/external/wpa_supplicant/ |
H A D | asn1_test.c | 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) " 91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix); 100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s", 104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER", 109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString", 114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString", 124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix); 136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID", 141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix); 147 wpa_printf(MSG_MSGDUMP, "AS [all...] |
H A D | eap_pax_common.c | 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN); 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
|
H A D | driver_ndis_.c | 57 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 72 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
H A D | eap_otp.c | 54 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 84 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
|
H A D | tls_schannel.c | 264 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello", 308 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys", 310 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs", 383 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> " 393 wpa_hexdump(MSG_MSGDUMP, "SChannel - output", 426 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted " 463 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 537 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> " 544 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: " 552 wpa_hexdump(MSG_MSGDUMP, "SChanne [all...] |
H A D | eap_pax.c | 180 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 186 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 195 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 217 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 224 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", rpos, data->cid_len); 233 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 242 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 301 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 309 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 320 wpa_hexdump(MSG_MSGDUMP, "EA [all...] |
H A D | eap_gtc.c | 70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 125 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
H A D | eap_md5.c | 81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN);
|
H A D | driver_broadcom.c | 88 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)", 90 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 100 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 170 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d", 173 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len); 195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 198 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 260 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 466 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs", 472 wpa_printf(MSG_MSGDUMP, "BROADCO [all...] |
H A D | eap_sim_common.c | 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len); 193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 195 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 223 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 227 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 250 wpa_printf(MSG_MSGDUMP, "EAP-SIM: Attribute: Type=%d Len=%d", 264 wpa_hexdump(MSG_MSGDUMP, "EA [all...] |
H A D | main_winmain.c | 40 params.wpa_debug_level = MSG_MSGDUMP;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | asn1_test.c | 66 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Class %d(%s) P/C %d(%s) " 91 wpa_printf(MSG_MSGDUMP, "ASN.1:%s EOC", prefix); 100 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Boolean %s", 104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER", 109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString", 114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString", 124 wpa_printf(MSG_MSGDUMP, "ASN.1:%s Null", prefix); 136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID", 141 wpa_printf(MSG_MSGDUMP, "ASN.1:%s SEQUENCE", prefix); 147 wpa_printf(MSG_MSGDUMP, "AS [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | ieee802_11_common.c | 33 wpa_printf(MSG_MSGDUMP, "short vendor specific " 55 wpa_printf(MSG_MSGDUMP, "short WMM " 78 wpa_printf(MSG_MSGDUMP, "unknown WMM " 91 wpa_printf(MSG_MSGDUMP, "Unknown Microsoft " 106 wpa_printf(MSG_MSGDUMP, "Unknown Broadcom " 115 wpa_printf(MSG_MSGDUMP, "unknown vendor specific information " 157 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 245 wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN); 145 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: MK", mk, EAP_PAX_MK_LEN); 146 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: CK", ck, EAP_PAX_CK_LEN); 147 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: ICK", ick, EAP_PAX_ICK_LEN);
|
H A D | eap_fast_common.c | 134 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: master_secret for key " 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 199 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 224 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 250 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 269 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
H A D | eap_sim_common.c | 195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 199 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Verify MAC - K_aut", 202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 227 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: Add MAC - K_aut", 231 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC: MAC", 390 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 392 wpa_hexdump(MSG_MSGDUMP, "EA [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_ndis_.c | 54 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 69 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
H A D | driver_broadcom.c | 93 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl(%s,%d,len=%d,val=%p)", 95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 105 wpa_printf(MSG_MSGDUMP, "BROADCOM: wlioctl cmd=%d res=%d", 175 wpa_printf(MSG_MSGDUMP, "BROADCOM: SET %sKEY[%d] alg=%d", 178 wpa_hexdump_key(MSG_MSGDUMP, "BROADCOM: key", key, key_len); 200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 203 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 265 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 471 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs", 477 wpa_printf(MSG_MSGDUMP, "BROADCO [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
|
H A D | eap_md5.c | 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
H A D | eap_pax.c | 169 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 175 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 184 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 204 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 209 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 218 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 227 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 283 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 291 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 302 wpa_hexdump(MSG_MSGDUMP, "EA [all...] |
H A D | eap_gtc.c | 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 120 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response",
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_schannel.c | 264 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello", 308 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys", 310 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs", 383 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> " 393 wpa_hexdump(MSG_MSGDUMP, "SChannel - output", 426 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted " 463 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 537 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> " 544 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: " 552 wpa_hexdump(MSG_MSGDUMP, "SChanne [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 110 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 117 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 154 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 164 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", 271 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 278 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", 319 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 339 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 349 wpa_hexdump(MSG_MSGDUMP, "EA [all...] |
H A D | eap_mschapv2.c | 139 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 184 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message", 217 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message", 331 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 333 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 334 wpa_printf(MSG_MSGDUMP, "EAP-MSCHAPV2: Flags 0x%x", flags); 335 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Name", name, name_len); 371 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: User name", 417 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
|