Home | History | Annotate | Download | only in tests

Lines Matching refs:MSG_DEBUG

47 	wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
55 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
63 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
74 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
125 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
144 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
145 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
153 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
162 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
184 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed");
199 wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default()"
214 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
217 wpa_printf(MSG_DEBUG, "AUTH: %s", txt);
225 wpa_printf(MSG_DEBUG, "SUPP: RX EAPOL frame");
236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
256 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
269 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine");
287 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed");
299 wpa_printf(MSG_DEBUG, "AUTH: wpa_auth_sta_init() failed");
305 wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed");
358 wpa_printf(MSG_DEBUG, "Starting eloop");
360 wpa_printf(MSG_DEBUG, "eloop done");