/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 124 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
eap_psk.c | 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 143 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 149 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", 357 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left); 392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
|
eap_ttls.c | 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 262 wpa_hexdump(MSG_DEBUG, 269 wpa_hexdump(MSG_DEBUG, 276 wpa_hexdump(MSG_DEBUG, 283 wpa_hexdump(MSG_DEBUG, 290 wpa_hexdump(MSG_DEBUG, 791 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received", 793 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected", 865 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge", 867 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge" [all...] |
eap_peap.c | 438 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", 440 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", 442 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", 445 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", 632 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding seed data", 660 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left); 708 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", 727 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Result TLV", 781 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs (SoH)", pos, left); 923 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed; [all...] |
ikev2.c | 162 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 270 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI", 444 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Nr", 586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 643 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data", 645 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data", 678 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 819 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 821 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 1099 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI" [all...] |
eap_tls.c | 213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key", 245 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_read.c | 79 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 103 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 111 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 122 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 234 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 586 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 616 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", 728 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); 859 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen) [all...] |
tlsv1_client_read.c | 76 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); 97 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 116 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " 434 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", 448 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", 464 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)", 542 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len); 815 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 885 wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake" [all...] |
tlsv1_record.c | 199 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 254 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 342 wpa_hexdump(MSG_DEBUG, 355 wpa_hexdump(MSG_MSGDUMP,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 283 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 601 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN); 687 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", kde, len); 693 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4", 703 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce", 795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 803 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4", 812 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake", 814 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake" [all...] |
wpa.c | 124 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 215 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 325 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len); 401 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", _buf, len); 404 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " 420 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 539 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen); 634 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len); 781 wpa_hexdump(MSG_INFO, "WPA: WPA IE in Beacon/ProbeResp", 789 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 202 wpa_hexdump(MSG_DEBUG, "Learned identity from " 297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 344 wpa_hexdump(MSG_DEBUG, "PMK from AS", 350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 353 wpa_hexdump(MSG_DEBUG, "PMK from AS", 590 wpa_hexdump(MSG_DEBUG, "Decapsulated EAP packet", eap, len); 635 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)", 639 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)", 875 wpa_hexdump(MSG_DEBUG, "RES", aka_res, aka_res_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_enrollee.c | 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 125 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", 471 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", 502 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); 536 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash1", wps->peer_hash1, WPS_HASH_LEN); 550 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash2", wps->peer_hash2, WPS_HASH_LEN); 1131 wpa_hexdump(MSG_DEBUG, "WPS: Received Registrar Nonce" [all...] |
/external/wpa_supplicant/ |
driver_broadcom.c | 90 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 198 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 234 wpa_hexdump(MSG_DEBUG, "RECEIVE EVENT", buf, left); 260 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 466 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
|
eap_gpsk.c | 177 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 345 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", 404 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2", 406 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3", 420 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", 422 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3", 521 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen); 554 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 555 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
eap_fast.c | 697 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 EAP types", 802 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Allowed Phase2 EAP types", 864 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 885 wpa_hexdump(MSG_DEBUG, "EAP-FAST: unrecognized TLS " 891 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 902 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: T-PRF seed", seed, seed_len); 1243 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1245 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", [all...] |
wpa.c | 963 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 1114 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", [all...] |
eap_tlv.c | 119 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); 166 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV",
|
eap_ttls.c | 184 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase2 EAP types", 415 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random", 492 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Allowed Phase2 EAP types", 631 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response", 700 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: implicit auth_challenge", 702 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: peer_challenge", 712 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 response", pos, 24); 807 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP implicit challenge", 809 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP response", pos, 24); 942 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: CHAP implicit challenge" [all...] |
common.h | 262 #define wpa_hexdump(...) do {} while (0) macro 284 #define wpa_hexdump(l,t,b,le) do { } while (0) macro 320 * wpa_hexdump - conditional hex dump 330 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len); 342 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
|
tlsv1_common.c | 129 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate", 343 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 398 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 485 wpa_hexdump(MSG_DEBUG, 498 wpa_hexdump(MSG_MSGDUMP,
|
eap_mschapv2.c | 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 191 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge", 200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response, 503 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: failure " 622 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 624 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge", 634 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: NT-Response",
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_broadcom.c | 95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */ 200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len); 203 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN); 239 wpa_hexdump(MSG_DEBUG, "RECEIVE EVENT", (u8 *) buf, left); 265 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes " 471 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
ikev2.c | 174 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 288 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI", 474 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 609 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data", 611 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data", 646 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 785 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 787 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI", 1132 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI" [all...] |
eap_sake.c | 223 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 230 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 391 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes",
|