HomeSort by relevance Sort by last modified time
    Searched refs:wpa_hexdump (Results 26 - 50 of 122) sorted by null

12 3 4 5

  /external/wpa_supplicant_8/src/tls/
tlsv1_server_read.c 74 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len);
113 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random",
121 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos);
132 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites",
175 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods",
244 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello "
603 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic",
633 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)",
742 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len);
918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen)
    [all...]
tlsv1_client_read.c 72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
98 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random",
117 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
170 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the "
436 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)",
450 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)",
466 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Ys (server's public value)",
544 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
817 wpa_hexdump(MSG_MSGDUMP, "TLSv1: verify_data in Finished",
908 wpa_hexdump(MSG_DEBUG, "TLSv1: Application Data included in Handshake"
    [all...]
x509v3.c 285 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey",
432 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID",
918 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len);
1173 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length);
    [all...]
rsa.c 105 wpa_hexdump(MSG_DEBUG,
207 wpa_hexdump(MSG_DEBUG,
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 200 wpa_hexdump(MSG_DEBUG, "Learned identity from "
296 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len);
340 wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN);
343 wpa_hexdump(MSG_DEBUG, "PMK from AS",
349 wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16);
352 wpa_hexdump(MSG_DEBUG, "PMK from AS",
714 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)",
718 wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)",
954 wpa_hexdump(MSG_DEBUG, "RES", aka_res, aka_res_len);
955 wpa_hexdump(MSG_DEBUG, "IK", aka_ik, IK_LEN)
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 272 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
588 wpa_hexdump(MSG_DEBUG, "RSN: SMKID", peerkey->smkid, PMKID_LEN);
676 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", kde, len);
682 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 1/4",
692 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce",
784 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", keydata, len);
792 wpa_hexdump(MSG_DEBUG, "RSN: Unknown SMKID in STK 2/4",
801 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in SMK handshake",
803 wpa_hexdump(MSG_DEBUG, "RSN: Peer RSN IE in STK handshake"
    [all...]
tdls.c 387 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
388 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
409 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
473 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
477 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
532 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
536 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
555 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
557 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC",
725 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake"
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 169 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
283 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI",
469 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni",
547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
604 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data",
606 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data",
641 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
780 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
782 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI",
1127 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI"
    [all...]
eap_gpsk.c 170 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server",
331 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer",
369 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id",
399 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-2",
401 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer in GPSK-3",
415 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1",
417 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-3",
516 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen);
549 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
550 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen)
    [all...]
eap_eke.c 352 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent_S",
356 wpa_hexdump(MSG_DEBUG, "EAP-EKE: CBValue", pos, end - pos);
419 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent_P",
436 wpa_hexdump(MSG_DEBUG, "EAP-EKE: PNonce_P",
526 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth_s, data->sess.prf_len);
559 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len);
623 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Received Data", pos, end - pos);
eap_fast.c 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
585 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
587 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
624 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
626 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
756 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
761 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC",
763 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC",
796 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id",
829 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len)
    [all...]
eap_mschapv2.c 438 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: failure "
571 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge",
573 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge",
583 wpa_hexdump(MSG_DEBUG, "EAP-MSCHAPV2: NT-Response",
eap_sake.c 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
225 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
386 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes",
471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len);
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 157 wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
265 wpa_hexdump(MSG_DEBUG, "IKEV2: SPI",
439 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Nr",
581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
638 wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data",
640 wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data",
673 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
814 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
816 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
1094 wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI"
    [all...]
eap_server_peap.c 439 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK",
441 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1",
443 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2",
446 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC",
633 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding seed data",
661 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left);
709 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV",
728 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Result TLV",
782 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs (SoH)", pos, left);
924 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed;
    [all...]
eap_server_mschapv2.c 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
326 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Peer-Challenge",
328 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: NT-Response", nt_response, 24);
420 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Expected NT-Response",
eap_server_tls.c 238 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived key",
270 wpa_hexdump(MSG_DEBUG, "EAP-TLS: Derived EMSK",
eap_server_fast.c 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
668 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
670 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
742 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque",
987 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 type Nak'ed; "
1179 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
1181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
1208 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for "
1214 wpa_hexdump(MSG_MSGDUMP
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce",
472 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce",
503 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN);
537 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash1", wps->peer_hash1, WPS_HASH_LEN);
551 wpa_hexdump(MSG_DEBUG, "WPS: R-Hash2", wps->peer_hash2, WPS_HASH_LEN);
    [all...]
wps_dev_attr.c 146 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type",
209 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1",
238 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension",
  /external/wpa_supplicant_8/src/eap_common/
eap_gpsk_common.c 316 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len);
386 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Data to Method ID derivation",
394 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Method ID", kdf_out, kdf_out_len);
461 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Seed", seed, seed_len);
eap_eke_common.c 204 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DH public value",
391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)",
398 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent = Encr(key, y)",
644 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Prot()", iv, block_size);
  /external/wpa_supplicant_8/src/crypto/
tls_schannel.c 257 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
384 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
414 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
530 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs",
  /external/wpa_supplicant_8/src/ap/
ieee802_11_shared.c 57 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
85 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
133 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
wpa_auth_ie.c 470 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len);
560 wpa_hexdump(MSG_DEBUG, "RSN: Attempted to use unknown "
579 wpa_hexdump(MSG_DEBUG, "RSN IE: STA PMKID",
763 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key "

Completed in 1292 milliseconds

12 3 4 5