/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
|
eap_leap.c | 109 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 128 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 178 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos, 231 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 249 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 360 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge", 362 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response",
|
eap_psk.c | 118 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 169 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 171 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 220 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); 221 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 275 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", 277 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); 296 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message" [all...] |
eap_md5.c | 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 61 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 63 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
|
eap_psk.c | 119 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 170 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 172 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 219 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 221 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); 222 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); 274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 276 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", 278 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); 297 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message" [all...] |
eap_md5.c | 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 281 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 290 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 308 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 327 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 336 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", 345 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", 398 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE in EAPOL-Key", 403 wpa_hexdump(MSG_DEBUG, "WPA: MDIE in EAPOL-Key", 408 wpa_hexdump(MSG_DEBUG, "WPA: FTIE in EAPOL-Key", 413 wpa_hexdump(MSG_DEBUG, "WPA: Reassoc Deadline [all...] |
wpa_ft.c | 71 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 76 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 82 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); 109 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 120 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", 134 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", 153 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " 574 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 575 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); 620 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
wpa_debug.h | 28 #define wpa_hexdump(...) do {} while (0) macro 52 #define wpa_hexdump(l,t,b,le) do { } while (0) macro 90 * wpa_hexdump - conditional hex dump 100 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len); 105 wpa_hexdump(level, title, wpabuf_head(buf), wpabuf_len(buf)); 118 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
|
/external/wpa_supplicant/ |
driver_ndis_.c | 57 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 72 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
eap_leap.c | 113 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 128 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 181 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos, 238 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 252 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 352 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 354 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 356 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge", 358 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response",
|
eap_psk.c | 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 164 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 212 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 214 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); 260 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 262 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", reqData, 5); 263 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); 279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message" [all...] |
asn1_test.c | 104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER", 109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString", 114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString", 136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID",
|
eap_sim_common.c | 140 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); 141 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 147 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 155 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 160 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", tmp, req_len); 193 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 221 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ndis_.c | 54 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 69 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 199 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 224 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 250 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 269 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
eap_sim_common.c | 142 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); 143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 149 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 162 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 195 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 202 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 54 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 69 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 81 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 83 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 199 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 224 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 250 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 269 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
eap_sim_common.c | 143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 150 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 158 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 163 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 196 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 203 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 226 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 45 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 50 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", pmk_r1_name, WPA_PMK_NAME_LEN); 55 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN); 75 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 85 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", r0kh_id, r0kh_id_len); 98 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", r1kh_id, FT_R1KH_ID_LEN); 466 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 518 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID in FTIE", 520 wpa_hexdump(MSG_DEBUG, "FT: The current R0KH-ID", 538 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", sm->r1kh_id, FT_R1KH_ID_LEN) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 284 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 285 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 299 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 310 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 315 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2); 319 wpa_hexdump(MSG_DEBUG, "Milenage: MAC_A", mac_a, 8); 323 wpa_hexdump(MSG_DEBUG, "Milenage: Received MAC_A",
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
asn1_test.c | 104 wpa_hexdump(MSG_MSGDUMP, "ASN.1: INTEGER", 109 wpa_hexdump(MSG_MSGDUMP, "ASN.1: BitString", 114 wpa_hexdump(MSG_MSGDUMP, "ASN.1: OctetString", 136 wpa_hexdump(MSG_MSGDUMP, "ASN.1: Relative OID",
|
/external/wpa_supplicant_8/src/utils/ |
wpa_debug.h | 30 #define wpa_hexdump(...) do {} while (0) macro 57 #define wpa_hexdump(l,t,b,le) do { } while (0) macro 102 * wpa_hexdump - conditional hex dump 112 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len); 117 wpa_hexdump(level, title, buf ? wpabuf_head(buf) : NULL, 131 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
|