/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_build.c | 28 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 32 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 55 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); 65 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods); 75 wpa_printf(MSG_DEBUG, "WPS: * UUID-E"); 85 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); 95 wpa_printf(MSG_DEBUG, "WPS: * Configuration Error (%d)", err); 110 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " 124 wpa_printf(MSG_DEBUG, "WPS: * Authenticator"); 135 wpa_printf(MSG_DEBUG, "WPS: * Version") [all...] |
wps_dev_attr.c | 26 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); 49 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); 72 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); 95 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); 117 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); 131 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); 165 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); 175 wpa_printf(MSG_DEBUG, "WPS: * RF Bands (%x)", dev->rf_bands); 187 wpa_printf(MSG_DEBUG, "WPS: No Manufacturer received"); 191 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Manufacturer", str, str_len) [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 27 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); 42 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", 59 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 60 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 64 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " 69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); 83 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 85 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); 93 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 101 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1") [all...] |
wps_attr_build.c | 31 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); 34 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); 40 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); 47 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " 52 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); 53 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); 73 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); 83 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type); 93 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods); 103 wpa_printf(MSG_DEBUG, "WPS: * UUID-E") [all...] |
/external/wpa_supplicant/ |
eap_sim_common.c | 55 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 74 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 97 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 122 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 137 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth") [all...] |
eap_gpsk.c | 73 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 141 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); 147 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); 153 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); 158 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", 173 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 177 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 201 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", 217 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d", 233 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_read.c | 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", 89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " 191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " 194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " 209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid [all...] |
tlsv1_client_read.c | 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " 182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys") [all...] |
x509v3.c | 49 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 200 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 242 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 261 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 270 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 282 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 318 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 334 wpa_printf(MSG_DEBUG, "X509: Expected SET " 347 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 364 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); 86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", 89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " 191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " 194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " 209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid [all...] |
x509v3.c | 56 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " 203 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 245 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 264 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " 273 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", 285 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " 321 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 339 wpa_printf(MSG_DEBUG, "X509: Expected SET " 352 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " 369 wpa_printf(MSG_DEBUG, "X509: Failed to parse [all...] |
tlsv1_client_read.c | 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " 58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " 64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); 83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " 108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); 137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " 146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " 169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " 182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " 193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys") [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_go_neg.c | 56 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3); 85 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d " 196 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 216 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 237 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 260 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating " 303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Selected operating " 314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 5 GHz " 326 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 2.4 GHz [all...] |
p2p_dev_disc.c | 51 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 65 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 83 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 93 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 106 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 140 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 156 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 165 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 179 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 187 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
p2p_sd.c | 155 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 266 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 277 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 331 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 337 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 346 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 353 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 373 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, 382 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 65 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state); 73 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame"); 84 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x " 105 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 135 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__); 151 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 154 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len); 155 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len); 163 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_ikev2_common.c | 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 121 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 123 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
eap_sim_common.c | 57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 105 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth") [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT", 78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack"); 95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the " 108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation"); 121 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 123 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV", 128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
|
eap_sim_common.c | 58 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 79 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 102 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 104 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 106 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 125 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null " 140 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 73 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 139 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); 145 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); 151 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); 156 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", 171 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 175 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 199 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", 215 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d", 232 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet") [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 74 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 140 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet"); 146 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow"); 152 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server"); 157 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server", 172 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 176 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 200 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d", 216 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d", 233 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet") [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 63 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 121 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 163 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 214 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 235 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); 263 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2"); 269 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 277 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 285 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store " 291 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 64 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 122 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 164 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 215 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 236 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos); 264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2"); 270 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 278 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for " 286 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store " 292 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer" [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 59 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst)); 329 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH " 341 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for " 374 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " 381 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN); 382 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); 388 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN); 389 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 397 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len); 398 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN) [all...] |