Lines Matching refs:MSG_DEBUG
85 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version "
91 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for "
97 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate "
101 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled "
106 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK "
171 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 EAP types",
250 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: Nak type=%d", *pos);
251 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Allowed Phase2 EAP types",
294 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: type=%d", *pos);
329 wpa_printf(MSG_DEBUG, "EAP-PEAP: Selected "
406 wpa_printf(MSG_DEBUG, "EAP-PEAP: received %lu bytes encrypted data for"
410 wpa_printf(MSG_DEBUG, "EAP-PEAP: Pending Phase 2 request - "
435 wpa_printf(MSG_DEBUG, "EAP-PEAP: Received TLS ACK, but "
470 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Decrypted Phase 2 EAP", in_decrypted,
540 wpa_printf(MSG_DEBUG, "EAP-PEAP: received Phase 2: code=%d "
554 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Success");
561 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 "
570 wpa_printf(MSG_DEBUG, "EAP-PEAP: Version 1 - "
578 wpa_printf(MSG_DEBUG, "EAP-PEAP: Use TLS ACK "
603 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Failure");
631 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
678 wpa_printf(MSG_DEBUG, "EAP-PEAP: Start (server ver=%d, own "
693 wpa_printf(MSG_DEBUG, "EAP-PEAP: Using PEAP version %d",
711 wpa_printf(MSG_DEBUG,
725 wpa_printf(MSG_DEBUG, "EAP-PEAP: using label '%s' in "
731 wpa_hexdump_key(MSG_DEBUG,
736 wpa_printf(MSG_DEBUG, "EAP-PEAP: Failed to "
751 wpa_printf(MSG_DEBUG, "EAP-PEAP: Workaround - "