/external/wpa_supplicant_8/wpa_supplicant/ |
D | events.c | 121 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_network_reenabled() 192 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association " in wpa_supplicant_select_config() 202 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled"); in wpa_supplicant_select_config() 208 wpa_dbg(wpa_s, MSG_DEBUG, "Selected BSS is disallowed"); in wpa_supplicant_select_config() 214 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is temporarily " in wpa_supplicant_select_config() 219 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the " in wpa_supplicant_select_config() 226 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites"); in wpa_supplicant_select_config() 337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " in wpa_find_assoc_pmkid() 346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " in wpa_supplicant_event_pmkid_candidate() 350 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR in wpa_supplicant_event_pmkid_candidate() [all …]
|
D | scan.c | 42 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured " in wpa_supplicant_gen_assoc_event() 110 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks (%d disabled " in wpa_supplicant_enabled_networks() 128 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached " in wpa_supplicant_assoc_try() 236 wpa_dbg(wpa_s, MSG_INFO, "Reject scan trigger since one is already pending"); in wpa_supplicant_trigger_scan() 258 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan"); in wpa_supplicant_delayed_sched_scan_timeout() 270 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it"); in wpa_supplicant_sched_scan_timeout() 300 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!"); in wpa_supplicant_stop_sched_scan() 351 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO " in wpa_supplicant_optimize_freqs() 359 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common " in wpa_supplicant_optimize_freqs() 376 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO preferred frequency %d MHz during invitation", in wpa_supplicant_optimize_freqs() [all …]
|
D | sme.c | 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", in sme_set_sae_group() 259 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", in sme_send_authentication() 263 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: " in sme_send_authentication() 274 wpa_dbg(wpa_s, MSG_DEBUG, in sme_send_authentication() 278 wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg"); in sme_send_authentication() 281 wpa_dbg(wpa_s, MSG_DEBUG, in sme_send_authentication() 388 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT " in sme_send_authentication() 405 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports " in sme_send_authentication() 521 wpa_dbg(wpa_s, MSG_DEBUG, in sme_send_authentication() 660 …wpa_dbg(wpa_s, MSG_DEBUG, "SME: BSS/SSID entry for authentication not valid anymore - drop connect… in sme_auth_start_cb() [all …]
|
D | wpa_supplicant.c | 231 wpa_dbg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec " in wpa_supplicant_req_auth_timeout() 248 wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout"); in wpa_supplicant_cancel_auth_timeout() 726 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize " in wpa_supplicant_start_bgscan() 762 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize autoscan"); in wpa_supplicant_start_autoscan() 795 wpa_dbg(wpa_s, MSG_DEBUG, "State: %s -> %s", in wpa_supplicant_set_state() 821 wpa_dbg(wpa_s, MSG_DEBUG, in wpa_supplicant_set_state() 826 wpa_dbg(wpa_s, MSG_DEBUG, in wpa_supplicant_set_state() 1028 wpa_dbg(wpa_s, MSG_DEBUG, "Reconfiguration completed"); in wpa_supplicant_reload_configuration() 1038 wpa_dbg(wpa_s, MSG_DEBUG, "Signal %d received - reconfiguring", in wpa_supplicant_reconfig() 1065 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set " in wpa_supplicant_suites_from_ai() [all …]
|
D | p2p_supplicant.c | 185 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: num_unused_channels: %d", unused); in wpas_p2p_num_unused_channels() 368 wpa_dbg(wpa_s, MSG_INFO, "P2P: Reject scan trigger since one is already pending"); in wpas_p2p_scan() 1507 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: No ACK for PD Req " in wpas_p2p_send_action_tx_status() 1693 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Add persistent group PSK entry for " in wpas_p2p_add_psk_list() 1714 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Common group frequencies (len=%u):", in p2p_go_dump_common_freqs() 1718 wpa_dbg(wpa_s, MSG_DEBUG, "freq[%u]: %d", in p2p_go_dump_common_freqs() 1787 wpa_dbg(wpa_s, MSG_DEBUG, in p2p_go_configured() 1793 wpa_dbg(wpa_s, MSG_DEBUG, in p2p_go_configured() 1818 wpa_dbg(wpa_s, MSG_DEBUG, in p2p_go_configured() 1872 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Starting GO"); in wpas_start_wps_go() [all …]
|
D | wnm_sta.c | 859 wpa_dbg(wpa_s, MSG_DEBUG, in wnm_bss_tm_connect() 899 wpa_dbg(wpa_s, MSG_DEBUG, in wnm_scan_process() 1073 wpa_dbg(wpa_s, MSG_DEBUG, in wnm_fetch_scan_results() 1077 wpa_dbg(wpa_s, MSG_DEBUG, "WNM: Failed to get scan results"); in wnm_fetch_scan_results() 1120 wpa_dbg(wpa_s, MSG_DEBUG, in wnm_fetch_scan_results() 1127 wpa_dbg(wpa_s, MSG_DEBUG, in wnm_fetch_scan_results() 1497 wpa_dbg(wpa_s, MSG_DEBUG, "WNM: Received WNM-Notification Request " in ieee802_11_rx_wnm_notif_req() 1505 wpa_dbg(wpa_s, MSG_DEBUG, "WNM: WNM-Notification frame not " in ieee802_11_rx_wnm_notif_req() 1515 wpa_dbg(wpa_s, MSG_DEBUG, "WNM: Ignore unknown " in ieee802_11_rx_wnm_notif_req()
|
D | bss.c | 239 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Remove id %u BSSID " MACSTR in wpa_bss_remove() 455 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Add new id %u BSSID " MACSTR in wpa_bss_add() 656 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Do not update scan IEs for " in wpa_bss_update() 713 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Start scan result update %u", in wpa_bss_update_start() 743 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Ignore driver BSS " in wpa_bss_update_scan_res() 754 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: No SSID IE included for " in wpa_bss_update_scan_res() 759 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Too long SSID IE included for " in wpa_bss_update_scan_res()
|
D | hs20_supplicant.c | 455 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 467 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 477 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 486 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " in hs20_process_icon_binary_file() 600 wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short WAN " in hs20_parse_rx_hs20_anqp_resp()
|
D | ctrl_iface_unix.c | 198 wpa_dbg(wpa_s, MSG_DEBUG, in wpa_supplicant_ctrl_iface_receive() 212 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to reinitialize ctrl_iface socket"); in wpa_supplicant_ctrl_iface_receive() 216 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to send response to ATTACH - detaching"); in wpa_supplicant_ctrl_iface_receive() 975 wpa_dbg(wpa_s, MSG_DEBUG, in wpa_supplicant_ctrl_iface_send()
|
D | ctrl_iface.c | 4956 wpa_dbg(wpa_s, MSG_INFO, in p2p_ctrl_find() 5274 wpa_dbg(wpa_s, MSG_DEBUG, "Direct P2P_CONNECT command to %s", in p2p_ctrl_connect() 5411 wpa_dbg(wpa_s, MSG_INFO, in p2p_ctrl_listen() 7490 wpa_dbg(wpa_s, MSG_DEBUG, "Flush all wpa_supplicant state"); in wpa_supplicant_ctrl_iface_flush() 7661 wpa_dbg(work->wpa_s, MSG_DEBUG, in wpas_ctrl_radio_work_timeout() 7691 wpa_dbg(work->wpa_s, MSG_DEBUG, "Starting external radio work %u (%s)", in wpas_ctrl_radio_work_cb() 7770 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_ctrl_radio_work_done() 7811 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_ctrl_radio_work_flush() 8003 wpa_dbg(wpa_s, MSG_DEBUG, "Assigned scan id %u", in wpas_ctrl_scan() 8027 wpa_dbg(wpa_s, MSG_DEBUG, "Assigned scan id %u", in wpas_ctrl_scan() [all …]
|
D | mesh_rsn.c | 302 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", in mesh_rsn_sae_group() 738 wpa_dbg(wpa_s, MSG_DEBUG, "mesh: Truncated AMPE element"); in mesh_rsn_process_ampe()
|
D | notify.c | 897 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_notify_network_bssid_set_changed()
|
D | wps_supplicant.c | 1494 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: UUID %s: %s", src, buf); in wpas_wps_set_uuid()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 59 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_eapol_key_send() 242 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_key_mgmt_set_pmk() 247 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_key_mgmt_set_pmk() 269 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_get_pmk() 272 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_get_pmk() 335 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_get_pmk() 360 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_get_pmk() 379 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, in wpa_supplicant_get_pmk() 495 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 2/4"); in wpa_supplicant_send_2_of_4() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | wpa_debug.h | 41 #define wpa_dbg(args...) do { } while (0) macro 159 #define wpa_dbg(args...) wpa_msg(args) macro
|
/external/wpa_supplicant_8/src/ap/ |
D | ctrl_iface_ap.c | 270 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "P2P: Disconnect STA " MACSTR in p2p_manager_disconnect() 315 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "CTRL_IFACE DEAUTHENTICATE %s", in hostapd_ctrl_iface_deauthenticate() 378 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "CTRL_IFACE DISASSOCIATE %s", in hostapd_ctrl_iface_disassociate() 441 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "CTRL_IFACE SIGNATURE %s", txtaddr); in hostapd_ctrl_iface_signature() 461 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "CTRL_IFACE POLL_STA %s", txtaddr); in hostapd_ctrl_iface_poll_sta()
|
D | sta_info.c | 480 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in ap_handle_timer() 1367 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in ap_sta_delayed_1x_auth_fail_cb() 1381 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in ap_sta_delayed_1x_auth_fail_disconnect()
|
D | drv_callbacks.c | 1188 wpa_dbg(hapd->msg_ctx, level, "Event %s (%d) received", in wpa_supplicant_event() 1392 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in wpa_supplicant_event_global()
|
D | hostapd.c | 485 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in hostapd_flush_old_stations() 494 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "Deauthenticate all stations"); in hostapd_flush_old_stations()
|
D | ieee802_1x.c | 1905 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "EAP Timeout, STA " MACSTR, in ieee802_1x_abort_auth()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_nl80211_event.c | 2185 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan trigger"); in do_process_drv_event() 2200 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan started"); in do_process_drv_event() 2204 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Sched scan stopped"); in do_process_drv_event() 2209 wpa_dbg(drv->ctx, MSG_DEBUG, in do_process_drv_event() 2224 wpa_dbg(drv->ctx, MSG_DEBUG, in do_process_drv_event() 2230 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Scan aborted"); in do_process_drv_event() 2347 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: Ignored unknown event " in do_process_drv_event()
|
D | driver_nl80211_scan.c | 309 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: scan request"); in wpa_driver_nl80211_scan() 486 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: sched_scan request"); in wpa_driver_nl80211_sched_scan() 1041 wpa_dbg(drv->ctx, MSG_DEBUG, "nl80211: vendor scan request"); in wpa_driver_nl80211_vendor_scan()
|
D | driver_nl80211.c | 3009 wpa_dbg(drv->ctx, MSG_DEBUG, in wpa_driver_nl80211_mlme() 3236 wpa_dbg(drv->ctx, MSG_DEBUG, in wpa_driver_nl80211_authenticate() 5434 wpa_dbg(drv->ctx, MSG_DEBUG, in wpa_driver_nl80211_associate()
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
D | sta_iface.cpp | 111 wpa_dbg( in extRadioWorkTimeoutCb() 141 wpa_dbg( in extRadioWorkStartCb() 987 wpa_dbg( in removeExtRadioWorkInternal()
|
/external/wpa_supplicant_8/hostapd/ |
D | ctrl_iface.c | 1733 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, in hostapd_ctrl_iface_data_test_config() 1754 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "test data: Enabled"); in hostapd_ctrl_iface_data_test_config() 1818 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "test data: TX dst=" MACSTR in hostapd_ctrl_iface_data_test_tx() 1866 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "test data: TX frame res=%d", res); in hostapd_ctrl_iface_data_test_frame()
|