/external/wpa_supplicant_8/wpa_supplicant/ |
autoscan_periodic.c | 54 wpa_printf(MSG_DEBUG, "autoscan periodic: interval is %d", 74 wpa_printf(MSG_DEBUG, "autoscan periodic: scan result notification");
|
blacklist.c | 66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count " 79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist", 107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from " 135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
|
gas_query.c | 197 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response"); 216 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst=" 225 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 229 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination"); 262 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 296 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to " 310 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 324 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACSTR 337 wpa_printf(MSG_DEBUG, "GAS: Received initial response from " 369 wpa_printf(MSG_DEBUG, "GAS: Received comeback response from [all...] |
wifi_display.c | 75 wpa_printf(MSG_DEBUG, "WFD: Update WFD IE"); 78 wpa_printf(MSG_DEBUG, "WFD: Wi-Fi Display disabled - do not " 162 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Beacon", ie); 166 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for (Re)Association Request", 171 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for GO Negotiation", ie); 175 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery " 185 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Request", ie); 192 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Probe Response", ie); 202 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for P2P Invitation", ie); 206 wpa_hexdump_buf(MSG_DEBUG, "WFD: WFD IE for Provision Discovery [all...] |
interworking.c | 125 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 248 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 270 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info", 310 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 316 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 379 wpa_printf(MSG_DEBUG, "No room for Authentication " 396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP") [all...] |
bgscan_simple.c | 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed " 225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short " 251 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan [all...] |
wps_supplicant.c | 60 wpa_printf(MSG_DEBUG, "WPS: Continuing association after eapol_cb"); 86 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR 113 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - " 119 wpa_printf(MSG_DEBUG, "WPS: Current network is " 128 wpa_printf(MSG_DEBUG, "WPS: Checking whether fast association " 150 wpa_printf(MSG_DEBUG, "WPS: Continue association from timeout"); 160 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting " 197 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from BSS " 202 wpa_printf(MSG_DEBUG, "WPS: AP found from BSS table"); 224 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA [all...] |
sme.c | 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", 92 wpa_printf(MSG_DEBUG, "SAE: No password available"); 97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group"); 105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 194 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", 198 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: " 210 wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg"); 318 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT " 336 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports " 436 wpa_printf(MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 235 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 289 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " 353 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request"); 365 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for " 406 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); 407 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); 409 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input", 428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 432 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing"); 182 wpa_printf(MSG_DEBUG, 192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response"); 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); 209 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); 217 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN); 230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 236 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response") [all...] |
eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 274 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow") [all...] |
eap_gpsk.c | 69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 115 wpa_printf(MSG_DEBUG, "EAP-GPSK: Forced cipher %u", 151 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); 157 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); 163 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); 168 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", 183 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 211 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", 229 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d" [all...] |
eap_sim.c | 73 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 109 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing"); 187 wpa_printf(MSG_DEBUG, 194 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response"); 201 wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND", 206 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc", 215 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES", 229 wpa_printf(MSG_DEBUG, "EAP-SIM: Invalid external SIM processing GSM-AUTH response"); 239 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm") [all...] |
eap_mschapv2.c | 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 354 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 371 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 380 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate [all...] |
eap_psk.c | 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags); 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S", 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", 192 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " 274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE"); 313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer " 325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates " 340 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type); 59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow"); 96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
|
/external/wpa_supplicant_8/src/utils/ |
ext_password_test.c | 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name); 68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value", 79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
|
state_machine.h | 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \ 68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \ 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ap.c | 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out"); 48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable " 64 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
|
http_server.c | 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received", 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received " 67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests"); 136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d", 143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s", 146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes", 209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: " 213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d", 249 wpa_printf(MSG_DEBUG, 276 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 24 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 37 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 49 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); 68 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", 79 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", 93 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " 107 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " 132 wpa_hexdump(MSG_DEBUG, "P2P: * Channel List", 143 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); 199 wpa_printf(MSG_DEBUG, "P2P: * Device Info") [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 153 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 171 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 289 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)", 295 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len); 300 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory " 314 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, pos - seed) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 211 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 219 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 306 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 504 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store " 521 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 534 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store " 558 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret); 568 wpa_printf(MSG_DEBUG, "SSL: %s:%s", 594 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s", 623 wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers_wps.c | 44 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Role type, " 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Uknown role %s", val); 75 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Type type, " 87 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s", 108 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid type, " 117 wpa_printf(MSG_DEBUG, "dbus: WPS.Stsrt - Wrong Bssid length " 137 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Pin type, " 161 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 171 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong " 206 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key) [all...] |