Lines Matching refs:ie
352 wpa_printf(MSG_DEBUG, "%s: ie len too short %u",
363 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
376 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
387 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
398 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
409 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
420 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
432 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes",
462 wpa_printf(MSG_DEBUG, "%s: ie len too short %u",
472 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
485 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
496 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
507 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
518 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), "
529 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)",
545 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored",
906 "underflow (ie=%d len=%d)",
1113 uint8_t *ie = NULL, *gtk = NULL, *key_rsc;
1128 "underflow (ie=%d len=%d)",
1133 ie = pos;
1153 ie = (uint8_t *)(key + 1);
1165 memcmp(wpa_s->ap_wpa_ie, ie, ie_len) != 0)) {
1171 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg", ie, ie_len);
1324 "underflow (ie=%d len=%d)",