HomeSort by relevance Sort by last modified time
    Searched refs:MSG_DEBUG (Results 26 - 50 of 454) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_build.c 28 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
32 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
55 wpa_printf(MSG_DEBUG, "WPS: * Request Type");
65 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods);
75 wpa_printf(MSG_DEBUG, "WPS: * UUID-E");
85 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id);
95 wpa_printf(MSG_DEBUG, "WPS: * Configuration Error (%d)", err);
110 wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
124 wpa_printf(MSG_DEBUG, "WPS: * Authenticator");
135 wpa_printf(MSG_DEBUG, "WPS: * Version")
    [all...]
wps_dev_attr.c 26 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer");
49 wpa_printf(MSG_DEBUG, "WPS: * Model Name");
72 wpa_printf(MSG_DEBUG, "WPS: * Model Number");
95 wpa_printf(MSG_DEBUG, "WPS: * Serial Number");
117 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type");
131 wpa_printf(MSG_DEBUG, "WPS: * Device Name");
165 wpa_printf(MSG_DEBUG, "WPS: * OS Version");
175 wpa_printf(MSG_DEBUG, "WPS: * RF Bands (%x)", dev->rf_bands);
187 wpa_printf(MSG_DEBUG, "WPS: No Manufacturer received");
191 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Manufacturer", str, str_len)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 27 wpa_printf(MSG_DEBUG, "WPS: * MAC Address");
42 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)",
59 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
60 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
64 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for "
69 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1");
83 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
85 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2");
93 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
101 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1")
    [all...]
wps_attr_build.c 31 wpa_printf(MSG_DEBUG, "WPS: * Public Key");
34 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
40 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
47 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
52 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
53 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey);
73 wpa_printf(MSG_DEBUG, "WPS: * Request Type");
83 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type);
93 wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods);
103 wpa_printf(MSG_DEBUG, "WPS: * UUID-E")
    [all...]
  /external/wpa_supplicant/
eap_sim_common.c 55 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
74 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
75 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
97 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
122 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
137 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
eap_gpsk.c 73 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
141 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
147 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
153 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
158 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
173 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow");
177 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
201 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d",
217 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d",
233 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_read.c 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the "
191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello "
194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello "
209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid
    [all...]
tlsv1_client_read.c 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys")
    [all...]
x509v3.c 49 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
200 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
242 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
261 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
270 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
282 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
318 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
334 wpa_printf(MSG_DEBUG, "X509: Expected SET "
347 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
364 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 46 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
61 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
67 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello");
86 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d",
89 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
150 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
181 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the "
191 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello "
194 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello "
209 wpa_printf(MSG_DEBUG, "TLSv1: Invalid
    [all...]
x509v3.c 56 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p "
203 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
245 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
264 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING "
273 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits",
285 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for "
321 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
339 wpa_printf(MSG_DEBUG, "X509: Expected SET "
352 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE "
369 wpa_printf(MSG_DEBUG, "X509: Failed to parse
    [all...]
tlsv1_client_read.c 43 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; "
58 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake "
64 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello");
83 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in "
108 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session");
137 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different "
146 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for "
169 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
182 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback "
193 wpa_printf(MSG_DEBUG, "TLSv1: Failed to derive keys")
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_go_neg.c 56 wpa_hexdump_ascii(MSG_DEBUG, "P2P: Peer country", pos, 3);
85 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Own reg_classes %d "
196 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
206 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
216 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
237 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
260 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Omit Operating "
303 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Selected operating "
314 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 5 GHz "
326 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Pick best 2.4 GHz
    [all...]
p2p_dev_disc.c 51 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
65 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
83 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
93 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
106 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
140 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
156 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
165 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
179 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
187 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
p2p_sd.c 155 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
266 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
277 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
292 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
331 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
337 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
346 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
353 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
373 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
382 wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 57 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
65 wpa_printf(MSG_DEBUG, "SUPP: %s(state=%d)", __func__, state);
73 wpa_printf(MSG_DEBUG, "AUTH: RX EAPOL frame");
84 wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR " proto=0x%04x "
105 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
135 wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
151 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
154 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
155 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
163 wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ikev2_common.c 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
121 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
123 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_sim_common.c 57 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
76 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
99 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
101 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
103 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
105 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
124 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
139 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.c 50 wpa_hexdump_key(MSG_DEBUG, "EAP-IKEV2: KEYMAT",
78 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Send fragment ack");
95 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
102 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Not enough room in the "
108 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No SK_a for ICV validation");
121 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
123 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
128 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Valid Integrity Checksum Data in "
eap_sim_common.c 58 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
77 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
78 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
79 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
102 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
104 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
106 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
125 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
140 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 73 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
139 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
145 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
151 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
156 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
171 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow");
175 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
199 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d",
215 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d",
232 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet")
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 74 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
140 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
146 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
152 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
157 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
172 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow");
176 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
200 wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite[%d]: %d:%d",
216 wpa_printf(MSG_DEBUG, "EAP-GPSK: Selected ciphersuite %d:%d",
233 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet")
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gpsk.c 63 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
121 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
163 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
214 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
235 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
263 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
269 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
277 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
285 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
291 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 64 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
122 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
164 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
215 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
236 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
264 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
270 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
278 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
286 wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
292 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer"
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 59 wpa_printf(MSG_DEBUG, "FT: RRB send to " MACSTR, MAC2STR(dst));
329 wpa_printf(MSG_DEBUG, "FT: Send PMK-R1 pull request to remote R0KH "
341 wpa_printf(MSG_DEBUG, "FT: Failed to get random data for "
374 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key "
381 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", pmk_r0, PMK_LEN);
382 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN);
388 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", pmk_r1, PMK_LEN);
389 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
397 wpa_hexdump_key(MSG_DEBUG, "FT: PTK", (u8 *) ptk, ptk_len);
398 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN)
    [all...]

Completed in 139 milliseconds

12 3 4 5 6 7 8 91011>>