Home
last modified time | relevance | path

Searched refs:MSG_DEBUG (Results 1 – 25 of 374) sorted by relevance

12345678910>>...15

/external/wpa_supplicant_8/src/wps/
Dwps_attr_parse.c27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
39 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
47 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
55 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
97 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
113 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext()
119 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext()
138 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr()
146 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr()
154 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " in wps_set_attr()
[all …]
Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid()
[all …]
Dwps_enrollee.c21 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr()
36 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
54 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
58 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
63 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
79 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
87 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
[all …]
Dwps_registrar.c147 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac()
151 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac()
159 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac()
168 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac()
175 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac()
184 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac()
329 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session()
331 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session()
352 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap()
355 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/wps/
Dwps_attr_parse.c27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr()
35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr()
43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " in wps_set_attr()
51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce " in wps_set_attr()
59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u", in wps_set_attr()
67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u", in wps_set_attr()
75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication " in wps_set_attr()
83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type " in wps_set_attr()
91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type " in wps_set_attr()
99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods " in wps_set_attr()
[all …]
Dwps_attr_process.c30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid()
[all …]
Dwps_enrollee.c25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr()
40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
[all …]
Dwps_registrar.c217 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
237 wpa_printf(MSG_DEBUG, "WPS UPnP: Drop pending M2/M2D"); in wps_registrar_free_pending_m2()
255 wpa_printf(MSG_DEBUG, "WPS: * AP Setup Locked"); in wps_build_ap_setup_locked()
269 wpa_printf(MSG_DEBUG, "WPS: * Selected Registrar"); in wps_build_selected_registrar()
285 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); in wps_build_sel_reg_dev_password_id()
304 wpa_printf(MSG_DEBUG, "WPS: * Selected Registrar Config Methods (%x)", in wps_build_sel_reg_config_methods()
318 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods); in wps_build_probe_config_methods()
340 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", resp); in wps_build_resp_type()
452 wpa_printf(MSG_DEBUG, "WPS: A new PIN configured (timeout=%d)", in wps_registrar_add_pin()
454 wpa_hexdump(MSG_DEBUG, "WPS: UUID", uuid, WPS_UUID_LEN); in wps_registrar_add_pin()
[all …]
/external/wpa_supplicant_8/src/eap_common/
Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
[all …]
Deap_sim_common.c52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk()
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys()
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys()
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys()
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys()
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth()
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Deap_sake_common.c31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
[all …]
Deap_sim_common.c57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk()
76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys()
101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys()
103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys()
105 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys()
124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth()
139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth()
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft()
38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft()
39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft()
43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft()
44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft()
49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_derive_ptk_ft()
50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft()
77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params()
82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params()
88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params()
[all …]
/external/wpa_supplicant_8/src/utils/
Dpcsc_funcs.c168 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols()
195 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols()
247 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ()
257 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ()
273 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ()
280 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ()
337 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid()
340 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid()
346 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid()
352 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
Dtlsv1_server_read.c46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello()
61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello()
67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello()
86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello()
89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello()
150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello()
181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello()
191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello()
194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello()
209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid " in tls_process_client_hello()
[all …]
Dtlsv1_client_read.c43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello()
182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello()
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys"); in tls_process_server_hello()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server_read.c41 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello()
56 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello()
62 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello()
81 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello()
84 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello()
104 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello()
160 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello()
191 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello()
201 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello()
204 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello()
[all …]
Dtlsv1_client_read.c39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello()
183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft()
44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft()
45 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft()
49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft()
50 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft()
54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_derive_ptk_ft()
55 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft()
75 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params()
85 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", r0kh_id, r0kh_id_len); in wpa_sm_set_ft_params()
98 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN); in wpa_sm_set_ft_params()
[all …]
/external/wpa_supplicant_8/src/p2p/
Dp2p_parse.c28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute()
33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute()
39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute()
44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute()
49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute()
54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute()
59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute()
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute()
68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute()
73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute()
[all …]
Dp2p_go_neg.c50 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); in p2p_peer_channels_check()
79 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d " in p2p_peer_channels_check()
189 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send()
199 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send()
212 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_connect_send()
233 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_build_go_neg_resp()
260 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating " in p2p_build_go_neg_resp()
303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Selected operating " in p2p_reselect_channel()
314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 5 GHz " in p2p_reselect_channel()
326 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 2.4 GHz " in p2p_reselect_channel()
[all …]
Dp2p_sd.c120 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_send_gas_comeback_req()
198 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd()
209 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd()
224 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_start_sd()
263 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
269 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
278 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
285 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
305 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, in p2p_rx_gas_initial_req()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
Dpcsc_funcs.c174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols()
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols()
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ()
263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ()
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ()
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ()
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid()
346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid()
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid()
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid()
[all …]
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c30 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send()
300 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " in wpa_ft_pull_pmk_r1()
312 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " in wpa_ft_pull_pmk_r1()
345 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_auth_derive_ptk_ft()
352 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN); in wpa_auth_derive_ptk_ft()
353 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft()
359 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN); in wpa_auth_derive_ptk_ft()
360 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_auth_derive_ptk_ft()
368 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_auth_derive_ptk_ft()
369 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/
Devents.c44 wpa_printf(MSG_DEBUG, "Select network based on association " in wpa_supplicant_select_config()
54 wpa_printf(MSG_DEBUG, "Selected network is disabled"); in wpa_supplicant_select_config()
58 wpa_printf(MSG_DEBUG, "Network configuration found for the current " in wpa_supplicant_select_config()
131 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA " in wpa_find_assoc_pmkid()
140 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event"); in wpa_supplicant_event_pmkid_candidate()
143 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR in wpa_supplicant_event_pmkid_candidate()
218 wpa_printf(MSG_DEBUG, "Selected network is configured to use " in wpa_supplicant_scard_init()
223 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM " in wpa_supplicant_scard_init()
297 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed"); in wpa_supplicant_ssid_bss_match()
301 wpa_printf(MSG_DEBUG, " skip RSN IE - proto " in wpa_supplicant_ssid_bss_match()
[all …]

12345678910>>...15