/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 74 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); 113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", 121 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); 132 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", 175 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", 244 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " 603 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", 633 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", 742 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); 918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen) [all...] |
tlsv1_client_read.c | 72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); 98 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", 117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " 436 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", 450 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", 466 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)", 544 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len); 817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished", 908 wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake" [all...] |
x509v3.c | 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", 432 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID", 918 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); 1173 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); [all...] |
rsa.c | 105 wpa_hexdump(MSG_DEBUG, 207 wpa_hexdump(MSG_DEBUG,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 200 wpa_hexdump(MSG_DEBUG, "Learned identity from " 296 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 343 wpa_hexdump(MSG_DEBUG, "PMK from AS", 349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 352 wpa_hexdump(MSG_DEBUG, "PMK from AS", 714 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)", 718 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)", 954 wpa_hexdump(MSG_DEBUG, "RES", aka_res, aka_res_len); 955 wpa_hexdump(MSG_DEBUG, "IK", aka_ik, IK_LEN) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake", 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 588 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN); 676 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", kde, len); 682 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4", 692 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce", 784 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len); 792 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4", 801 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake", 803 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake" [all...] |
tdls.c | 387 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); 388 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); 409 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 473 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); 477 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 532 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); 536 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 555 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC", 557 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC", 725 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 169 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 283 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI", 469 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 604 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data", 606 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data", 641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 780 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 782 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI", 1127 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI" [all...] |
eap_gpsk.c | 170 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 331 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", 369 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id", 399 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2", 401 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3", 415 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", 417 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3", 516 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen); 549 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 550 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen) [all...] |
eap_eke.c | 352 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent_S", 356 wpa_hexdump(MSG_DEBUG, "EAP-EKE: CBValue", pos, end - pos); 419 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent_P", 436 wpa_hexdump(MSG_DEBUG, "EAP-EKE: PNonce_P", 526 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth_s, data->sess.prf_len); 559 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); 623 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Received Data", pos, end - pos);
|
eap_fast.c | 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 585 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 587 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 624 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 626 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 756 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " 761 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC", 763 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC", 796 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id", 829 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len) [all...] |
eap_mschapv2.c | 438 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: failure " 571 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge", 573 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge", 583 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: NT-Response",
|
eap_sake.c | 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 225 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 386 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes", 471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len);
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 265 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI", 439 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Nr", 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data", 640 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data", 673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 814 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 816 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 1094 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI" [all...] |
eap_server_peap.c | 439 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", 441 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", 443 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", 446 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", 633 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding seed data", 661 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left); 709 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", 728 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Result TLV", 782 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs (SoH)", pos, left); 924 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed; [all...] |
eap_server_mschapv2.c | 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge", 328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24); 420 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
|
eap_server_tls.c | 238 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key", 270 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
|
eap_server_fast.c | 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 668 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 670 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 742 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", 987 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 type Nak'ed; " 1179 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", 1181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", 1208 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for " 1214 wpa_hexdump(MSG_MSGDUMP [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", 472 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", 503 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); 537 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash1", wps->peer_hash1, WPS_HASH_LEN); 551 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash2", wps->peer_hash2, WPS_HASH_LEN); [all...] |
wps_dev_attr.c | 146 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", 209 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", 238 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension",
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 316 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len); 386 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Data to Method ID derivation", 394 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Method ID", kdf_out, kdf_out_len); 461 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len);
|
eap_eke_common.c | 204 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DH public value", 391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)", 398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)", 644 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Prot()", iv, block_size);
|
/external/wpa_supplicant_8/src/crypto/ |
tls_schannel.c | 257 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello", 384 wpa_hexdump(MSG_MSGDUMP, "SChannel - output", 414 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted " 448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data", 530 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs",
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11_shared.c | 57 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 85 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 133 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
|
wpa_auth_ie.c | 470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); 560 wpa_hexdump(MSG_DEBUG, "RSN: Attempted to use unknown " 579 wpa_hexdump(MSG_DEBUG, "RSN IE: STA PMKID", 763 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key "
|