Home
last modified time | relevance | path

Searched refs:wpa_hexdump (Results 1 – 25 of 47) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Dccmp.c160 wpa_hexdump(MSG_MSGDUMP, "CCMP AAD", aad, aad_len); in ccmp_decrypt()
161 wpa_hexdump(MSG_MSGDUMP, "CCMP nonce", nonce, 13); in ccmp_decrypt()
174 wpa_hexdump(MSG_MSGDUMP, "CCMP decrypted", plain, mlen); in ccmp_decrypt()
222 wpa_hexdump(MSG_MSGDUMP, "CCMP AAD", aad, aad_len); in ccmp_encrypt()
223 wpa_hexdump(MSG_MSGDUMP, "CCMP nonce", nonce, 13); in ccmp_encrypt()
232 wpa_hexdump(MSG_MSGDUMP, "CCMP encrypted", crypt + hdrlen + 8, plen); in ccmp_encrypt()
265 wpa_hexdump(MSG_DEBUG, "CCMP AAD", aad, aad_len); in ccmp_encrypt_pv1()
266 wpa_hexdump(MSG_DEBUG, "CCMP nonce", nonce, sizeof(nonce)); in ccmp_encrypt_pv1()
274 wpa_hexdump(MSG_DEBUG, "CCMP encrypted", crypt + hdrlen, plen); in ccmp_encrypt_pv1()
302 wpa_hexdump(MSG_DEBUG, "CCMP-256 AAD", aad, aad_len); in ccmp_256_decrypt()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_client_ocsp.c77 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA1)", hash, 20); in ocsp_hash_data()
84 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA256)", hash, 32); in ocsp_hash_data()
91 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA384)", hash, 48); in ocsp_hash_data()
98 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA512)", hash, 64); in ocsp_hash_data()
129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); in tls_process_ocsp_single_response()
169 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash", in tls_process_ocsp_single_response()
173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", in tls_process_ocsp_single_response()
180 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash", in tls_process_ocsp_single_response()
194 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len); in tls_process_ocsp_single_response()
202 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash", in tls_process_ocsp_single_response()
[all …]
Dpkcs1.c223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver()
245 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestInfo", in pkcs1_v15_sig_ver()
266 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestAlgorithmIdentifier", in pkcs1_v15_sig_ver()
276 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Digest algorithm parameters", in pkcs1_v15_sig_ver()
315 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Decrypted Digest", in pkcs1_v15_sig_ver()
329 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data", in pkcs1_v15_sig_ver()
Dx509v3.c278 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", in x509_parse_public_key()
425 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID", in x509_parse_name()
949 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); in x509_parse_alt_name_ip()
1177 wpa_hexdump(MSG_MSGDUMP, "X509: certificatePolicies", pos, end - pos); in x509_parse_ext_certificate_policies()
1194 wpa_hexdump(MSG_MSGDUMP, "X509: PolicyInformation", in x509_parse_ext_certificate_policies()
1297 wpa_hexdump(MSG_MSGDUMP, "X509: ExtKeyUsageSyntax", pos, end - pos); in x509_parse_ext_ext_key_usage()
1418 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); in x509_parse_extension()
1538 wpa_hexdump(MSG_MSGDUMP, "X509: serialNumber", cert->serial_number, in x509_parse_tbs_certificate()
1640 wpa_hexdump(MSG_DEBUG, in x509_parse_tbs_certificate()
1764 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER " in x509_certificate_parse()
[all …]
Dpkcs5.c180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
194 wpa_hexdump(MSG_DEBUG, in pkcs5_get_params_pbes2()
255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2()
328 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", in pkcs5_get_params()
344 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " in pkcs5_get_params()
372 wpa_hexdump(MSG_DEBUG, "PKCS #5: PBES2 salt for PBKDF2", in pkcs5_crypto_init_pbes2()
380 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2()
616 wpa_hexdump(MSG_INFO, "PKCS #5: Invalid PS", in pkcs5_decrypt()
Dtlsv1_client_read.c46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions", in tls_process_server_hello_extensions()
71 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions()
123 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); in tls_process_server_hello()
150 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", in tls_process_server_hello()
169 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", in tls_process_server_hello()
238 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello()
528 wpa_hexdump(MSG_MSGDUMP, "TLSv1: SHA256 hash", in tls_process_certificate()
697 wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime", in tlsv1_process_diffie_hellman()
705 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", in tlsv1_process_diffie_hellman()
719 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", in tlsv1_process_diffie_hellman()
[all …]
Dtlsv1_server_read.c83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos); in tls_process_status_request_item()
172 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); in tls_process_client_hello()
215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", in tls_process_client_hello()
227 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); in tls_process_client_hello()
243 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", in tls_process_client_hello()
295 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", in tls_process_client_hello()
359 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " in tls_process_client_hello()
722 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", in tls_process_client_key_exchange_dh()
751 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", in tls_process_client_key_exchange_dh()
860 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); in tls_process_client_key_exchange()
[all …]
Dtlsv1_record.c231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", in tlsv1_record_send()
293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", in tlsv1_record_receive()
333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", in tlsv1_record_receive()
409 wpa_hexdump(MSG_DEBUG, in tlsv1_record_receive()
Dtlsv1_cred.c495 wpa_hexdump(MSG_DEBUG, "PKCS #12: x509Certificate", in pkcs12_certbag()
731 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data", hdr.payload, hdr.length); in pkcs12_parse_content_data()
774 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: EncryptedContentInfo", in pkcs12_parse_content_enc_data()
853 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: ContentInfo", buf, len); in pkcs12_parse_content()
973 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data content", in pkcs12_parse()
1102 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); in tlsv1_set_dhparams_der()
1119 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); in tlsv1_set_dhparams_der()
/hal_espressif-latest/components/wpa_supplicant/include/utils/
Dwpa_debug.h81 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len);
85 wpa_hexdump(level, title, buf, len); in wpa_hexdump_ascii()
90 wpa_hexdump(level, title, buf, len); in wpa_hexdump_ascii_key()
96 wpa_hexdump(level, title, wpabuf_head(buf), wpabuf_len(buf)); in wpa_hexdump_buf()
154 #define wpa_hexdump(...) do {} while(0) macro
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c43 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft()
48 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft()
88 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params()
96 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params()
110 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", in wpa_sm_set_ft_params()
129 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " in wpa_sm_set_ft_params()
427 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_process_response()
428 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); in wpa_ft_process_response()
472 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", in wpa_ft_process_response()
474 wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce", in wpa_ft_process_response()
[all …]
Dwpa_ie.c344 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", in wpa_parse_generic()
353 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", in wpa_parse_generic()
362 wpa_hexdump(MSG_DEBUG, "WPA: GTK in EAPOL-Key", in wpa_parse_generic()
371 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", in wpa_parse_generic()
380 wpa_hexdump(MSG_DEBUG, "WPA: IGTK in EAPOL-Key", in wpa_parse_generic()
389 wpa_hexdump(MSG_DEBUG, in wpa_parse_generic()
422 wpa_hexdump(MSG_DEBUG, "WPA: Key Data", in wpa_supplicant_parse_ies()
430 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE in EAPOL-Key", in wpa_supplicant_parse_ies()
435 wpa_hexdump(MSG_DEBUG, "WPA: RSNXE in EAPOL-Key", in wpa_supplicant_parse_ies()
446 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key " in wpa_supplicant_parse_ies()
Dwpa.c263 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt, sm->pmk_len)); in wpa_eapol_key_send()
264 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send()
420 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); in wpa_supplicant_get_pmk()
567 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE before FT processing", in wpa_supplicant_send_2_of_4()
584 wpa_hexdump(MSG_DEBUG, in wpa_supplicant_send_2_of_4()
589 wpa_hexdump(MSG_DEBUG, "WPA: Add assoc_resp_ies", in wpa_supplicant_send_2_of_4()
600 wpa_hexdump(MSG_MSGDUMP, "WPA: WPA IE for msg 2/4\n", wpa_ie, wpa_ie_len); in wpa_supplicant_send_2_of_4()
690 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", in wpa_supplicant_process_1_of_4()
695 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " in wpa_supplicant_process_1_of_4()
722 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", in wpa_supplicant_process_1_of_4()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_fast_common.c75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
153 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", in eap_fast_parse_tlv()
165 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); in eap_fast_parse_tlv()
190 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", in eap_fast_parse_tlv()
216 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", in eap_fast_parse_tlv()
235 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", in eap_fast_parse_tlv()
254 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); in eap_fast_parse_tlv()
Dmschapv2.c52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response()
86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response()
88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
Deap_peap.c350 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); in eap_tlv_add_cryptobinding()
351 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", in eap_tlv_add_cryptobinding()
353 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", in eap_tlv_add_cryptobinding()
356 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); in eap_tlv_add_cryptobinding()
448 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Compound_MAC data", in eap_tlv_validate_cryptobinding()
455 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC", in eap_tlv_validate_cryptobinding()
457 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC", in eap_tlv_validate_cryptobinding()
511 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); in eap_tlv_process()
561 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", in eap_tlv_process()
579 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV", in eap_tlv_process()
[all …]
Deap_fast.c96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb()
600 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", in eap_fast_validate_crypto_binding()
602 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", in eap_fast_validate_crypto_binding()
639 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", in eap_fast_write_crypto_binding()
641 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", in eap_fast_write_crypto_binding()
772 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " in eap_fast_process_crypto_binding()
777 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received Compound MAC", in eap_fast_process_crypto_binding()
779 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Calculated Compound MAC", in eap_fast_process_crypto_binding()
812 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id", in eap_fast_process_crypto_binding()
845 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len); in eap_fast_parse_pac_tlv()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/common/
Ddpp.c529 wpa_hexdump(MSG_DEBUG, "DPP: Base64 decoded URI public-key", in dpp_parse_uri_pk()
538 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", in dpp_parse_uri_pk()
761 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash, in dpp_bootstrap_key_hash()
809 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash, in dpp_keygen()
1100 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[0]", addr[0], len[0]); in dpp_auth_build_req()
1105 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[1]", addr[1], len[1]); in dpp_auth_build_req()
1108 wpa_hexdump(MSG_DEBUG, "DPP: AES-SIV cleartext", clear, siv_len); in dpp_auth_build_req()
1115 wpa_hexdump(MSG_DEBUG, "DPP: AES-SIV ciphertext", in dpp_auth_build_req()
1273 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[0]", addr[0], len[0]); in dpp_auth_build_resp()
1278 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[1]", addr[1], len[1]); in dpp_auth_build_resp()
[all …]
Dsae_pk.c531 wpa_hexdump(MSG_DEBUG, "SAE-PK: hash(data to be signed)", in sae_pk_hash_sig_data()
579 wpa_hexdump(MSG_DEBUG, "SAE-PK: Hash(SSID || M || K_AP)", in sae_pk_valid_fingerprint()
595 wpa_hexdump(MSG_DEBUG, "SAE-PK: Fingerprint", hash, in sae_pk_valid_fingerprint()
600 wpa_hexdump(MSG_DEBUG, "SAE-PK: Expected fingerprint", in sae_pk_valid_fingerprint()
645 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received confirm IEs", ies, ies_len); in sae_check_confirm_pk()
664 wpa_hexdump(MSG_DEBUG, "SAE-PK: EncryptedModifier", in sae_check_confirm_pk()
683 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received K_AP", k_ap, k_ap_len); in sae_check_confirm_pk()
698 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received KeyAuth", in sae_check_confirm_pk()
Dsae.c1122 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ecc()
1184 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ffc()
1526 wpa_hexdump(MSG_DEBUG, "SAE: salt for keyseed derivation", in sae_derive_keys()
1548 wpa_hexdump(MSG_DEBUG, "SAE: PMKID", val, SAE_PMKID_LEN); in sae_derive_keys()
1620 wpa_hexdump(MSG_DEBUG, "SAE: Anti-clogging token", in sae_write_commit()
1629 wpa_hexdump(MSG_DEBUG, "SAE: own commit-scalar", in sae_write_commit()
1639 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(x)", in sae_write_commit()
1641 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(y)", in sae_write_commit()
1650 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element", in sae_write_commit()
1785 wpa_hexdump(MSG_DEBUG, "SAE: Anti-Clogging Token", *pos, tlen); in sae_parse_commit_token()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/utils/
Dwpa_debug.c82 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len) in wpa_hexdump() function
111 wpa_hexdump(level, title, buf, len); in wpa_hexdump_key()
/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_enrollee.c45 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
46 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
69 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
114 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", in wps_build_m1()
532 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", in wps_process_registrar_nonce()
563 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); in wps_process_uuid_r()
583 wpa_hexdump(MSG_DEBUG, "WPS: Received public key", in wps_process_pubkey()
585 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key " in wps_process_pubkey()
587 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash", in wps_process_pubkey()
[all …]
Dwps_dev_attr.c145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type()
208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1()
233 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension", in wps_build_vendor_ext()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwpa_auth.c571 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name from Supplicant", in ft_check_msg_2_of_4()
593 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4", in ft_check_msg_2_of_4()
595 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp", in ft_check_msg_2_of_4()
678 wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce, in wpa_receive()
680 wpa_hexdump(MSG_DEBUG, "WPA: Received Replay Counter", in wpa_receive()
765 wpa_hexdump(MSG_DEBUG, "pending replay counter", in wpa_receive()
769 wpa_hexdump(MSG_DEBUG, "received replay counter", in wpa_receive()
820 wpa_hexdump(MSG_DEBUG, "WPA IE in AssocReq", in wpa_receive()
823 wpa_hexdump(MSG_DEBUG, "WPA IE in msg 2/4", in wpa_receive()
1447 wpa_hexdump(MSG_DEBUG, "WPA: Assign ANonce", sm->ANonce, in SM_STATE()
[all …]
Dwpa_auth_ie.c487 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); in wpa_validate_wpa_ie()
589 wpa_hexdump(MSG_DEBUG, "RSN: Attempted to use unknown " in wpa_validate_wpa_ie()
611 wpa_hexdump(MSG_DEBUG, "RSN IE: STA PMKID", in wpa_validate_wpa_ie()
756 wpa_hexdump(MSG_DEBUG, "WPA: RSNXE in EAPOL-Key", in wpa_parse_kde_ies()
767 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key " in wpa_parse_kde_ies()

12