HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 76 - 100 of 454) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 129 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
281 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key",
290 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
299 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key",
308 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key",
318 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
327 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
336 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key",
345 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key",
356 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_write.c 55 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello");
111 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
121 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
169 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
176 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
196 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
221 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
230 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
264 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed")
    [all...]
tlsv1_client_write.c 55 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
119 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
141 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
161 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
186 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
195 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
220 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value",
250 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 56 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello");
112 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
122 wpa_printf(MSG_DEBUG, "TLSv1: Failed to "
147 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
170 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when "
177 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
197 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
222 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain "
231 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
263 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed")
    [all...]
tlsv1_client_write.c 56 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello");
120 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record");
142 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate");
162 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space "
187 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain "
196 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record");
220 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate "
227 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random "
243 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value",
250 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate
    [all...]
pkcs5.c 66 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID "
72 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf);
90 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE "
103 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) "
111 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
117 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found "
128 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value "
133 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x",
169 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8);
170 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8)
    [all...]
  /external/wpa_supplicant/
tlsv1_common.c 138 wpa_printf(MSG_DEBUG, "TLSv1: Failed to parse X.509 "
185 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
223 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
237 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
257 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite "
271 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize "
323 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
332 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not "
339 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed "
353 wpa_printf(MSG_DEBUG, "TLSv1: No room for
    [all...]
ndis_events.c 190 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
213 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
234 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
241 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
256 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
262 wpa_printf(MSG_DEBUG, "Could not get "
273 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event "
284 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", data, data_len);
296 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival");
303 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval")
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
events.c 56 wpa_dbg(wpa_s, MSG_DEBUG, "Select network based on association "
66 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is disabled");
70 wpa_dbg(wpa_s, MSG_DEBUG, "Network configuration found for the "
173 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
182 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
186 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
261 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to "
267 wpa_dbg(wpa_s, MSG_DEBUG, "Selected network is configured to use SIM "
351 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - parse "
359 wpa_dbg(wpa_s, MSG_DEBUG, " selected based on TSN
    [all...]
ibss_rsn.c 55 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
71 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
99 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
117 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
120 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
121 wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
130 wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
152 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
161 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
167 wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ralink.c 71 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
92 wpa_printf(MSG_DEBUG, "%s: failed", __func__);
108 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
145 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
188 wpa_printf(MSG_DEBUG, "Ready to set 802.1x mode and "
200 wpa_printf(MSG_DEBUG, "RALINK: Failed to set OID_802_11_SET_IEEE8021X(%d)", (int) ieee8021x_mode);
204 wpa_printf(MSG_DEBUG, "ieee8021x_mode is %s", ieee8021x_mode ? "TRUE" : "FALSE");
209 wpa_printf(MSG_DEBUG, "ERROR: Failed to set OID_802_11_SET_IEEE8021X_REQUIRE_KEY(%d)", (int) ieee8021x_required_key);
213 wpa_printf(MSG_DEBUG, "ieee8021x_required_key is %s and eapol_flag(%d)", ieee8021x_required_key ? "TRUE" : "FALSE",
230 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__)
    [all...]
driver_ndis.c 435 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
442 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
449 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
471 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
477 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
515 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
540 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
556 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
572 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
585 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
ndis_events.c 190 wpa_printf(MSG_DEBUG, "ndis_events: terminated");
213 wpa_printf(MSG_DEBUG, "Not enough room for send_event "
234 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaConnect");
241 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaDisconnect");
256 wpa_printf(MSG_DEBUG, "MSNdis_StatusMediaSpecificIndication");
262 wpa_printf(MSG_DEBUG, "Could not get "
273 wpa_printf(MSG_DEBUG, "Failed to allocate buffer for event "
284 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_len);
296 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterArrival");
303 wpa_printf(MSG_DEBUG, "MSNdis_NotifyAdapterRemoval")
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ralink.c 74 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
95 wpa_printf(MSG_DEBUG, "%s: failed", __func__);
111 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
148 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__);
191 wpa_printf(MSG_DEBUG, "Ready to set 802.1x mode and "
203 wpa_printf(MSG_DEBUG, "RALINK: Failed to set OID_802_11_SET_IEEE8021X(%d)", (int) ieee8021x_mode);
207 wpa_printf(MSG_DEBUG, "ieee8021x_mode is %s", ieee8021x_mode ? "TRUE" : "FALSE");
212 wpa_printf(MSG_DEBUG, "ERROR: Failed to set OID_802_11_SET_IEEE8021X_REQUIRE_KEY(%d)", (int) ieee8021x_required_key);
216 wpa_printf(MSG_DEBUG, "ieee8021x_required_key is %s and eapol_flag(%d)", ieee8021x_required_key ? "TRUE" : "FALSE",
233 wpa_printf(MSG_DEBUG, "%s", __FUNCTION__)
    [all...]
driver_ndis.c 476 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_QUERY_OID_VALUE "
483 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d); "
490 wpa_printf(MSG_DEBUG, "NDIS: query oid=%08x written (%d) > "
512 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
518 wpa_printf(MSG_DEBUG, "%s: oid=0x%x Length (%d) > len (%d)",
556 wpa_printf(MSG_DEBUG, "NDIS: IOCTL_NDISUIO_SET_OID_VALUE "
581 wpa_printf(MSG_DEBUG, "%s: oid=0x%x len (%d) failed",
597 wpa_printf(MSG_DEBUG, "NDIS: Failed to set "
613 wpa_printf(MSG_DEBUG, "NDIS: Failed to get "
626 wpa_printf(MSG_DEBUG, "NDIS: Failed to set
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_wsc.c 61 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
216 wpa_printf(MSG_DEBUG, "EAP-WSC: Provide new AP settings for "
231 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment size limit %u",
267 wpa_printf(MSG_DEBUG, "EAP-WSC: Generating Response");
301 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
315 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
331 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in "
338 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow");
344 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting "
360 wpa_printf(MSG_DEBUG, "EAP-WSC: No Message Length field in a
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_peap.c 100 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
116 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV");
119 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory "
180 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
243 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
254 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
295 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data",
338 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk));
350 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40)
    [all...]
eap_ikev2.c 43 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
81 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
160 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
165 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
196 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
203 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
223 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
235 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_peap.c 101 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
117 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV");
120 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Failed to allocate memory "
181 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
244 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready");
255 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 data",
297 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: Encrypting Phase 2 SOH data",
341 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TK", tk, 60);
344 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: ISK", isk, sizeof(isk));
353 wpa_hexdump_key(MSG_DEBUG, "EAP-PEAP: TempKey", tk, 40)
    [all...]
eap_server_ikev2.c 43 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
81 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
143 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
197 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
204 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
224 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
236 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in
    [all...]
eap_server_wsc.c 63 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
78 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
129 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) "
141 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P "
184 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
229 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
237 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
260 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
272 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
301 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_er.c 186 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from AP %s (%s)",
205 wpa_printf(MSG_DEBUG, "WPS ER: Unsubscribed from events");
211 wpa_printf(MSG_DEBUG, "WPS ER: Failed to unsubscribe from "
234 wpa_printf(MSG_DEBUG, "WPS ER: No eventSubURL - cannot "
239 wpa_printf(MSG_DEBUG, "WPS ER: Pending HTTP request - cannot "
246 wpa_printf(MSG_DEBUG, "WPS ER: Failed to parse eventSubURL");
335 wpa_printf(MSG_DEBUG, "WPS ER: Use cached AP settings");
342 wpa_printf(MSG_DEBUG, "WPS ER: Removing AP entry for %s (%s)",
367 wpa_printf(MSG_DEBUG, "WPS ER: AP advertisement timed out");
378 wpa_printf(MSG_DEBUG, "WPS ER: No SID received from %s (%s)"
    [all...]
  /external/wpa_supplicant_8/src/ap/
wmm.c 110 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)",
116 wpa_printf(MSG_DEBUG, "Validating WMM IE: OUI %02x:%02x:%02x "
122 wpa_printf(MSG_DEBUG, "Unsupported WMM IE Subtype/Version");
171 wpa_printf(MSG_DEBUG, "WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d",
174 wpa_printf(MSG_DEBUG, "WMM: Nominal MSDU Size: %d%s",
176 wpa_printf(MSG_DEBUG, "WMM: Mean Data Rate: %u bps",
178 wpa_printf(MSG_DEBUG, "WMM: Minimum PHY Rate: %u bps",
181 wpa_printf(MSG_DEBUG, "WMM: Surplus Bandwidth Allowance: %u.%04u",
186 wpa_printf(MSG_DEBUG, "WMM: Invalid Nominal MSDU Size (0)");
191 wpa_printf(MSG_DEBUG, "WMM: Packets-per-second estimate for TSPEC: %d"
    [all...]
  /external/wpa_supplicant_8/src/crypto/
milenage.c 284 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
285 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16);
291 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
292 wpa_hexdump_key(MSG_DEBUG, "Milenage: CK", ck, 16);
293 wpa_hexdump_key(MSG_DEBUG, "Milenage: IK", ik, 16);
294 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK", ak, 6);
299 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6);
305 wpa_hexdump_key(MSG_DEBUG, "Milenage: AK*", ak, 6);
310 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
315 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2)
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_pd.c 109 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
116 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
120 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
129 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unsupported "
138 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
143 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
159 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
168 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
178 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
211 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]

Completed in 293 milliseconds

1 2 34 5 6 7 8 91011>>