/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft() 50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_derive_ptk_ft() 77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params() 102 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", in wpa_sm_set_ft_params() 121 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " in wpa_sm_set_ft_params() 387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_process_response() 388 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); in wpa_ft_process_response() 432 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", in wpa_ft_process_response() [all …]
|
D | wpa_ie.c | 337 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", in wpa_parse_vendor_specific() 342 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element", in wpa_parse_vendor_specific() 369 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", in wpa_parse_generic() 378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", in wpa_parse_generic() 396 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", in wpa_parse_generic() 415 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", in wpa_parse_generic() 424 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", in wpa_parse_generic() 433 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", in wpa_parse_generic() 454 wpa_hexdump(MSG_DEBUG, "WPA: IP Address Request in EAPOL-Key", in wpa_parse_generic() 462 wpa_hexdump(MSG_DEBUG, in wpa_parse_generic() [all …]
|
D | wpa.c | 66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16); in wpa_eapol_key_send() 67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send() 166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); in wpa_supplicant_get_pmk() 323 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len); in wpa_supplicant_send_2_of_4() 344 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter", reply->replay_counter, in wpa_supplicant_send_2_of_4() 405 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", in wpa_supplicant_process_1_of_4() 410 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " in wpa_supplicant_process_1_of_4() 431 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", in wpa_supplicant_process_1_of_4() 577 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen); in wpa_supplicant_install_ptk() 646 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len); in wpa_supplicant_install_gtk() [all …]
|
D | tdls.c | 406 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); in wpa_tdls_generate_tpk() 407 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); in wpa_tdls_generate_tpk() 428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); in wpa_tdls_generate_tpk() 492 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); in wpa_tdls_ftie_mic() 496 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_ftie_mic() 551 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); in wpa_tdls_key_mic_teardown() 555 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_key_mic_teardown() 574 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC", in wpa_supplicant_verify_tdls_mic() 576 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC", in wpa_supplicant_verify_tdls_mic() 785 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake", in wpa_tdls_send_teardown() [all …]
|
D | peerkey.c | 272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", in wpa_supplicant_process_smk_m2() 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", in wpa_supplicant_send_stk_1_of_4() 585 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN); in wpa_supplicant_process_smk_m45() 671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4() 678 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4", in wpa_supplicant_process_stk_1_of_4() 688 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce", in wpa_supplicant_process_stk_1_of_4() 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_2_of_4() 782 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4", in wpa_supplicant_process_stk_2_of_4() 791 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake", in wpa_supplicant_process_stk_2_of_4() 793 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake", in wpa_supplicant_process_stk_2_of_4() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ() 292 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV", in scard_parse_fsp_templ() 296 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV", in scard_parse_fsp_templ() 300 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV", in scard_parse_fsp_templ() 304 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary " in scard_parse_fsp_templ() 308 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status " in scard_parse_fsp_templ() 312 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV", in scard_parse_fsp_templ() 325 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV", in scard_parse_fsp_templ() 329 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " in scard_parse_fsp_templ() 339 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File " in scard_parse_fsp_templ() [all …]
|
D | wpa_debug.h | 29 #define wpa_hexdump(l,t,b,le) do { } while (0) macro 84 void wpa_hexdump(int level, const char *title, const void *buf, size_t len); 89 wpa_hexdump(level, title, buf ? wpabuf_head(buf) : NULL, in wpa_hexdump_buf()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_fast_common.c | 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", in eap_fast_parse_tlv() 193 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); in eap_fast_parse_tlv() 218 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", in eap_fast_parse_tlv() 244 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", in eap_fast_parse_tlv() 263 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", in eap_fast_parse_tlv() 282 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); in eap_fast_parse_tlv()
|
D | eap_sim_common.c | 137 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); in eap_sim_derive_keys_reauth() 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, in eap_sim_derive_keys_reauth() 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); in eap_sim_derive_keys_reauth() 152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys_reauth() 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth() 190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", in eap_sim_verify_mac() 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", in eap_sim_verify_mac() 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", in eap_sim_verify_mac() 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); in eap_sim_add_mac() 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", in eap_sim_add_mac() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_psk.c | 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, in eap_psk_process_1() 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, in eap_psk_process_1() 168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); in eap_psk_process_1() 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, in eap_psk_process_3() 217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); in eap_psk_process_3() 218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); in eap_psk_process_3() 270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3() 272 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", in eap_psk_process_3() 274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); in eap_psk_process_3() 293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", in eap_psk_process_3() [all …]
|
D | eap_pax.c | 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", in eap_pax_process_std_1() 168 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", in eap_pax_process_std_1() 177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", in eap_pax_process_std_1() 197 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", in eap_pax_process_std_1() 211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", in eap_pax_process_std_1() 220 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); in eap_pax_process_std_1() 276 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", in eap_pax_process_std_3() 284 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", in eap_pax_process_std_3() 295 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", in eap_pax_process_std_3() 311 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); in eap_pax_process_std_3() [all …]
|
D | mschapv2.c | 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response() 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response() 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response() 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
|
D | eap_leap.c | 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", in eap_leap_process_request() 123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", in eap_leap_process_request() 173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos, in eap_leap_process_success() 226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", in eap_leap_process_response() 250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", in eap_leap_process_response() 363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", in eap_leap_getKey() 365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", in eap_leap_getKey() 367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge", in eap_leap_getKey() 369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response", in eap_leap_getKey()
|
D | eap_gpsk.c | 187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", in eap_gpsk_process_rand_server() 355 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", in eap_gpsk_send_gpsk_2() 393 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id", in eap_gpsk_send_gpsk_2() 423 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2", in eap_gpsk_validate_rand() 425 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3", in eap_gpsk_validate_rand() 439 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", in eap_gpsk_validate_rand() 441 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3", in eap_gpsk_validate_rand() 540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen); in eap_gpsk_validate_pd_payload_2() 573 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_validate_gpsk_3_mic() 574 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_validate_gpsk_3_mic()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 319 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID", in wpa_ft_pull_pmk_r1() 386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft() 393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_auth_derive_ptk_ft() 402 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft() 516 wpa_hexdump(MSG_MSGDUMP, "FT: Resource descriptor IE(s)", in wpa_ft_process_rdie() 611 wpa_hexdump(MSG_MSGDUMP, "FT: RIC Request", ric, ric_len); in wpa_ft_process_ric() 820 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", in wpa_ft_process_auth_req() 850 wpa_hexdump(MSG_DEBUG, "FT: STA R0KH-ID", in wpa_ft_process_auth_req() 860 wpa_hexdump(MSG_DEBUG, "FT: Requested PMKR0Name", in wpa_ft_process_auth_req() 865 wpa_hexdump(MSG_DEBUG, "FT: Derived requested PMKR1Name", in wpa_ft_process_auth_req() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pax.c | 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", in eap_pax_build_std_1() 112 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); in eap_pax_build_std_1() 149 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", in eap_pax_build_std_3() 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); in eap_pax_build_std_3() 206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", in eap_pax_check() 266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_check() 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", in eap_pax_check() 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", in eap_pax_process_std_2() 349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", in eap_pax_process_std_2() 406 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected MAC_CK(A, B, CID)", in eap_pax_process_std_2() [all …]
|
D | eap_server_gpsk.c | 115 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", in eap_gpsk_build_gpsk_1() 312 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", in eap_gpsk_process_gpsk_2() 325 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", in eap_gpsk_process_gpsk_2() 327 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-2", in eap_gpsk_process_gpsk_2() 397 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); in eap_gpsk_process_gpsk_2() 438 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_process_gpsk_2() 439 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2() 486 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); in eap_gpsk_process_gpsk_4() 507 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_process_gpsk_4() 508 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_4()
|
D | eap_server_psk.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", in eap_psk_build_1() 138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", in eap_psk_build_3() 144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", in eap_psk_build_3() 292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", in eap_psk_process_2() 316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); in eap_psk_process_2() 319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", in eap_psk_process_2() 352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left); in eap_psk_process_4() 387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", in eap_psk_process_4()
|
D | eap_server_ttls.c | 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse() 244 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 251 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 258 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 265 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 272 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse() 642 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received", in eap_ttls_process_phase2_mschap() 644 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected", in eap_ttls_process_phase2_mschap() 724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", in eap_ttls_process_phase2_mschapv2() 726 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", in eap_ttls_process_phase2_mschapv2() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | milenage.c | 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); in milenage_check() 279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); in milenage_check() 293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); in milenage_check() 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); in milenage_check() 309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2); in milenage_check() 313 wpa_hexdump(MSG_DEBUG, "Milenage: MAC_A", mac_a, 8); in milenage_check() 317 wpa_hexdump(MSG_DEBUG, "Milenage: Received MAC_A", in milenage_check()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_read.c | 72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); in tls_process_server_hello() 98 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", in tls_process_server_hello() 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", in tls_process_server_hello() 170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 463 wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime", in tlsv1_process_diffie_hellman() 472 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", in tlsv1_process_diffie_hellman() 486 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", in tlsv1_process_diffie_hellman() 502 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)", in tlsv1_process_diffie_hellman() 548 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerKeyExchange hash", in tlsv1_process_diffie_hellman() 633 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len); in tls_process_server_key_exchange() [all …]
|
D | tlsv1_server_read.c | 93 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); in tls_process_client_hello() 132 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", in tls_process_client_hello() 140 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); in tls_process_client_hello() 151 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", in tls_process_client_hello() 195 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", in tls_process_client_hello() 259 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " in tls_process_client_hello() 608 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", in tls_process_client_key_exchange_dh() 637 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", in tls_process_client_key_exchange_dh() 746 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); in tls_process_client_key_exchange() 920 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() [all …]
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_enrollee.c | 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", in wps_build_m1() 490 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", in wps_process_registrar_nonce() 521 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); in wps_process_uuid_r() 541 wpa_hexdump(MSG_DEBUG, "WPS: Received public key", in wps_process_pubkey() 543 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key " in wps_process_pubkey() 545 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash", in wps_process_pubkey() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eapol_test.c | 204 wpa_hexdump(MSG_DEBUG, "Learned identity from " in ieee802_1x_encapsulate_radius() 307 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); in eapol_test_eapol_send() 353 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); in eapol_test_compare_pmk() 356 wpa_hexdump(MSG_DEBUG, "PMK from AS", in eapol_test_compare_pmk() 362 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); in eapol_test_compare_pmk() 365 wpa_hexdump(MSG_DEBUG, "PMK from AS", in eapol_test_compare_pmk() 392 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk() 393 wpa_hexdump(MSG_DEBUG, "EAP-Key-Name from server", in eapol_test_compare_pmk() 802 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)", in ieee802_1x_get_keys() 806 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)", in ieee802_1x_get_keys() [all …]
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_ndis_.c | 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); in wpa_driver_ndis_event_process() 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len); in wpa_driver_ndis_event_process()
|