HomeSort by relevance Sort by last modified time
    Searched refs:MSG_MSGDUMP (Results 1 - 25 of 106) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/src/eap_common/
eap_pax_common.c 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
139 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN);
140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN);
141 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
eap_fast_common.c 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key "
181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV",
193 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len);
218 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV",
244 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV",
263 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV",
282 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
eap_sim_common.c 190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg",
192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
194 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data",
222 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut",
226 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC",
385 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg",
387 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis_.c 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len);
63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
eap_md5.c 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
eap_pax.c 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)",
168 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)",
202 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID",
211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)",
220 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
276 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
284 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)",
295 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload"
    [all...]
eap_gtc.c 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
114 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
  /external/wpa_supplicant_8/src/crypto/
tls_schannel.c 257 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
300 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
302 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
374 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
384 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
414 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
515 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
522 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
530 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)",
112 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
149 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN);
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV",
314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
334 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID",
344 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)"
    [all...]
eap_server_mschapv2.c 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message",
211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message",
326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
329 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags);
330 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len);
366 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name",
420 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
eap_server_gtc.c 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
129 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user",
136 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected "
163 wpa_hexdump_ascii_key(MSG_MSGDUMP,
eap_server_md5.c 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
eap_server_psk.c 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
247 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
eap_server_fast.c 391 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk));
397 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]",
400 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",
586 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req);
668 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
670 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
1179 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
1181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
1208 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for "
1214 wpa_hexdump(MSG_MSGDUMP,
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_upnp_ap.c 35 wpa_hexdump_buf(MSG_MSGDUMP, "WPS: SetSelectedRegistrar attributes",
wps_upnp_ssdp.c 289 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state);
404 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)",
432 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec",
660 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH data:\n%s", start);
716 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Received SSDP packet from %s:%d: "
  /external/wpa_supplicant_8/wpa_supplicant/
main_winmain.c 34 params.wpa_debug_level = MSG_MSGDUMP;
config.c 80 wpa_hexdump_ascii_key(MSG_MSGDUMP, data->name,
83 wpa_hexdump_ascii(MSG_MSGDUMP, data->name,
192 wpa_printf(MSG_MSGDUMP, "%s=%d (0x%x)", data->name, *dst, *dst);
244 wpa_printf(MSG_MSGDUMP, "BSSID any");
253 wpa_hexdump(MSG_MSGDUMP, "BSSID", ssid->bssid, ETH_ALEN);
318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)",
347 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN);
425 wpa_printf(MSG_MSGDUMP, "proto: 0x%x", val);
536 wpa_printf(MSG_MSGDUMP, "key_mgmt: 0x%x", val);
683 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val)
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
363 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted "
421 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - "
x509v3.c 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey",
435 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data",
706 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu",
850 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - rfc822Name", pos, len);
872 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len);
894 wpa_hexdump_ascii(MSG_MSGDUMP,
918 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len);
939 wpa_printf(MSG_MSGDUMP, "X509: altName - registeredID: %s", buf);
1173 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length);
1286 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1)
    [all...]
tlsv1_server_read.c 74 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len);
113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
121 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos);
132 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites",
175 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods",
244 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello "
603 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic",
918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
933 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos);
954 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature"
    [all...]
tlsv1_server.c 41 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret",
54 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret",
69 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block",
206 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d",
292 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV",
296 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV",
300 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV",
304 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary "
308 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status "
312 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV",
325 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV",
329 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template "
339 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.c 28 wpa_printf(MSG_MSGDUMP, "short vendor specific "
50 wpa_printf(MSG_MSGDUMP, "short WMM "
112 wpa_printf(MSG_MSGDUMP, "Unknown WFA "
178 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
296 wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "

Completed in 1412 milliseconds

1 2 3 4 5