/external/wpa_supplicant_8/wpa_supplicant/ |
hs20_supplicant.c | 74 wpa_printf(MSG_DEBUG, 84 wpa_printf(MSG_DEBUG, 91 wpa_printf(MSG_DEBUG, 245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " 254 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 258 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", 337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR 355 wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons"); 357 wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons for [all...] |
ctrl_iface_named_pipe.c | 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p", 141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst); 192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in " 196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already " 202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d", 224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst); 258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p " 270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d", 275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst); 294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached") [all...] |
ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__) [all...] |
rrm.c | 31 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report - NONE"); 67 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len); 72 wpa_printf(MSG_DEBUG, 93 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report (token = %d)", 145 wpa_printf(MSG_DEBUG, "RRM: No connection, no RRM."); 150 wpa_printf(MSG_DEBUG, "RRM: No RRM in current connection."); 158 wpa_printf(MSG_DEBUG, 165 wpa_printf(MSG_DEBUG, 175 wpa_printf(MSG_DEBUG, 180 wpa_printf(MSG_DEBUG, "RRM: Neighbor report request (for %s), token=%d" [all...] |
interworking.c | 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR 254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 276 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info", 316 wpa_msg(wpa_s, MSG_DEBUG, "ANQP: Failed to send Query Request"); 322 wpa_msg(wpa_s, MSG_DEBUG, 366 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 372 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 378 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 385 wpa_printf(MSG_DEBUG, 393 wpa_printf(MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", 88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " 98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " 102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " 108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); 111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); 114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); 120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); 123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled") [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " 201 wpa_printf(MSG_DEBUG, 208 wpa_printf(MSG_DEBUG, 214 wpa_printf(MSG_DEBUG, 221 wpa_printf(MSG_DEBUG, 229 wpa_printf(MSG_DEBUG, "TLSv1: Only probe server certificate"); 290 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key " 434 wpa_printf(MSG_DEBUG, [all...] |
bignum.c | 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__); 220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
|
pkcs5.c | 112 wpa_printf(MSG_DEBUG, 123 wpa_printf(MSG_DEBUG, 133 wpa_printf(MSG_DEBUG, 139 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 keyDerivationFunc algorithm %s", 142 wpa_printf(MSG_DEBUG, 166 wpa_printf(MSG_DEBUG, 180 wpa_printf(MSG_DEBUG, 188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); 193 wpa_printf(MSG_DEBUG, 205 wpa_hexdump(MSG_DEBUG, [all...] |
x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 198 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 363 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_wsc_common.c | 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_event.c | 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e); 91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for " 122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p", 129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry); 132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event " 178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s " 192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p " 200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p " 218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p " 222 wpa_printf(MSG_DEBUG, [all...] |
wps_er.c | 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
wps_registrar.c | 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " 218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " 243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " 386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); 410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", 196 wpa_printf(MSG_DEBUG, [all...] |
eap_server_tnc.c | 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request"); 254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to " 346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d", 352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag") [all...] |
eap_server_ttls.c | 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 197 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 220 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 229 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 255 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name", 267 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: " 274 wpa_hexdump(MSG_DEBUG, 281 wpa_hexdump(MSG_DEBUG, 288 wpa_hexdump(MSG_DEBUG, [all...] |
eap_server_peap.c | 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s", 178 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d", 241 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready"); 250 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data", 292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data", 336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK", 344 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK", 351 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk)); 360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40) [all...] |
eap_server_wsc.c | 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in [all...] |
eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 175 wpa_printf(MSG_DEBUG, " AT_IV"); 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); 180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter) [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis.c | 471 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 478 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 485 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 507 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 513 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 551 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 576 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 592 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 608 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 621 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
ndis_events.c | 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 207 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 256 wpa_printf(MSG_DEBUG, "Could not get " 267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " 278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len); 290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival"); 297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval") [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 203 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 239 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 293 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " 357 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request"); 369 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for " 410 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); 411 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); 413 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input", 432 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 436 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK" [all...] |
/external/wpa_supplicant_8/src/ap/ |
wmm.c | 102 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 108 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 114 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 164 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 167 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 169 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 171 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 174 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 179 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)"); 184 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16); 287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16); 288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6); 293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6); 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2) [all...] |