HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 151 - 175 of 454) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/wpa_supplicant_8/src/eap_peer/
tncc.c 168 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
173 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
205 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
208 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
244 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
262 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
272 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
284 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
372 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
376 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu"
    [all...]
eap_fast.c 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
199 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
273 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive
    [all...]
ikev2.c 129 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
163 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
164 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
175 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
184 wpa_printf(MSG_DEBUG, "IKEV2: No "
190 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
197 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
204 wpa_printf(MSG_DEBUG, "IKEV2: "
253 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
255 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d
    [all...]
eap_sake.c 64 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
173 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
181 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
204 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
212 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
251 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
261 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P");
266 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
271 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P")
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 71 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
111 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
116 wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
123 wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
126 wpa_printf(MSG_DEBUG, " AT_VERSION_LIST");
147 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
156 wpa_printf(MSG_DEBUG, " AT_IV");
157 wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
161 wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter);
166 wpa_printf(MSG_DEBUG, " *AT_NONCE_S")
    [all...]
eap_server_mschapv2.c 238 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in "
264 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - "
272 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or "
279 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure "
313 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response",
329 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured "
364 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
365 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
367 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
399 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response")
    [all...]
eap_server_psk.c 68 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
105 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
136 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
137 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
150 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
172 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
195 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
198 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 -
    [all...]
  /external/wpa_supplicant/
tls_openssl.c 142 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not load crypt32 "
150 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
159 wpa_printf(MSG_DEBUG, "CryptoAPI: Could not get "
196 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
204 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
291 wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
495 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
512 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
525 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
549 wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret)
    [all...]
eap_fast.c 459 wpa_printf(MSG_DEBUG, "EAP-FAST: read %d PAC entries from "
568 wpa_printf(MSG_DEBUG, "EAP-FAST: No memory for PAC "
612 wpa_printf(MSG_DEBUG, "EAP-FAST: wrote %d PAC entries into '%s'",
632 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC "
697 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 EAP types",
801 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: Nak type=%d", *pos);
802 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Allowed Phase2 EAP types",
834 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)",
840 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)",
864 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random"
    [all...]
eap_gpsk_common.c 161 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
169 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
179 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
183 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
188 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
298 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
304 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
310 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
324 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len)
    [all...]
driver_madwifi.c 188 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __FUNCTION__, key_idx);
237 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",
242 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "
247 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big",
252 wpa_printf(MSG_DEBUG, "%s: key length %lu too big",
292 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
301 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
311 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
324 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
339 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__)
    [all...]
eap_sim.c 83 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
110 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
119 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM authentication could "
169 wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old%s%s%s",
205 wpa_hexdump_ascii(MSG_DEBUG,
222 wpa_hexdump_ascii(MSG_DEBUG,
279 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)",
284 wpa_hexdump(MSG_DEBUG, " AT_NONCE_MT",
288 wpa_printf(MSG_DEBUG, " AT_SELECTED_VERSION %d",
295 wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY"
    [all...]
tls_gnutls.c 154 wpa_printf(level > 3 ? MSG_MSGDUMP : MSG_DEBUG,
194 wpa_printf(MSG_DEBUG, "%s - gnutls version %s", __func__, ver);
252 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
257 wpa_printf(MSG_DEBUG, "%s - %d bytes remaining in pull_buf",
474 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: "
482 wpa_printf(MSG_DEBUG, "TLS: altSubjectName: %s:%s",
526 wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - "
579 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' "
586 wpa_printf(MSG_DEBUG, "Failed to read CA cert "
601 wpa_printf(MSG_DEBUG, "Failed to read client cert/key
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast.c 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
199 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
273 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive
    [all...]
ikev2.c 128 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
162 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
163 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
174 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
183 wpa_printf(MSG_DEBUG, "IKEV2: No "
189 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
196 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
203 wpa_printf(MSG_DEBUG, "IKEV2: "
252 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
254 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d
    [all...]
eap_sake.c 63 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
161 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
172 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
180 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
203 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received "
211 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Challenge");
250 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Challenge");
260 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_P");
265 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
270 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_P")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 237 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in "
263 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - "
271 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or "
278 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure "
311 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response",
327 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured "
362 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
363 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
365 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
392 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response")
    [all...]
eap_psk.c 67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
104 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
136 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
143 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
149 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
171 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
194 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
197 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 -
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
146 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
154 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
174 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
187 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
209 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
234 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
243 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
251 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
265 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed:
    [all...]
  /external/wpa_supplicant_8/src/wps/
http_server.c 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
60 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
73 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
142 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
149 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
152 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
215 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
219 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
272 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: "
284 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_gpsk_common.c 162 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
170 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
176 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
184 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
189 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
299 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
305 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
311 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
325 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 159 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: Data to MK derivation",
167 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MK", mk, mk_len);
173 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
177 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
186 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
296 wpa_printf(MSG_DEBUG, "EAP-GPSK: Deriving keys (%d:%d)",
302 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PSK", psk, psk_len);
308 wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to allocate memory "
322 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.c 113 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for "
117 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR
205 wpa_printf(MSG_DEBUG, "RSN: found matching PMKID from "
208 wpa_printf(MSG_DEBUG, "RSN: no matching PMKID found");
215 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
217 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
246 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
254 wpa_printf(MSG_DEBUG, "RSN: the new PMK "
265 wpa_printf(MSG_DEBUG, "RSN: Cancelled PMKSA "
280 wpa_printf(MSG_DEBUG, "RSN: no PMKSA entry found - trigger
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_madwifi.c 198 wpa_printf(MSG_DEBUG, "%s: keyidx=%d", __FUNCTION__, key_idx);
247 wpa_printf(MSG_DEBUG, "%s: unknown/unsupported algorithm %d",
252 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu "
257 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big",
262 wpa_printf(MSG_DEBUG, "%s: key length %lu too big",
302 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
311 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
321 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
334 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
349 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__)
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11_auth.c 129 wpa_printf(MSG_DEBUG, "Could not add User-Name");
137 wpa_printf(MSG_DEBUG, "Could not add User-Password");
144 wpa_printf(MSG_DEBUG, "Could not add NAS-IP-Address");
152 wpa_printf(MSG_DEBUG, "Could not add NAS-IPv6-Address");
161 wpa_printf(MSG_DEBUG, "Could not add NAS-Identifier");
169 wpa_printf(MSG_DEBUG, "Could not add Called-Station-Id");
177 wpa_printf(MSG_DEBUG, "Could not add Calling-Station-Id");
183 wpa_printf(MSG_DEBUG, "Could not add NAS-Port-Type");
190 wpa_printf(MSG_DEBUG, "Could not add Connect-Info");
277 wpa_printf(MSG_DEBUG, "Failed to send Access-Request
    [all...]

Completed in 220 milliseconds

1 2 3 4 5 67 8 91011>>