HomeSort by relevance Sort by last modified time
    Searched refs:wpa_hexdump (Results 1 - 25 of 127) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
eap_md5.c 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
eap_pax.c 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)",
168 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)",
211 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)",
220 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN);
276 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
284 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)",
295 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
311 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN)
    [all...]
eap_psk.c 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN);
218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left);
270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
272 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr",
274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left);
293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message"
    [all...]
eap_leap.c 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response",
173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge",
369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response",
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.c 337 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE",
342 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element",
369 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key",
378 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key",
396 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key",
415 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key",
424 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key",
433 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key",
454 wpa_hexdump(MSG_DEBUG, "WPA: IP Address Request in EAPOL-Key",
462 wpa_hexdump(MSG_DEBUG
    [all...]
wpa_ft.c 39 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name",
44 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
50 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
77 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain",
88 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID",
102 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID",
121 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from "
387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len);
388 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len);
432 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce"
    [all...]
wpa.c 66 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, 16);
67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
323 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len);
344 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter", reply->replay_counter,
405 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data",
410 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from "
431 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
577 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen);
646 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len)
    [all...]
tdls.c 406 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
407 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
492 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
496 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
551 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
555 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
574 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
576 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC",
785 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake"
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_ndis_.c 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len);
63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.c 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random",
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random",
181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV",
193 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len);
218 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV",
244 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV",
263 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV",
282 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
eap_ikev2_common.c 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV",
107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
eap_sim_common.c 137 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2);
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN);
152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)",
157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN);
190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg",
192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data",
197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC",
219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data"
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template",
292 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV",
296 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV",
300 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV",
304 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary "
308 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status "
312 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV",
325 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV",
329 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template "
339 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File
    [all...]
wpa_debug.h 29 #define wpa_hexdump(l,t,b,le) do { } while (0) macro
74 * wpa_hexdump - conditional hex dump
84 void wpa_hexdump(int level, const char *title, const void *buf, size_t len);
89 wpa_hexdump(level, title, buf ? wpabuf_head(buf) : NULL,
103 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
  /external/wpa_supplicant_8/src/crypto/
milenage.c 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16);
279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16);
293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6);
304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14);
309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2);
313 wpa_hexdump(MSG_DEBUG, "Milenage: MAC_A", mac_a, 8);
317 wpa_hexdump(MSG_DEBUG, "Milenage: Received MAC_A",
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 319 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID",
386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN);
393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name,
402 wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
516 wpa_hexdump(MSG_MSGDUMP, "FT: Resource descriptor IE(s)",
611 wpa_hexdump(MSG_MSGDUMP, "FT: RIC Request", ric, ric_len);
820 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs",
850 wpa_hexdump(MSG_DEBUG, "FT: STA R0KH-ID",
860 wpa_hexdump(MSG_DEBUG, "FT: Requested PMKR0Name",
865 wpa_hexdump(MSG_DEBUG, "FT: Derived requested PMKR1Name"
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)",
112 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
149 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN);
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV",
314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)",
349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)",
406 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected MAC_CK(A, B, CID)"
    [all...]
eap_server_gpsk.c 115 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server",
312 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer",
325 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1",
327 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-2",
397 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen);
438 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
439 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
486 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen);
507 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
508 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen)
    [all...]
eap_server_ttls.c 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
244 wpa_hexdump(MSG_DEBUG,
251 wpa_hexdump(MSG_DEBUG,
258 wpa_hexdump(MSG_DEBUG,
265 wpa_hexdump(MSG_DEBUG,
272 wpa_hexdump(MSG_DEBUG,
642 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received",
644 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected",
724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
726 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge"
    [all...]
eap_server_md5.c 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
eap_server_psk.c 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC",
293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received",
409 wpa_hexdump(MSG_DEBUG,
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2",
67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN);
77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN);
111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce",
490 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce",
521 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN);
541 wpa_hexdump(MSG_DEBUG, "WPS: Received public key",
543 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key "
545 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash"
    [all...]
  /external/wpa_supplicant_8/src/common/
sae.c 623 wpa_hexdump(MSG_DEBUG, "SAE: PMKID", val, SAE_PMKID_LEN);
664 wpa_hexdump(MSG_DEBUG, "SAE: own commit-scalar",
671 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(x)",
673 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(y)",
679 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element",
735 wpa_hexdump(MSG_DEBUG, "SAE: Anti-Clogging Token", *pos, tlen);
789 wpa_hexdump(MSG_DEBUG, "SAE: Peer commit-scalar",
821 wpa_hexdump(MSG_DEBUG, "SAE: Peer commit-element(x)",
823 wpa_hexdump(MSG_DEBUG, "SAE: Peer commit-element(y)",
852 wpa_hexdump(MSG_DEBUG, "SAE: Peer commit-element", pos
    [all...]

Completed in 428 milliseconds

1 2 3 4 5 6