/external/wpa_supplicant_8/src/eap_peer/ |
eap_tnc.c | 77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for " 170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a " 180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for " 186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first " 231 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d" [all...] |
eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 197 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " 282 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive [all...] |
tncc.c | 115 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 120 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 152 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 155 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage", 191 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 209 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 219 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 231 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 319 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'", 323 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu" [all...] |
ikev2.c | 106 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 152 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 161 wpa_printf(MSG_DEBUG, "IKEV2: No " 166 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 172 wpa_printf(MSG_DEBUG, "IKEV2: " 221 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 223 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 226 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d" [all...] |
eap_eke.c | 59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s", 104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u", 111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u", 118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u", 125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u", 203 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x", 239 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request"); 242 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data"); 254 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data (num_prop=%u)", 263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u" [all...] |
eap_vendor_test.c | 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
eap_ttls.c | 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id", 272 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 322 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " 330 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP " 337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 395 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos); 416 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response", 434 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request") [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 192 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed"); 266 wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not yet " 273 wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available for " 284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
pkcs1.c | 36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer " 59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get " 70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type " 219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); 237 wpa_printf(MSG_DEBUG, 258 wpa_printf(MSG_DEBUG, 267 wpa_printf(MSG_DEBUG, 277 wpa_printf(MSG_DEBUG, 291 wpa_printf(MSG_DEBUG, 313 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 110 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 167 wpa_printf(MSG_DEBUG, "IKEV2: No " 172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 178 wpa_printf(MSG_DEBUG, "IKEV2: " 229 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 231 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 234 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d" [all...] |
eap_server_psk.c | 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq", 189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t); 192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - [all...] |
eap_server_sake.c | 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 168 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S"); 172 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 187 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm"); 196 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S") [all...] |
tncs.c | 135 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found", 151 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu " 156 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 187 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu " 190 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage", 230 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry"); 244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu " 271 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute"); 284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute"); 295 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, [all...] |
eap_server_tls_common.c | 150 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 184 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 192 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 210 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 221 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 226 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 240 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " 266 wpa_printf(MSG_DEBUG, "SSL: No memory for message"); 270 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first " 299 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 146 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused); 194 wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration", 216 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)", 234 wpa_printf(MSG_DEBUG, "P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for " 512 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group freq_conflict timeout"); 514 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout"); 517 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group formation " 534 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s", 558 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network"); 581 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not [all...] |
config_none.c | 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
|
ctrl_iface_udp.c | 79 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 83 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 109 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s:%d", 116 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 148 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 156 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level %s:%d", 163 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 229 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected source %s", 240 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 262 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - [all...] |
scan.c | 42 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured " 109 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks (%d disabled " 127 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached " 226 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan"); 238 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it"); 268 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!"); 319 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO " 327 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common " 344 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO preferred frequency %d MHz during invitation", 358 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Clear p2p_in_invitation") [all...] |
/external/wpa_supplicant_8/src/ap/ |
wnm_ap.c | 28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__); 94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 114 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d", 125 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d", 148 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response " 180 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame"); 214 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized", 220 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found") [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending " 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): " 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 45 wpa_printf(MSG_DEBUG, "NSS: I/O close"); 52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); 59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); 67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); 78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); 131 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 47 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 52 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16); 155 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 158 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 198 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 212 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x " 228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d " 291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 320 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 326 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 346 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); 352 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 397 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d" [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 256 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 271 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 280 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 286 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 292 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 297 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 302 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate"); 307 wpa_printf(MSG_DEBUG, "IKEV2: Payload: [all...] |
/external/wpa_supplicant_8/src/wps/ |
httpread.c | 140 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h); 159 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h); 384 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h); 399 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h); 404 wpa_printf(MSG_DEBUG, 415 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h); 452 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h); 457 wpa_printf(MSG_DEBUG, 463 wpa_printf(MSG_DEBUG, 479 wpa_printf(MSG_DEBUG, [all...] |