HomeSort by relevance Sort by last modified time
    Searched refs:MSG_MSGDUMP (Results 1 - 25 of 114) sorted by null

1 2 3 4 5

  /external/wpa_supplicant/
asn1_test.c 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) "
91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix);
100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s",
104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER",
109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString",
114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString",
124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix);
136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID",
141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix);
147 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SET", prefix)
    [all...]
eap_pax_common.c 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
driver_ndis_.c 57 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len);
72 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
eap_otp.c 54 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
84 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
tls_schannel.c 264 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
308 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
310 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
383 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
393 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
426 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
463 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
537 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
544 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
552 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs"
    [all...]
eap_pax.c 180 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)",
186 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
195 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
217 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)",
224 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", rpos, data->cid_len);
233 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)",
242 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
301 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
309 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)",
320 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload"
    [all...]
eap_gtc.c 70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
125 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
eap_md5.c 81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN);
driver_broadcom.c 88 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)",
90 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */
100 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d",
170 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d",
173 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len);
195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
198 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN);
260 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes "
466 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
472 wpa_printf(MSG_MSGDUMP, "BROADCOM: IE: id:%x, len:%d"
    [all...]
eap_sim_common.c 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len);
193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
221 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data",
223 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
227 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC",
250 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d",
264 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Attribute data"
    [all...]
main_winmain.c 40 params.wpa_debug_level = MSG_MSGDUMP;
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
asn1_test.c 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) "
91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix);
100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s",
104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER",
109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString",
114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString",
124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix);
136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID",
141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix);
147 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SET", prefix)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
ieee802_11_common.c 33 wpa_printf(MSG_MSGDUMP, "short vendor specific "
55 wpa_printf(MSG_MSGDUMP, "short WMM "
78 wpa_printf(MSG_MSGDUMP, "unknown WMM "
91 wpa_printf(MSG_MSGDUMP, "Unknown Microsoft "
106 wpa_printf(MSG_MSGDUMP, "Unknown Broadcom "
115 wpa_printf(MSG_MSGDUMP, "unknown vendor specific information "
157 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
245 wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_pax_common.c 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
eap_fast_common.c 134 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV",
199 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len);
224 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV",
250 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV",
269 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV",
288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
eap_sim_common.c 195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data",
227 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
231 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC",
390 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg",
392 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ndis_.c 54 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len);
69 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
driver_broadcom.c 93 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)",
95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */
105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d",
175 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d",
178 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len);
200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
203 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN);
265 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes "
471 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
477 wpa_printf(MSG_MSGDUMP, "BROADCOM: IE: id:%x, len:%d"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_otp.c 48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
eap_md5.c 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
eap_pax.c 169 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)",
175 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
184 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
204 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)",
209 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID",
218 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)",
227 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
283 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
291 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)",
302 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload"
    [all...]
eap_gtc.c 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
120 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_schannel.c 264 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
308 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
310 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
383 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
393 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
426 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
463 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
537 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
544 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
552 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 110 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)",
117 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
154 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
164 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
271 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN);
278 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV",
319 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
339 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID",
349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)"
    [all...]
eap_mschapv2.c 139 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
184 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message",
217 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message",
331 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
334 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags);
335 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len);
371 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name",
417 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",

Completed in 130 milliseconds

1 2 3 4 5