Searched refs:MSG_DEBUG (Results 1 - 25 of 640) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dp2p_hostapd.c36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
/external/wpa_supplicant_8/src/ap/
H A Dp2p_hostapd.c36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dp2p_hostapd.c36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_attr_parse.c28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
155 wpa_printf(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WP
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_attr_parse.c28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
155 wpa_printf(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WP
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_attr_parse.c28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u",
106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
155 wpa_printf(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
111 wpa_hexdump_ascii(MSG_DEBUG, "WP
[all...]
H A Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
32 wpa_printf(MSG_DEBUG,
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
52 wpa_printf(MSG_DEBUG,
57 wpa_printf(MSG_DEBUG,
66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
78 wpa_hexdump_buf(MSG_DEBUG, "WP
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_ikev2_common.c44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
H A Deap_fast_common.c52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_ikev2_common.c44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
66 wpa_printf(MSG_DEBUG, "EA
[all...]
H A Deap_ikev2_common.c44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2
[all...]
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
73 wpa_printf(MSG_DEBUG, "P2
[all...]

Completed in 1412 milliseconds

1234567891011>>