/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password_test.c | 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name); 68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value", 79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
|
H A D | state_machine.h | 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \ 68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \ 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_ap.c | 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out"); 48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable " 65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wnm_ap.c | 28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__); 94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 113 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d", 124 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d", 146 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response " 174 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame"); 209 wpa_printf(MSG_DEBUG, "EID %d not recognized", *pos); 214 wpa_printf(MSG_DEBUG, "N [all...] |
H A D | gas_serv.c | 35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for " 39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR 88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR, 98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for " 273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx], 301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query", 309 wpa_hexdump(MSG_DEBUG, 317 wpa_hexdump(MSG_DEBUG, 368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d", 563 wpa_printf(MSG_DEBUG, "GA [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_ndis_.c | 53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type); 59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow"); 96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password_test.c | 50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name); 68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value", 79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
|
H A D | state_machine.h | 49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \ 68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \ 86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp_ap.c | 23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out"); 48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable " 65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 152 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 160 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 247 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 445 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store " 462 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 475 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store " 499 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret); 509 wpa_printf(MSG_DEBUG, "SSL: %s:%s", 527 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s", 556 wpa_printf(MSG_DEBUG, "ENGIN [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 73 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association " 83 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled"); 89 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily " 94 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the " 204 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 213 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 217 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 296 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to " 302 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to use SIM " 387 wpa_dbg(wpa_s, MSG_DEBUG, " ski [all...] |
H A D | bgscan_simple.c | 51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan"); 53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan"); 66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing " 131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d " 151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d", 183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification"); 202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss"); 220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed " 225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short " 251 wpa_printf(MSG_DEBUG, "bgsca [all...] |
H A D | wnm_sta.c | 25 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); 36 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); 82 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " 109 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " 139 wpa_printf(MSG_DEBUG, "action=%d token = %d key_len_total = %d", 151 wpa_printf(MSG_DEBUG, "EID %d not recognized", *pos); 156 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found"); 161 wpa_printf(MSG_DEBUG, "Successfully recv WNM-Sleep Response " 175 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); 185 wpa_printf(MSG_DEBUG, "Fai [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_wsc.c | 60 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 75 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 164 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 209 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 217 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 240 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 252 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 281 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " 289 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow"); 295 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_tls_common.c | 116 wpa_printf(MSG_DEBUG, "SSL: Generating Request"); 151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes " 178 wpa_printf(MSG_DEBUG, "SSL: Building ACK"); 189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow"); 194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu " 208 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a " 226 wpa_printf(MSG_DEBUG, "SSL: No memory for message"); 230 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first " 283 wpa_printf(MSG_DEBUG, "SS [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 280 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_mschapv2.c | 165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 198 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 347 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 364 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 373 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 274 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_mschapv2.c | 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 375 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 274 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_mschapv2.c | 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 375 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 274 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | gas_serv.c | 35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for " 39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR 88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR, 98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for " 273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx], 301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query", 309 wpa_hexdump(MSG_DEBUG, 317 wpa_hexdump(MSG_DEBUG, 368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d", 563 wpa_printf(MSG_DEBUG, "GA [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | gas_serv.c | 35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for " 39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR 88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR, 98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for " 273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx], 301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query", 309 wpa_hexdump(MSG_DEBUG, 317 wpa_hexdump(MSG_DEBUG, 368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d", 563 wpa_printf(MSG_DEBUG, "GA [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | scan.c | 38 wpa_printf(MSG_DEBUG, "Already associated with a configured network - " 95 wpa_printf(MSG_DEBUG, "%s: scan_req = %d, ap_scan = %d", __func__, 105 wpa_printf(MSG_DEBUG, "No enabled networks - do not scan"); 114 wpa_printf(MSG_DEBUG, "Using wired authentication - " 151 wpa_printf(MSG_DEBUG, "wpa_supplicant_scan: Reached " 176 wpa_printf(MSG_DEBUG, "Trying to get current scan results " 196 wpa_printf(MSG_DEBUG, "Starting AP scan (%s SSID)", 199 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID", 254 wpa_msg(wpa_s, MSG_DEBUG, "Not rescheduling scan to " 261 wpa_msg(wpa_s, MSG_DEBUG, "Settin [all...] |