/external/wpa_supplicant_8/src/eap_common/ |
eap_pax_common.c | 138 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN); 139 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 140 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 141 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
|
eap_fast_common.c | 128 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 193 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 218 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 244 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 263 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 282 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
eap_sim_common.c | 190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 194 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 222 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 226 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 385 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 387 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
|
eap_md5.c | 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
eap_pax.c | 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 168 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 202 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 220 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 276 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 284 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 295 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload" [all...] |
eap_gtc.c | 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 114 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
/external/wpa_supplicant_8/src/crypto/ |
tls_schannel.c | 257 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello", 300 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys", 302 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs", 374 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> " 384 wpa_hexdump(MSG_MSGDUMP, "SChannel - output", 414 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted " 448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 515 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> " 522 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: " 530 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 112 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 149 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", 266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 334 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 344 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)" [all...] |
eap_server_mschapv2.c | 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message", 211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message", 326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 329 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags); 330 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len); 366 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name", 420 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
|
eap_server_gtc.c | 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 129 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user", 136 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected " 163 wpa_hexdump_ascii_key(MSG_MSGDUMP,
|
eap_server_md5.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
eap_server_psk.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 247 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P", 292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", 352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
|
eap_server_fast.c | 391 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk)); 397 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]", 400 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]", 586 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req); 668 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 670 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1179 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1208 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for " 1214 wpa_hexdump(MSG_MSGDUMP, [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ap.c | 35 wpa_hexdump_buf(MSG_MSGDUMP, "WPS: SetSelectedRegistrar attributes",
|
wps_upnp_ssdp.c | 289 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Advertisement state=%d", a->state); 404 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply state=%d (%s:%d)", 432 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH reply in %d.%03d sec", 660 wpa_printf(MSG_MSGDUMP, "WPS UPnP: M-SEARCH data:\n%s", start); 716 wpa_printf(MSG_MSGDUMP, "WPS UPnP: Received SSDP packet from %s:%d: "
|
/external/wpa_supplicant_8/wpa_supplicant/ |
main_winmain.c | 34 params.wpa_debug_level = MSG_MSGDUMP;
|
config.c | 80 wpa_hexdump_ascii_key(MSG_MSGDUMP, data->name, 83 wpa_hexdump_ascii(MSG_MSGDUMP, data->name, 192 wpa_printf(MSG_MSGDUMP, "%s=%d (0x%x)", data->name, *dst, *dst); 244 wpa_printf(MSG_MSGDUMP, "BSSID any"); 253 wpa_hexdump(MSG_MSGDUMP, "BSSID", ssid->bssid, ETH_ALEN); 318 wpa_hexdump_ascii_key(MSG_MSGDUMP, "PSK (ASCII passphrase)", 347 wpa_hexdump_key(MSG_MSGDUMP, "PSK", ssid->psk, PMK_LEN); 425 wpa_printf(MSG_MSGDUMP, "proto: 0x%x", val); 536 wpa_printf(MSG_MSGDUMP, "key_mgmt: 0x%x", val); 683 wpa_printf(MSG_MSGDUMP, "pairwise: 0x%x", val) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 363 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - Decrypted " 421 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Record Layer - "
|
x509v3.c | 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 435 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: Attribute Data", 706 wpa_printf(MSG_MSGDUMP, "X509: Validity: notBefore: %lu notAfter: %lu", 850 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - rfc822Name", pos, len); 872 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len); 894 wpa_hexdump_ascii(MSG_MSGDUMP, 918 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); 939 wpa_printf(MSG_MSGDUMP, "X509: altName - registeredID: %s", buf); 1173 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); 1286 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1) [all...] |
tlsv1_server_read.c | 74 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 121 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 132 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 175 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 244 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 603 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 933 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Signature", pos, end - pos); 954 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Decrypted Signature" [all...] |
tlsv1_server.c | 41 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: pre_master_secret", 54 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: master_secret", 69 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: key_block", 206 wpa_hexdump_key(MSG_MSGDUMP, "TLSv1: Plaintext AppData",
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", 292 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV", 296 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV", 300 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV", 304 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary " 308 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status " 312 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV", 325 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV", 329 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " 339 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.c | 28 wpa_printf(MSG_MSGDUMP, "short vendor specific " 50 wpa_printf(MSG_MSGDUMP, "short WMM " 112 wpa_printf(MSG_MSGDUMP, "Unknown WFA " 178 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 296 wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "
|