HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 76 - 100 of 256) sorted by null

1 2 34 5 6 7 8 91011

  /external/wpa_supplicant_8/src/eap_peer/
eap_tnc.c 77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first "
231 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d"
    [all...]
eap_fast.c 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
197 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
282 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive
    [all...]
tncc.c 115 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
120 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
152 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
155 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
191 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
209 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
219 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
231 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
319 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
323 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu"
    [all...]
ikev2.c 106 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
152 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
161 wpa_printf(MSG_DEBUG, "IKEV2: No "
166 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
172 wpa_printf(MSG_DEBUG, "IKEV2: "
221 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
223 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
226 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_eke.c 59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u",
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u",
203 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x",
239 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request");
242 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data");
254 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data (num_prop=%u)",
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u"
    [all...]
eap_vendor_test.c 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
eap_ttls.c 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
272 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
322 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
330 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP "
337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
395 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos);
416 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response",
434 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 116 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
142 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
165 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
192 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
217 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed");
266 wpa_printf(MSG_DEBUG, "TLSv1: ServerKeyExchange not yet "
273 wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available for "
284 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
pkcs1.c 36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
237 wpa_printf(MSG_DEBUG,
258 wpa_printf(MSG_DEBUG,
267 wpa_printf(MSG_DEBUG,
277 wpa_printf(MSG_DEBUG,
291 wpa_printf(MSG_DEBUG,
313 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 110 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
167 wpa_printf(MSG_DEBUG, "IKEV2: No "
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
178 wpa_printf(MSG_DEBUG, "IKEV2: "
229 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
231 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
234 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_server_psk.c 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 -
    [all...]
eap_server_sake.c 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
168 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
172 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
187 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
196 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S")
    [all...]
tncs.c 135 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
151 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
156 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
187 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
190 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage",
230 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
271 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
295 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu,
    [all...]
eap_server_tls_common.c 150 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
184 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
192 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
210 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
221 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
226 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
240 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a "
266 wpa_printf(MSG_DEBUG, "SSL: No memory for message");
270 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first "
299 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.c 146 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused);
194 wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration",
216 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)",
234 wpa_printf(MSG_DEBUG, "P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for "
512 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group freq_conflict timeout");
514 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
517 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group formation "
534 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s",
558 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network");
581 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not
    [all...]
config_none.c 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
ctrl_iface_udp.c 79 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
83 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
109 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s:%d",
116 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
148 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
156 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level %s:%d",
163 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
229 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected source %s",
240 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
262 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request -
    [all...]
scan.c 42 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured "
109 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks (%d disabled "
127 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached "
226 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan");
238 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it");
268 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!");
319 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO "
327 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common "
344 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO preferred frequency %d MHz during invitation",
358 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Clear p2p_in_invitation")
    [all...]
  /external/wpa_supplicant_8/src/ap/
wnm_ap.c 28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
114 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d",
125 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d",
148 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response "
180 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame");
214 wpa_printf(MSG_DEBUG, "WNM: EID %d not recognized",
220 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found")
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed:
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 45 wpa_printf(MSG_DEBUG, "NSS: I/O close");
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
131 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 47 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
52 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16);
155 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
158 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
198 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
212 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_atheros.c 206 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
228 wpa_printf(MSG_DEBUG, "%s: %s: Failed to set parameter (op %d "
291 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
320 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
326 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
346 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v);
352 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
365 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
397 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d"
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 190 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
225 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
256 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
271 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
280 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
286 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
292 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
297 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
302 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
307 wpa_printf(MSG_DEBUG, "IKEV2: Payload:
    [all...]
  /external/wpa_supplicant_8/src/wps/
httpread.c 140 wpa_printf(MSG_DEBUG, "ENTER httpread_destroy(%p)", h);
159 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h);
384 wpa_printf(MSG_DEBUG, "ENTER httpread_read_handler(%p)", h);
399 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h);
404 wpa_printf(MSG_DEBUG,
415 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h);
452 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h);
457 wpa_printf(MSG_DEBUG,
463 wpa_printf(MSG_DEBUG,
479 wpa_printf(MSG_DEBUG,
    [all...]

Completed in 470 milliseconds

1 2 34 5 6 7 8 91011