/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 35 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " 43 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce " 51 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce " 59 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u", 67 wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u", 75 wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication " 83 wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type " 91 wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type " 99 wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods [all...] |
wps_attr_process.c | 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len) [all...] |
wps_enrollee.c | 25 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); 40 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 62 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 67 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 83 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 99 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1") [all...] |
/external/wpa_supplicant/ |
eap_sake_common.c | 30 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 32 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 39 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 41 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 48 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 50 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 57 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 59 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 71 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
events.c | 48 wpa_printf(MSG_DEBUG, "Selected network is disabled"); 52 wpa_printf(MSG_DEBUG, "Network configuration found for the current " 119 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA " 128 wpa_printf(MSG_DEBUG, "RSN: No data in PMKID candidate event"); 131 wpa_printf(MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 206 wpa_printf(MSG_DEBUG, "Selected network is configured to use " 211 wpa_printf(MSG_DEBUG, "Selected network is configured to use SIM " 271 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed"); 275 wpa_printf(MSG_DEBUG, " skip RSN IE - proto " 281 wpa_printf(MSG_DEBUG, " skip RSN IE - PTK cipher [all...] |
pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record") [all...] |
/external/wpa_supplicant_8/src/ap/ |
p2p_hostapd.c | 42 wpa_printf(MSG_DEBUG, "P2P: Set NoA parameters: count=%u start=%d " 52 wpa_printf(MSG_DEBUG, "P2P: Non-periodic NoA - set " 62 wpa_printf(MSG_DEBUG, "P2P: No legacy STAs connected - update " 67 wpa_printf(MSG_DEBUG, "P2P: Legacy STA(s) connected - do not enable " 76 wpa_printf(MSG_DEBUG, "P2P: First non-P2P device connected"); 79 wpa_printf(MSG_DEBUG, "P2P: Disable periodic NoA"); 87 wpa_printf(MSG_DEBUG, "P2P: Last non-P2P device disconnected"); 90 wpa_printf(MSG_DEBUG, "P2P: Enable periodic NoA");
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 33 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " 45 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " 53 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " 61 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " 103 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); 119 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", 125 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " 144 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", 152 wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type " 160 wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce [all...] |
wps_attr_process.c | 30 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " 36 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 51 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); 67 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); 74 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " 81 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); 93 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " 98 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); 108 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); 117 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 54 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 58 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 65 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 54 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 58 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 65 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", 104 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.c | 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
eap_fast_common.c | 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 61 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 177 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 190 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 207 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 31 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); 33 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " 40 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); 42 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " 49 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); 51 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); 60 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " 67 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); 72 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID") [all...] |
eap_fast_common.c | 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 61 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 97 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", 161 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 177 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 190 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 201 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " 207 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 209 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)" [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 41 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 79 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 93 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 113 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 127 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 179 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 188 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 195 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 209 wpa_printf(MSG_DEBUG, "TLSv1: No room for " 258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)" [all...] |
pkcs8.c | 39 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " 49 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " 60 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); 67 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " 80 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " 88 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 94 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); 104 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " 115 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " 120 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 35 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 44 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 45 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 49 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 50 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 55 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); 75 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 85 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", r0kh_id, r0kh_id_len); 98 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 34 wpa_printf(MSG_DEBUG, "P2P: Too short Capability " 39 wpa_printf(MSG_DEBUG, "P2P: * Device Capability %02x " 45 wpa_printf(MSG_DEBUG, "P2P: Too short Device ID " 50 wpa_printf(MSG_DEBUG, "P2P: * Device ID " MACSTR, 55 wpa_printf(MSG_DEBUG, "P2P: Too short GO Intent " 60 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u " 65 wpa_printf(MSG_DEBUG, "P2P: Too short Status " 70 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[0]); 74 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Ignore " 79 wpa_printf(MSG_DEBUG, "P2P: Too short Listen Channel [all...] |
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 65 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 73 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 81 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 92 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 113 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 143 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 159 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 162 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 163 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_osx.m | 38 if (MSG_DEBUG < wpa_debug_level) 41 wpa_printf(MSG_DEBUG, "Key:"); 43 wpa_printf(MSG_DEBUG, "Value:"); 52 wpa_printf(MSG_DEBUG, "OSX: Dump dictionary %s - %u entries", 68 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d", 73 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off"); 94 wpa_printf(MSG_DEBUG, "OSX: WirelessGetInfo failed: %d", 99 wpa_printf(MSG_DEBUG, "OSX: Wireless device power off"); 131 wpa_printf(MSG_DEBUG, "CFStringCreateWithBytes " 140 wpa_printf(MSG_DEBUG, "OSX: WirelessDirectedScan [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 61 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 70 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); 71 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 75 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); 76 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 81 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 82 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); 109 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 114 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", 120 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record") [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 174 wpa_printf(MSG_DEBUG, "WinSCard: Could not load winscard.dll " 201 wpa_printf(MSG_DEBUG, "WinSCard: Could not get address for %s from " 253 wpa_printf(MSG_DEBUG, "SCARD: file header did not " 263 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 279 wpa_printf(MSG_DEBUG, "SCARD: file_size=%d", 286 wpa_printf(MSG_DEBUG, "SCARD: PS_DO=0x%02x", 343 wpa_printf(MSG_DEBUG, "SCARD: Failed to read EF_DIR"); 346 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); 352 wpa_printf(MSG_DEBUG, "SCARD: Failed to get EF_DIR " 358 wpa_printf(MSG_DEBUG, "SCARD: Too long EF_DIR record") [all...] |