Searched refs:MSG_DEBUG (Results 151 - 175 of 744) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dasn1.c42 wpa_printf(MSG_DEBUG, "ASN.1: Identifier "
57 wpa_printf(MSG_DEBUG, "ASN.1: Reserved length "
64 wpa_printf(MSG_DEBUG, "ASN.1: Too long length field");
69 wpa_printf(MSG_DEBUG, "ASN.1: Length "
81 wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow");
112 wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value");
143 wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d "
212 wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored "
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
125 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
200 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
217 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
224 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
272 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
125 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
200 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
217 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
224 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
272 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
125 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
200 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
217 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
224 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication "
233 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
272 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c55 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR
64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
69 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
89 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK",
91 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC",
132 wpa_hexdump_key(MSG_DEBUG, "WPA: Plaintext Key Data",
135 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
147 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
247 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
252 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c55 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR
64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
69 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
89 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK",
91 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC",
132 wpa_hexdump_key(MSG_DEBUG, "WPA: Plaintext Key Data",
135 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
147 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
247 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
252 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c55 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL-Key frame to " MACSTR
64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
69 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
89 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK",
91 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC",
132 wpa_hexdump_key(MSG_DEBUG, "WPA: Plaintext Key Data",
135 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len);
147 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
247 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
252 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
340 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_aka.c83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
340 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dblacklist.c66 wpa_printf(MSG_DEBUG, "BSSID " MACSTR " blacklist count "
79 wpa_printf(MSG_DEBUG, "Added BSSID " MACSTR " into blacklist",
107 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
135 wpa_printf(MSG_DEBUG, "Removed BSSID " MACSTR " from "
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
274 wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
313 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
325 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
340 wpa_printf(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_ndis_.c53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dext_password_test.c50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
H A Dstate_machine.h49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_upnp_ap.c23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
46 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
62 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_ndis_.c53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
/external/wpa_supplicant_8/src/utils/
H A Dext_password_test.c50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
H A Dstate_machine.h49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp_ap.c23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
46 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
62 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_ndis_.c53 wpa_printf(MSG_DEBUG, "NDIS: event - type %d", type);
59 wpa_printf(MSG_DEBUG, "NDIS: event data overflow");
96 wpa_printf(MSG_DEBUG, "%s: ReadFile() failed: %d", __func__,
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dext_password_test.c50 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s)", name);
68 wpa_hexdump_ascii_key(MSG_DEBUG, "EXT PW TEST: value",
79 wpa_printf(MSG_DEBUG, "EXT PW TEST: get(%s) - not found", name);
H A Dstate_machine.h49 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " #machine \
68 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " \
86 wpa_printf(MSG_DEBUG, STATE_MACHINE_DEBUG_PREFIX ": " MACSTR " " \
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp_ap.c23 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar from ER timed out");
46 wpa_printf(MSG_DEBUG, "WPS: SetSelectedRegistrar: Disable "
62 wpa_printf(MSG_DEBUG, "WPS: Add broadcast "
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_gpsk_common.c154 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
168 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
290 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
296 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
301 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
315 wpa_hexdump(MSG_DEBUG, "EA
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_gpsk_common.c154 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
168 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
172 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
290 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
296 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
301 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
315 wpa_hexdump(MSG_DEBUG, "EA
[all...]

Completed in 735 milliseconds

1234567891011>>