/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 55 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", 57 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", 89 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", 91 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
|
eap_md5.c | 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
|
eap_pax.c | 163 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 169 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 178 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 198 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 212 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 221 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 277 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 285 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 296 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 312 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN) [all...] |
eap_psk.c | 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN); 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN); 218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); 270 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", 272 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", 274 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); 293 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message" [all...] |
eap_leap.c | 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response", 173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos, 226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP", 250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP", 363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge", 365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response", 367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge", 369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response",
|
eap_peap.c | 335 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); 336 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", 338 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", 341 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); 431 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Compound_MAC data", 438 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC", 440 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC", 480 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); 530 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", 548 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV" [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_ndis_.c | 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", 150 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 162 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", 213 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", 232 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", 251 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
|
eap_ikev2_common.c | 105 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Calculated ICV", 107 wpa_hexdump(MSG_DEBUG, "EAP-IKEV2: Received ICV",
|
eap_sim_common.c | 137 wpa_hexdump(MSG_DEBUG, "EAP-SIM: counter", counter, 2); 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: XKEY'", xkey, SHA1_MAC_LEN); 152 wpa_hexdump(MSG_DEBUG, "EAP-SIM: keying material (MSK)", 157 wpa_hexdump(MSG_DEBUG, "EAP-SIM: EMSK", emsk, EAP_EMSK_LEN); 190 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 197 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC: MAC", 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data" [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 281 wpa_hexdump(MSG_DEBUG, "SCARD: file header FSP template", 298 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Descriptor TLV", 302 wpa_hexdump(MSG_MSGDUMP, "SCARD: File Identifier TLV", 306 wpa_hexdump(MSG_MSGDUMP, "SCARD: DF name (AID) TLV", 310 wpa_hexdump(MSG_MSGDUMP, "SCARD: Proprietary " 314 wpa_hexdump(MSG_MSGDUMP, "SCARD: Life Cycle Status " 318 wpa_hexdump(MSG_MSGDUMP, "SCARD: File size TLV", 330 wpa_hexdump(MSG_MSGDUMP, "SCARD: Total file size TLV", 334 wpa_hexdump(MSG_MSGDUMP, "SCARD: PIN Status Template " 344 wpa_hexdump(MSG_MSGDUMP, "SCARD: Short File [all...] |
wpa_debug.h | 29 #define wpa_hexdump(l,t,b,le) do { } while (0) macro 76 * wpa_hexdump - conditional hex dump 86 void wpa_hexdump(int level, const char *title, const void *buf, size_t len); 91 wpa_hexdump(level, title, buf ? wpabuf_head(buf) : NULL, 105 * like wpa_hexdump(), but by default, does not include secret keys (passwords,
|
/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 278 wpa_hexdump(MSG_DEBUG, "Milenage: AUTN", autn, 16); 279 wpa_hexdump(MSG_DEBUG, "Milenage: RAND", _rand, 16); 293 wpa_hexdump(MSG_DEBUG, "Milenage: SQN", rx_sqn, 6); 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 309 wpa_hexdump(MSG_DEBUG, "Milenage: AMF", amf, 2); 313 wpa_hexdump(MSG_DEBUG, "Milenage: MAC_A", mac_a, 8); 317 wpa_hexdump(MSG_DEBUG, "Milenage: Received MAC_A",
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.c | 344 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", 349 wpa_hexdump(MSG_DEBUG, "WPA: WMM Parameter Element", 376 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", 385 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", 403 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", 422 wpa_hexdump(MSG_DEBUG, "WPA: Nonce in EAPOL-Key", 431 wpa_hexdump(MSG_DEBUG, "WPA: Lifetime in EAPOL-Key", 440 wpa_hexdump(MSG_DEBUG, "WPA: Error in EAPOL-Key", 461 wpa_hexdump(MSG_DEBUG, "WPA: IP Address Request in EAPOL-Key", 469 wpa_hexdump(MSG_DEBUG [all...] |
wpa_ft.c | 38 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", 43 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 72 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", 83 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", 97 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", 116 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " 384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 385 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); 429 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", 431 wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce" [all...] |
wpa.c | 70 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, mic_len); 71 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 199 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 361 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len); 385 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter", reply->replay_counter, 449 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", 454 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " 475 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 621 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen); 693 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len) [all...] |
tdls.c | 409 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN); 410 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN); 431 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 495 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); 499 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 554 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf); 558 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 577 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC", 579 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC", 796 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake" [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 320 wpa_hexdump(MSG_DEBUG, "FT: Did not find R0KH-ID", 386 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", pmk_r0_name, WPA_PMK_NAME_LEN); 393 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, 513 wpa_hexdump(MSG_MSGDUMP, "FT: Resource descriptor IE(s)", 609 wpa_hexdump(MSG_MSGDUMP, "FT: RIC Request", ric, ric_len); 819 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 849 wpa_hexdump(MSG_DEBUG, "FT: STA R0KH-ID", 859 wpa_hexdump(MSG_DEBUG, "FT: Requested PMKR0Name", 864 wpa_hexdump(MSG_DEBUG, "FT: Derived requested PMKR1Name", 888 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 106 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 150 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 206 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", 266 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected ICV", 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 349 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 406 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Expected MAC_CK(A, B, CID)" [all...] |
eap_server_gpsk.c | 117 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 314 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer", 327 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1", 329 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-2", 399 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); 434 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Derived Session-Id", 455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen); 456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 503 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen); 524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen) [all...] |
eap_server_psk.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)", 144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)", 292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P", 352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left); 387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message", 504 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Derived Session-Id", id, *len);
|
eap_server_md5.c | 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
|
eap_server_peap.c | 409 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", 411 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", 413 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", 416 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", 601 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding seed data", 629 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left); 677 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", 696 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Result TLV", 750 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs (SoH)", pos, left); 894 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed; [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", 293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", 409 wpa_hexdump(MSG_DEBUG,
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 44 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", 67 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); 77 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); 111 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", 516 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", 547 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); 567 wpa_hexdump(MSG_DEBUG, "WPS: Received public key", 569 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key " 571 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash" [all...] |