HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 76 - 100 of 297) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/
bgscan_simple.c 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
61 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
123 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
143 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
175 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
194 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
212 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
217 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
243 wpa_printf(MSG_DEBUG, "bgscan simple: Start using long bgscan
    [all...]
events.c 121 wpa_dbg(wpa_s, MSG_DEBUG,
186 wpa_msg(wpa_s, MSG_DEBUG,
192 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association "
202 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled");
208 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed");
214 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily "
219 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the "
226 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate
    [all...]
p2p_supplicant_sd.c 41 wpa_printf(MSG_DEBUG, "P2P: Invalid domain name "
52 wpa_printf(MSG_DEBUG, "P2P: No room for full "
59 wpa_printf(MSG_DEBUG, "P2P: Invalid DNS "
78 wpa_printf(MSG_DEBUG, "P2P: Invalid domain name "
231 wpa_printf(MSG_DEBUG, "P2P: SD Request for all Bonjour services");
234 wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available");
249 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service",
296 wpa_hexdump_ascii(MSG_DEBUG, "P2P: SD Request for Bonjour",
299 wpa_printf(MSG_DEBUG, "P2P: Bonjour protocol not available");
328 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Matching Bonjour service"
    [all...]
sme.c 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d",
92 wpa_printf(MSG_DEBUG, "SAE: No password available");
97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group");
105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
154 wpa_printf(MSG_DEBUG,
160 wpa_printf(MSG_DEBUG, "RRM: No RRM in network");
168 wpa_printf(MSG_DEBUG,
180 wpa_printf(MSG_DEBUG, "RRM: Adding RRM IE to Association Request");
259 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
263 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection:
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_common.c 223 wpa_printf(MSG_DEBUG, "EAP: Too short TV");
238 wpa_printf(MSG_DEBUG, "EAP: Too short TLV");
243 wpa_printf(MSG_DEBUG, "EAP: Truncated TLV");
248 wpa_printf(MSG_DEBUG,
266 wpa_printf(MSG_DEBUG,
272 wpa_printf(MSG_DEBUG,
279 wpa_printf(MSG_DEBUG, "EAP: Unknown TV/TLV type %u",
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags);
114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S",
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
192 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state")
    [all...]
eap_tnc.c 82 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
96 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
130 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
137 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
153 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
159 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
175 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
185 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
191 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first "
236 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d"
    [all...]
tncc.c 115 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
120 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
152 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
155 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
191 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
209 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
220 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
232 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
320 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
324 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu"
    [all...]
ikev2.c 106 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
140 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
141 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
152 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
161 wpa_printf(MSG_DEBUG, "IKEV2: No "
166 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
172 wpa_printf(MSG_DEBUG, "IKEV2: "
221 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
223 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
226 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_eke.c 59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u",
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u",
202 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x",
239 wpa_printf(MSG_DEBUG, "EAP-EKE: Received EAP-EKE-ID/Request");
242 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data");
254 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data (num_prop=%u)",
263 wpa_printf(MSG_DEBUG, "EAP-EKE: Proposal #%u: dh=%u encr=%u prf=%u mac=%u"
    [all...]
eap_vendor_test.c 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
83 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
90 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
97 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
106 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
117 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
  /hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/
driver_cmd_nl80211.c 115 wpa_printf(MSG_DEBUG, "%s: P2P: Device address ("MACSTR")",
118 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
120 wpa_printf(MSG_DEBUG, "%s: P2P: %s ", __func__, buf);
122 wpa_printf(MSG_DEBUG, "%s: %s ", __func__, buf);
129 wpa_printf(MSG_DEBUG, "%s %s len = %d, %zu", __func__, buf, ret, buf_len);
141 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
158 wpa_printf(MSG_DEBUG, "%s: Entry", __func__);
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 110 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
167 wpa_printf(MSG_DEBUG, "IKEV2: No "
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
178 wpa_printf(MSG_DEBUG, "IKEV2: "
229 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
231 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
234 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_server_psk.c 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 -
    [all...]
eap_server.c 293 wpa_printf(MSG_DEBUG, "EAP: Failed to "
394 wpa_printf(MSG_DEBUG, "EAP: method not initialized");
399 wpa_printf(MSG_DEBUG, "EAP: building EAP-Request: Identifier %d",
436 wpa_printf(MSG_DEBUG,
448 wpa_printf(MSG_DEBUG,
453 wpa_hexdump_key(MSG_DEBUG, "EAP: EMSK", emsk, emsk_len);
459 wpa_printf(MSG_DEBUG, "EAP: Could not derive EMSKname");
462 wpa_hexdump(MSG_DEBUG, "EAP: EMSKname", EMSKname, EAP_EMSK_NAME_LEN);
473 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP");
477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len)
    [all...]
eap_server_ikev2.c 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
201 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
221 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
tncs.c 135 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
151 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
156 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
187 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
190 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage",
230 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
271 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
295 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu,
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 59 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
84 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK",
86 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC",
127 wpa_hexdump_key(MSG_DEBUG, "WPA: Plaintext Key Data",
130 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
142 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
242 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
247 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
269 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/wps/
httpread.c 129 wpa_printf(MSG_DEBUG, "httpread_destroy(%p)", h);
148 wpa_printf(MSG_DEBUG, "httpread timeout (%p)", h);
170 wpa_printf(MSG_DEBUG,
379 wpa_printf(MSG_DEBUG, "httpread: Trying to read more data(%p)", h);
382 wpa_printf(MSG_DEBUG, "httpread failed: %s", strerror(errno));
393 wpa_printf(MSG_DEBUG, "httpread premature eof(%p)", h);
398 wpa_printf(MSG_DEBUG,
408 wpa_printf(MSG_DEBUG, "httpread ok eof(%p)", h);
428 wpa_printf(MSG_DEBUG,
447 wpa_printf(MSG_DEBUG, "httpread bad hdr(%p)", h)
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed:
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 36 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Invalid buffer "
59 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Failed to get "
70 wpa_printf(MSG_DEBUG, "PKCS #1: %s - Unsupported block type "
219 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len);
237 wpa_printf(MSG_DEBUG,
258 wpa_printf(MSG_DEBUG,
267 wpa_printf(MSG_DEBUG,
277 wpa_printf(MSG_DEBUG,
291 wpa_printf(MSG_DEBUG,
313 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 91 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
102 wpa_printf(MSG_DEBUG,
170 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
175 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
409 wpa_printf(MSG_DEBUG, "GnuTLS: Try to parse %s in DER format",
414 wpa_printf(MSG_DEBUG,
422 wpa_printf(MSG_DEBUG,
438 wpa_printf(MSG_DEBUG,
444 wpa_printf(MSG_DEBUG,
486 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]
  /external/wpa_supplicant_8/src/ap/
fils_hlp.c 46 wpa_printf(MSG_DEBUG,
88 wpa_printf(MSG_DEBUG, "FILS: Could not update DHCPDISCOVER");
140 wpa_printf(MSG_DEBUG,
171 wpa_printf(MSG_DEBUG, "FILS: DHCP read failed: %s",
175 wpa_printf(MSG_DEBUG, "FILS: DHCP response from server %s:%d (len=%d)",
184 wpa_printf(MSG_DEBUG,
194 wpa_printf(MSG_DEBUG, "FILS: HLP - no DHCP magic in response");
199 wpa_hexdump(MSG_DEBUG, "FILS: HLP - DHCP options in response",
227 wpa_printf(MSG_DEBUG,
234 wpa_printf(MSG_DEBUG,
    [all...]
dhcp_snoop.c 100 wpa_printf(MSG_DEBUG, "dhcp_snoop: Found DHCPACK for " MACSTR
110 wpa_printf(MSG_DEBUG,
120 wpa_printf(MSG_DEBUG,
144 wpa_printf(MSG_DEBUG,
vlan_ioctl.c 24 wpa_printf(MSG_DEBUG, "VLAN: vlan_rem(%s)", if_name);
67 wpa_printf(MSG_DEBUG, "VLAN: vlan_add(if_name=%s, vid=%d)",
100 wpa_printf(MSG_DEBUG,
132 wpa_printf(MSG_DEBUG, "VLAN: vlan_set_name_type(name_type=%u)",

Completed in 6943 milliseconds

1 2 34 5 6 7 8 91011>>