/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
/external/wpa_supplicant_8/src/ap/ |
H A D | p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | p2p_hostapd.c | 36 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 46 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 56 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 61 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 70 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 73 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 81 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 84 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " 147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 155 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 111 wpa_hexdump_ascii(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 52 wpa_printf(MSG_DEBUG, 57 wpa_printf(MSG_DEBUG, 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " 147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 155 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 111 wpa_hexdump_ascii(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 52 wpa_printf(MSG_DEBUG, 57 wpa_printf(MSG_DEBUG, 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " 147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 155 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 111 wpa_hexdump_ascii(MSG_DEBUG, "WP [all...] |
H A D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 32 wpa_printf(MSG_DEBUG, 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); 52 wpa_printf(MSG_DEBUG, 57 wpa_printf(MSG_DEBUG, 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 78 wpa_hexdump_buf(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 52 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 59 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 105 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_ikev2_common.c | 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
H A D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_ikev2_common.c | 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 66 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_ikev2_common.c | 44 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 62 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 79 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 86 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 92 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 112 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 73 wpa_printf(MSG_DEBUG, "P2 [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 73 wpa_printf(MSG_DEBUG, "P2 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 73 wpa_printf(MSG_DEBUG, "P2 [all...] |