Home | History | Annotate | Download | only in drivers

Lines Matching refs:MSG_DEBUG

210 		wpa_printf(MSG_DEBUG, "atheros: %s: %s: ioctl op=0x%x "
295 wpa_printf(MSG_DEBUG, "%s: group key cipher=%d", __func__, v);
325 wpa_printf(MSG_DEBUG, "%s: pairwise key ciphers=0x%x", __func__, v);
332 wpa_printf(MSG_DEBUG, "%s: key management algorithms=0x%x",
353 wpa_printf(MSG_DEBUG, "%s: rsn capabilities=0x%x", __func__, v);
360 wpa_printf(MSG_DEBUG, "%s: enable WPA=0x%x", __func__, params->wpa);
373 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, params->enabled);
405 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __func__, enabled);
417 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
428 wpa_printf(MSG_DEBUG, "%s: Failed to %sauthorize STA " MACSTR,
455 wpa_printf(MSG_DEBUG, "%s: addr=%s key_idx=%d",
468 wpa_printf(MSG_DEBUG, "%s: Failed to delete key (addr %s"
489 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%s key_idx=%d",
558 wpa_printf(MSG_DEBUG, "%s: Failed to set key (addr %s"
575 wpa_printf(MSG_DEBUG, "%s: addr=%s idx=%d",
586 wpa_printf(MSG_DEBUG, "%s: Failed to get encryption data "
641 wpa_printf(MSG_DEBUG, "%s: Failed to fetch STA stats (addr "
668 wpa_printf(MSG_DEBUG, "%s: addr=%s", __func__, ether_sprintf(addr));
675 wpa_printf(MSG_DEBUG, "%s: Failed to clear STA stats (addr "
690 wpa_printf(MSG_DEBUG, "%s buflen = %lu", __func__,
692 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len);
710 wpa_hexdump(MSG_DEBUG, "atheros: SET_APPIEBUF(Beacon)",
726 wpa_hexdump(MSG_DEBUG, "atheros: SET_APPIEBUF(ProbeResp)",
742 wpa_printf(MSG_DEBUG, "%s: addr=%s reason_code=%d",
750 wpa_printf(MSG_DEBUG, "%s: Failed to deauth STA (addr " MACSTR
766 wpa_printf(MSG_DEBUG, "%s: addr=%s reason_code=%d",
774 wpa_printf(MSG_DEBUG, "%s: Failed to disassoc STA (addr "
854 wpa_printf(MSG_DEBUG, "%s: subtype 0x%x len %d", __func__, stype,
882 wpa_printf(MSG_DEBUG, "%s: BSSID does not match - ignore",
929 wpa_printf(MSG_DEBUG, "%s Enter", __func__);
977 wpa_printf(MSG_DEBUG, "%s buflen = %lu frametype=%u", __func__,
979 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len);
990 wpa_hexdump_buf(MSG_DEBUG, "atheros: Append WPA/RSN IE",
997 wpa_hexdump(MSG_DEBUG, "atheros: SET_APPIEBUF",
1011 wpa_hexdump_buf(MSG_DEBUG, "atheros: set_ap_wps_ie - beacon", beacon);
1012 wpa_hexdump_buf(MSG_DEBUG, "atheros: set_ap_wps_ie - proberesp",
1014 wpa_hexdump_buf(MSG_DEBUG, "atheros: set_ap_wps_ie - assocresp",
1046 wpa_printf(MSG_DEBUG, "%s: addr=%s status_code=%d",
1058 wpa_printf(MSG_DEBUG, "%s: Not enough space to copy "
1068 wpa_printf(MSG_DEBUG, "%s: Failed to auth STA (addr " MACSTR
1083 wpa_printf(MSG_DEBUG, "%s: addr=%s status_code=%d reassoc %d",
1097 wpa_printf(MSG_DEBUG, "%s: Not enough space to copy "
1107 wpa_printf(MSG_DEBUG, "%s: Failed to assoc STA (addr " MACSTR
1133 wpa_printf(MSG_DEBUG, "%s: Failed to get WPA/RSN IE: %s",
1189 wpa_printf(MSG_DEBUG, "Custom wireless event: '%s'", custom);
1196 wpa_printf(MSG_DEBUG,
1210 wpa_printf(MSG_DEBUG,
1253 wpa_printf(MSG_DEBUG, "Invalid Manage.prob_req event "
1266 wpa_printf(MSG_DEBUG,
1278 wpa_printf(MSG_DEBUG,
1291 wpa_printf(MSG_DEBUG,
1329 wpa_printf(MSG_DEBUG, "%s:%d exit",
1333 wpa_printf(MSG_DEBUG, "athr: %s: P2P_BIG_PARAM["
1339 wpa_hexdump(MSG_DEBUG, "athr: P2P_FETCH_FRAME data",
1342 wpa_printf(MSG_DEBUG, "athr: frame too short");
1355 wpa_printf(MSG_DEBUG, "athr: EV_RX_MGMT stype=%u "
1367 wpa_printf(MSG_DEBUG, "athr: %s unknown type %d",
1380 wpa_printf(MSG_DEBUG, "WEXT: EV_RX_MGMT");
1521 wpa_printf(MSG_DEBUG, "SIOCGIWRANGE: WE(compiled)=%d "
1647 wpa_printf(MSG_DEBUG, "Configure bridge %s for EAPOL traffic.",
1655 wpa_printf(MSG_DEBUG, "Interface in bridge %s; configure for "
1775 wpa_printf(MSG_DEBUG, "%s: enabled=%d", __FUNCTION__, enabled);
1810 wpa_printf(MSG_DEBUG, "atheros: set_ap - pairwise_ciphers=0x%x "
1816 wpa_hexdump_ascii(MSG_DEBUG, "atheros: SSID",
1819 wpa_printf(MSG_DEBUG, "atheros: HESSID " MACSTR,
1821 wpa_hexdump_buf(MSG_DEBUG, "atheros: beacon_ies",
1823 wpa_hexdump_buf(MSG_DEBUG, "atheros: proberesp_ies",
1825 wpa_hexdump_buf(MSG_DEBUG, "atheros: assocresp_ies",
1863 wpa_printf(MSG_DEBUG, "%s frmlen = %lu " MACSTR, __func__,
1890 wpa_printf(MSG_DEBUG, "%s", __func__);
1897 wpa_printf(MSG_DEBUG, "%s IEEE80211_IOCTL_RES_REQ FAILED "
1912 wpa_printf(MSG_DEBUG, "%s", __func__);
1935 wpa_printf(MSG_DEBUG, "%s: op=0x%x=%d (%s) len=0x%x",
1939 wpa_printf(MSG_DEBUG, "%s: op=0x%x (%s) subop=0x%x=%d "
1968 wpa_printf(MSG_DEBUG, "%s: freq=%d, wait=%u, dst=" MACSTR ", src="
1991 wpa_printf(MSG_DEBUG, "atheros: ifname=%s, WNM TFS IE oper=%d " MACSTR,
1998 wpa_printf(MSG_DEBUG, "TFS Req IE(s) too large");
2017 wpa_printf(MSG_DEBUG, "%s: Failed to set WNM TFS IE: "
2036 wpa_printf(MSG_DEBUG, "%s: Failed to get WNM TFS IE: "
2043 wpa_printf(MSG_DEBUG, "atheros: %c len=%d", tfs_ie->app_buf[0],
2063 wpa_printf(MSG_DEBUG, "%s: Failed to set WNM TFS IE: "
2069 wpa_printf(MSG_DEBUG, "Unsupported TFS oper %d", oper);
2085 wpa_printf(MSG_DEBUG, "atheros: WNM-Sleep Oper %d, " MACSTR,
2130 wpa_printf(MSG_DEBUG, "atheros: Unsupported WNM operation %d",