/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 173 wpa_printf(MSG_DEBUG, "EA [all...] |
H A D | eap_sim_common.c | 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 134 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 173 wpa_printf(MSG_DEBUG, "EA [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 289 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 424 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 436 wpa_printf(MSG_DEBUG, "SCAR [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 289 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 424 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 436 wpa_printf(MSG_DEBUG, "SCAR [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 289 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 424 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 436 wpa_printf(MSG_DEBUG, "SCAR [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); 95 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 208 wpa_hexdump(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); 95 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 208 wpa_hexdump(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); 95 wpa_printf(MSG_DEBUG, "WP [all...] |
H A D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 208 wpa_hexdump(MSG_DEBUG, "WP [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | offchannel.c | 41 wpa_printf(MSG_DEBUG, 60 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s " 79 wpa_printf(MSG_DEBUG, 101 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX " 114 wpa_printf(MSG_DEBUG, "Off-channel: Schedule " 118 wpa_printf(MSG_DEBUG, 128 wpa_printf(MSG_DEBUG, "Off-channel: Failed to " 141 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to " 153 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the " 184 wpa_printf(MSG_DEBUG, "Of [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs8.c | 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 114 wpa_printf(MSG_DEBUG, "PKC [all...] |
H A D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs8.c | 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 114 wpa_printf(MSG_DEBUG, "PKC [all...] |
H A D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs8.c | 33 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 43 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 54 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 61 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 74 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 88 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 98 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 109 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 114 wpa_printf(MSG_DEBUG, "PKC [all...] |
H A D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 290 wpa_printf(MSG_DEBUG, "TLSv [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.1/ |
H A D | hidl.cpp | 44 wpa_printf(MSG_DEBUG, "Initing hidl control"); 76 wpa_printf(MSG_DEBUG, "Deiniting hidl control"); 89 MSG_DEBUG, "Registering interface to hidl control: %s", 105 MSG_DEBUG, "Deregistering interface from hidl control: %s", 122 MSG_DEBUG, "Registering network to hidl control: %d", ssid->id); 138 MSG_DEBUG, "Deregistering network from hidl control: %d", ssid->id); 153 MSG_DEBUG, "Notifying state change event to hidl control: %d", 171 MSG_DEBUG, "Notifying network request to hidl control: %d", 190 MSG_DEBUG, 209 MSG_DEBUG, "Notifyin [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
H A D | hidl.cpp | 44 wpa_printf(MSG_DEBUG, "Initing hidl control"); 76 wpa_printf(MSG_DEBUG, "Deiniting hidl control"); 89 MSG_DEBUG, "Registering interface to hidl control: %s", 105 MSG_DEBUG, "Deregistering interface from hidl control: %s", 122 MSG_DEBUG, "Registering network to hidl control: %d", ssid->id); 138 MSG_DEBUG, "Deregistering network from hidl control: %d", ssid->id); 153 MSG_DEBUG, "Notifying state change event to hidl control: %d", 171 MSG_DEBUG, "Notifying network request to hidl control: %d", 190 MSG_DEBUG, 209 MSG_DEBUG, "Notifyin [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_parse.c | 46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 91 wpa_printf(MSG_DEBUG, "P2 [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_parse.c | 46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 91 wpa_printf(MSG_DEBUG, "P2 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_parse.c | 46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 91 wpa_printf(MSG_DEBUG, "P2 [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 134 wpa_printf(MSG_DEBUG, "EA [all...] |