Searched refs:MSG_DEBUG (Results 226 - 250 of 757) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/src/utils/
H A Dext_password_test.c50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
H A Dstate_machine.h49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp_ap.c23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwnm_ap.c28 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
38 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
65 wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
94 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
113 wpa_printf(MSG_DEBUG, "Pass 4, gtk_len = %d",
124 wpa_printf(MSG_DEBUG, "Pass 4 igtk_len = %d",
146 wpa_printf(MSG_DEBUG, "Successfully send WNM-Sleep Response "
174 wpa_printf(MSG_DEBUG, "Fail to send WNM-Sleep Response frame");
209 wpa_printf(MSG_DEBUG, "EID %d not recognized", *pos);
214 wpa_printf(MSG_DEBUG, "N
[all...]
H A Dgas_serv.c35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
309 wpa_hexdump(MSG_DEBUG,
317 wpa_hexdump(MSG_DEBUG,
368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
563 wpa_printf(MSG_DEBUG, "GA
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_ndis_.c53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dext_password_test.c50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
H A Dstate_machine.h49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp_ap.c23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
48 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
65 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_openssl.c152 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
160 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
247 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
445 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
462 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
475 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
499 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret);
509 wpa_printf(MSG_DEBUG, "SSL: %s:%s",
527 wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s",
556 wpa_printf(MSG_DEBUG, "ENGIN
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Devents.c73 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association "
83 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled");
89 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily "
94 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the "
204 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
213 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
217 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
296 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to "
302 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to use SIM "
387 wpa_dbg(wpa_s, MSG_DEBUG, " ski
[all...]
H A Dbgscan_simple.c51 wpa_printf(MSG_DEBUG, "bgscan simple: Request a background scan");
53 wpa_printf(MSG_DEBUG, "bgscan simple: Failed to trigger scan");
66 wpa_printf(MSG_DEBUG, "bgscan simple: Backing "
131 wpa_printf(MSG_DEBUG, "bgscan simple: Signal strength threshold %d "
151 wpa_printf(MSG_DEBUG, "bgscan simple: Init scan interval: %d",
183 wpa_printf(MSG_DEBUG, "bgscan simple: scan result notification");
202 wpa_printf(MSG_DEBUG, "bgscan simple: beacon loss");
220 wpa_printf(MSG_DEBUG, "bgscan simple: signal level changed "
225 wpa_printf(MSG_DEBUG, "bgscan simple: Start using short "
251 wpa_printf(MSG_DEBUG, "bgsca
[all...]
H A Dwnm_sta.c25 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper);
36 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper);
82 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for "
109 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request "
139 wpa_printf(MSG_DEBUG, "action=%d token = %d key_len_total = %d",
151 wpa_printf(MSG_DEBUG, "EID %d not recognized", *pos);
156 wpa_printf(MSG_DEBUG, "No WNM-Sleep IE found");
161 wpa_printf(MSG_DEBUG, "Successfully recv WNM-Sleep Response "
175 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found");
185 wpa_printf(MSG_DEBUG, "Fai
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_wsc.c60 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
75 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
164 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
209 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
217 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
240 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
252 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
281 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in "
289 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow");
295 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_tls_common.c116 wpa_printf(MSG_DEBUG, "SSL: Generating Request");
151 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
159 wpa_printf(MSG_DEBUG, "SSL: Sending out %lu bytes "
178 wpa_printf(MSG_DEBUG, "SSL: Building ACK");
189 wpa_printf(MSG_DEBUG, "SSL: Fragment overflow");
194 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes, waiting for %lu "
208 wpa_printf(MSG_DEBUG, "SSL: No Message Length field in a "
226 wpa_printf(MSG_DEBUG, "SSL: No memory for message");
230 wpa_printf(MSG_DEBUG, "SSL: Received %lu bytes in first "
283 wpa_printf(MSG_DEBUG, "SS
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c57 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
145 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
170 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
175 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
209 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
226 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
242 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
280 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_mschapv2.c165 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
198 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
208 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
347 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
364 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
373 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
274 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_mschapv2.c160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
375 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
274 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_mschapv2.c160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
375 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
122 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
139 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
164 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
169 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
220 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
227 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
274 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dgas_serv.c35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
309 wpa_hexdump(MSG_DEBUG,
317 wpa_hexdump(MSG_DEBUG,
368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
563 wpa_printf(MSG_DEBUG, "GA
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dgas_serv.c35 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
39 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
88 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
98 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
273 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
301 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
309 wpa_hexdump(MSG_DEBUG,
317 wpa_hexdump(MSG_DEBUG,
368 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
563 wpa_printf(MSG_DEBUG, "GA
[all...]
/external/wpa_supplicant_6/wpa_supplicant/
H A Dscan.c38 wpa_printf(MSG_DEBUG, "Already associated with a configured network - "
95 wpa_printf(MSG_DEBUG, "%s: scan_req = %d, ap_scan = %d", __func__,
105 wpa_printf(MSG_DEBUG, "No enabled networks - do not scan");
114 wpa_printf(MSG_DEBUG, "Using wired authentication - "
151 wpa_printf(MSG_DEBUG, "wpa_supplicant_scan: Reached "
176 wpa_printf(MSG_DEBUG, "Trying to get current scan results "
196 wpa_printf(MSG_DEBUG, "Starting AP scan (%s SSID)",
199 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID",
254 wpa_msg(wpa_s, MSG_DEBUG, "Not rescheduling scan to "
261 wpa_msg(wpa_s, MSG_DEBUG, "Settin
[all...]

Completed in 1265 milliseconds

1234567891011>>