HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 26 - 50 of 256) sorted by null

12 3 4 5 6 7 8 91011

  /external/wpa_supplicant_8/src/wps/
wps_upnp_event.c 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e);
91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for "
122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p",
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event "
178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s "
192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p "
200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p "
218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p "
222 wpa_printf(MSG_DEBUG,
    [all...]
wps_er.c 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)"
    [all...]
wps_registrar.c 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR,
210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was "
218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR,
234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the "
243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for "
386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E",
407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap");
410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID")
    [all...]
  /external/wpa_supplicant_8/src/tls/
bignum.c 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
tlsv1_client_write.c 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
240 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value",
247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
pkcs5.c 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found "
122 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value "
127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x",
163 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8);
164 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8)
    [all...]
asn1.c 42 wpa_printf(MSG_DEBUG, "ASN.1: Identifier "
57 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length "
64 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field");
69 wpa_printf(MSG_DEBUG, "ASN.1: Length "
81 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow");
112 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value");
143 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d "
212 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque",
193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid
    [all...]
eap_server_tnc.c 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request");
254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d",
352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag")
    [all...]
eap_server_ikev2.c 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
eap_server_wsc.c 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P "
178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in
    [all...]
eap_server_sim.c 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ");
135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
175 wpa_printf(MSG_DEBUG, " AT_IV");
176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter)
    [all...]
  /external/wpa_supplicant_8/src/common/
sae.c 161 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR
185 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN);
193 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value",
206 wpa_printf(MSG_DEBUG, "SAE: No solution found");
211 wpa_printf(MSG_DEBUG, "SAE: PWE found");
226 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN);
234 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value,
239 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p");
275 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE");
281 wpa_printf(MSG_DEBUG, "SAE: PWE <= 1")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 81 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d",
87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key "
93 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on "
97 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success "
101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after "
107 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding");
110 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding");
113 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding");
119 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled");
122 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled")
    [all...]
eap_wsc.c 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid");
88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth");
98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth");
104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr");
118 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr");
133 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key");
252 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to parse new AP "
257 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for "
265 wpa_printf(MSG_DEBUG, "EAP-WSC: wps_init failed")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_named_pipe.c 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p "
270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d",
275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst);
294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached")
    [all...]
wnm_sta.c 31 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
42 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
62 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request "
77 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element",
102 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element",
107 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
137 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
162 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
168 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE");
187 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total)
    [all...]
events.c 112 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association "
122 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled");
128 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed");
134 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily "
139 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the "
146 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
251 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
260 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
264 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
344 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to
    [all...]
hs20_supplicant.c 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
208 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
212 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
232 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File "
237 wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos);
244 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File "
248 wpa_hexdump_ascii(MSG_DEBUG, "Icon Type", pos + 1, pos[0]);
254 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File "
263 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File "
268 wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len)
    [all...]
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__)
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
ndis_events.c 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
207 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
256 wpa_printf(MSG_DEBUG, "Could not get "
267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event "
278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len);
290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival");
297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval")
    [all...]
  /external/wpa_supplicant_8/src/ap/
wmm.c 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
113 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
119 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
168 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
171 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
173 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
175 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
178 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
183 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)");
188 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
milenage.c 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16);
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16);
287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16);
288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6);
293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6);
299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6);
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 118 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
337 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE",
342 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element",
369 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key",
378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
387 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key",
396 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key",
406 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
415 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
424 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key"
    [all...]

Completed in 494 milliseconds

12 3 4 5 6 7 8 91011