HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 76 - 100 of 243) sorted by null

1 2 34 5 6 7 8 910

  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response");
193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated "
203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated "
222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d "
251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge");
277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the "
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername",
349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success");
366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message",
375 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate
    [all...]
eap_psk.c 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags);
114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S",
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
192 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state")
    [all...]
eap_tnc.c 77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for "
170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a "
180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for "
186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first "
231 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d"
    [all...]
eap_fast.c 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
195 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
270 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive
    [all...]
tncc.c 162 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
167 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
199 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
202 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
238 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
256 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
266 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
278 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
366 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
370 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu"
    [all...]
eap_aka.c 82 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
149 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
164 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
167 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
196 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
228 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith "
244 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym");
251 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old reauth_id");
257 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old eap_id");
274 wpa_hexdump_ascii(MSG_DEBUG,
    [all...]
ikev2.c 123 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
169 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
178 wpa_printf(MSG_DEBUG, "IKEV2: No "
184 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
191 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
198 wpa_printf(MSG_DEBUG, "IKEV2: "
247 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
249 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d
    [all...]
eap_vendor_test.c 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
  /external/wpa_supplicant_8/src/p2p/
p2p_build.c 25 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
39 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token);
52 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header");
71 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x",
82 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u",
96 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u "
110 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u "
135 wpa_hexdump(MSG_DEBUG, "P2P: * Channel List",
146 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status);
202 wpa_printf(MSG_DEBUG, "P2P: * Device Info")
    [all...]
p2p.c 71 wpa_printf(MSG_DEBUG, "p2p_connection_in_progress state %d", p2p->state);
122 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
213 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
221 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
231 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
267 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
274 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
290 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip listen state "
306 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
319 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 119 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)",
271 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key",
280 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
289 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key",
298 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key",
308 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key",
317 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
326 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key",
335 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key",
346 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key"
    [all...]
tdls.c 179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
213 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
259 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
328 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
340 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
381 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
382 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
384 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
403 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
407 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK"
    [all...]
wpa.c 47 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
52 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16);
66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16);
151 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
154 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
162 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
194 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
208 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
interworking.c 188 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
208 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info",
244 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
249 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
294 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
300 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
306 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
313 wpa_printf(MSG_DEBUG, "No room for Authentication "
330 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
333 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP")
    [all...]
ctrl_iface_udp.c 67 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d",
88 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached "
107 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level);
113 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor "
175 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected "
196 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - "
202 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the "
208 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - "
309 wpa_msg(wpa_s, MSG_DEBUG, "ctrl_iface_init UDP port: %d", port);
338 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached
    [all...]
p2p_supplicant.c 124 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)",
163 wpa_printf(MSG_DEBUG, "Delaying P2P scan to allow "
357 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout");
360 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group formation "
372 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s",
385 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network");
409 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not "
444 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
452 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether "
455 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs"
    [all...]
sme.c 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d",
92 wpa_printf(MSG_DEBUG, "SAE: No password available");
97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group");
105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
193 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
197 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: "
209 wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg");
315 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
333 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports "
451 wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE authentication transaction %u
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 110 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
167 wpa_printf(MSG_DEBUG, "IKEV2: No "
172 wpa_printf(MSG_DEBUG, "IKEV2: Not a "
178 wpa_printf(MSG_DEBUG, "IKEV2: "
229 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
231 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
234 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d"
    [all...]
eap_server_mschapv2.c 232 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in "
258 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - "
266 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or "
273 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure "
307 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response",
323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured "
358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
393 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response")
    [all...]
eap_server_psk.c 62 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
99 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
132 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
133 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
140 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
146 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
168 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
191 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
194 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 -
    [all...]
tncs.c 201 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found",
217 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu "
222 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
253 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu "
256 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage",
296 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry");
310 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu "
337 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute");
350 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute");
361 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu,
    [all...]
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending "
140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): "
148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d",
168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: "
181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet",
203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started");
228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received "
237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: "
245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped");
259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed:
    [all...]
  /external/wpa_supplicant_8/src/wps/
http_server.c 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received",
54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received "
67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests");
136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d",
143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s",
146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes",
209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: "
213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d",
266 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: "
278 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d"
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 168 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0");
173 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0");
178 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0");
183 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0");
190 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick");
201 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick");
377 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for "
563 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both "
614 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff");
624 wpa_printf(MSG_DEBUG, "EAPOL: txStart")
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_nss.c 45 wpa_printf(MSG_DEBUG, "NSS: I/O close");
52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount);
59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount);
67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size);
78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount);
81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet");
91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__);
96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf",
110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__);
131 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__)
    [all...]

Completed in 172 milliseconds

1 2 34 5 6 7 8 910