Home
last modified time | relevance | path

Searched refs:wpa_hexdump (Results 1 – 25 of 131) sorted by relevance

123456

/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c38 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft()
43 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft()
72 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params()
83 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params()
97 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", in wpa_sm_set_ft_params()
116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " in wpa_sm_set_ft_params()
382 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_process_response()
383 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); in wpa_ft_process_response()
427 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", in wpa_ft_process_response()
429 wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce", in wpa_ft_process_response()
[all …]
Dwpa_ie.c344 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", in wpa_parse_vendor_specific()
349 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element", in wpa_parse_vendor_specific()
376 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", in wpa_parse_generic()
385 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", in wpa_parse_generic()
403 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", in wpa_parse_generic()
422 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", in wpa_parse_generic()
431 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", in wpa_parse_generic()
440 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", in wpa_parse_generic()
461 wpa_hexdump(MSG_DEBUG, "WPA: IP Address Request in EAPOL-Key", in wpa_parse_generic()
469 wpa_hexdump(MSG_DEBUG, in wpa_parse_generic()
[all …]
Dwpa.c76 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, mic_len); in wpa_eapol_key_send()
77 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send()
206 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); in wpa_supplicant_get_pmk()
384 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len); in wpa_supplicant_send_2_of_4()
408 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter", reply->replay_counter, in wpa_supplicant_send_2_of_4()
470 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", in wpa_supplicant_process_1_of_4()
475 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " in wpa_supplicant_process_1_of_4()
496 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", in wpa_supplicant_process_1_of_4()
648 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen); in wpa_supplicant_install_ptk()
721 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len); in wpa_supplicant_install_gtk()
[all …]
Dtdls.c410 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); in wpa_tdls_generate_tpk()
411 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); in wpa_tdls_generate_tpk()
432 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); in wpa_tdls_generate_tpk()
496 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); in wpa_tdls_ftie_mic()
500 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_ftie_mic()
555 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); in wpa_tdls_key_mic_teardown()
559 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); in wpa_tdls_key_mic_teardown()
578 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC", in wpa_supplicant_verify_tdls_mic()
580 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC", in wpa_supplicant_verify_tdls_mic()
803 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake", in wpa_tdls_send_teardown()
[all …]
Dpeerkey.c272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", in wpa_supplicant_process_smk_m2()
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", in wpa_supplicant_send_stk_1_of_4()
586 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN); in wpa_supplicant_process_smk_m45()
672 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_1_of_4()
679 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4", in wpa_supplicant_process_stk_1_of_4()
689 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce", in wpa_supplicant_process_stk_1_of_4()
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); in wpa_supplicant_process_stk_2_of_4()
782 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4", in wpa_supplicant_process_stk_2_of_4()
791 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake", in wpa_supplicant_process_stk_2_of_4()
793 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake", in wpa_supplicant_process_stk_2_of_4()
[all …]
/external/wpa_supplicant_8/src/utils/
Dpcsc_funcs.c281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", in scard_parse_fsp_templ()
298 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV", in scard_parse_fsp_templ()
302 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV", in scard_parse_fsp_templ()
306 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV", in scard_parse_fsp_templ()
310 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary " in scard_parse_fsp_templ()
314 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status " in scard_parse_fsp_templ()
318 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV", in scard_parse_fsp_templ()
330 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV", in scard_parse_fsp_templ()
334 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " in scard_parse_fsp_templ()
344 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File " in scard_parse_fsp_templ()
[all …]
Dwpa_debug.h29 #define wpa_hexdump(l,t,b,le) do { } while (0) macro
86 void wpa_hexdump(int level, const char *title, const void *buf, size_t len);
91 wpa_hexdump(level, title, buf ? wpabuf_head(buf) : NULL, in wpa_hexdump_buf()
/external/wpa_supplicant_8/src/eap_common/
Deap_fast_common.c75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
154 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", in eap_fast_parse_tlv()
166 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); in eap_fast_parse_tlv()
191 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", in eap_fast_parse_tlv()
217 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", in eap_fast_parse_tlv()
236 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", in eap_fast_parse_tlv()
255 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); in eap_fast_parse_tlv()
Deap_sim_common.c137 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); in eap_sim_derive_keys_reauth()
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, in eap_sim_derive_keys_reauth()
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); in eap_sim_derive_keys_reauth()
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", in eap_sim_derive_keys_reauth()
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); in eap_sim_derive_keys_reauth()
190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", in eap_sim_verify_mac()
192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", in eap_sim_verify_mac()
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", in eap_sim_verify_mac()
219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); in eap_sim_add_mac()
220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", in eap_sim_add_mac()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_client_ocsp.c77 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA1)", hash, 20); in ocsp_hash_data()
84 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA256)", hash, 32); in ocsp_hash_data()
91 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA384)", hash, 48); in ocsp_hash_data()
98 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA512)", hash, 64); in ocsp_hash_data()
129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); in tls_process_ocsp_single_response()
175 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash", in tls_process_ocsp_single_response()
179 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", in tls_process_ocsp_single_response()
186 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash", in tls_process_ocsp_single_response()
202 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len); in tls_process_ocsp_single_response()
210 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash", in tls_process_ocsp_single_response()
[all …]
Dtlsv1_client_read.c46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions", in tls_process_server_hello_extensions()
68 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions()
120 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); in tls_process_server_hello()
147 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", in tls_process_server_hello()
166 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", in tls_process_server_hello()
235 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello()
515 wpa_hexdump(MSG_MSGDUMP, "TLSv1: SHA256 hash", in tls_process_certificate()
684 wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime", in tlsv1_process_diffie_hellman()
693 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", in tlsv1_process_diffie_hellman()
708 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", in tlsv1_process_diffie_hellman()
[all …]
Dpkcs5.c188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
205 wpa_hexdump(MSG_DEBUG, in pkcs5_get_params_pbes2()
271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2()
349 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", in pkcs5_get_params()
366 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " in pkcs5_get_params()
394 wpa_hexdump(MSG_DEBUG, "PKCS #5: PBES2 salt for PBKDF2", in pkcs5_crypto_init_pbes2()
402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2()
638 wpa_hexdump(MSG_INFO, "PKCS #5: Invalid PS", in pkcs5_decrypt()
Dtlsv1_server_read.c83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos); in tls_process_status_request_item()
165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); in tls_process_client_hello()
204 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", in tls_process_client_hello()
212 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); in tls_process_client_hello()
223 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", in tls_process_client_hello()
267 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", in tls_process_client_hello()
331 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " in tls_process_client_hello()
694 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", in tls_process_client_key_exchange_dh()
723 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", in tls_process_client_key_exchange_dh()
832 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); in tls_process_client_key_exchange()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_psk.c114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, in eap_psk_process_1()
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, in eap_psk_process_1()
168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); in eap_psk_process_1()
215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, in eap_psk_process_3()
217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); in eap_psk_process_3()
218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); in eap_psk_process_3()
270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3()
272 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", in eap_psk_process_3()
274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); in eap_psk_process_3()
293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", in eap_psk_process_3()
[all …]
Deap_pax.c163 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", in eap_pax_process_std_1()
169 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", in eap_pax_process_std_1()
178 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", in eap_pax_process_std_1()
198 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", in eap_pax_process_std_1()
212 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", in eap_pax_process_std_1()
221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); in eap_pax_process_std_1()
277 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", in eap_pax_process_std_3()
285 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", in eap_pax_process_std_3()
296 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", in eap_pax_process_std_3()
315 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); in eap_pax_process_std_3()
[all …]
Dmschapv2.c55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response()
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response()
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
Deap_leap.c104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", in eap_leap_process_request()
123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", in eap_leap_process_request()
173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos, in eap_leap_process_success()
226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", in eap_leap_process_response()
250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", in eap_leap_process_response()
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", in eap_leap_getKey()
365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", in eap_leap_getKey()
367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge", in eap_leap_getKey()
369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response", in eap_leap_getKey()
Deap_gpsk.c187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", in eap_gpsk_process_rand_server()
355 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", in eap_gpsk_send_gpsk_2()
393 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id", in eap_gpsk_send_gpsk_2()
423 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2", in eap_gpsk_validate_rand()
425 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3", in eap_gpsk_validate_rand()
439 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", in eap_gpsk_validate_rand()
441 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3", in eap_gpsk_validate_rand()
540 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen); in eap_gpsk_validate_pd_payload_2()
573 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_validate_gpsk_3_mic()
574 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_validate_gpsk_3_mic()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c320 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID", in wpa_ft_pull_pmk_r1()
386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); in wpa_auth_derive_ptk_ft()
393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_auth_derive_ptk_ft()
513 wpa_hexdump(MSG_MSGDUMP, "FT: Resource descriptor IE(s)", in wpa_ft_process_rdie()
609 wpa_hexdump(MSG_MSGDUMP, "FT: RIC Request", ric, ric_len); in wpa_ft_process_ric()
819 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", in wpa_ft_process_auth_req()
849 wpa_hexdump(MSG_DEBUG, "FT: STA R0KH-ID", in wpa_ft_process_auth_req()
859 wpa_hexdump(MSG_DEBUG, "FT: Requested PMKR0Name", in wpa_ft_process_auth_req()
864 wpa_hexdump(MSG_DEBUG, "FT: Derived requested PMKR1Name", in wpa_ft_process_auth_req()
888 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", in wpa_ft_process_auth_req()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_pax.c106 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", in eap_pax_build_std_1()
113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); in eap_pax_build_std_1()
150 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", in eap_pax_build_std_3()
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); in eap_pax_build_std_3()
206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", in eap_pax_check()
266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_check()
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", in eap_pax_check()
314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", in eap_pax_process_std_2()
349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", in eap_pax_process_std_2()
406 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected MAC_CK(A, B, CID)", in eap_pax_process_std_2()
[all …]
Deap_server_gpsk.c117 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", in eap_gpsk_build_gpsk_1()
314 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", in eap_gpsk_process_gpsk_2()
327 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", in eap_gpsk_process_gpsk_2()
329 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-2", in eap_gpsk_process_gpsk_2()
399 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); in eap_gpsk_process_gpsk_2()
434 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id", in eap_gpsk_process_gpsk_2()
455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_process_gpsk_2()
456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); in eap_gpsk_process_gpsk_2()
503 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); in eap_gpsk_process_gpsk_4()
524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); in eap_gpsk_process_gpsk_4()
[all …]
Deap_server_psk.c67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", in eap_psk_build_1()
138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", in eap_psk_build_3()
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", in eap_psk_build_3()
292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", in eap_psk_process_2()
316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); in eap_psk_process_2()
319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", in eap_psk_process_2()
352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left); in eap_psk_process_4()
387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", in eap_psk_process_4()
504 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Derived Session-Id", id, *len); in eap_psk_get_session_id()
Deap_server_ttls.c226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse()
274 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
281 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
288 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
295 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
302 wpa_hexdump(MSG_DEBUG, in eap_ttls_avp_parse()
681 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received", in eap_ttls_process_phase2_mschap()
683 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected", in eap_ttls_process_phase2_mschap()
763 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", in eap_ttls_process_phase2_mschapv2()
765 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge", in eap_ttls_process_phase2_mschapv2()
[all …]
/external/wpa_supplicant_8/src/crypto/
Dmilenage.c278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); in milenage_check()
279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); in milenage_check()
293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); in milenage_check()
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); in milenage_check()
309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2); in milenage_check()
313 wpa_hexdump(MSG_DEBUG, "Milenage: MAC_A", mac_a, 8); in milenage_check()
317 wpa_hexdump(MSG_DEBUG, "Milenage: Received MAC_A", in milenage_check()
/external/wpa_supplicant_8/src/wps/
Dwps_enrollee.c43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", in wps_build_m1()
516 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", in wps_process_registrar_nonce()
547 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); in wps_process_uuid_r()
567 wpa_hexdump(MSG_DEBUG, "WPS: Received public key", in wps_process_pubkey()
569 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key " in wps_process_pubkey()
571 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash", in wps_process_pubkey()
[all …]

123456