available");
653 wpa_printf(MSG_DEBUG, "TLSv1: Could not allocate memory for "
669 wpa_hexdump_key(MSG_DEBUG, "TLSv1: Shared secret from DH key exchange"
    [all...]
tlsv1_common.c 176 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 "
429 wpa_printf(MSG_DEBUG, "TLSv1: No public key to verify signature");
442 wpa_printf(MSG_DEBUG, "TLSv1: Failed to decrypt signature");
472 wpa_printf(MSG_DEBUG, "TLSv1.2: DigestAlgorithn = SHA-256");
476 wpa_printf(MSG_DEBUG, "TLSv1.2: Unrecognized DigestInfo");
486 wpa_printf(MSG_DEBUG, "TLSv1: Invalid Signature in CertificateVerify - did not match calculated hash");
tlsv1_server.c 41 wpa_printf(MSG_DEBUG, "TLSv1: %s", buf);
75 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive key_block");
142 wpa_printf(MSG_DEBUG, "TLSv1: No input data to server");
158 wpa_printf(MSG_DEBUG, "TLSv1: Processing received "
165 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not "
198 wpa_printf(MSG_DEBUG, "TLSv1: Drop alert loop");
236 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create a record");
284 wpa_printf(MSG_DEBUG, "TLSv1: Partial processing not "
330 wpa_printf(MSG_DEBUG, "TLSv1: Buffer not large enough
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp.c 330 wpa_printf(MSG_DEBUG, "WPS UPnP: Adding URL '%s'", scratch_mem);
421 wpa_printf(MSG_DEBUG, "WPS UPnP: Parsing URL list '%s'", url_list);
491 wpa_printf(MSG_DEBUG, "WPS UPnP: Throttle "
539 wpa_printf(MSG_DEBUG, "WPS UPnP: Destroy subscription %p", s);
557 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing aged subscription");
643 wpa_printf(MSG_DEBUG, "WPS UPnP: Use a fake WSC_ACK as the "
656 wpa_printf(MSG_DEBUG, "WPS UPnP: WLANEvent not known for "
720 wpa_printf(MSG_DEBUG, "WPS UPnP: No valid callback URLs in "
738 wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription %p started with %s",
755 wpa_printf(MSG_DEBUG, "WPS UPnP: Subscription renewed")
    [all...]
wps.c 57 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password",
83 wpa_hexdump_key(MSG_DEBUG, "WPS: NFC dev_password",
105 wpa_hexdump_buf(MSG_DEBUG, "WPS: WPS IE from (Re)AssocReq",
108 wpa_printf(MSG_DEBUG, "WPS: Failed to parse WPS IE "
111 wpa_printf(MSG_DEBUG, "WPS: No Request Type attribute "
114 wpa_printf(MSG_DEBUG, "WPS: Request Type (from WPS IE "
165 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and "
421 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association "
455 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for (Re)Association "
500 wpa_printf(MSG_DEBUG, "WPS: Building WPS IE for Probe Request")
    [all...]
  /external/wpa_supplicant_8/src/ap/
hw_features.c 206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x",
235 wpa_printf(MSG_DEBUG, "HT40: control channel: %d "
409 wpa_printf(MSG_DEBUG, "Found overlapping legacy BSS: "
420 wpa_printf(MSG_DEBUG, "Found overlapping 20 MHz HT BSS: "
442 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz",
454 wpa_printf(MSG_DEBUG,
472 wpa_printf(MSG_DEBUG, "Neighboring BSS: " MACSTR
478 wpa_printf(MSG_DEBUG, "40 MHz pri/sec "
500 wpa_printf(MSG_DEBUG,
581 wpa_printf(MSG_DEBUG, "40 MHz affected channel range: [%d,%d] MHz"
    [all...]
tkip_countermeasures.c 84 wpa_printf(MSG_DEBUG,
vlan_init.c 80 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s up", if_name);
87 wpa_printf(MSG_DEBUG, "VLAN: Set interface %s down", if_name);
112 wpa_printf(MSG_DEBUG, "VLAN: br_delif(%s, %s)", br_name, if_name);
163 wpa_printf(MSG_DEBUG, "VLAN: br_addif(%s, %s)", br_name, if_name);
210 wpa_printf(MSG_DEBUG, "VLAN: br_delbr(%s)", br_name);
246 wpa_printf(MSG_DEBUG, "VLAN: br_addbr(%s)", br_name);
340 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name);
383 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)",
417 wpa_printf(MSG_DEBUG, "VLAN: vlan_add: "
450 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)"
    [all...]
ieee802_11_ht.c 130 wpa_printf(MSG_DEBUG, "%s current operation mode=0x%X",
171 wpa_printf(MSG_DEBUG, "%s new operation mode=0x%X changes=%d",
351 wpa_printf(MSG_DEBUG,
366 wpa_printf(MSG_DEBUG, "HT: STA " MACSTR " HT Capabilities Info: "
373 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no greenfield, num "
383 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - 20 MHz HT, num of "
401 wpa_printf(MSG_DEBUG, "%s STA " MACSTR " - no HT, num of "
peerkey_auth.c 108 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
283 wpa_printf(MSG_DEBUG, "RSN: SMK handshake with " MACSTR
293 wpa_printf(MSG_DEBUG, "RSN: Failed to generate SMK");
315 wpa_hexdump_key(MSG_DEBUG, "RSN: SMK", smk, PMK_LEN);
351 wpa_printf(MSG_DEBUG, "RSN: Peer STA " MACSTR " not "
pmksa_cache_auth.c 100 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
166 wpa_hexdump_ascii(MSG_DEBUG, "STA identity from PMKSA",
180 wpa_printf(MSG_DEBUG, "Copied %lu Class attribute(s) from "
219 wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
221 wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN);
279 wpa_printf(MSG_DEBUG, "RSN: removed the oldest PMKSA cache "
eap_user_db.c 182 wpa_printf(MSG_DEBUG, "DB: %s", cmd);
185 wpa_printf(MSG_DEBUG, "DB: Failed to complete SQL operation");
192 wpa_printf(MSG_DEBUG, "DB: %s", cmd);
195 wpa_printf(MSG_DEBUG, "DB: Failed to complete SQL "
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_privsep.c 109 wpa_printf(MSG_DEBUG, "L2: Too show packet received");
116 wpa_printf(MSG_DEBUG, "L2: Received message from unexpected "
205 wpa_printf(MSG_DEBUG, "L2: Timeout while waiting for "
211 wpa_printf(MSG_DEBUG, "L2: Unexpected registration reply "
  /external/wpa_supplicant_8/wpa_supplicant/
config_winreg.c 60 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
80 wpa_printf(MSG_DEBUG, "RegEnumValue failed: 0x%x",
128 wpa_printf(MSG_DEBUG, TSTR "=%d", name, (int) val);
158 wpa_printf(MSG_DEBUG, TSTR "=%s", name, (char *) val);
294 wpa_printf(MSG_DEBUG, "Could not open wpa_supplicant config "
357 wpa_printf(MSG_DEBUG, "Removed CCMP from group cipher "
400 wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x",
454 wpa_printf(MSG_DEBUG, "Reading configuration profile '%s'", name);
641 wpa_printf(MSG_DEBUG, "WINREG: Could not open key '" TSTR
659 wpa_printf(MSG_DEBUG, "RegEnumKeyEx failed: 0x%x (%d)"
    [all...]
  /external/wpa_supplicant_8/src/utils/
http_curl.c 134 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_IN - %d",
138 wpa_printf(MSG_DEBUG, "debug - CURLINFO_SSL_DATA_OUT - %d",
142 wpa_printf(MSG_DEBUG, "debug - CURLINFO_END - %d",
527 wpa_printf(MSG_DEBUG, "OpenSSL: No SHA256 hash found for the logo");
779 wpa_hexdump(MSG_DEBUG, "logotypeExtn",
953 wpa_printf(MSG_DEBUG, "curl_cb_ssl_verify");
1023 wpa_printf(MSG_DEBUG, "OpenSSL: %s - %s %s",
1027 wpa_printf(MSG_DEBUG, "OpenSSL: pending error: %s",
1047 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received");
1053 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", p, len)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pwd.c 75 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s",
97 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d",
164 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request");
196 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request");
305 wpa_printf(MSG_DEBUG, "EAP-pwd: Confirm/Request");
435 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a fragment!!");
503 wpa_printf(MSG_DEBUG, "EAP-pwd: Fragmenting output, "
506 wpa_printf(MSG_DEBUG, "EAP-pwd: Send a %d byte fragment",
555 wpa_printf(MSG_DEBUG, "EAP-pwd: Received frame: exch = %d, len = %d",
604 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PWD (server): peer sent id of"
    [all...]
eap_server_identity.c 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
eap_server_md5.c 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success");
133 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure");
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 340 wpa_printf(MSG_DEBUG, "LibTomCrypt: Cipher start "
366 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
390 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
504 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
527 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
538 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
565 wpa_printf(MSG_DEBUG, "LibTomCrypt: rsa_exptmod failed: %s",
623 wpa_printf(MSG_DEBUG, "LibTomCrypt: rsa_exptmod failed: %s",
crypto_internal-rsa.c 57 wpa_printf(MSG_DEBUG, "Trying to parse PKCS #1 encoded RSA private "
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 996 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: "
1019 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids "
1032 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ssids "
1043 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: "
1057 wpa_printf(MSG_DEBUG,
1069 wpa_printf(MSG_DEBUG,
1106 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must "
1119 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must "
1138 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: "
    [all...]

Completed in 441 milliseconds

1 2 3 4 5 6 78 91011