HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 1 - 25 of 454) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_parse.c 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type "
43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce "
51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce "
59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u",
67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u",
75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication "
83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type "
91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type "
99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods
    [all...]
wps_attr_process.c 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len)
    [all...]
wps_enrollee.c 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address");
40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1")
    [all...]
  /external/wpa_supplicant/
eap_sake_common.c 30 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
32 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
39 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
41 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
48 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
50 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
57 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
59 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
71 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
events.c 48 wpa_printf(MSG_DEBUG, "Selected network is disabled");
52 wpa_printf(MSG_DEBUG, "Network configuration found for the current "
119 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA "
128 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event");
131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
206 wpa_printf(MSG_DEBUG, "Selected network is configured to use "
211 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM "
271 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed");
275 wpa_printf(MSG_DEBUG, " skip RSN IE - proto "
281 wpa_printf(MSG_DEBUG, " skip RSN IE - PTK cipher
    [all...]
pcsc_funcs.c 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]
  /external/wpa_supplicant_8/src/ap/
p2p_hostapd.c 42 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d "
52 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set "
62 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update "
67 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable "
76 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected");
79 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA");
87 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected");
90 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
  /external/wpa_supplicant_8/src/wps/
wps_attr_parse.c 33 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
45 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
53 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
61 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
103 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension");
119 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)",
125 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension "
144 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
152 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type "
160 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce
    [all...]
wps_attr_process.c 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute "
36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator");
67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute");
74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the "
81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA");
93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include "
98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx);
108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID");
117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
mschapv2.c 54 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
58 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
65 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 54 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
58 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
65 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
104 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.c 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_fast_common.c 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
61 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
177 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
190 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
207 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.c 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with "
67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID");
72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID")
    [all...]
eap_fast_common.c 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV");
61 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret",
161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
177 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
190 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
201 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one "
207 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
209 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)"
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
209 wpa_printf(MSG_DEBUG, "TLSv1: No room for "
258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)"
    [all...]
pkcs8.c 39 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 "
49 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found "
60 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER");
67 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the "
80 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE "
88 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID "
94 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf);
104 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key "
115 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING "
120 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
45 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
50 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
55 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
75 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
85 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", r0kh_id, r0kh_id_len);
98 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN)
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 34 wpa_printf(MSG_DEBUG, "P2P: Too short Capability "
39 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x "
45 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID "
50 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR,
55 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent "
60 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u "
65 wpa_printf(MSG_DEBUG, "P2P: Too short Status "
70 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]);
74 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore "
79 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_wpa.c 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
65 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
73 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
81 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
113 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
143 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
162 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
163 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_osx.m 38 if (MSG_DEBUG < wpa_debug_level)
41 wpa_printf(MSG_DEBUG, "Key:");
43 wpa_printf(MSG_DEBUG, "Value:");
52 wpa_printf(MSG_DEBUG, "OSX: Dump dictionary %s - %u entries",
68 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d",
73 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off");
94 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d",
99 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off");
131 wpa_printf(MSG_DEBUG, "CFStringCreateWithBytes "
140 wpa_printf(MSG_DEBUG, "OSX: WirelessDirectedScan
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 61 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
70 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN);
71 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
75 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN);
76 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
82 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
109 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
114 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x",
120 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.c 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll "
201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from "
253 wpa_printf(MSG_DEBUG, "SCARD: file header did not "
263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d",
286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x",
343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR");
346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen);
352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR "
358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record")
    [all...]

Completed in 175 milliseconds

1 2 3 4 5 6 7 8 91011>>