| /hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
| D | ccmp.c | 160 wpa_hexdump(MSG_MSGDUMP, "CCMP AAD", aad, aad_len); in ccmp_decrypt() 161 wpa_hexdump(MSG_MSGDUMP, "CCMP nonce", nonce, 13); in ccmp_decrypt() 174 wpa_hexdump(MSG_MSGDUMP, "CCMP decrypted", plain, mlen); in ccmp_decrypt() 222 wpa_hexdump(MSG_MSGDUMP, "CCMP AAD", aad, aad_len); in ccmp_encrypt() 223 wpa_hexdump(MSG_MSGDUMP, "CCMP nonce", nonce, 13); in ccmp_encrypt() 232 wpa_hexdump(MSG_MSGDUMP, "CCMP encrypted", crypt + hdrlen + 8, plen); in ccmp_encrypt() 265 wpa_hexdump(MSG_DEBUG, "CCMP AAD", aad, aad_len); in ccmp_encrypt_pv1() 266 wpa_hexdump(MSG_DEBUG, "CCMP nonce", nonce, sizeof(nonce)); in ccmp_encrypt_pv1() 274 wpa_hexdump(MSG_DEBUG, "CCMP encrypted", crypt + hdrlen, plen); in ccmp_encrypt_pv1() 302 wpa_hexdump(MSG_DEBUG, "CCMP-256 AAD", aad, aad_len); in ccmp_256_decrypt() [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/src/tls/ |
| D | tlsv1_client_ocsp.c | 77 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA1)", hash, 20); in ocsp_hash_data() 84 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA256)", hash, 32); in ocsp_hash_data() 91 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA384)", hash, 48); in ocsp_hash_data() 98 wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA512)", hash, 64); in ocsp_hash_data() 129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); in tls_process_ocsp_single_response() 169 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash", in tls_process_ocsp_single_response() 173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", in tls_process_ocsp_single_response() 180 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash", in tls_process_ocsp_single_response() 194 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len); in tls_process_ocsp_single_response() 202 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash", in tls_process_ocsp_single_response() [all …]
|
| D | pkcs1.c | 223 wpa_hexdump(MSG_DEBUG, "Decrypted(S)", decrypted, decrypted_len); in pkcs1_v15_sig_ver() 245 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestInfo", in pkcs1_v15_sig_ver() 266 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: DigestAlgorithmIdentifier", in pkcs1_v15_sig_ver() 276 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Digest algorithm parameters", in pkcs1_v15_sig_ver() 315 wpa_hexdump(MSG_MSGDUMP, "PKCS #1: Decrypted Digest", in pkcs1_v15_sig_ver() 329 wpa_hexdump(MSG_DEBUG, "PKCS #1: Extra data", in pkcs1_v15_sig_ver()
|
| D | x509v3.c | 278 wpa_hexdump(MSG_MSGDUMP, "X509: subjectPublicKey", in x509_parse_public_key() 425 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID", in x509_parse_name() 949 wpa_hexdump(MSG_MSGDUMP, "X509: altName - iPAddress", pos, len); in x509_parse_alt_name_ip() 1177 wpa_hexdump(MSG_MSGDUMP, "X509: certificatePolicies", pos, end - pos); in x509_parse_ext_certificate_policies() 1194 wpa_hexdump(MSG_MSGDUMP, "X509: PolicyInformation", in x509_parse_ext_certificate_policies() 1297 wpa_hexdump(MSG_MSGDUMP, "X509: ExtKeyUsageSyntax", pos, end - pos); in x509_parse_ext_ext_key_usage() 1418 wpa_hexdump(MSG_MSGDUMP, "X509: extnValue", hdr.payload, hdr.length); in x509_parse_extension() 1538 wpa_hexdump(MSG_MSGDUMP, "X509: serialNumber", cert->serial_number, in x509_parse_tbs_certificate() 1640 wpa_hexdump(MSG_DEBUG, in x509_parse_tbs_certificate() 1764 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER " in x509_certificate_parse() [all …]
|
| D | pkcs5.c | 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 194 wpa_hexdump(MSG_DEBUG, in pkcs5_get_params_pbes2() 255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2() 328 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", in pkcs5_get_params() 344 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " in pkcs5_get_params() 372 wpa_hexdump(MSG_DEBUG, "PKCS #5: PBES2 salt for PBKDF2", in pkcs5_crypto_init_pbes2() 380 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2() 616 wpa_hexdump(MSG_INFO, "PKCS #5: Invalid PS", in pkcs5_decrypt()
|
| D | tlsv1_client_read.c | 46 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello extensions", in tls_process_server_hello_extensions() 71 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions() 123 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); in tls_process_server_hello() 150 wpa_hexdump(MSG_MSGDUMP, "TLSv1: server_random", in tls_process_server_hello() 169 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", in tls_process_server_hello() 238 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 528 wpa_hexdump(MSG_MSGDUMP, "TLSv1: SHA256 hash", in tls_process_certificate() 697 wpa_hexdump(MSG_DEBUG, "TLSv1: Rejected DH prime", in tlsv1_process_diffie_hellman() 705 wpa_hexdump(MSG_DEBUG, "TLSv1: DH p (prime)", in tlsv1_process_diffie_hellman() 719 wpa_hexdump(MSG_DEBUG, "TLSv1: DH g (generator)", in tlsv1_process_diffie_hellman() [all …]
|
| D | tlsv1_server_read.c | 83 wpa_hexdump(MSG_DEBUG, "TLSv1: OCSPStatusRequest", pos, end - pos); in tls_process_status_request_item() 172 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello", pos, len); in tls_process_client_hello() 215 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client_random", in tls_process_client_hello() 227 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client session_id", pos + 1, *pos); in tls_process_client_hello() 243 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client cipher suites", in tls_process_client_hello() 295 wpa_hexdump(MSG_MSGDUMP, "TLSv1: client compression_methods", in tls_process_client_hello() 359 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientHello " in tls_process_client_hello() 722 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ClientDiffieHellmanPublic", in tls_process_client_key_exchange_dh() 751 wpa_hexdump(MSG_DEBUG, "TLSv1: DH Yc (client's public value)", in tls_process_client_key_exchange_dh() 860 wpa_hexdump(MSG_DEBUG, "TLSv1: ClientKeyExchange", pos, len); in tls_process_client_key_exchange() [all …]
|
| D | tlsv1_record.c | 231 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Write HMAC", in tlsv1_record_send() 293 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", in tlsv1_record_receive() 333 wpa_hexdump(MSG_MSGDUMP, "TLSv1: Record Layer - Received", in tlsv1_record_receive() 409 wpa_hexdump(MSG_DEBUG, in tlsv1_record_receive()
|
| D | tlsv1_cred.c | 495 wpa_hexdump(MSG_DEBUG, "PKCS #12: x509Certificate", in pkcs12_certbag() 731 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data", hdr.payload, hdr.length); in pkcs12_parse_content_data() 774 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: EncryptedContentInfo", in pkcs12_parse_content_enc_data() 853 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: ContentInfo", buf, len); in pkcs12_parse_content() 973 wpa_hexdump(MSG_MSGDUMP, "PKCS #12: Data content", in pkcs12_parse() 1102 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); in tlsv1_set_dhparams_der() 1119 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); in tlsv1_set_dhparams_der()
|
| /hal_espressif-latest/components/wpa_supplicant/include/utils/ |
| D | wpa_debug.h | 81 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len); 85 wpa_hexdump(level, title, buf, len); in wpa_hexdump_ascii() 90 wpa_hexdump(level, title, buf, len); in wpa_hexdump_ascii_key() 96 wpa_hexdump(level, title, wpabuf_head(buf), wpabuf_len(buf)); in wpa_hexdump_buf() 154 #define wpa_hexdump(...) do {} while(0) macro
|
| /hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
| D | wpa_ft.c | 43 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 48 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft() 88 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 96 wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID", in wpa_sm_set_ft_params() 110 wpa_hexdump(MSG_DEBUG, "FT: R1KH-ID", in wpa_sm_set_ft_params() 129 wpa_hexdump(MSG_DEBUG, "FT: Stored MDIE and FTIE from " in wpa_sm_set_ft_params() 427 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_process_response() 428 wpa_hexdump(MSG_DEBUG, "FT: RIC IEs", ric_ies, ric_ies_len); in wpa_ft_process_response() 472 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", in wpa_ft_process_response() 474 wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce", in wpa_ft_process_response() [all …]
|
| D | wpa_ie.c | 344 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", in wpa_parse_generic() 353 wpa_hexdump(MSG_DEBUG, "WPA: PMKID in EAPOL-Key", in wpa_parse_generic() 362 wpa_hexdump(MSG_DEBUG, "WPA: GTK in EAPOL-Key", in wpa_parse_generic() 371 wpa_hexdump(MSG_DEBUG, "WPA: MAC Address in EAPOL-Key", in wpa_parse_generic() 380 wpa_hexdump(MSG_DEBUG, "WPA: IGTK in EAPOL-Key", in wpa_parse_generic() 389 wpa_hexdump(MSG_DEBUG, in wpa_parse_generic() 422 wpa_hexdump(MSG_DEBUG, "WPA: Key Data", in wpa_supplicant_parse_ies() 430 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE in EAPOL-Key", in wpa_supplicant_parse_ies() 435 wpa_hexdump(MSG_DEBUG, "WPA: RSNXE in EAPOL-Key", in wpa_supplicant_parse_ies() 446 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key " in wpa_supplicant_parse_ies()
|
| D | wpa.c | 263 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt, sm->pmk_len)); in wpa_eapol_key_send() 264 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); in wpa_eapol_key_send() 420 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); in wpa_supplicant_get_pmk() 567 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE before FT processing", in wpa_supplicant_send_2_of_4() 584 wpa_hexdump(MSG_DEBUG, in wpa_supplicant_send_2_of_4() 589 wpa_hexdump(MSG_DEBUG, "WPA: Add assoc_resp_ies", in wpa_supplicant_send_2_of_4() 600 wpa_hexdump(MSG_MSGDUMP, "WPA: WPA IE for msg 2/4\n", wpa_ie, wpa_ie_len); in wpa_supplicant_send_2_of_4() 690 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", in wpa_supplicant_process_1_of_4() 695 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from " in wpa_supplicant_process_1_of_4() 722 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", in wpa_supplicant_process_1_of_4() [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
| D | eap_fast_common.c | 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 153 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", in eap_fast_parse_tlv() 165 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV", pos, len); in eap_fast_parse_tlv() 190 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Intermediate Result TLV", in eap_fast_parse_tlv() 216 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV", in eap_fast_parse_tlv() 235 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Request-Action TLV", in eap_fast_parse_tlv() 254 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); in eap_fast_parse_tlv()
|
| D | mschapv2.c | 52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response() 54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response() 86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response() 88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
|
| D | eap_peap.c | 350 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC CMK", data->cmk, 20); in eap_tlv_add_cryptobinding() 351 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 1", in eap_tlv_add_cryptobinding() 353 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC data 2", in eap_tlv_add_cryptobinding() 356 wpa_hexdump(MSG_MSGDUMP, "EAP-PEAP: Compound_MAC", mac, SHA1_MAC_LEN); in eap_tlv_add_cryptobinding() 448 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Compound_MAC data", in eap_tlv_validate_cryptobinding() 455 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received MAC", in eap_tlv_validate_cryptobinding() 457 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Expected MAC", in eap_tlv_validate_cryptobinding() 511 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); in eap_tlv_process() 561 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Cryptobinding TLV", in eap_tlv_process() 579 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV", in eap_tlv_process() [all …]
|
| D | eap_fast.c | 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb() 600 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", in eap_fast_validate_crypto_binding() 602 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", in eap_fast_validate_crypto_binding() 639 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE", in eap_fast_write_crypto_binding() 641 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC", in eap_fast_write_crypto_binding() 772 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " in eap_fast_process_crypto_binding() 777 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received Compound MAC", in eap_fast_process_crypto_binding() 779 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Calculated Compound MAC", in eap_fast_process_crypto_binding() 812 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id", in eap_fast_process_crypto_binding() 845 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len); in eap_fast_parse_pac_tlv() [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/src/common/ |
| D | dpp.c | 529 wpa_hexdump(MSG_DEBUG, "DPP: Base64 decoded URI public-key", in dpp_parse_uri_pk() 538 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", in dpp_parse_uri_pk() 761 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash, in dpp_bootstrap_key_hash() 809 wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash, in dpp_keygen() 1100 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[0]", addr[0], len[0]); in dpp_auth_build_req() 1105 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[1]", addr[1], len[1]); in dpp_auth_build_req() 1108 wpa_hexdump(MSG_DEBUG, "DPP: AES-SIV cleartext", clear, siv_len); in dpp_auth_build_req() 1115 wpa_hexdump(MSG_DEBUG, "DPP: AES-SIV ciphertext", in dpp_auth_build_req() 1273 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[0]", addr[0], len[0]); in dpp_auth_build_resp() 1278 wpa_hexdump(MSG_DEBUG, "DDP: AES-SIV AD[1]", addr[1], len[1]); in dpp_auth_build_resp() [all …]
|
| D | sae_pk.c | 531 wpa_hexdump(MSG_DEBUG, "SAE-PK: hash(data to be signed)", in sae_pk_hash_sig_data() 579 wpa_hexdump(MSG_DEBUG, "SAE-PK: Hash(SSID || M || K_AP)", in sae_pk_valid_fingerprint() 595 wpa_hexdump(MSG_DEBUG, "SAE-PK: Fingerprint", hash, in sae_pk_valid_fingerprint() 600 wpa_hexdump(MSG_DEBUG, "SAE-PK: Expected fingerprint", in sae_pk_valid_fingerprint() 645 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received confirm IEs", ies, ies_len); in sae_check_confirm_pk() 664 wpa_hexdump(MSG_DEBUG, "SAE-PK: EncryptedModifier", in sae_check_confirm_pk() 683 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received K_AP", k_ap, k_ap_len); in sae_check_confirm_pk() 698 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received KeyAuth", in sae_check_confirm_pk()
|
| D | sae.c | 1122 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ecc() 1184 wpa_hexdump(MSG_DEBUG, "SAE: val", hash, hash_len); in sae_derive_pwe_from_pt_ffc() 1526 wpa_hexdump(MSG_DEBUG, "SAE: salt for keyseed derivation", in sae_derive_keys() 1548 wpa_hexdump(MSG_DEBUG, "SAE: PMKID", val, SAE_PMKID_LEN); in sae_derive_keys() 1620 wpa_hexdump(MSG_DEBUG, "SAE: Anti-clogging token", in sae_write_commit() 1629 wpa_hexdump(MSG_DEBUG, "SAE: own commit-scalar", in sae_write_commit() 1639 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(x)", in sae_write_commit() 1641 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element(y)", in sae_write_commit() 1650 wpa_hexdump(MSG_DEBUG, "SAE: own commit-element", in sae_write_commit() 1785 wpa_hexdump(MSG_DEBUG, "SAE: Anti-Clogging Token", *pos, tlen); in sae_parse_commit_token() [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/src/utils/ |
| D | wpa_debug.c | 82 void wpa_hexdump(int level, const char *title, const u8 *buf, size_t len) in wpa_hexdump() function 111 wpa_hexdump(level, title, buf, len); in wpa_hexdump_key()
|
| /hal_espressif-latest/components/wpa_supplicant/src/wps/ |
| D | wps_enrollee.c | 45 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 46 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 69 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 114 wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", in wps_build_m1() 532 wpa_hexdump(MSG_DEBUG, "WPS: Registrar Nonce", in wps_process_registrar_nonce() 563 wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); in wps_process_uuid_r() 583 wpa_hexdump(MSG_DEBUG, "WPS: Received public key", in wps_process_pubkey() 585 wpa_hexdump(MSG_DEBUG, "WPS: Calculated public key " in wps_process_pubkey() 587 wpa_hexdump(MSG_DEBUG, "WPS: Expected public key hash", in wps_process_pubkey() [all …]
|
| D | wps_dev_attr.c | 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type() 208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1() 233 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension", in wps_build_vendor_ext()
|
| /hal_espressif-latest/components/wpa_supplicant/src/ap/ |
| D | wpa_auth.c | 571 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name from Supplicant", in ft_check_msg_2_of_4() 593 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4", in ft_check_msg_2_of_4() 595 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp", in ft_check_msg_2_of_4() 678 wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce, in wpa_receive() 680 wpa_hexdump(MSG_DEBUG, "WPA: Received Replay Counter", in wpa_receive() 765 wpa_hexdump(MSG_DEBUG, "pending replay counter", in wpa_receive() 769 wpa_hexdump(MSG_DEBUG, "received replay counter", in wpa_receive() 820 wpa_hexdump(MSG_DEBUG, "WPA IE in AssocReq", in wpa_receive() 823 wpa_hexdump(MSG_DEBUG, "WPA IE in msg 2/4", in wpa_receive() 1447 wpa_hexdump(MSG_DEBUG, "WPA: Assign ANonce", sm->ANonce, in SM_STATE() [all …]
|
| D | wpa_auth_ie.c | 487 wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len); in wpa_validate_wpa_ie() 589 wpa_hexdump(MSG_DEBUG, "RSN: Attempted to use unknown " in wpa_validate_wpa_ie() 611 wpa_hexdump(MSG_DEBUG, "RSN IE: STA PMKID", in wpa_validate_wpa_ie() 756 wpa_hexdump(MSG_DEBUG, "WPA: RSNXE in EAPOL-Key", in wpa_parse_kde_ies() 767 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key " in wpa_parse_kde_ies()
|