HomeSort by relevance Sort by last modified time
    Searched full:wpa_hexdump (Results 26 - 50 of 127) sorted by null

12 3 4 5 6

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_md5.c 72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
124 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
eap_psk.c 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
143 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
149 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
357 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
eap_ttls.c 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
262 wpa_hexdump(MSG_DEBUG,
269 wpa_hexdump(MSG_DEBUG,
276 wpa_hexdump(MSG_DEBUG,
283 wpa_hexdump(MSG_DEBUG,
290 wpa_hexdump(MSG_DEBUG,
791 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received",
793 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected",
865 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
867 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge"
    [all...]
eap_peap.c 438 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK",
440 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1",
442 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2",
445 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC",
632 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding seed data",
660 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left);
708 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV",
727 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Result TLV",
781 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs (SoH)", pos, left);
923 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed;
    [all...]
ikev2.c 162 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
270 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI",
444 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Nr",
586 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
643 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data",
645 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data",
678 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
819 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
821 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
1099 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI"
    [all...]
eap_tls.c 213 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key",
245 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_read.c 79 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len);
103 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
111 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos);
122 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites",
165 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods",
234 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello "
586 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic",
616 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)",
728 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len);
859 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen)
    [all...]
tlsv1_client_read.c 76 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
97 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
116 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
434 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)",
448 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)",
464 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)",
542 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
815 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
885 wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake"
    [all...]
tlsv1_record.c 199 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
254 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
342 wpa_hexdump(MSG_DEBUG,
355 wpa_hexdump(MSG_MSGDUMP,
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 283 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
379 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
601 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN);
687 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", kde, len);
693 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4",
703 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce",
795 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len);
803 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4",
812 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
814 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake"
    [all...]
wpa.c 124 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
215 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
325 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len);
401 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", _buf, len);
404 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from "
420 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
539 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen);
634 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len);
781 wpa_hexdump(MSG_INFO, "WPA: WPA IE in Beacon/ProbeResp",
789 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg"
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 202 wpa_hexdump(MSG_DEBUG, "Learned identity from "
297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
341 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
344 wpa_hexdump(MSG_DEBUG, "PMK from AS",
350 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
353 wpa_hexdump(MSG_DEBUG, "PMK from AS",
590 wpa_hexdump(MSG_DEBUG, "Decapsulated EAP packet", eap, len);
635 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)",
639 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)",
875 wpa_hexdump(MSG_DEBUG, "RES", aka_res, aka_res_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_enrollee.c 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
58 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
81 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
91 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
125 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce",
471 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce",
502 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN);
536 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash1", wps->peer_hash1, WPS_HASH_LEN);
550 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash2", wps->peer_hash2, WPS_HASH_LEN);
1131 wpa_hexdump(MSG_DEBUG, "WPS: Received Registrar Nonce"
    [all...]
  /external/wpa_supplicant/
driver_broadcom.c 90 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */
195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
198 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN);
234 wpa_hexdump(MSG_DEBUG, "RECEIVE EVENT", buf, left);
260 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes "
466 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
eap_gpsk.c 177 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
345 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer",
404 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2",
406 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3",
420 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1",
422 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3",
521 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen);
554 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
555 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
eap_fast.c 697 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 EAP types",
802 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Allowed Phase2 EAP types",
864 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
885 wpa_hexdump(MSG_DEBUG, "EAP-FAST: unrecognized TLS "
891 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
902 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: T-PRF seed", seed, seed_len);
1243 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
1245 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
    [all...]
wpa.c 963 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
1114 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
    [all...]
eap_tlv.c 119 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left);
166 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV",
eap_ttls.c 184 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase2 EAP types",
415 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: client/server random",
492 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Allowed Phase2 EAP types",
631 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response",
700 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: implicit auth_challenge",
702 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: peer_challenge",
712 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 response", pos, 24);
807 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP implicit challenge",
809 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP response", pos, 24);
942 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: CHAP implicit challenge"
    [all...]
common.h 262 #define wpa_hexdump(...) do {} while (0) macro
284 #define wpa_hexdump(l,t,b,le) do { } while (0) macro
320 * wpa_hexdump - conditional hex dump
330 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len);
342 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
tlsv1_common.c 129 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Parse ASN.1 DER certificate",
343 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
398 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
485 wpa_hexdump(MSG_DEBUG,
498 wpa_hexdump(MSG_MSGDUMP,
eap_mschapv2.c 189 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
191 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge",
200 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: response", nt_response,
503 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: failure "
622 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
624 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge",
634 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: NT-Response",
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_broadcom.c 95 /* wpa_hexdump(MSG_MSGDUMP, "BROADCOM: wlioctl buf", buf, len); */
200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
203 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: addr", addr, ETH_ALEN);
239 wpa_hexdump(MSG_DEBUG, "RECEIVE EVENT", (u8 *) buf, left);
265 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: copying %d bytes "
471 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: AP IEs",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
ikev2.c 174 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
288 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI",
474 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni",
552 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
609 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data",
611 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data",
646 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
785 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
787 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI",
1132 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI"
    [all...]
eap_sake.c 223 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
230 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
391 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes",

Completed in 263 milliseconds

12 3 4 5 6