/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 129 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)", 281 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 290 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 299 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key", 308 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 318 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key", 327 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 336 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", 345 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", 356 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_write.c | 55 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); 111 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 121 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 169 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 176 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 196 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 221 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 230 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 264 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed") [all...] |
tlsv1_client_write.c | 55 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 119 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 141 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 161 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 186 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 195 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 220 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", 250 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 56 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); 112 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 122 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " 147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 170 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " 177 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 197 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 222 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " 231 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 263 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed") [all...] |
tlsv1_client_write.c | 56 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); 120 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); 142 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); 162 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " 187 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " 196 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); 220 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " 227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " 243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", 250 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate [all...] |
pkcs5.c | 66 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " 72 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); 90 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " 103 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " 111 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", 117 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " 128 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " 133 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", 169 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8); 170 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8) [all...] |
/external/wpa_supplicant/ |
tlsv1_common.c | 138 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 " 185 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 223 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 237 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 257 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " 271 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " 323 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 332 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " 339 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " 353 wpa_printf(MSG_DEBUG, "TLSv1: No room for [all...] |
ndis_events.c | 190 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 213 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 234 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 241 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 256 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 262 wpa_printf(MSG_DEBUG, "Could not get " 273 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " 284 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", data, data_len); 296 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival"); 303 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval") [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
events.c | 56 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association " 66 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled"); 70 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the " 173 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 182 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 186 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 261 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to " 267 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to use SIM " 351 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - parse " 359 wpa_dbg(wpa_s, MSG_DEBUG, " selected based on TSN [all...] |
ibss_rsn.c | 55 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 71 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 99 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 117 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 120 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 121 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 130 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK"); 152 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d " 161 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 167 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 71 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 92 wpa_printf(MSG_DEBUG, "%s: failed", __func__); 108 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 145 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 188 wpa_printf(MSG_DEBUG, "Ready to set 802.1x mode and " 200 wpa_printf(MSG_DEBUG, "RALINK: Failed to set OID_802_11_SET_IEEE8021X(%d)", (int) ieee8021x_mode); 204 wpa_printf(MSG_DEBUG, "ieee8021x_mode is %s", ieee8021x_mode ? "TRUE" : "FALSE"); 209 wpa_printf(MSG_DEBUG, "ERROR: Failed to set OID_802_11_SET_IEEE8021X_REQUIRE_KEY(%d)", (int) ieee8021x_required_key); 213 wpa_printf(MSG_DEBUG, "ieee8021x_required_key is %s and eapol_flag(%d)", ieee8021x_required_key ? "TRUE" : "FALSE", 230 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__) [all...] |
driver_ndis.c | 435 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 442 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 449 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 471 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 477 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 515 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 540 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 556 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 572 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 585 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
ndis_events.c | 190 wpa_printf(MSG_DEBUG, "ndis_events: terminated"); 213 wpa_printf(MSG_DEBUG, "Not enough room for send_event " 234 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect"); 241 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect"); 256 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication"); 262 wpa_printf(MSG_DEBUG, "Could not get " 273 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event " 284 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len); 296 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival"); 303 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval") [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ralink.c | 74 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 95 wpa_printf(MSG_DEBUG, "%s: failed", __func__); 111 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 148 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__); 191 wpa_printf(MSG_DEBUG, "Ready to set 802.1x mode and " 203 wpa_printf(MSG_DEBUG, "RALINK: Failed to set OID_802_11_SET_IEEE8021X(%d)", (int) ieee8021x_mode); 207 wpa_printf(MSG_DEBUG, "ieee8021x_mode is %s", ieee8021x_mode ? "TRUE" : "FALSE"); 212 wpa_printf(MSG_DEBUG, "ERROR: Failed to set OID_802_11_SET_IEEE8021X_REQUIRE_KEY(%d)", (int) ieee8021x_required_key); 216 wpa_printf(MSG_DEBUG, "ieee8021x_required_key is %s and eapol_flag(%d)", ieee8021x_required_key ? "TRUE" : "FALSE", 233 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__) [all...] |
driver_ndis.c | 476 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE " 483 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); " 490 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > " 512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 518 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)", 556 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE " 581 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed", 597 wpa_printf(MSG_DEBUG, "NDIS: Failed to set " 613 wpa_printf(MSG_DEBUG, "NDIS: Failed to get " 626 wpa_printf(MSG_DEBUG, "NDIS: Failed to set [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_wsc.c | 61 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 216 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for " 231 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment size limit %u", 267 wpa_printf(MSG_DEBUG, "EAP-WSC: Generating Response"); 301 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 315 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 331 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " 338 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow"); 344 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting " 360 wpa_printf(MSG_DEBUG, "EAP-WSC: No Message Length field in a [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 100 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s", 116 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV"); 119 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory " 180 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d", 243 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready"); 254 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data", 295 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data", 338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk)); 350 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40) [all...] |
eap_ikev2.c | 43 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 81 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 160 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 165 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 196 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 223 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 101 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s", 117 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV"); 120 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory " 181 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d", 244 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready"); 255 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data", 297 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data", 341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60); 344 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk)); 353 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40) [all...] |
eap_server_ikev2.c | 43 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 81 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 143 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 197 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 204 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 224 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in [all...] |
eap_server_wsc.c | 63 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 78 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 129 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 141 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 184 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 229 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 237 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " 260 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " 272 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " 301 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_er.c | 186 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)", 205 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events"); 211 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from " 234 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot " 239 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot " 246 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL"); 335 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings"); 342 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)", 367 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out"); 378 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)" [all...] |
/external/wpa_supplicant_8/src/ap/ |
wmm.c | 110 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 116 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x " 122 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version"); 171 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d", 174 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s", 176 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps", 178 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps", 181 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u", 186 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)"); 191 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d" [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 284 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 285 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 291 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 292 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16); 293 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16); 294 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6); 299 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 305 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6); 310 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 315 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 109 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 116 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 120 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 129 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unsupported " 138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 143 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR 159 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 168 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 178 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 211 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |