HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 1 - 25 of 297) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/wps/
wps_attr_parse.c 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
155 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type
    [all...]
wps_attr_build.c 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey)
    [all...]
wps_attr_process.c 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len)
    [all...]
wps_enrollee.c 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1");
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2")
    [all...]
wps_dev_attr.c 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer");
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name");
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number");
91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number");
114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type");
128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type");
145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type",
161 wpa_printf(MSG_DEBUG, "WPS: * Device Name");
197 wpa_printf(MSG_DEBUG, "WPS: * OS Version");
208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1"
    [all...]
  /external/wpa_supplicant_8/src/ap/
p2p_hostapd.c 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
x_snoop.c 23 wpa_printf(MSG_DEBUG,
29 wpa_printf(MSG_DEBUG,
36 wpa_printf(MSG_DEBUG,
42 wpa_printf(MSG_DEBUG,
49 wpa_printf(MSG_DEBUG,
56 wpa_printf(MSG_DEBUG,
77 wpa_printf(MSG_DEBUG,
84 wpa_printf(MSG_DEBUG,
116 wpa_printf(MSG_DEBUG,
wpa_auth_ft.c 38 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
79 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized");
331 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID",
336 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH "
348 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for "
390 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
399 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN);
400 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN);
408 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN);
409 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key"
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.c 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_ikev2_common.c 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_fast_common.c 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short
    [all...]
eap_sim_common.c 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_ocsp.c 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s",
144 wpa_printf(MSG_DEBUG,
168 wpa_printf(MSG_DEBUG,
175 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash",
179 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN",
185 wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch");
186 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash",
195 wpa_printf(MSG_DEBUG,
202 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len);
209 wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch")
    [all...]
pkcs8.c 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
114 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey")
    [all...]
tlsv1_record.c 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) -
    [all...]
tlsv1_client_read.c 66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u",
68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data",
87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
129 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
137 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s",
158 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
187 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
196 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
279 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
289 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
424 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
436 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
offchannel.c 41 wpa_printf(MSG_DEBUG,
60 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s "
79 wpa_printf(MSG_DEBUG,
101 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX "
114 wpa_printf(MSG_DEBUG, "Off-channel: Schedule "
118 wpa_printf(MSG_DEBUG,
128 wpa_printf(MSG_DEBUG, "Off-channel: Failed to "
141 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to "
153 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the "
184 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status -
    [all...]
wnm_sta.c 33 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
46 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
66 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request "
81 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element",
106 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element",
111 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
141 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
168 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
174 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE");
193 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/
hidl.cpp 43 wpa_printf(MSG_DEBUG, "Initing hidl control");
76 wpa_printf(MSG_DEBUG, "Deiniting hidl control");
90 MSG_DEBUG, "Registering interface to hidl control: %s",
106 MSG_DEBUG, "Deregistering interface from hidl control: %s",
123 MSG_DEBUG, "Registering network to hidl control: %d", ssid->id);
139 MSG_DEBUG, "Deregistering network from hidl control: %d", ssid->id);
154 MSG_DEBUG, "Notifying state change event to hidl control: %d",
172 MSG_DEBUG, "Notifying network request to hidl control: %d",
191 MSG_DEBUG,
210 MSG_DEBUG, "Notifying HS20 icon query done to hidl control: " MACST
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
77 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
91 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
110 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
152 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
203 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
224 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
252 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
266 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
274 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
280 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer"
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 28 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
37 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
38 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
43 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
72 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
77 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
83 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID",
97 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID",
116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_openssl_ocsp.c 357 wpa_printf(MSG_DEBUG,
365 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid");
373 wpa_printf(MSG_DEBUG,
380 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired");
385 wpa_printf(MSG_DEBUG,
407 wpa_printf(MSG_DEBUG,
425 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerNameHash: %s",
445 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerKeyHash: %s",
514 wpa_printf(MSG_DEBUG,
521 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received")
    [all...]

Completed in 269 milliseconds

1 2 3 4 5 6 7 8 91011>>