HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 26 - 50 of 297) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/
hs20_supplicant.c 74 wpa_printf(MSG_DEBUG,
84 wpa_printf(MSG_DEBUG,
91 wpa_printf(MSG_DEBUG,
245 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
254 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
258 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
308 wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)",
337 wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR
355 wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons");
357 wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons for
    [all...]
ctrl_iface_named_pipe.c 123 wpa_printf(MSG_DEBUG, "CTRL: closing broken pipe %p",
141 wpa_printf(MSG_DEBUG, "CTRL: Open pipe %p", dst);
192 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: connection in "
196 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe: already "
202 wpa_printf(MSG_DEBUG, "CTRL: ConnectNamedPipe error: %d",
224 wpa_printf(MSG_DEBUG, "CTRL: close pipe %p", dst);
258 wpa_printf(MSG_DEBUG, "CTRL: Overlapped write completed: dst=%p "
270 wpa_printf(MSG_DEBUG, "CTRL: ReadFileEx failed: %d",
275 wpa_printf(MSG_DEBUG, "CTRL: Overlapped read started for %p", dst);
294 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached")
    [all...]
ibss_rsn.c 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__)
    [all...]
rrm.c 31 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report - NONE");
67 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len);
72 wpa_printf(MSG_DEBUG,
93 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report (token = %d)",
145 wpa_printf(MSG_DEBUG, "RRM: No connection, no RRM.");
150 wpa_printf(MSG_DEBUG, "RRM: No RRM in current connection.");
158 wpa_printf(MSG_DEBUG,
165 wpa_printf(MSG_DEBUG,
175 wpa_printf(MSG_DEBUG,
180 wpa_printf(MSG_DEBUG, "RRM: Neighbor report request (for %s), token=%d"
    [all...]
interworking.c 131 wpa_printf(MSG_DEBUG, "ANQP: Response callback dst=" MACSTR
254 wpa_msg(wpa_s, MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
276 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info",
316 wpa_msg(wpa_s, MSG_DEBUG, "ANQP: Failed to send Query Request");
322 wpa_msg(wpa_s, MSG_DEBUG,
366 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
372 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
378 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
385 wpa_printf(MSG_DEBUG,
393 wpa_printf(MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d",
88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key "
94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on "
98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success "
102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after "
108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding");
111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding");
114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding");
120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled");
123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled")
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.c 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
201 wpa_printf(MSG_DEBUG,
208 wpa_printf(MSG_DEBUG,
214 wpa_printf(MSG_DEBUG,
221 wpa_printf(MSG_DEBUG,
229 wpa_printf(MSG_DEBUG, "TLSv1: Only probe server certificate");
290 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key "
434 wpa_printf(MSG_DEBUG,
    [all...]
bignum.c 83 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
102 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
144 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
162 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
180 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
200 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
220 wpa_printf(MSG_DEBUG, "BIGNUM: %s failed", __func__);
pkcs5.c 112 wpa_printf(MSG_DEBUG,
123 wpa_printf(MSG_DEBUG,
133 wpa_printf(MSG_DEBUG,
139 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 keyDerivationFunc algorithm %s",
142 wpa_printf(MSG_DEBUG,
166 wpa_printf(MSG_DEBUG,
180 wpa_printf(MSG_DEBUG,
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
193 wpa_printf(MSG_DEBUG,
205 wpa_hexdump(MSG_DEBUG,
    [all...]
x509v3.c 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
198 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
333 wpa_printf(MSG_DEBUG, "X509: Expected SET "
346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
363 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_wsc_common.c 28 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/FRAG_ACK");
  /external/wpa_supplicant_8/src/wps/
wps_upnp_event.c 76 wpa_printf(MSG_DEBUG, "WPS UPnP: Delete event %p", e);
91 wpa_printf(MSG_DEBUG, "WPS UPnP: Dequeue event %p for "
122 wpa_printf(MSG_DEBUG, "WPS UPnP: Retry event %p for subscription %p",
129 wpa_printf(MSG_DEBUG, "WPS UPnP: Try address %d", e->retry);
132 wpa_printf(MSG_DEBUG, "WPS UPnP: Giving up on sending event "
178 wpa_printf(MSG_DEBUG, "WPS UPnP: Failed to send event %p to %s "
192 wpa_printf(MSG_DEBUG, "WPS UPnP: Deleting subscription %p "
200 wpa_printf(MSG_DEBUG, "WPS UPnP: Removing subscription %p "
218 wpa_printf(MSG_DEBUG, "WPS UPnP: HTTP client callback: e=%p c=%p "
222 wpa_printf(MSG_DEBUG,
    [all...]
wps_er.c 183 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
200 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
206 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
229 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
234 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
241 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
330 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
337 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
362 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
373 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)"
    [all...]
wps_registrar.c 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR,
210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was "
218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR,
234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the "
243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs",
384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for "
386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E",
407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap");
410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque",
196 wpa_printf(MSG_DEBUG,
    [all...]
eap_server_tnc.c 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request");
254 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
265 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
292 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
303 wpa_printf(MSG_DEBUG, "EAP-TNC: Failed to "
346 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d",
352 wpa_printf(MSG_DEBUG, "EAP-TNC: Peer used Start flag")
    [all...]
eap_server_ttls.c 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
197 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
220 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
229 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
255 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name",
267 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: "
274 wpa_hexdump(MSG_DEBUG,
281 wpa_hexdump(MSG_DEBUG,
288 wpa_hexdump(MSG_DEBUG,
    [all...]
eap_server_peap.c 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
178 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
241 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
250 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
292 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data",
336 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: IPMK from TK",
344 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: CMK from TK",
351 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk));
360 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40)
    [all...]
eap_server_wsc.c 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P "
178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
223 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
254 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
266 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
295 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in
    [all...]
eap_server_sim.c 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ");
135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
175 wpa_printf(MSG_DEBUG, " AT_IV");
176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter)
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis.c 471 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
478 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
485 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
507 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
513 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
551 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
576 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
592 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
608 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
621 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
ndis_events.c 184 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
207 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
228 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
235 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
250 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
256 wpa_printf(MSG_DEBUG, "Could not get "
267 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event "
278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len);
290 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival");
297 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval")
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 203 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
239 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
293 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
357 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
369 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
410 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
411 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
413 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
432 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
436 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK"
    [all...]
  /external/wpa_supplicant_8/src/ap/
wmm.c 102 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
108 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
114 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
164 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
167 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
169 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
171 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
174 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
179 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)");
184 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
milenage.c 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16);
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
286 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16);
287 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16);
288 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6);
293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6);
299 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6);
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2)
    [all...]

Completed in 3414 milliseconds

12 3 4 5 6 7 8 91011>>