Lines Matching refs:MSG_DEBUG
218 wpa_printf(MSG_DEBUG, "RSN: removed current PMKSA entry");
235 wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
352 wpa_printf(MSG_DEBUG, "%s: ie len too short %u",
363 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
376 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
387 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
398 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
409 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
420 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
432 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes",
462 wpa_printf(MSG_DEBUG, "%s: ie len too short %u",
472 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
485 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
496 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
507 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
518 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
529 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
545 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored",
747 wpa_hexdump(MSG_DEBUG, "WPA: PMK", pmk, WPA_PMK_LEN);
748 wpa_hexdump(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
774 wpa_printf(MSG_DEBUG, "entry len=%d ssid=%s,"
885 wpa_printf(MSG_DEBUG, "WPA: RX message 1 of 4-Way Handshake from "
900 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data",
905 wpa_printf(MSG_DEBUG, "RSN: key data "
916 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from "
932 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len);
970 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
989 wpa_hexdump(MSG_DEBUG, "WPA: EAPOL-Key MIC", reply->key_mic, 16);
991 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 2/4");
1005 wpa_hexdump(MSG_DEBUG,
1026 wpa_hexdump(MSG_DEBUG, "WPA: Group Key", gtk, gtk_len);
1069 wpa_printf(MSG_DEBUG, "WPA: Installing GTK to the driver "
1071 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key->key_rsc, key_rsc_len);
1117 wpa_printf(MSG_DEBUG, "WPA: RX message 3 of 4-Way Handshake from "
1127 wpa_printf(MSG_DEBUG, "RSN: key data "
1235 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 4/4");
1250 wpa_printf(MSG_DEBUG, "WPA: Installing PTK to the driver.");
1263 wpa_printf(MSG_DEBUG, "WPA: Pairwise Cipher Suite: "
1275 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen);
1286 wpa_printf(MSG_DEBUG, "%s: key_info=%x gtk=%p\n",
1312 wpa_printf(MSG_DEBUG, "WPA: RX message 1 of Group Key Handshake from "
1323 wpa_printf(MSG_DEBUG, "RSN: key data "
1409 wpa_hexdump(MSG_DEBUG,
1456 wpa_hexdump(MSG_DEBUG, "WPA: Group Key", gtk, keylen);
1457 wpa_printf(MSG_DEBUG, "WPA: Installing GTK to the driver (keyidx=%d "
1459 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key->key_rsc, key_rsc_len);
1515 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 2/2");
1584 wpa_hexdump(MSG_DEBUG, "RSN: encrypted key data",
1626 wpa_hexdump(MSG_DEBUG, "WPA: decrypted EAPOL-Key key data",
1641 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame len %u\n ", len);
1645 wpa_printf(MSG_DEBUG, "hdr_len=%u, key_len=%u",
1648 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame too short, len %u, "
1655 wpa_printf(MSG_DEBUG, "IEEE 802.1X RX: version=%d type=%d length=%d",
1659 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame (type %u) discarded, "
1664 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame payload size %u "
1669 wpa_printf(MSG_DEBUG, " EAPOL-Key type=%d", key->type);
1672 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key type (%d) unknown, "
1679 wpa_printf(MSG_DEBUG, "WPA: ignoring %d bytes after the IEEE "
1774 wpa_printf(MSG_DEBUG, "RX EAPOL from " MACSTR, MAC2STR(src_addr));