/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 79 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 103 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 111 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 122 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 234 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 585 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 855 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 870 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 891 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature" [all...] |
tlsv1_client.c | 65 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 77 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 227 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
tlsv1_server.c | 47 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 201 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
/external/wpa_supplicant_8/src/drivers/ |
driver_broadcom.c | 93 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)", 95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 176 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d", 179 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len); 201 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 204 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 488 wpa_printf(MSG_MSGDUMP, "Received %d bytes of scan results (%lu "
|
/external/wpa_supplicant/ |
config.c | 111 wpa_hexdump_ascii_key(MSG_MSGDUMP, data->name, 114 wpa_hexdump_ascii(MSG_MSGDUMP, data->name, 245 wpa_printf(MSG_MSGDUMP, "%s=%d (0x%x)", data->name, *dst, *dst); 294 wpa_hexdump(MSG_MSGDUMP, "BSSID", ssid->bssid, ETH_ALEN); 336 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 362 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 427 wpa_printf(MSG_MSGDUMP, "proto: 0x%x", val); 514 wpa_printf(MSG_MSGDUMP, "key_mgmt: 0x%x", val); 715 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); 743 wpa_printf(MSG_MSGDUMP, "group: 0x%x", val) [all...] |
x509v3.c | 288 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 421 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data", 678 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu", 911 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); 1024 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); 1042 wpa_printf(MSG_MSGDUMP, "X509: serialNumber %lu", cert->serial_number); 1053 wpa_printf(MSG_MSGDUMP, "X509: issuer %s", sbuf); 1063 wpa_printf(MSG_MSGDUMP, "X509: subject %s", sbuf); 1233 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER " 1289 wpa_hexdump(MSG_MSGDUMP, "X509: signature" [all...] |
eap_leap.c | 113 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 128 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 181 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
|
tlsv1_common.c | 129 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate", 343 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 398 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 498 wpa_hexdump(MSG_MSGDUMP,
|
eap_psk.c | 260 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 262 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", reqData, 5); 263 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_leap.c | 109 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 128 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 178 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
|
ikev2.c | 474 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 646 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 771 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)", 1192 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1231 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg); 1280 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (Notification)", [all...] |
eap_fast.c | 587 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 589 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 626 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 628 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 698 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk)); 704 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]", 707 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 758 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " 763 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC", 765 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
config.c | 120 wpa_hexdump_ascii_key(MSG_MSGDUMP, data->name, 123 wpa_hexdump_ascii(MSG_MSGDUMP, data->name, 257 wpa_printf(MSG_MSGDUMP, "%s=%d (0x%x)", data->name, *dst, *dst); 312 wpa_hexdump(MSG_MSGDUMP, "BSSID", ssid->bssid, ETH_ALEN); 362 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 393 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 460 wpa_printf(MSG_MSGDUMP, "proto: 0x%x", val); 565 wpa_printf(MSG_MSGDUMP, "key_mgmt: 0x%x", val); 796 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val); 826 wpa_printf(MSG_MSGDUMP, "group: 0x%x", val) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 65 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 77 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 91 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 227 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
tlsv1_server.c | 47 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 73 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 201 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
wpa_debug.h | 23 enum { MSG_MSGDUMP, MSG_DEBUG, MSG_INFO, MSG_WARNING, MSG_ERROR };
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 171 wpa_hexdump(MSG_MSGDUMP, "WPS: Encrypted Settings", encr, encr_len); 179 wpa_hexdump_buf_key(MSG_MSGDUMP, "WPS: Decrypted Encrypted Settings",
|
wps_upnp_ssdp.c | 294 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state); 423 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)", 451 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec", 681 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH data:\n%s", start); 737 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Received SSDP packet from %s:%d: "
|
/external/wpa_supplicant_8/src/crypto/ |
random.c | 137 wpa_printf(MSG_MSGDUMP, "Add randomness: count=%u entropy=%u", 165 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u",
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 252 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", 357 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
|
eap_fast.c | 396 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk)); 402 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]", 405 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 591 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req); 673 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 675 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1180 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1182 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1209 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for " 1215 wpa_hexdump(MSG_MSGDUMP, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 75 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 253 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 298 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 325 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", 358 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
|
eap_server_fast.c | 397 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk)); 403 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]", 406 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 592 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req); 674 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 676 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1185 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1214 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for " 1220 wpa_hexdump(MSG_MSGDUMP, [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 296 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state); 411 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)", 439 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec", 669 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH data:\n%s", start); 725 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Received SSDP packet from %s:%d: "
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 475 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 553 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 647 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 772 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)", 1193 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1232 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg); 1281 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (Notification)", [all...] |