/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem() 106 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 122 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() 128 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext() 147 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr() 155 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " in wps_set_attr() [all …]
|
D | wps_enrollee.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 45 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 61 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 68 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 75 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 87 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 92 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 102 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 111 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid() [all …]
|
D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key() 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key() 32 wpa_printf(MSG_DEBUG, in wps_build_public_key() 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key() 52 wpa_printf(MSG_DEBUG, in wps_build_public_key() 57 wpa_printf(MSG_DEBUG, in wps_build_public_key() 66 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key() 72 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key() 77 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key() 78 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key() [all …]
|
D | wps_registrar.c | 206 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac() 210 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac() 218 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac() 227 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac() 234 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac() 243 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac() 384 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session() 386 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session() 407 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap() 410 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap() [all …]
|
D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer() 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name() 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number() 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number() 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type() 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type() 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type() 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name() 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version() 208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr() 27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr() 34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr() 36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr() 43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr() 45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr() 52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr() 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr() 61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr() 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr() [all …]
|
D | eap_sim_common.c | 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk() 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk() 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk() 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk() 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys() 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys() 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys() 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys() 119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth() 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth() [all …]
|
D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload() 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload() 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret() 155 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk() 171 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk() 184 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 195 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 201 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 29 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft() 38 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft() 39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 43 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft() 44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft() 49 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); in wpa_derive_ptk_ft() 50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() 77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 82 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params() 88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params() [all …]
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 28 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute() 33 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute() 39 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute() 44 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute() 49 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute() 54 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute() 59 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute() 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute() 68 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute() 73 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 192 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols() 219 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols() 271 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ() 281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ() 320 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ() 333 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ() 406 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid() 409 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid() 415 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid() 421 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_read.c | 39 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 54 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 60 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 80 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 88 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 109 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 138 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 183 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello() [all …]
|
D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite() 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher() 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher() 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher() 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher() 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send() 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send() 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive() [all …]
|
D | x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free() 197 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_algorithm_identifier() 239 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_public_key() 258 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " in x509_parse_public_key() 267 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", in x509_parse_public_key() 279 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key() 315 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name() 333 wpa_printf(MSG_DEBUG, "X509: Expected SET " in x509_parse_name() 346 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name() 363 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 37 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); in wpa_ft_rrb_send() 67 wpa_printf(MSG_DEBUG, "FT: add_tspec is not initialized"); in wpa_ft_add_tspec() 319 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID", in wpa_ft_pull_pmk_r1() 324 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " in wpa_ft_pull_pmk_r1() 336 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " in wpa_ft_pull_pmk_r1() 378 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_auth_derive_ptk_ft() 385 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN); in wpa_auth_derive_ptk_ft() 386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft() 392 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN); in wpa_auth_derive_ptk_ft() 393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_auth_derive_ptk_ft() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_gpsk.c | 56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state() 108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); in eap_gpsk_build_gpsk_1() 150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); in eap_gpsk_build_gpsk_3() 201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", in eap_gpsk_buildReq() 222 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); in eap_gpsk_check() 250 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2"); in eap_gpsk_process_gpsk_2() 256 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " in eap_gpsk_process_gpsk_2() 264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " in eap_gpsk_process_gpsk_2() 272 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store " in eap_gpsk_process_gpsk_2() 278 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer", in eap_gpsk_process_gpsk_2() [all …]
|
D | eap_server_sim.c | 67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", in eap_sim_state() 107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); in eap_sim_build_start() 116 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); in eap_sim_build_start() 132 wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ"); in eap_sim_build_start() 135 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); in eap_sim_build_start() 138 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); in eap_sim_build_start() 166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " in eap_sim_build_encr() 175 wpa_printf(MSG_DEBUG, " AT_IV"); in eap_sim_build_encr() 176 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); in eap_sim_build_encr() 180 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter); in eap_sim_build_encr() [all …]
|
D | eap_server_ttls.c | 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", in eap_ttls_state() 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " in eap_ttls_avp_parse() 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", in eap_ttls_avp_parse() 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse() 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); in eap_ttls_avp_parse() 225 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name", in eap_ttls_avp_parse() 237 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: " in eap_ttls_avp_parse() 244 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 251 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 258 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() [all …]
|
D | eap_server_fast.c | 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", in eap_fast_state() 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb() 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", in eap_fast_session_ticket_cb() 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " in eap_fast_session_ticket_cb() 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " in eap_fast_session_ticket_cb() 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", in eap_fast_session_ticket_cb() 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_session_ticket_cb() 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " in eap_fast_session_ticket_cb() 179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", in eap_fast_session_ticket_cb() 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid " in eap_fast_session_ticket_cb() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | hs20_supplicant.c | 199 wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " in hs20_anqp_send_req() 208 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); in hs20_anqp_send_req() 212 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " in hs20_anqp_send_req() 232 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 237 wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos); in hs20_process_icon_binary_file() 244 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 248 wpa_hexdump_ascii(MSG_DEBUG, "Icon Type", pos + 1, pos[0]); in hs20_process_icon_binary_file() 254 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 263 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 268 wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len); in hs20_process_icon_binary_file() [all …]
|
D | ibss_rsn.c | 68 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " in supp_ether_send() 84 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", in supp_alloc_eapol() 112 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie() 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key() 149 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); in supp_set_key() 150 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); in supp_set_key() 161 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); in supp_set_key() 183 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection() 192 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout() 198 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_deauthenticate() [all …]
|
D | offchannel.c | 40 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s " in wpas_get_tx_interface() 59 wpa_printf(MSG_DEBUG, in wpas_send_action_cb() 81 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX " in wpas_send_action_cb() 93 wpa_printf(MSG_DEBUG, "Off-channel: Schedule " in wpas_send_action_cb() 98 wpa_printf(MSG_DEBUG, "Off-channel: Failed to " in wpas_send_action_cb() 111 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to " in wpas_send_action_cb() 122 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the " in wpas_send_action_cb() 153 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " in offchannel_send_action_tx_status() 159 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " in offchannel_send_action_tx_status() 168 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " in offchannel_send_action_tx_status() [all …]
|
D | wnm_sta.c | 31 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); in ieee80211_11_get_tfs_ie() 42 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); in ieee80211_11_set_tfs_ie() 62 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " in ieee802_11_send_wnmsleep_req() 77 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element", in ieee802_11_send_wnmsleep_req() 102 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element", in ieee802_11_send_wnmsleep_req() 107 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " in ieee802_11_send_wnmsleep_req() 137 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " in ieee802_11_send_wnmsleep_req() 162 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); in wnm_sleep_mode_enter_success() 168 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); in wnm_sleep_mode_enter_success() 187 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total); in wnm_sleep_mode_exit_success() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state() 115 wpa_printf(MSG_DEBUG, "EAP-GPSK: Forced cipher %u", in eap_gpsk_init() 151 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); in eap_gpsk_process_id_server() 157 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); in eap_gpsk_process_id_server() 163 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); in eap_gpsk_process_id_server() 168 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", in eap_gpsk_process_id_server() 183 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); in eap_gpsk_process_rand_server() 187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", in eap_gpsk_process_rand_server() 211 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", in eap_gpsk_select_csuite() 229 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d", in eap_gpsk_select_csuite() [all …]
|