HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 101 - 125 of 297) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 176 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
210 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
218 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
236 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
247 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
252 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
266 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a "
292 wpa_printf(MSG_DEBUG, "SSL: No memory for message");
296 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first "
325 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to
    [all...]
eap_server_tls.c 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
191 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
202 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
243 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
272 wpa_printf(MSG_DEBUG,
280 wpa_printf(MSG_DEBUG,
287 wpa_printf(MSG_DEBUG,
314 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key",
317 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key");
346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK"
    [all...]
eap_sim_db.c 103 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
129 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for "
435 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Delete query timeout for %p", entry);
449 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Query timeout for %p", entry);
471 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
478 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported "
523 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed "
530 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string");
549 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the "
556 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
autoscan.c 51 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG, "autoscan: Already initialized");
105 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with "
128 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
config_none.c 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
ctrl_iface_udp.c 99 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
103 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
129 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s:%d",
136 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
168 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
176 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level %s:%d",
183 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
250 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected source %s",
261 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
283 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request -
    [all...]
gas_query.c 209 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response");
228 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst="
237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
241 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination");
284 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u "
331 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to "
346 wpa_printf(MSG_DEBUG,
354 wpa_printf(MSG_DEBUG,
374 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR,
393 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACST
    [all...]
p2p_supplicant.c 185 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused);
237 wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration",
259 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)",
277 wpa_printf(MSG_DEBUG, "P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for "
311 wpa_printf(MSG_DEBUG,
510 wpa_printf(MSG_DEBUG,
546 wpa_printf(MSG_DEBUG,
650 wpa_printf(MSG_DEBUG, "P2P: Conncap - in:%d role:%d", incoming, role);
678 wpa_printf(MSG_DEBUG,
684 wpa_printf(MSG_DEBUG, "P2P: p2p_no_group_iface")
    [all...]
autoscan_exponential.c 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d "
81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
mesh_rsn.c 38 wpa_printf(MSG_DEBUG, "AUTH: Re-authenticate with " MACSTR
70 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
73 wpa_printf(MSG_DEBUG, "AUTH: %s", txt);
84 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
106 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
110 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
113 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len);
151 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine");
171 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed");
189 wpa_hexdump_key(MSG_DEBUG, "mesh: Own TX IGTK"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_wired_common.c 243 wpa_printf(MSG_DEBUG,
248 wpa_printf(MSG_DEBUG,
257 wpa_printf(MSG_DEBUG,
265 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__);
272 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active",
292 wpa_printf(MSG_DEBUG,
299 wpa_printf(MSG_DEBUG,
308 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode",
316 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
driver_macsec_qca.c 168 wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d",
182 wpa_printf(MSG_DEBUG, "%s", __func__);
192 wpa_printf(MSG_DEBUG, "%s", __func__);
205 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
219 wpa_printf(MSG_DEBUG, "%s: enabled=%d, win=%u",
239 wpa_printf(MSG_DEBUG, "%s: default support aes-gcm-128", __func__);
250 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled);
345 wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, sa->lowest_pn);
364 wpa_printf(MSG_DEBUG, "%s: npn=0x%x", __func__, sa->next_pn);
404 wpa_printf(MSG_DEBUG, "%s: channel=%d"
    [all...]
driver_nl80211.c 144 wpa_printf(MSG_DEBUG,
617 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command "
652 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)",
822 wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK",
828 wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event",
854 wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s",
858 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1",
862 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed",
912 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed "
984 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)"
    [all...]
driver_atheros.c 210 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
295 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
325 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
332 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
353 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v);
360 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
373 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
405 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
417 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
428 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)",
160 wpa_printf(MSG_DEBUG,
196 wpa_printf(MSG_DEBUG,
248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
295 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
320 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
330 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
354 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
361 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 121 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
356 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE",
361 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element",
388 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key",
397 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
406 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key",
415 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key",
425 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
434 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
443 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key"
    [all...]
peerkey.c 108 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer "
112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error "
168 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
188 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2");
208 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR,
231 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey",
270 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
367 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
371 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR,
427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
255 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
274 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
283 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
289 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
295 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
300 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
305 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
310 wpa_printf(MSG_DEBUG, "IKEV2: Payload:
    [all...]
  /external/wpa_supplicant_8/src/ap/
acs.c 347 wpa_printf(MSG_DEBUG, "ACS: %d: insufficient data", i);
355 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu",
504 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)",
509 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg",
599 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for selected bandwidth %d MHz",
622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
653 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not enough bandwidth",
715 wpa_printf(MSG_DEBUG,
719 wpa_printf(MSG_DEBUG,
    [all...]
sta_info.c 117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from "
148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR
260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR,
366 wpa_printf(MSG_DEBUG, "Removing station " MACSTR,
388 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d",
411 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
422 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
431 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
438 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
453 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACST
    [all...]
wps_hostapd.c 104 wpa_printf(MSG_DEBUG,
108 wpa_printf(MSG_DEBUG,
113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu",
143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to "
180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid);
276 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data");
295 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload");
318 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration");
408 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute"
    [all...]
  /external/wpa_supplicant_8/src/wps/
http_client.c 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c);
49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p "
59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from "
65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from "
91 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu "
99 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s",
107 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes "
115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d",
153 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s",
160 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s"
    [all...]
wps_common.c 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available");
77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available");
81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey);
88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key");
96 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared);
102 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey));
113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk));
122 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey",
124 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey"
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 211 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
213 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN);
214 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN);
215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
216 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", tmp, ptk_len);
219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len);
222 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
225 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len);
244 wpa_printf(MSG_DEBUG, "FILS: rMSK to PMK derivation");
253 wpa_hexdump_key(MSG_DEBUG, "FILS: rMSK", rmsk, rmsk_len)
    [all...]
  /external/wpa_supplicant_8/src/utils/
browser.c 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__);
57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__,
67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s",
80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime);
120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri);
128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title,
144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);

Completed in 1805 milliseconds

1 2 3 45 6 7 8 91011>>