/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 140 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 185 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message", 218 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message", 333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 335 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 336 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags); 337 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len); 373 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name", 424 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
|
eap_server_gtc.c | 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 135 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", 142 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected " 169 wpa_hexdump_ascii_key(MSG_MSGDUMP,
|
eap_server_md5.c | 73 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 125 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.c | 33 wpa_printf(MSG_MSGDUMP, "short vendor specific " 55 wpa_printf(MSG_MSGDUMP, "short WMM " 107 wpa_printf(MSG_MSGDUMP, "Unknown WFA " 173 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 266 wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 227 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 231 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 390 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 392 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data" [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 196 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 200 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 203 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 226 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 228 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 232 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 391 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 393 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data" [all...] |
/external/wpa_supplicant/ |
eap_gtc.c | 70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 125 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
eap_md5.c | 81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN);
|
driver_broadcom.c | 88 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)", 90 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 100 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 170 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d", 173 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len); 195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 198 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 260 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 466 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs", 472 wpa_printf(MSG_MSGDUMP, "BROADCOM: IE: id:%x, len:%d" [all...] |
eap_sim_common.c | 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len); 193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 223 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 227 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 250 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 264 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Attribute data" [all...] |
main_winmain.c | 40 params.wpa_debug_level = MSG_MSGDUMP;
|
eap_fast.c | 902 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: T-PRF seed", seed, seed_len); 903 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: PAC-Key", 954 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 1243 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1245 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 120 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 120 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_broadcom.c | 93 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)", 95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 175 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d", 178 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len); 200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 203 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 265 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 471 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs", 477 wpa_printf(MSG_MSGDUMP, "BROADCOM: IE: id:%x, len:%d" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
main_winmain.c | 40 params.wpa_debug_level = MSG_MSGDUMP;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 135 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", 142 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected " 169 wpa_hexdump_ascii_key(MSG_MSGDUMP,
|
eap_md5.c | 72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 124 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ap.c | 40 wpa_hexdump_buf(MSG_MSGDUMP, "WPS: SetSelectedRegistrar attributes",
|
/external/wpa_supplicant_8/wpa_supplicant/ |
main_winmain.c | 40 params.wpa_debug_level = MSG_MSGDUMP;
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 291 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 441 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data", 713 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu", 857 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - rfc822Name", pos, len); 879 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len); 901 wpa_hexdump_ascii(MSG_MSGDUMP, 925 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); 946 wpa_printf(MSG_MSGDUMP, "X509: altName - registeredID: %s", buf); 1180 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); 1293 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1) [all...] |
tlsv1_record.c | 199 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 254 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 355 wpa_hexdump(MSG_MSGDUMP,
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 199 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 254 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 355 wpa_hexdump(MSG_MSGDUMP,
|
x509v3.c | 288 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 421 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data", 678 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu", 911 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); 1024 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); 1042 wpa_printf(MSG_MSGDUMP, "X509: serialNumber %lu", cert->serial_number); 1053 wpa_printf(MSG_MSGDUMP, "X509: issuer %s", sbuf); 1063 wpa_printf(MSG_MSGDUMP, "X509: subject %s", sbuf); 1248 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER " 1304 wpa_hexdump(MSG_MSGDUMP, "X509: signature" [all...] |
tlsv1_server_read.c | 79 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 103 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 111 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 122 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 234 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 586 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 859 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 874 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 895 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature" [all...] |