Lines Matching refs:MSG_DEBUG
30 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
32 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
39 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
41 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
48 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
50 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
57 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
59 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
71 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID");
76 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SPI_S");
81 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SPI_P");
86 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_ANY_ID_REQ");
88 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid AT_ANY_ID_REQ"
95 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PERM_ID_REQ");
97 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid "
104 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_ENCR_DATA");
109 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_IV");
114 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PADDING");
117 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_PADDING "
124 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_NEXT_TMPID");
129 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_IV");
131 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid "
139 wpa_printf(MSG_DEBUG, "EAP-SAKE: Unknown non-skippable"
143 wpa_printf(MSG_DEBUG, "EAP-SAKE: Ignoring unknown skippable "
149 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_IV included without "
173 wpa_printf(MSG_DEBUG, "EAP-SAKE: Too short attribute");
178 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid attribute "
184 wpa_printf(MSG_DEBUG, "EAP-SAKE: Attribute underflow");
272 wpa_printf(MSG_DEBUG, "EAP-SAKE: Deriving keys");
274 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: Root-Secret-A",
280 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: SMS-A", sms_a, EAP_SAKE_SMS_LEN);
284 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth",
286 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher",
289 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: Root-Secret-B",
295 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: SMS-B", sms_b, EAP_SAKE_SMS_LEN);
301 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN);