/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 176 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 210 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 218 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 236 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 247 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 252 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 266 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " 292 wpa_printf(MSG_DEBUG, "SSL: No memory for message"); 296 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first " 325 wpa_printf(MSG_DEBUG, "SSL: Failed - tls_out available to [all...] |
eap_server_tls.c | 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 191 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 202 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 243 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS " 272 wpa_printf(MSG_DEBUG, 280 wpa_printf(MSG_DEBUG, 287 wpa_printf(MSG_DEBUG, 314 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key", 317 wpa_printf(MSG_DEBUG, "EAP-TLS: Failed to derive key"); 346 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK" [all...] |
eap_sim_db.c | 103 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 129 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Adding database table for " 435 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Delete query timeout for %p", entry); 449 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Query timeout for %p", entry); 471 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 478 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported " 523 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Authentication data parsed " 530 wpa_printf(MSG_DEBUG, "EAP-SIM DB: Failed to parse response string"); 549 wpa_printf(MSG_DEBUG, "EAP-SIM DB: No pending entry for the " 556 wpa_printf(MSG_DEBUG, "EAP-SIM DB: External server reported [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
autoscan.c | 51 wpa_printf(MSG_DEBUG, 57 wpa_printf(MSG_DEBUG, "autoscan: Already initialized"); 105 wpa_printf(MSG_DEBUG, "autoscan: Initialized module '%s' with " 128 wpa_printf(MSG_DEBUG, "autoscan: Deinitializing module '%s'",
|
config_none.c | 42 wpa_printf(MSG_DEBUG, "Writing configuration file '%s'", name);
|
ctrl_iface_udp.c | 99 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 103 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 129 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached %s:%d", 136 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 168 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 176 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor level %s:%d", 183 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 250 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected source %s", 261 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 283 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - [all...] |
gas_query.c | 209 wpa_printf(MSG_DEBUG, "GAS: No memory to store the response"); 228 wpa_printf(MSG_DEBUG, "GAS: Unexpected TX status: freq=%u dst=" 237 wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR 241 wpa_printf(MSG_DEBUG, "GAS: TX status for unexpected destination"); 284 wpa_printf(MSG_DEBUG, "GAS: Send action frame to " MACSTR " len=%u " 331 wpa_printf(MSG_DEBUG, "GAS: Failed to send Action frame to " 346 wpa_printf(MSG_DEBUG, 354 wpa_printf(MSG_DEBUG, 374 wpa_printf(MSG_DEBUG, "GAS: Comeback timeout for request to " MACSTR, 393 wpa_printf(MSG_DEBUG, "GAS: Send comeback request to " MACST [all...] |
p2p_supplicant.c | 185 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused); 237 wpa_printf(MSG_DEBUG, "P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration", 259 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)", 277 wpa_printf(MSG_DEBUG, "P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for " 311 wpa_printf(MSG_DEBUG, 510 wpa_printf(MSG_DEBUG, 546 wpa_printf(MSG_DEBUG, 650 wpa_printf(MSG_DEBUG, "P2P: Conncap - in:%d role:%d", incoming, role); 678 wpa_printf(MSG_DEBUG, 684 wpa_printf(MSG_DEBUG, "P2P: p2p_no_group_iface") [all...] |
autoscan_exponential.c | 59 wpa_printf(MSG_DEBUG, "autoscan exponential: base exponential is %d " 81 wpa_printf(MSG_DEBUG, "autoscan exponential: scan result "
|
mesh_rsn.c | 38 wpa_printf(MSG_DEBUG, "AUTH: Re-authenticate with " MACSTR 70 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", 73 wpa_printf(MSG_DEBUG, "AUTH: %s", txt); 84 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", 106 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 110 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", 113 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); 151 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine"); 171 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed"); 189 wpa_hexdump_key(MSG_DEBUG, "mesh: Own TX IGTK" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_wired_common.c | 243 wpa_printf(MSG_DEBUG, 248 wpa_printf(MSG_DEBUG, 257 wpa_printf(MSG_DEBUG, 265 wpa_printf(MSG_DEBUG, "%s: Enabled allmulti mode", __func__); 272 wpa_printf(MSG_DEBUG, "%s: waiting for link to become active", 292 wpa_printf(MSG_DEBUG, 299 wpa_printf(MSG_DEBUG, 308 wpa_printf(MSG_DEBUG, "%s: Failed to disable allmulti mode", 316 wpa_printf(MSG_DEBUG, "%s: Failed to set the interface down",
|
driver_macsec_qca.c | 168 wpa_printf(MSG_DEBUG, "%s: es=%d, scb=%d, sci=%d", 182 wpa_printf(MSG_DEBUG, "%s", __func__); 192 wpa_printf(MSG_DEBUG, "%s", __func__); 205 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 219 wpa_printf(MSG_DEBUG, "%s: enabled=%d, win=%u", 239 wpa_printf(MSG_DEBUG, "%s: default support aes-gcm-128", __func__); 250 wpa_printf(MSG_DEBUG, "%s: enable=%d", __func__, enabled); 345 wpa_printf(MSG_DEBUG, "%s: lpn=0x%x", __func__, sa->lowest_pn); 364 wpa_printf(MSG_DEBUG, "%s: npn=0x%x", __func__, sa->next_pn); 404 wpa_printf(MSG_DEBUG, "%s: channel=%d" [all...] |
driver_nl80211.c | 144 wpa_printf(MSG_DEBUG, 617 wpa_printf(MSG_DEBUG, "nl80211: Register beacons command " 652 wpa_printf(MSG_DEBUG, "nl80211: Unexpected beacon event? (%d)", 822 wpa_printf(MSG_DEBUG, "nl80211: Interface %s does not exist - ignore RTM_NEWLINK", 828 wpa_printf(MSG_DEBUG, "nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event", 854 wpa_printf(MSG_DEBUG, "nl80211: if_removed already set - ignore RTM_DELLINK event for %s", 858 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed - mark if_removed=1", 862 wpa_printf(MSG_DEBUG, "RTM_DELLINK: Interface '%s' removed", 912 wpa_printf(MSG_DEBUG, "nl80211: Update ifindex for a removed " 984 wpa_printf(MSG_DEBUG, "RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s)" [all...] |
driver_atheros.c | 210 wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x " 295 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v); 325 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v); 332 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x", 353 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v); 360 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa); 373 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled); 405 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled); 417 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 428 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 70 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)", 160 wpa_printf(MSG_DEBUG, 196 wpa_printf(MSG_DEBUG, 248 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 275 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 295 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 320 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 330 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 354 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 361 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 121 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)", 356 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", 361 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element", 388 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 397 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 406 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key", 415 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 425 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key", 434 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 443 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key" [all...] |
peerkey.c | 108 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error (peer " 112 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK Error " 168 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3"); 188 wpa_printf(MSG_DEBUG, "RSN: Received SMK M2"); 208 wpa_printf(MSG_DEBUG, "RSN: SMK M2 - SMK initiator " MACSTR, 231 wpa_printf(MSG_DEBUG, "RSN: Using %s for PeerKey", 270 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 367 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 371 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 1/4 to " MACSTR, 427 wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 224 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); 255 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 274 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 283 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 289 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 295 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 300 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 305 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate"); 310 wpa_printf(MSG_DEBUG, "IKEV2: Payload: [all...] |
/external/wpa_supplicant_8/src/ap/ |
acs.c | 347 wpa_printf(MSG_DEBUG, "ACS: %d: insufficient data", i); 355 wpa_printf(MSG_DEBUG, "ACS: %d: min_nf=%d interference_factor=%Lg nf=%d time=%lu busy=%lu rx=%lu", 504 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for channel %d (%d MHz)", 509 wpa_printf(MSG_DEBUG, "ACS: * interference factor average: %Lg", 599 wpa_printf(MSG_DEBUG, "ACS: Survey analysis for selected bandwidth %d MHz", 622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80", 653 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not enough bandwidth", 715 wpa_printf(MSG_DEBUG, 719 wpa_printf(MSG_DEBUG, [all...] |
sta_info.c | 117 wpa_printf(MSG_DEBUG, "Could not remove STA " MACSTR " from " 148 wpa_printf(MSG_DEBUG, "AP: could not remove STA " MACSTR 260 wpa_printf(MSG_DEBUG, "%s: cancel ap_handle_timer for " MACSTR, 366 wpa_printf(MSG_DEBUG, "Removing station " MACSTR, 388 wpa_printf(MSG_DEBUG, "%s: %s: " MACSTR " flags=0x%x timeout_next=%d", 411 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 422 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 431 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 438 wpa_msg(hapd->msg_ctx, MSG_DEBUG, 453 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACST [all...] |
wps_hostapd.c | 104 wpa_printf(MSG_DEBUG, 108 wpa_printf(MSG_DEBUG, 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 116 wpa_printf(MSG_DEBUG, "Unexpected PSK length %lu", 143 wpa_printf(MSG_DEBUG, "Failed to add the PSK to " 180 wpa_printf(MSG_DEBUG, "WPS: PIN needed for E-UUID %s", uuid); 276 wpa_printf(MSG_DEBUG, "WPS: Reload configuration data"); 295 wpa_printf(MSG_DEBUG, "WPS: Reschedule immediate configuration reload"); 318 wpa_printf(MSG_DEBUG, "WPS: Updating in-memory configuration"); 408 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute" [all...] |
/external/wpa_supplicant_8/src/wps/ |
http_client.c | 39 wpa_printf(MSG_DEBUG, "HTTP: Timeout (c=%p)", c); 49 wpa_printf(MSG_DEBUG, "HTTP: httpread callback: handle=%p cookie=%p " 59 wpa_printf(MSG_DEBUG, "HTTP: Response OK from " 65 wpa_printf(MSG_DEBUG, "HTTP: Error %d from " 91 wpa_printf(MSG_DEBUG, "HTTP: Send client request to %s:%d (%lu of %lu " 99 wpa_printf(MSG_DEBUG, "HTTP: Failed to send buffer: %s", 107 wpa_printf(MSG_DEBUG, "HTTP: Sent %d of %lu bytes; %lu bytes " 115 wpa_printf(MSG_DEBUG, "HTTP: Full client request sent to %s:%d", 153 wpa_printf(MSG_DEBUG, "HTTP: fnctl(O_NONBLOCK) failed: %s", 160 wpa_printf(MSG_DEBUG, "HTTP: Failed to connect: %s" [all...] |
wps_common.c | 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); 77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); 81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); 88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); 96 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); 102 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); 113 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); 122 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", 124 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey" [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 211 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR, 213 wpa_hexdump(MSG_DEBUG, "WPA: Nonce1", nonce1, WPA_NONCE_LEN); 214 wpa_hexdump(MSG_DEBUG, "WPA: Nonce2", nonce2, WPA_NONCE_LEN); 215 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 216 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", tmp, ptk_len); 219 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); 222 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); 225 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); 244 wpa_printf(MSG_DEBUG, "FILS: rMSK to PMK derivation"); 253 wpa_hexdump_key(MSG_DEBUG, "FILS: rMSK", rmsk, rmsk_len) [all...] |
/external/wpa_supplicant_8/src/utils/ |
browser.c | 26 wpa_printf(MSG_DEBUG, "BROWSER:%s", __func__); 57 wpa_printf(MSG_DEBUG, "BROWSER:%s progress=%d", __func__, 67 wpa_printf(MSG_DEBUG, "BROWSER:%s load-status=%d uri=%s", 80 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 103 wpa_printf(MSG_DEBUG, "BROWSER:%s mime=%s", __func__, mime); 120 wpa_printf(MSG_DEBUG, "BROWSER:%s uri=%s", __func__, uri); 128 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s uri=%s", __func__, title, 144 wpa_printf(MSG_DEBUG, "BROWSER:%s title=%s", __func__, title);
|