/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 39 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 47 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 55 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 97 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 113 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() 119 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext() 138 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr() 146 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr() 154 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " in wps_set_attr() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid() [all …]
|
D | wps_enrollee.c | 21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr() 36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 54 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 87 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() [all …]
|
D | wps_registrar.c | 147 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac() 151 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac() 159 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac() 168 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac() 175 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac() 184 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac() 329 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session() 331 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session() 352 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap() 355 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
D | wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr() 35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr() 43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " in wps_set_attr() 51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce " in wps_set_attr() 59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u", in wps_set_attr() 67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u", in wps_set_attr() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication " in wps_set_attr() 83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type " in wps_set_attr() 91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type " in wps_set_attr() 99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods " in wps_set_attr() [all …]
|
D | wps_attr_process.c | 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid() [all …]
|
D | wps_enrollee.c | 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr() 40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() [all …]
|
D | wps_registrar.c | 217 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 237 wpa_printf(MSG_DEBUG, "WPS UPnP: Drop pending M2/M2D"); in wps_registrar_free_pending_m2() 255 wpa_printf(MSG_DEBUG, "WPS: * AP Setup Locked"); in wps_build_ap_setup_locked() 269 wpa_printf(MSG_DEBUG, "WPS: * Selected Registrar"); in wps_build_selected_registrar() 285 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); in wps_build_sel_reg_dev_password_id() 304 wpa_printf(MSG_DEBUG, "WPS: * Selected Registrar Config Methods (%x)", in wps_build_sel_reg_config_methods() 318 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods); in wps_build_probe_config_methods() 340 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", resp); in wps_build_resp_type() 452 wpa_printf(MSG_DEBUG, "WPS: A new PIN configured (timeout=%d)", in wps_registrar_add_pin() 454 wpa_hexdump(MSG_DEBUG, "WPS: UUID", uuid, WPS_UUID_LEN); in wps_registrar_add_pin() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
D | eap_sim_common.c | 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys() 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys() 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sake_common.c | 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
D | eap_sim_common.c | 57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys() 101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys() 103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys() 105 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft() 38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft() 39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft() 44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft() 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_derive_ptk_ft() 50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() 77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params() 88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 168 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 195 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 247 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 257 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ() 273 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 280 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 337 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 340 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid() 346 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 352 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
D | tlsv1_server_read.c | 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello() 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello() 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello() 86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello() 89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello() 150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello() 181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello() 191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello() 194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello() 209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid " in tls_process_client_hello() [all …]
|
D | tlsv1_client_read.c | 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello() 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys"); in tls_process_server_hello() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server_read.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello() 56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello() 62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello() 81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello() 84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello() 104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello() 160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello() 191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello() 201 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello() 204 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello() [all …]
|
D | tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft() 44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft() 45 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft() 50 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() 54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_derive_ptk_ft() 55 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() 75 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 85 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", r0kh_id, r0kh_id_len); in wpa_sm_set_ft_params() 98 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params() [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute() 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute() 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute() 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute() 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute() 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute() 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute() 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute() 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute() 73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute() [all …]
|
D | p2p_go_neg.c | 50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); in p2p_peer_channels_check() 79 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d " in p2p_peer_channels_check() 189 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send() 199 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send() 212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send() 233 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_build_go_neg_resp() 260 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating " in p2p_build_go_neg_resp() 303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Selected operating " in p2p_reselect_channel() 314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 5 GHz " in p2p_reselect_channel() 326 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 2.4 GHz " in p2p_reselect_channel() [all …]
|
D | p2p_sd.c | 120 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_send_gas_comeback_req() 198 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd() 209 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd() 224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd() 263 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() 269 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() 278 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() 285 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() 305 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() 314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ() 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid() 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send() 300 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " in wpa_ft_pull_pmk_r1() 312 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " in wpa_ft_pull_pmk_r1() 345 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_auth_derive_ptk_ft() 352 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN); in wpa_auth_derive_ptk_ft() 353 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft() 359 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN); in wpa_auth_derive_ptk_ft() 360 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_auth_derive_ptk_ft() 368 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_auth_derive_ptk_ft() 369 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | events.c | 44 wpa_printf(MSG_DEBUG, "Select network based on association " in wpa_supplicant_select_config() 54 wpa_printf(MSG_DEBUG, "Selected network is disabled"); in wpa_supplicant_select_config() 58 wpa_printf(MSG_DEBUG, "Network configuration found for the current " in wpa_supplicant_select_config() 131 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA " in wpa_find_assoc_pmkid() 140 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event"); in wpa_supplicant_event_pmkid_candidate() 143 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR in wpa_supplicant_event_pmkid_candidate() 218 wpa_printf(MSG_DEBUG, "Selected network is configured to use " in wpa_supplicant_scard_init() 223 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM " in wpa_supplicant_scard_init() 297 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed"); in wpa_supplicant_ssid_bss_match() 301 wpa_printf(MSG_DEBUG, " skip RSN IE - proto " in wpa_supplicant_ssid_bss_match() [all …]
|