/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 160 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generating Challenge Response"); 193 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " 203 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " 222 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " 251 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); 277 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", 349 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); 366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", 375 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate [all...] |
eap_psk.c | 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags); 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S", 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 169 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P", 192 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state") [all...] |
eap_tnc.c | 77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for " 170 wpa_printf(MSG_DEBUG, "EAP-TNC: No Message Length field in a " 180 wpa_printf(MSG_DEBUG, "EAP-TNC: No memory for " 186 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes in first " 231 wpa_printf(MSG_DEBUG, "EAP-TNC: Unsupported version %d" [all...] |
eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 195 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " 270 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive [all...] |
tncc.c | 162 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu " 167 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 199 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu " 202 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage", 238 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry"); 256 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu " 266 wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu " 278 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, " 366 wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'", 370 wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu" [all...] |
eap_aka.c | 82 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 149 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 164 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 167 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 196 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " 228 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith " 244 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym"); 251 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old reauth_id"); 257 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old eap_id"); 274 wpa_hexdump_ascii(MSG_DEBUG, [all...] |
ikev2.c | 123 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 157 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 158 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 169 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 178 wpa_printf(MSG_DEBUG, "IKEV2: No " 184 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 191 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 198 wpa_printf(MSG_DEBUG, "IKEV2: " 247 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 249 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d [all...] |
eap_vendor_test.c | 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 25 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 39 wpa_printf(MSG_DEBUG, "P2P: * Dialog Token: %d", dialog_token); 52 wpa_printf(MSG_DEBUG, "P2P: * P2P IE header"); 71 wpa_printf(MSG_DEBUG, "P2P: * Capability dev=%02x group=%02x", 82 wpa_printf(MSG_DEBUG, "P2P: * GO Intent: Intent %u Tie breaker %u", 96 wpa_printf(MSG_DEBUG, "P2P: * Listen Channel: Regulatory Class %u " 110 wpa_printf(MSG_DEBUG, "P2P: * Operating Channel: Regulatory Class %u " 135 wpa_hexdump(MSG_DEBUG, "P2P: * Channel List", 146 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", status); 202 wpa_printf(MSG_DEBUG, "P2P: * Device Info") [all...] |
p2p.c | 71 wpa_printf(MSG_DEBUG, "p2p_connection_in_progress state %d", p2p->state); 122 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer " 213 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s", 221 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 231 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)", 267 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 274 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 290 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip listen state " 306 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 319 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 119 wpa_printf(MSG_DEBUG, "RSN: Too short IE buffer (%lu bytes)", 271 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 280 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 289 wpa_hexdump_key(MSG_DEBUG, "WPA: GTK in EAPOL-Key", 298 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 308 wpa_hexdump_key(MSG_DEBUG, "WPA: SMK in EAPOL-Key", 317 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 326 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", 335 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", 346 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key" [all...] |
tdls.c | 179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: " 213 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u " 259 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered " 328 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request"); 340 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for " 381 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); 382 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); 384 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input", 403 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 407 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK" [all...] |
wpa.c | 47 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 52 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 65 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, 16); 66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16); 151 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 154 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 162 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 194 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state " 208 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
interworking.c | 188 wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR, 208 wpa_hexdump(MSG_DEBUG, "Interworking: ANQP Query info", 244 wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); 249 wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " 294 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 300 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 306 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 313 wpa_printf(MSG_DEBUG, "No room for Authentication " 330 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP"); 333 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP") [all...] |
ctrl_iface_udp.c | 67 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor attached %s:%d", 88 wpa_printf(MSG_DEBUG, "CTRL_IFACE monitor detached " 107 wpa_printf(MSG_DEBUG, "CTRL_IFACE LEVEL %s", level); 113 wpa_printf(MSG_DEBUG, "CTRL_IFACE changed monitor " 175 wpa_printf(MSG_DEBUG, "CTRL: Drop packet from unexpected " 196 wpa_printf(MSG_DEBUG, "CTLR: No cookie in the request - " 202 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie format in the " 208 wpa_printf(MSG_DEBUG, "CTLR: Invalid cookie in the request - " 309 wpa_msg(wpa_s, MSG_DEBUG, "ctrl_iface_init UDP port: %d", port); 338 wpa_printf(MSG_DEBUG, "CTRL_IFACE wait for attached [all...] |
p2p_supplicant.c | 124 wpa_printf(MSG_DEBUG, "P2P: Scan results received (%d BSS)", 163 wpa_printf(MSG_DEBUG, "Delaying P2P scan to allow " 357 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group idle timeout"); 360 wpa_printf(MSG_DEBUG, "P2P: Cancelled P2P group formation " 372 wpa_printf(MSG_DEBUG, "P2P: Remove group interface %s", 385 wpa_printf(MSG_DEBUG, "P2P: Remove temporary group network"); 409 wpa_printf(MSG_DEBUG, "P2P: Temporary group network not " 444 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether " 452 wpa_printf(MSG_DEBUG, "P2P: Could not figure out whether " 455 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs" [all...] |
sme.c | 73 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d", 92 wpa_printf(MSG_DEBUG, "SAE: No password available"); 97 wpa_printf(MSG_DEBUG, "SAE: Failed to select group"); 105 wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE"); 193 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", 197 wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: " 209 wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg"); 315 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT " 333 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports " 451 wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE authentication transaction %u [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 110 wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 145 wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 146 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 167 wpa_printf(MSG_DEBUG, "IKEV2: No " 172 wpa_printf(MSG_DEBUG, "IKEV2: Not a " 178 wpa_printf(MSG_DEBUG, "IKEV2: " 229 wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 231 wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 234 wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d" [all...] |
eap_server_mschapv2.c | 232 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in " 258 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Response - " 266 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Success or " 273 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Expected Failure " 307 wpa_hexdump_buf(MSG_DEBUG, "EAP-MSCHAPV2: Invalid response", 323 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using pre-configured " 358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 393 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Correct NT-Response") [all...] |
eap_server_psk.c | 62 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 99 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN); 132 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN); 133 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN); 140 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 146 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 168 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq", 191 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t); 194 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - [all...] |
tncs.c | 201 wpa_printf(MSG_DEBUG, "TNC: Connection ID %lu not found", 217 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ReportMessageTypes(imvID=%lu " 222 wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu", 253 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage(imvID=%lu " 256 wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCS_SendMessage", 296 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_RequestHandshakeRetry"); 310 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_ProvideRecommendation(imvID=%lu " 337 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_GetAttribute"); 350 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_SetAttribute"); 361 wpa_printf(MSG_DEBUG, "TNC: TNC_TNCS_BindFunction(imcID=%lu, [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 134 wpa_printf(MSG_DEBUG, "L2(NDISUIO): Wait for pending " 140 wpa_printf(MSG_DEBUG, "L2(NDISUIO): " 148 wpa_printf(MSG_DEBUG, "L2(NDISUIO): WriteFile failed: %d", 168 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: ReadFile failed: " 181 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Read %d byte packet", 203 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread started"); 228 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: Received " 237 wpa_printf(MSG_DEBUG, "l2_packet_rx_thread: " 245 wpa_printf(MSG_DEBUG, "L2(NDISUIO): RX thread stopped"); 259 wpa_printf(MSG_DEBUG, "L2(NDISUIO): ReadFile failed: [all...] |
/external/wpa_supplicant_8/src/wps/ |
http_server.c | 48 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d received", 54 wpa_printf(MSG_DEBUG, "HTTP: Request from %s:%d could not be received " 67 wpa_printf(MSG_DEBUG, "HTTP: Too many concurrent requests"); 136 wpa_printf(MSG_DEBUG, "HTTP: Send %lu byte response to %s:%d", 143 wpa_printf(MSG_DEBUG, "HTTP: Send failed: %s", 146 wpa_printf(MSG_DEBUG, "HTTP: Sent only %d of %lu bytes", 209 wpa_printf(MSG_DEBUG, "HTTP: Failed to accept new connection: " 213 wpa_printf(MSG_DEBUG, "HTTP: Connection from %s:%d", 266 wpa_printf(MSG_DEBUG, "HTTP: Failed to bind server port %d: " 278 wpa_printf(MSG_DEBUG, "HTTP: Started server on %s:%d" [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 168 wpa_printf(MSG_DEBUG, "EAPOL: authWhile --> 0"); 173 wpa_printf(MSG_DEBUG, "EAPOL: heldWhile --> 0"); 178 wpa_printf(MSG_DEBUG, "EAPOL: startWhen --> 0"); 183 wpa_printf(MSG_DEBUG, "EAPOL: idleWhile --> 0"); 190 wpa_printf(MSG_DEBUG, "EAPOL: disable timer tick"); 201 wpa_printf(MSG_DEBUG, "EAPOL: enable timer tick"); 377 wpa_printf(MSG_DEBUG, "EAPOL: IEEE 802.1X for " 563 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 614 wpa_printf(MSG_DEBUG, "EAPOL: txLogoff"); 624 wpa_printf(MSG_DEBUG, "EAPOL: txStart") [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 45 wpa_printf(MSG_DEBUG, "NSS: I/O close"); 52 wpa_printf(MSG_DEBUG, "NSS: I/O read(%d)", amount); 59 wpa_printf(MSG_DEBUG, "NSS: I/O write(%d)", amount); 67 wpa_printf(MSG_DEBUG, "NSS: I/O writev(%d)", iov_size); 78 wpa_printf(MSG_DEBUG, "NSS: I/O recv(%d)", amount); 81 wpa_printf(MSG_DEBUG, "NSS: No data available to be read yet"); 91 wpa_printf(MSG_DEBUG, "%s - pull_buf consumed", __func__); 96 wpa_printf(MSG_DEBUG, "%s - %lu bytes remaining in pull_buf", 110 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__); 131 wpa_printf(MSG_DEBUG, "NSS: I/O %s", __func__) [all...] |