Home | History | Annotate | Download | only in eap_common

Lines Matching refs:MSG_DEBUG

52 	wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
100 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
119 wpa_printf(MSG_DEBUG, "EAP-SIM: Workaround - drop null "
134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
135 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity",
137 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2);
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
140 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN);
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
302 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_encr",
307 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_aut",
312 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': K_re",
317 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN);
321 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN);
348 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': MSK", msk, EAP_MSK_LEN);
352 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': EMSK", emsk, EAP_EMSK_LEN);
459 wpa_printf(MSG_DEBUG, "EAP-AKA': Derive (CK',IK') from (CK,IK)");
460 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK", ck, EAP_AKA_CK_LEN);
461 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK", ik, EAP_AKA_IK_LEN);
462 wpa_printf(MSG_DEBUG, "EAP-AKA': FC = 0x%x", fc);
463 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': P0 = Access network identity",
465 wpa_hexdump(MSG_DEBUG, "EAP-AKA': P1 = SQN xor AK", sqn_ak, 6);
469 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': Key = CK || IK",
486 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': KDF output (CK' || IK')",
491 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': CK'", ck, EAP_AKA_CK_LEN);
492 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA': IK'", ik, EAP_AKA_IK_LEN);
534 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_RAND");
548 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTN");
550 wpa_printf(MSG_DEBUG, "EAP-SIM: "
570 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_PADDING");
576 wpa_hexdump(MSG_DEBUG, "EAP-SIM: "
584 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_NONCE_MT");
593 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_PERMANENT_ID_REQ");
597 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_MAC");
613 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_NOTIFICATION %d",
617 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_ANY_ID_REQ");
621 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_IDENTITY");
639 wpa_printf(MSG_DEBUG, "EAP-AKA: "
644 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_VERSION_LIST");
657 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_SELECTED_VERSION");
665 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_SELECTED_VERSION "
669 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_FULLAUTH_ID_REQ");
685 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) AT_COUNTER %d",
700 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) "
710 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) "
728 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_CLIENT_ERROR_CODE "
732 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_IV");
741 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_ENCR_DATA");
758 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) "
778 wpa_printf(MSG_DEBUG, "EAP-SIM: (encr) "
793 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_RES");
808 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_AUTS");
810 wpa_printf(MSG_DEBUG, "EAP-SIM: "
823 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_CHECKCODE");
825 wpa_printf(MSG_DEBUG, "EAP-SIM: "
853 wpa_printf(MSG_DEBUG, "EAP-SIM: AT_RESULT_IND");
864 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF_INPUT");
886 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_KDF");
894 wpa_printf(MSG_DEBUG, "EAP-AKA': Too many "
902 wpa_printf(MSG_DEBUG, "EAP-AKA: AT_BIDDING");
920 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized skippable"
928 wpa_printf(MSG_DEBUG, "EAP-SIM: Attributes parsed successfully "
1152 wpa_printf(MSG_DEBUG, " *AT_PADDING");
1159 wpa_printf(MSG_DEBUG, " (AT_ENCR_DATA data len %lu)",