/hal_espressif-3.6.0/components/wpa_supplicant/src/wps/ |
D | wps_attr_parse.c | 27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 39 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 47 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 55 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 62 wpa_printf(MSG_DEBUG, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem() 97 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 109 wpa_printf(MSG_DEBUG, "WPS: Unknown Vendor Extension (Vendor ID %u)", in wps_parse_vendor_ext() 113 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() 119 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext() 137 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr() [all …]
|
D | wps_attr_process.c | 23 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 29 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 43 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 59 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 66 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 73 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 85 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 90 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 100 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 109 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid() [all …]
|
D | wps_enrollee.c | 23 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr() 38 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 55 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 56 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 60 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 65 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 81 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 89 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 97 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() [all …]
|
D | wps_registrar.c | 200 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac() 204 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac() 212 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac() 221 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac() 228 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac() 237 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac() 377 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session() 379 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session() 400 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap() 403 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap() [all …]
|
D | wps_attr_build.c | 27 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key() 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key() 38 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key() 44 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key() 48 wpa_printf(MSG_DEBUG, "build public key start\n"); in wps_build_public_key() 52 wpa_printf(MSG_DEBUG, "build public key finish\n"); in wps_build_public_key() 57 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key() 62 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key() 63 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key() 92 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type() [all …]
|
D | wps_dev_attr.c | 17 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer() 41 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name() 65 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number() 90 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number() 113 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type() 127 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type() 144 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type() 160 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name() 196 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version() 207 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/tls/ |
D | tlsv1_server_read.c | 42 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello() 57 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello() 63 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello() 82 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello() 85 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello() 105 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello() 161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello() 192 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello() 202 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello() 205 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello() [all …]
|
D | tlsv1_client_read.c | 40 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 55 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 61 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 81 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 89 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 110 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 139 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 148 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() 171 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello() 184 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello() [all …]
|
D | x509v3.c | 51 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free() 198 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_algorithm_identifier() 240 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_public_key() 259 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " in x509_parse_public_key() 268 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", in x509_parse_public_key() 280 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key() 316 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name() 334 wpa_printf(MSG_DEBUG, "X509: Expected SET " in x509_parse_name() 347 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name() 364 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name() [all …]
|
D | tlsv1_record.c | 37 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite() 78 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher() 94 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher() 114 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher() 129 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher() 213 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 223 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send() 231 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed to calculate HMAC"); in tlsv1_record_send() 245 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send() 294 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive() [all …]
|
D | tlsv1_server_write.c | 52 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); in tls_write_server_hello() 108 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_write_server_hello() 118 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " in tls_write_server_hello() 144 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_write_server_hello() 167 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " in tls_write_server_certificate() 174 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_server_certificate() 194 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_server_certificate() 219 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " in tls_write_server_certificate() 229 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_server_certificate() 261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed"); in tls_write_server_key_exchange() [all …]
|
D | pkcs8.c | 32 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " in pkcs8_key_import() 42 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " in pkcs8_key_import() 53 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); in pkcs8_key_import() 60 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " in pkcs8_key_import() 73 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " in pkcs8_key_import() 81 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " in pkcs8_key_import() 87 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); in pkcs8_key_import() 97 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " in pkcs8_key_import() 108 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " in pkcs8_key_import() 113 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey"); in pkcs8_key_import() [all …]
|
D | tlsv1_client_write.c | 53 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); in tls_send_client_hello() 148 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_send_client_hello() 170 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_client_certificate() 190 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_client_certificate() 215 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " in tls_write_client_certificate() 225 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_client_certificate() 249 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_anon_dh() 256 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " in tlsv1_key_x_anon_dh() 272 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", in tlsv1_key_x_anon_dh() 279 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_anon_dh() [all …]
|
D | pkcs5.c | 61 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " in pkcs5_get_params() 67 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); in pkcs5_get_params() 85 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " in pkcs5_get_params() 98 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " in pkcs5_get_params() 106 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", in pkcs5_get_params() 112 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " in pkcs5_get_params() 123 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " in pkcs5_get_params() 128 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", in pkcs5_get_params() 165 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8); in pkcs5_crypto_init() 166 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8); in pkcs5_crypto_init() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/eap_peer/ |
D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload() 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload() 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret() 124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk() 142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk() 156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv() [all …]
|
D | eap_peap.c | 82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", in eap_peap_parse_phase1() 88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " in eap_peap_parse_phase1() 94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " in eap_peap_parse_phase1() 98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " in eap_peap_parse_phase1() 102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " in eap_peap_parse_phase1() 108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); in eap_peap_parse_phase1() 111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); in eap_peap_parse_phase1() 114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); in eap_peap_parse_phase1() 120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); in eap_peap_parse_phase1() 123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled"); in eap_peap_parse_phase1() [all …]
|
D | eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb() 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " in eap_fast_session_ticket_cb() 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " in eap_fast_session_ticket_cb() 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb() 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " in eap_fast_session_ticket_cb() 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " in eap_fast_init() 280 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive " in eap_fast_derive_key_auth() 289 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_auth() 307 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block"); in eap_fast_derive_key_provisioning() 314 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_provisioning() [all …]
|
D | mschapv2.c | 45 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", in mschapv2_derive_response() 49 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", in mschapv2_derive_response() 52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response() 54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response() 56 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", in mschapv2_derive_response() 61 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response() 72 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response() 86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response() 88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response() 102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key", in mschapv2_derive_response()
|
D | eap_mschapv2.c | 145 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generate Challenge Response\n"); in eap_mschapv2_challenge_reply() 177 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " in eap_mschapv2_challenge_reply() 187 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply() 206 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " in eap_mschapv2_challenge_reply() 235 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge() 261 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge() 268 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", in eap_mschapv2_challenge() 322 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); in eap_mschapv2_success() 339 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", in eap_mschapv2_success() 348 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate " in eap_mschapv2_success() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/common/ |
D | wnm_sta.c | 47 wpa_printf(MSG_DEBUG, "WNM: Too short TSF"); in wnm_parse_neighbor_report_elem() 56 wpa_printf(MSG_DEBUG, "WNM: Too short condensed " in wnm_parse_neighbor_report_elem() 65 wpa_printf(MSG_DEBUG, "WNM: Too short BSS transition " in wnm_parse_neighbor_report_elem() 74 wpa_printf(MSG_DEBUG, in wnm_parse_neighbor_report_elem() 84 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor " in wnm_parse_neighbor_report_elem() 95 wpa_printf(MSG_DEBUG, "WNM: Too short measurement " in wnm_parse_neighbor_report_elem() 109 wpa_printf(MSG_DEBUG, "WNM: Too short RRM enabled " in wnm_parse_neighbor_report_elem() 118 wpa_printf(MSG_DEBUG, "WNM: Too short multiple BSSID"); in wnm_parse_neighbor_report_elem() 139 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor report"); in wnm_parse_neighbor_report() 157 wpa_printf(MSG_DEBUG, "WNM: Subelement id=%u len=%u", id, elen); in wnm_parse_neighbor_report() [all …]
|
D | dpp.c | 93 wpa_printf(MSG_DEBUG, "%s (%s,%s)", title, x, y); in dpp_debug_print_point() 332 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 337 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 347 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 424 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 428 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 432 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 449 wpa_printf(MSG_DEBUG, "DPP: Invalid URI channel-list"); in dpp_parse_uri_chan_list() 462 wpa_printf(MSG_DEBUG, "DPP: Invalid URI mac"); in dpp_parse_uri_mac() 466 wpa_printf(MSG_DEBUG, "DPP: URI mac: " MACSTR, MAC2STR(bi->mac_addr)); in dpp_parse_uri_mac() [all …]
|
D | sae.c | 33 wpa_printf(MSG_DEBUG, "SAE: Selecting supported ECC group %d", in sae_set_group() 45 wpa_printf(MSG_DEBUG, "SAE: Selecting supported FFC group %d", in sae_set_group() 77 wpa_printf(MSG_DEBUG, in sae_set_group() 165 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR in sae_pwd_seed_key() 276 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ecc() 285 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", in sae_test_pwd_seed_ecc() 320 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ffc() 327 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, in sae_test_pwd_seed_ffc() 332 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p"); in sae_test_pwd_seed_ffc() 368 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE"); in sae_test_pwd_seed_ffc() [all …]
|
D | rrm.c | 34 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report - NONE"); in wpas_rrm_neighbor_rep_timeout_handler() 69 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len); in wpas_rrm_process_neighbor_rep() 74 wpa_printf(MSG_DEBUG, in wpas_rrm_process_neighbor_rep() 88 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report (token = %d)", in wpas_rrm_process_neighbor_rep() 154 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request() 165 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request() 170 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request() 254 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request() 428 wpa_printf(MSG_DEBUG, in wpas_beacon_rep_add_frame_body() 632 wpa_hexdump_buf(MSG_DEBUG, "RRM: Radio Measurement report", *buf); in wpas_beacon_rep_table() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 243 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " in wpa_eapol_key_send() 249 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR in wpa_eapol_key_send() 265 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send() 266 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt)); in wpa_eapol_key_send() 303 wpa_printf(MSG_DEBUG, "Failed to read BSSID for EAPOL-Key " in wpa_sm_key_request() 344 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key Request (error=%d " in wpa_sm_key_request() 358 wpa_printf( MSG_DEBUG, "RSN: PMKSA cache entry free_cb: " in wpa_sm_pmksa_free_cb() 362 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 380 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 410 wpa_printf(MSG_DEBUG, in wpa_supplicant_get_pmk() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wps.c | 157 wpa_printf(MSG_DEBUG, "wps_Task enter"); in wps_task() 171 wpa_printf(MSG_DEBUG, "wpsT: rx sig=%d", e->sig); in wps_task() 234 wpa_printf(MSG_DEBUG, "wpsT: delete task"); in wps_task() 247 wpa_printf(MSG_DEBUG, "wps post: sig=%d cnt=%d", sig, s_wps_sig_cnt[sig]); in wps_post() 251 wpa_printf(MSG_DEBUG, "wps post: sig=%d processing", sig); in wps_post() 402 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password", in wps_init() 408 wpa_printf(MSG_DEBUG, "WPS PIN [%s]", tmpp); in wps_init() 472 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " in wps_deinit() 475 wpa_printf(MSG_DEBUG, "WPS: register information revealed and " in wps_deinit() 506 wpa_printf(MSG_DEBUG, "wps build: wps pr"); in wps_build_ic_appie_wps_pr() [all …]
|