HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 51 - 75 of 256) sorted by null

1 23 4 5 6 7 8 91011

  /external/wpa_supplicant_8/wpa_supplicant/
autoscan_periodic.c 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d",
74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
blacklist.c 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
gas_query.c 197 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response");
216 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst="
225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
229 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination");
262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
296 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to "
310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR
337 wpa_printf(MSG_DEBUG, "GAS: Received initial response from "
369 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from
    [all...]
wifi_display.c 75 wpa_printf(MSG_DEBUG, "WFD: Update WFD IE");
78 wpa_printf(MSG_DEBUG, "WFD: Wi-Fi Display disabled - do not "
162 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Beacon", ie);
166 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for (Re)Association Request",
171 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for GO Negotiation", ie);
175 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery "
185 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Request", ie);
192 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Response", ie);
202 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for P2P Invitation", ie);
206 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery
    [all...]
interworking.c 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
270 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info",
310 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
316 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
379 wpa_printf(MSG_DEBUG, "No room for Authentication "
396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP")
    [all...]
bgscan_simple.c 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
251 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan
    [all...]
wps_supplicant.c 60 wpa_printf(MSG_DEBUG, "WPS: Continuing association after eapol_cb");
86 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
113 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
119 wpa_printf(MSG_DEBUG, "WPS: Current network is "
128 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association "
150 wpa_printf(MSG_DEBUG, "WPS: Continue association from timeout");
160 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
197 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS "
202 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table");
224 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA
    [all...]
sme.c 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d",
92 wpa_printf(MSG_DEBUG, "SAE: No password available");
97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group");
105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
194 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
198 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: "
210 wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg");
318 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
336 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports "
436 wpa_printf(MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
235 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
289 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
353 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
365 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
406 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
407 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
409 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
432 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
182 wpa_printf(MSG_DEBUG,
192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN);
209 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN);
217 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN);
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
236 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response")
    [all...]
eap_ikev2.c 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
274 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow")
    [all...]
eap_gpsk.c 69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
115 wpa_printf(MSG_DEBUG, "EAP-GPSK: Forced cipher %u",
151 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
157 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
163 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
168 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
183 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow");
187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
211 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d",
229 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d"
    [all...]
eap_sim.c 73 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
109 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing");
187 wpa_printf(MSG_DEBUG,
194 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response");
201 wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND",
206 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
215 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES",
229 wpa_printf(MSG_DEBUG, "EAP-SIM: Invalid external SIM processing GSM-AUTH response");
239 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm")
    [all...]
eap_mschapv2.c 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
354 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
371 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
380 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate
    [all...]
eap_psk.c 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags);
114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S",
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
192 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
340 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis_.c 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
  /external/wpa_supplicant_8/src/utils/
ext_password_test.c 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
state_machine.h 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ap.c 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
64 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
http_server.c 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
249 wpa_printf(MSG_DEBUG,
276 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d:
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_build.c 24 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
37 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
49 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header");
68 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x",
79 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u",
93 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u "
107 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u "
132 wpa_hexdump(MSG_DEBUG, "P2P: * Channel List",
143 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status);
199 wpa_printf(MSG_DEBUG, "P2P: * Device Info")
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
171 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
289 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
295 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
300 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
314 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, pos - seed)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 211 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
219 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
306 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
504 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
521 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
534 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
558 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret);
568 wpa_printf(MSG_DEBUG, "SSL: %s:%s",
594 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s",
623 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers_wps.c 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, "
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val);
75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, "
87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s",
108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, "
117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length "
137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, "
161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong "
206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key)
    [all...]

Completed in 293 milliseconds

1 23 4 5 6 7 8 91011