Home
last modified time | relevance | path

Searched refs:MSG_DEBUG (Results 1 – 25 of 316) sorted by relevance

12345678910>>...13

/freebsd/contrib/wpa/src/wps/
H A Dwps_attr_parse.c28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem()
72 wpa_printf(MSG_DEBUG, in wps_set_vendor_ext_wfa_subelem()
78 wpa_printf(MSG_DEBUG, "WPS: Multi-AP Extension 0x%02x", in wps_set_vendor_ext_wfa_subelem()
117 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
133 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext()
139 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext()
[all …]
H A Dwps_enrollee.c26 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
48 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
53 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
85 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
95 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2()
[all …]
H A Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key()
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key()
32 wpa_printf(MSG_DEBUG, in wps_build_public_key()
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key()
52 wpa_printf(MSG_DEBUG, in wps_build_public_key()
57 wpa_printf(MSG_DEBUG, in wps_build_public_key()
67 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key()
73 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key()
78 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key()
79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key()
[all …]
H A Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
46 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
62 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
69 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
76 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
88 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
93 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
103 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
112 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid()
[all …]
H A Dwps_registrar.c238 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac()
242 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac()
250 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac()
259 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac()
266 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac()
275 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac()
415 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session()
417 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session()
438 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap()
441 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap()
[all …]
H A Dwps_dev_attr.c19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer()
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name()
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number()
91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number()
114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type()
128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type()
145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type()
161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name()
197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version()
208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1()
[all …]
/freebsd/contrib/wpa/src/p2p/
H A Dp2p_parse.c46 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " in p2p_parse_attribute()
51 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " in p2p_parse_attribute()
57 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " in p2p_parse_attribute()
62 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, in p2p_parse_attribute()
67 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " in p2p_parse_attribute()
72 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " in p2p_parse_attribute()
77 wpa_printf(MSG_DEBUG, "P2P: Too short Status " in p2p_parse_attribute()
82 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); in p2p_parse_attribute()
86 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " in p2p_parse_attribute()
91 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel " in p2p_parse_attribute()
[all …]
/freebsd/contrib/wpa/src/eap_common/
H A Deap_sake_common.c25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
[all …]
H A Deap_fast_common.c52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload()
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload()
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret()
124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk()
142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk()
156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv()
[all …]
H A Deap_sim_common.c52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); in eap_sim_derive_mk()
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); in eap_aka_derive_mk()
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); in eap_aka_derive_mk()
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); in eap_aka_derive_mk()
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", in eap_sim_derive_keys()
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", in eap_sim_derive_keys()
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys()
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys()
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " in eap_sim_derive_keys_reauth()
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); in eap_sim_derive_keys_reauth()
[all …]
/freebsd/contrib/wpa/src/utils/
H A Dpcsc_funcs.c200 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " in mingw_load_symbols()
227 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " in mingw_load_symbols()
279 wpa_printf(MSG_DEBUG, "SCARD: file header did not " in scard_parse_fsp_templ()
289 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ()
333 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", in scard_parse_fsp_templ()
346 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", in scard_parse_fsp_templ()
421 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); in scard_get_aid()
424 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid()
430 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " in scard_get_aid()
436 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record"); in scard_get_aid()
[all …]
/freebsd/contrib/wpa/src/pasn/
H A Dpasn_initiator.c46 wpa_printf(MSG_DEBUG, "PASN: Failed to set SAE group"); in wpas_pasn_wd_sae_commit()
54 wpa_printf(MSG_DEBUG, "PASN: Failed to prepare SAE commit"); in wpas_pasn_wd_sae_commit()
61 wpa_printf(MSG_DEBUG, "PASN: Failed to allocate SAE buffer"); in wpas_pasn_wd_sae_commit()
92 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (commit)"); in wpas_pasn_wd_sae_rx()
98 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short for commit"); in wpas_pasn_wd_sae_rx()
109 wpa_printf(MSG_DEBUG, "PASN: SAE: commit: alg=%u, seq=%u, status=%u", in wpas_pasn_wd_sae_rx()
114 wpa_printf(MSG_DEBUG, "PASN: SAE: dropping peer commit"); in wpas_pasn_wd_sae_rx()
121 wpa_printf(MSG_DEBUG, "PASN: SAE failed parsing commit"); in wpas_pasn_wd_sae_rx()
128 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); in wpas_pasn_wd_sae_rx()
137 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (confirm)"); in wpas_pasn_wd_sae_rx()
[all …]
H A Dpasn_responder.c57 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short. len=%zu", in pasn_wd_handle_sae_commit()
66 wpa_printf(MSG_DEBUG, "PASN: SAE commit: alg=%u, seq=%u, status=%u", in pasn_wd_handle_sae_commit()
71 wpa_printf(MSG_DEBUG, "PASN: Dropping peer SAE commit"); in pasn_wd_handle_sae_commit()
80 wpa_printf(MSG_DEBUG, "PASN: Failed to set SAE group"); in pasn_wd_handle_sae_commit()
85 wpa_printf(MSG_DEBUG, "PASN: No SAE PT found"); in pasn_wd_handle_sae_commit()
92 wpa_printf(MSG_DEBUG, "PASN: Failed to prepare SAE commit"); in pasn_wd_handle_sae_commit()
99 wpa_printf(MSG_DEBUG, "PASN: Failed parsing SAE commit"); in pasn_wd_handle_sae_commit()
106 wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); in pasn_wd_handle_sae_commit()
130 wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short. len=%zu", in pasn_wd_handle_sae_confirm()
139 wpa_printf(MSG_DEBUG, "PASN: SAE confirm: alg=%u, seq=%u, status=%u", in pasn_wd_handle_sae_confirm()
[all …]
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_client_read.c66 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions()
68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions()
87 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
102 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
108 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
129 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
137 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
158 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
187 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
196 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
[all …]
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c214 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
222 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key MIC using HMAC-MD5"); in wpa_eapol_key_mic()
226 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key MIC using HMAC-SHA1"); in wpa_eapol_key_mic()
232 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key MIC using AES-CMAC"); in wpa_eapol_key_mic()
239 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
244 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
271 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
277 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
286 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
295 wpa_printf(MSG_DEBUG, in wpa_eapol_key_mic()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Dpasn_supplicant.c63 wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); in wpas_pasn_auth_work_timeout()
73 wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); in wpas_pasn_cancel_auth_work()
125 wpa_printf(MSG_DEBUG, "PASN: SAE without a password"); in wpas_pasn_sae_derive_pt()
138 wpa_printf(MSG_DEBUG, "PASN: SAE without a password"); in wpas_pasn_sae_setup_pt()
172 wpa_printf(MSG_DEBUG, "PASN: BSS not found"); in wpas_pasn_get_params_from_bss()
179 wpa_printf(MSG_DEBUG, "PASN: BSS without RSNE"); in wpas_pasn_get_params_from_bss()
185 wpa_printf(MSG_DEBUG, "PASN: Failed parsing RSNE data"); in wpas_pasn_get_params_from_bss()
209 wpa_printf(MSG_DEBUG, "PASN: peer pairwise 0x%x, select 0x%x", in wpas_pasn_get_params_from_bss()
223 wpa_printf(MSG_DEBUG, "PASN: peer AKMP 0x%x, select 0x%x", in wpas_pasn_get_params_from_bss()
241 wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FT/802.1X-SHA384"); in wpas_pasn_get_params_from_bss()
[all …]
H A Doffchannel.c41 wpa_printf(MSG_DEBUG, in wpas_get_tx_interface()
60 wpa_printf(MSG_DEBUG, "P2P: Use group interface %s " in wpas_get_tx_interface()
79 wpa_printf(MSG_DEBUG, in wpas_send_action_cb()
101 wpa_printf(MSG_DEBUG, "Off-channel: Pending Action frame TX " in wpas_send_action_cb()
114 wpa_printf(MSG_DEBUG, "Off-channel: Schedule " in wpas_send_action_cb()
118 wpa_printf(MSG_DEBUG, in wpas_send_action_cb()
128 wpa_printf(MSG_DEBUG, "Off-channel: Failed to " in wpas_send_action_cb()
141 wpa_printf(MSG_DEBUG, "Off-channel: Sending pending Action frame to " in wpas_send_action_cb()
153 wpa_printf(MSG_DEBUG, "Off-channel: Failed to send the " in wpas_send_action_cb()
184 wpa_printf(MSG_DEBUG, "Off-channel: Ignore Action TX status - " in offchannel_send_action_tx_status()
[all …]
H A Dibss_rsn.c69 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR in supp_ether_send()
90 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", in supp_alloc_eapol()
118 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_get_beacon_ie()
153 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " in supp_set_key()
156 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); in supp_set_key()
157 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); in supp_set_key()
168 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); in supp_set_key()
191 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " in supp_mlme_setprotection()
200 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); in supp_cancel_auth_timeout()
206 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__); in supp_deauthenticate()
[all …]
H A Dwnm_sta.c36 wpa_printf(MSG_DEBUG, "%s: TFS get operation %d", __func__, oper); in ieee80211_11_get_tfs_ie()
49 wpa_printf(MSG_DEBUG, "%s: TFS set operation %d", __func__, oper); in ieee80211_11_set_tfs_ie()
69 wpa_printf(MSG_DEBUG, "WNM: Request to send WNM-Sleep Mode Request " in ieee802_11_send_wnmsleep_req()
84 wpa_hexdump(MSG_DEBUG, "WNM: WNM-Sleep Mode element", in ieee802_11_send_wnmsleep_req()
108 wpa_hexdump(MSG_DEBUG, "WNM: TFS Request element", in ieee802_11_send_wnmsleep_req()
156 wpa_printf(MSG_DEBUG, "MLME: Failed to allocate buffer for " in ieee802_11_send_wnmsleep_req()
194 wpa_printf(MSG_DEBUG, "Failed to send WNM-Sleep Request " in ieee802_11_send_wnmsleep_req()
222 wpa_printf(MSG_DEBUG, "TFS Resp IE(s) found"); in wnm_sleep_mode_enter_success()
228 wpa_printf(MSG_DEBUG, "WNM: Fail to set TFS Resp IE"); in wnm_sleep_mode_enter_success()
247 wpa_hexdump_key(MSG_DEBUG, "WNM: Key Data", ptr, key_len_total); in wnm_sleep_mode_exit_success()
[all …]
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_gpsk.c58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", in eap_gpsk_state()
110 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); in eap_gpsk_build_gpsk_1()
152 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); in eap_gpsk_build_gpsk_3()
203 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", in eap_gpsk_buildReq()
224 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); in eap_gpsk_check()
252 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2"); in eap_gpsk_process_gpsk_2()
258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " in eap_gpsk_process_gpsk_2()
266 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " in eap_gpsk_process_gpsk_2()
274 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store " in eap_gpsk_process_gpsk_2()
279 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer", in eap_gpsk_process_gpsk_2()
[all …]
H A Deap_server_ttls.c70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", in eap_ttls_state()
197 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " in eap_ttls_avp_parse()
220 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", in eap_ttls_avp_parse()
226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse()
229 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); in eap_ttls_avp_parse()
254 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name", in eap_ttls_avp_parse()
266 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: " in eap_ttls_avp_parse()
273 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
280 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
287 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
[all …]
H A Deap_server_teap.c125 wpa_printf(MSG_DEBUG, "EAP-TEAP: %s -> %s", in eap_teap_state()
154 wpa_printf(MSG_DEBUG, "EAP-TEAP: SessionTicket callback"); in eap_teap_session_ticket_cb()
155 wpa_hexdump(MSG_DEBUG, "EAP-TEAP: SessionTicket (PAC-Opaque)", in eap_teap_session_ticket_cb()
159 wpa_printf(MSG_DEBUG, "EAP-TEAP: Ignore invalid SessionTicket"); in eap_teap_session_ticket_cb()
167 wpa_printf(MSG_DEBUG, in eap_teap_session_ticket_cb()
173 wpa_hexdump(MSG_DEBUG, "EAP-TEAP: Received PAC-Opaque", in eap_teap_session_ticket_cb()
178 wpa_printf(MSG_DEBUG, in eap_teap_session_ticket_cb()
185 wpa_printf(MSG_DEBUG, "EAP-TEAP: Failed to decrypt PAC-Opaque"); in eap_teap_session_ticket_cb()
197 wpa_hexdump_key(MSG_DEBUG, "EAP-TEAP: Decrypted PAC-Opaque", in eap_teap_session_ticket_cb()
214 wpa_printf(MSG_DEBUG, in eap_teap_session_ticket_cb()
[all …]
H A Deap_server_fast.c104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", in eap_fast_state()
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb()
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", in eap_fast_session_ticket_cb()
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " in eap_fast_session_ticket_cb()
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " in eap_fast_session_ticket_cb()
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", in eap_fast_session_ticket_cb()
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_session_ticket_cb()
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " in eap_fast_session_ticket_cb()
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque", in eap_fast_session_ticket_cb()
196 wpa_printf(MSG_DEBUG, in eap_fast_session_ticket_cb()
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dtls_openssl_ocsp.c351 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
359 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid"); in ocsp_resp_valid()
367 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
374 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired"); in ocsp_resp_valid()
379 wpa_printf(MSG_DEBUG, in ocsp_resp_valid()
401 wpa_printf(MSG_DEBUG, in issuer_match()
419 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerNameHash: %s", in issuer_match()
439 wpa_printf(MSG_DEBUG, "OpenSSL: calculated issuerKeyHash: %s", in issuer_match()
508 wpa_printf(MSG_DEBUG, in check_ocsp_resp()
515 wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received"); in check_ocsp_resp()
[all …]
/freebsd/contrib/wpa/src/rsn_supp/
H A Dtdls.c236 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " in wpa_tdls_set_key()
245 wpa_printf(MSG_DEBUG, "TDLS: Configure pairwise key for peer " MACSTR, in wpa_tdls_set_key()
278 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " in wpa_tdls_tpk_send()
331 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " in wpa_tdls_tpk_send()
395 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request"); in wpa_tdls_tpk_retry_timeout()
407 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for " in wpa_tdls_tpk_retry_timeout_cancel()
449 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); in wpa_tdls_generate_tpk()
450 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); in wpa_tdls_generate_tpk()
452 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input", in wpa_tdls_generate_tpk()
468 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); in wpa_tdls_generate_tpk()
[all …]

12345678910>>...13