/external/wpa_supplicant_8/src/wps/ |
wps_upnp_event.c | 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e); 91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for " 122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p", 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s " 192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p " 200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p " 218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p " 222 wpa_printf(MSG_DEBUG, [all...] |
wps_er.c | 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
wps_registrar.c | 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); 410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID") [all...] |
/external/wpa_supplicant_8/src/tls/ |
bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
tlsv1_client_write.c | 51 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 138 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 158 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 183 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 217 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 224 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 240 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", 247 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
pkcs5.c | 60 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 66 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 84 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 97 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 105 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", 111 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " 122 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " 127 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", 163 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8); 164 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8) [all...] |
asn1.c | 42 wpa_printf(MSG_DEBUG, "ASN.1: Identifier " 57 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length " 64 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field"); 69 wpa_printf(MSG_DEBUG, "ASN.1: Length " 81 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow"); 112 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value"); 143 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d " 212 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid [all...] |
eap_server_tnc.c | 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request"); 254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d", 352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag") [all...] |
eap_server_ikev2.c | 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
eap_server_wsc.c | 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in [all...] |
eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 175 wpa_printf(MSG_DEBUG, " AT_IV"); 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); 180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter) [all...] |
/external/wpa_supplicant_8/src/common/ |
sae.c | 161 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR 185 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); 193 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", 206 wpa_printf(MSG_DEBUG, "SAE: No solution found"); 211 wpa_printf(MSG_DEBUG, "SAE: PWE found"); 226 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); 234 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, 239 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p"); 275 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE"); 281 wpa_printf(MSG_DEBUG, "SAE: PWE <= 1") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 81 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", 87 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 93 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " 97 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " 101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " 107 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); 110 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); 113 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); 119 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); 122 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled") [all...] |
eap_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid"); 88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth"); 98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth"); 104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr"); 118 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr"); 133 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key"); 252 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to parse new AP " 257 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for " 265 wpa_printf(MSG_DEBUG, "EAP-WSC: wps_init failed") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_named_pipe.c | 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p " 270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d", 275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst); 294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached") [all...] |
wnm_sta.c | 31 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 42 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 62 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " 77 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element", 102 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element", 107 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 137 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " 162 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); 168 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); 187 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total) [all...] |
events.c | 112 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association " 122 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled"); 128 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed"); 134 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily " 139 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the " 146 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); 251 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 260 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 264 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 344 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to [all...] |
hs20_supplicant.c | 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 208 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 212 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 232 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " 237 wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos); 244 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " 248 wpa_hexdump_ascii(MSG_DEBUG, "Icon Type", pos + 1, pos[0]); 254 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " 263 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " 268 wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len) [all...] |
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 470 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 477 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 484 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 506 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 550 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 575 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 591 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 607 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 620 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
ndis_events.c | 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 256 wpa_printf(MSG_DEBUG, "Could not get " 267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " 278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len); 290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival"); 297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wmm.c | 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 113 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 119 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 168 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 171 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 173 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 175 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 178 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 183 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)"); 188 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16); 287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16); 288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6); 293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6); 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 118 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)", 337 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", 342 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element", 369 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 387 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key", 396 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 406 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key", 415 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 424 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key" [all...] |