/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 80 wpa_hexdump_ascii_key(MSG_MSGDUMP, data->name, 83 wpa_hexdump_ascii(MSG_MSGDUMP, data->name, 192 wpa_printf(MSG_MSGDUMP, "%s=%d (0x%x)", data->name, *dst, *dst); 244 wpa_printf(MSG_MSGDUMP, "BSSID any"); 253 wpa_hexdump(MSG_MSGDUMP, "BSSID", ssid->bssid, ETH_ALEN); 318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 349 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 427 wpa_printf(MSG_MSGDUMP, "proto: 0x%x", val); 538 wpa_printf(MSG_MSGDUMP, "key_mgmt: 0x%x", val); 685 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 469 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 766 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)", 1187 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1226 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg); 1275 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (Notification)", [all...] |
eap_fast.c | 585 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 587 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 624 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 626 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 696 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk)); 702 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]", 705 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 756 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " 761 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC", 763 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC" [all...] |
eap_leap.c | 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
|
eap_psk.c | 270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 272 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", 274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left);
|
eap_sake.c | 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 232 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-SAKE: SERVERID",
|
eap_peap.c | 329 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); 330 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", 332 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", 335 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 639 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received", 641 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected", 718 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: User", 720 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 722 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", 760 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Received", 762 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Expected",
|
ikev2.c | 439 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Nr", 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 801 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)", 1116 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 1181 wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg);
|
eap_server_tnc.c | 167 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request", 529 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Received payload",
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 63 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " 110 wpa_printf(MSG_MSGDUMP, "WPS: Unknown Vendor Extension (Vendor ID %u)", 591 wpa_hexdump_buf(MSG_MSGDUMP, "WPS: Message data", msg);
|
wps_er_ssdp.c | 44 wpa_hexdump_ascii(MSG_MSGDUMP, "WPS ER: Received SSDP contents",
|
/external/wpa_supplicant_8/src/drivers/ |
driver_wired.c | 124 wpa_printf(MSG_MSGDUMP, "handle_data: too short (%lu)", 133 wpa_printf(MSG_MSGDUMP, "Received EAPOL packet"); 184 wpa_printf(MSG_MSGDUMP, "handle_dhcp: too short (%d)", len); 191 wpa_printf(MSG_MSGDUMP, "Got DHCP broadcast packet from " MACSTR,
|
driver_ndis.c | 535 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len); 563 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len); 968 wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_WEP", 1039 wpa_hexdump_key(MSG_MSGDUMP, "NDIS: OID_802_11_ADD_KEY", 1228 wpa_hexdump(MSG_MSGDUMP, "NDIS: OID_802_11_PMKID", (u8 *) p, len); [all...] |
/external/wpa_supplicant_8/src/tls/ |
asn1.c | 36 wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: "
|
tlsv1_client.c | 59 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 72 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 88 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 279 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
tlsv1_client_write.c | 61 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 363 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Encrypted pre_master_secret", 542 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
|
tlsv1_cred.c | 390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
|
pkcs5.c | 227 wpa_hexdump_key(MSG_MSGDUMP, "PKCS #5: message M (encrypted key)",
|
tlsv1_client_read.c | 72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); 98 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
|
/external/wpa_supplicant_8/src/radius/ |
radius_das.c | 188 if (wpa_debug_level <= MSG_MSGDUMP) 261 if (wpa_debug_level <= MSG_MSGDUMP)
|
/external/wpa_supplicant_8/src/ap/ |
beacon.c | 398 wpa_printf(MSG_MSGDUMP, "P2P: Ignore Probe Request " 411 wpa_printf(MSG_MSGDUMP, "P2P: Ignore Probe Request " 422 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR " for " 449 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR 463 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR 479 wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
|
wpa_auth_ft.c | 496 wpa_hexdump(MSG_MSGDUMP, "FT: Resource descriptor IE(s)", 591 wpa_hexdump(MSG_MSGDUMP, "FT: RIC Request", ric, ric_len); 1099 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 1100 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16); 1101 wpa_hexdump(MSG_MSGDUMP, "FT: MDIE", 1103 wpa_hexdump(MSG_MSGDUMP, "FT: FTIE", 1105 wpa_hexdump(MSG_MSGDUMP, "FT: RSN", 1165 wpa_hexdump(MSG_MSGDUMP, "FT: Action frame body", ies, ies_len); 1200 wpa_hexdump(MSG_MSGDUMP, "FT: RRB Request Frame body", body, len); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 110 wpa_hexdump(MSG_MSGDUMP, "P2P: Channel List", 310 wpa_hexdump(MSG_MSGDUMP, "P2P: Data", pos, end - pos); 411 wpa_hexdump_buf(MSG_MSGDUMP, "P2P: P2P IE data",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 58 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
|