/external/wpa_supplicant_8/src/eap_peer/ |
tncc.c | 168 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 173 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 205 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 208 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage", 244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 262 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 272 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 372 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'", 376 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu" [all...] |
eap_fast.c | 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 199 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " 273 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive [all...] |
ikev2.c | 129 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 163 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 164 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 175 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 184 wpa_printf(MSG_DEBUG, "IKEV2: No " 190 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 197 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 204 wpa_printf(MSG_DEBUG, "IKEV2: " 253 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 255 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d [all...] |
eap_sake.c | 64 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 173 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 204 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 212 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 251 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); 261 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P"); 266 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 271 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P") [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 71 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 111 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 116 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ"); 123 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ"); 126 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST"); 147 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 156 wpa_printf(MSG_DEBUG, " AT_IV"); 157 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA"); 161 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter); 166 wpa_printf(MSG_DEBUG, " *AT_NONCE_S") [all...] |
eap_server_mschapv2.c | 238 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in " 264 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - " 272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or " 279 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure " 313 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response", 329 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured " 364 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 365 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 367 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 399 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response") [all...] |
eap_server_psk.c | 68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 105 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 136 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 137 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 150 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 172 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq", 195 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t); 198 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - [all...] |
/external/wpa_supplicant/ |
tls_openssl.c | 142 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 " 150 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 159 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get " 196 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 204 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 291 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__); 495 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store " 512 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for " 525 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store " 549 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret) [all...] |
eap_fast.c | 459 wpa_printf(MSG_DEBUG, "EAP-FAST: read %d PAC entries from " 568 wpa_printf(MSG_DEBUG, "EAP-FAST: No memory for PAC " 612 wpa_printf(MSG_DEBUG, "EAP-FAST: wrote %d PAC entries into '%s'", 632 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC " 697 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 EAP types", 801 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: Nak type=%d", *pos); 802 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Allowed Phase2 EAP types", 834 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", 840 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", 864 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random" [all...] |
eap_gpsk_common.c | 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 179 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 183 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 188 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 298 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)", 304 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len); 310 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory " 324 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len) [all...] |
driver_madwifi.c | 188 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __FUNCTION__, key_idx); 237 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d", 242 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 247 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big", 252 wpa_printf(MSG_DEBUG, "%s: key length %lu too big", 292 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 301 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 311 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 324 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 339 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__) [all...] |
eap_sim.c | 83 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 110 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 119 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM authentication could " 169 wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old%s%s%s", 205 wpa_hexdump_ascii(MSG_DEBUG, 222 wpa_hexdump_ascii(MSG_DEBUG, 279 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", 284 wpa_hexdump(MSG_DEBUG, " AT_NONCE_MT", 288 wpa_printf(MSG_DEBUG, " AT_SELECTED_VERSION %d", 295 wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY" [all...] |
tls_gnutls.c | 154 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG, 194 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver); 252 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 257 wpa_printf(MSG_DEBUG, "%s - %d bytes remaining in pull_buf", 474 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: " 482 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s", 526 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - " 579 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 586 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 601 wpa_printf(MSG_DEBUG, "Failed to read client cert/key [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 199 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " 273 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive [all...] |
ikev2.c | 128 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 162 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 163 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 174 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 183 wpa_printf(MSG_DEBUG, "IKEV2: No " 189 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 196 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 203 wpa_printf(MSG_DEBUG, "IKEV2: " 252 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 254 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d [all...] |
eap_sake.c | 63 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 161 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 172 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 180 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 203 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received " 211 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge"); 250 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge"); 260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P"); 265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 270 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 237 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in " 263 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - " 271 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or " 278 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure " 311 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response", 327 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured " 362 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 363 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 365 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 392 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response") [all...] |
eap_psk.c | 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 104 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 136 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 143 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 149 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 171 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq", 194 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t); 197 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending " 146 wpa_printf(MSG_DEBUG, "L2(NDISUIO): " 154 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 174 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 187 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 209 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 234 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 243 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 251 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 265 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: [all...] |
/external/wpa_supplicant_8/src/wps/ |
http_server.c | 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received", 60 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received " 73 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests"); 142 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d", 149 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s", 152 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes", 215 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: " 219 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d", 272 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: " 284 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.c | 162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 184 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 189 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 299 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)", 305 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len); 311 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory " 325 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 159 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation", 167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len); 173 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN); 177 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN); 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len); 186 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 296 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)", 302 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len); 308 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory " 322 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.c | 113 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " 117 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR 205 wpa_printf(MSG_DEBUG, "RSN: found matching PMKID from " 208 wpa_printf(MSG_DEBUG, "RSN: no matching PMKID found"); 215 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 217 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 246 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 254 wpa_printf(MSG_DEBUG, "RSN: the new PMK " 265 wpa_printf(MSG_DEBUG, "RSN: Cancelled PMKSA " 280 wpa_printf(MSG_DEBUG, "RSN: no PMKSA entry found - trigger [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_madwifi.c | 198 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __FUNCTION__, key_idx); 247 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d", 252 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 257 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big", 262 wpa_printf(MSG_DEBUG, "%s: key length %lu too big", 302 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 311 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled); 321 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 334 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 349 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_auth.c | 129 wpa_printf(MSG_DEBUG, "Could not add User-Name"); 137 wpa_printf(MSG_DEBUG, "Could not add User-Password"); 144 wpa_printf(MSG_DEBUG, "Could not add NAS-IP-Address"); 152 wpa_printf(MSG_DEBUG, "Could not add NAS-IPv6-Address"); 161 wpa_printf(MSG_DEBUG, "Could not add NAS-Identifier"); 169 wpa_printf(MSG_DEBUG, "Could not add Called-Station-Id"); 177 wpa_printf(MSG_DEBUG, "Could not add Calling-Station-Id"); 183 wpa_printf(MSG_DEBUG, "Could not add NAS-Port-Type"); 190 wpa_printf(MSG_DEBUG, "Could not add Connect-Info"); 277 wpa_printf(MSG_DEBUG, "Failed to send Access-Request [all...] |