Home
last modified time | relevance | path

Searched refs:MSG_DEBUG (Results 1 – 25 of 64) sorted by relevance

123

/hal_espressif-3.6.0/components/wpa_supplicant/src/wps/
Dwps_attr_parse.c27 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
39 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
47 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
55 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
62 wpa_printf(MSG_DEBUG, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem()
97 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
109 wpa_printf(MSG_DEBUG, "WPS: Unknown Vendor Extension (Vendor ID %u)", in wps_parse_vendor_ext()
113 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext()
119 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext()
137 wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u", in wps_set_attr()
[all …]
Dwps_attr_process.c23 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
29 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
43 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
59 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
66 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
73 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
85 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
90 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
100 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
109 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid()
[all …]
Dwps_enrollee.c23 wpa_printf(MSG_DEBUG, "WPS: * MAC Address"); in wps_build_mac_addr()
38 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
55 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
56 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
60 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
65 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
81 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
89 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
97 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
[all …]
Dwps_registrar.c200 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac()
204 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac()
212 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac()
221 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac()
228 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac()
237 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac()
377 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session()
379 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session()
400 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap()
403 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap()
[all …]
Dwps_attr_build.c27 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key()
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key()
38 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key()
44 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key()
48 wpa_printf(MSG_DEBUG, "build public key start\n"); in wps_build_public_key()
52 wpa_printf(MSG_DEBUG, "build public key finish\n"); in wps_build_public_key()
57 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key()
62 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key()
63 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key()
92 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type()
[all …]
Dwps_dev_attr.c17 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer()
41 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name()
65 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number()
90 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number()
113 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type()
127 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type()
144 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type()
160 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name()
196 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version()
207 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1()
[all …]
/hal_espressif-3.6.0/components/wpa_supplicant/src/tls/
Dtlsv1_server_read.c42 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_client_hello()
57 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_client_hello()
63 wpa_printf(MSG_DEBUG, "TLSv1: Received ClientHello"); in tls_process_client_hello()
82 wpa_printf(MSG_DEBUG, "TLSv1: Client version %d.%d", in tls_process_client_hello()
85 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_client_hello()
105 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_client_hello()
161 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_client_hello()
192 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected extra octet in the " in tls_process_client_hello()
202 wpa_printf(MSG_DEBUG, "TLSv1: %u bytes of ClientHello " in tls_process_client_hello()
205 wpa_printf(MSG_DEBUG, "TLSv1: Invalid ClientHello " in tls_process_client_hello()
[all …]
Dtlsv1_client_read.c40 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
55 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
61 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
81 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
89 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
110 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
139 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
148 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
171 wpa_hexdump(MSG_DEBUG, "TLSv1: Unexpected extra data in the " in tls_process_server_hello()
184 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_process_server_hello()
[all …]
Dx509v3.c51 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free()
198 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_algorithm_identifier()
240 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_public_key()
259 wpa_printf(MSG_DEBUG, "X509: Expected BITSTRING " in x509_parse_public_key()
268 wpa_printf(MSG_DEBUG, "X509: BITSTRING - %d unused bits", in x509_parse_public_key()
280 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key()
316 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name()
334 wpa_printf(MSG_DEBUG, "X509: Expected SET " in x509_parse_name()
347 wpa_printf(MSG_DEBUG, "X509: Expected SEQUENCE " in x509_parse_name()
364 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name()
[all …]
Dtlsv1_record.c37 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite()
78 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher()
94 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher()
114 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher()
129 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher()
213 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send()
223 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send()
231 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed to calculate HMAC"); in tlsv1_record_send()
245 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send()
294 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive()
[all …]
Dtlsv1_server_write.c52 wpa_printf(MSG_DEBUG, "TLSv1: Send ServerHello"); in tls_write_server_hello()
108 wpa_printf(MSG_DEBUG, "TLSv1: SessionTicket callback " in tls_write_server_hello()
118 wpa_printf(MSG_DEBUG, "TLSv1: Failed to " in tls_write_server_hello()
144 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_write_server_hello()
167 wpa_printf(MSG_DEBUG, "TLSv1: Do not send Certificate when " in tls_write_server_certificate()
174 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_server_certificate()
194 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_server_certificate()
219 wpa_printf(MSG_DEBUG, "TLSv1: Full server certificate chain " in tls_write_server_certificate()
229 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_server_certificate()
261 wpa_printf(MSG_DEBUG, "TLSv1: No ServerKeyExchange needed"); in tls_write_server_key_exchange()
[all …]
Dpkcs8.c32 wpa_printf(MSG_DEBUG, "PKCS #8: Does not start with PKCS #8 " in pkcs8_key_import()
42 wpa_printf(MSG_DEBUG, "PKCS #8: Expected INTEGER - found " in pkcs8_key_import()
53 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse INTEGER"); in pkcs8_key_import()
60 wpa_printf(MSG_DEBUG, "PKCS #8: Expected zero INTEGER in the " in pkcs8_key_import()
73 wpa_printf(MSG_DEBUG, "PKCS #8: Expected SEQUENCE " in pkcs8_key_import()
81 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " in pkcs8_key_import()
87 wpa_printf(MSG_DEBUG, "PKCS #8: algorithm=%s", obuf); in pkcs8_key_import()
97 wpa_printf(MSG_DEBUG, "PKCS #8: Unsupported private key " in pkcs8_key_import()
108 wpa_printf(MSG_DEBUG, "PKCS #8: Expected OCTETSTRING " in pkcs8_key_import()
113 wpa_printf(MSG_DEBUG, "PKCS #8: Try to parse RSAPrivateKey"); in pkcs8_key_import()
[all …]
Dtlsv1_client_write.c53 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello"); in tls_send_client_hello()
148 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_send_client_hello()
170 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_client_certificate()
190 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_client_certificate()
215 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " in tls_write_client_certificate()
225 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_client_certificate()
249 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_anon_dh()
256 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " in tlsv1_key_x_anon_dh()
272 wpa_hexdump_key(MSG_DEBUG, "TLSv1: DH client's secret value", in tlsv1_key_x_anon_dh()
279 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_anon_dh()
[all …]
Dpkcs5.c61 wpa_printf(MSG_DEBUG, "PKCS #5: Failed to parse OID " in pkcs5_get_params()
67 wpa_printf(MSG_DEBUG, "PKCS #5: encryption algorithm %s", obuf); in pkcs5_get_params()
85 wpa_printf(MSG_DEBUG, "PKCS #5: Expected SEQUENCE " in pkcs5_get_params()
98 wpa_printf(MSG_DEBUG, "PKCS #5: Expected OCTETSTRING SIZE(8) " in pkcs5_get_params()
106 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", in pkcs5_get_params()
112 wpa_printf(MSG_DEBUG, "PKCS #5: Expected INTEGER - found " in pkcs5_get_params()
123 wpa_hexdump(MSG_DEBUG, "PKCS #5: Unsupported INTEGER value " in pkcs5_get_params()
128 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", in pkcs5_get_params()
165 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES key", hash, 8); in pkcs5_crypto_init()
166 wpa_hexdump_key(MSG_DEBUG, "PKCS #5: DES IV", hash + 8, 8); in pkcs5_crypto_init()
[all …]
/hal_espressif-3.6.0/components/wpa_supplicant/src/eap_peer/
Deap_fast_common.c52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload()
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload()
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret()
124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk()
142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk()
156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv()
[all …]
Deap_peap.c82 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", in eap_peap_parse_phase1()
88 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " in eap_peap_parse_phase1()
94 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " in eap_peap_parse_phase1()
98 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " in eap_peap_parse_phase1()
102 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " in eap_peap_parse_phase1()
108 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); in eap_peap_parse_phase1()
111 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); in eap_peap_parse_phase1()
114 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); in eap_peap_parse_phase1()
120 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 2 enabled"); in eap_peap_parse_phase1()
123 wpa_printf(MSG_DEBUG, "EAP-PEAP: SoH version 1 enabled"); in eap_peap_parse_phase1()
[all …]
Deap_fast.c80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb()
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " in eap_fast_session_ticket_cb()
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " in eap_fast_session_ticket_cb()
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb()
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " in eap_fast_session_ticket_cb()
193 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " in eap_fast_init()
280 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive " in eap_fast_derive_key_auth()
289 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_auth()
307 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block"); in eap_fast_derive_key_provisioning()
314 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_provisioning()
[all …]
Dmschapv2.c45 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", in mschapv2_derive_response()
49 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", in mschapv2_derive_response()
52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response()
56 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", in mschapv2_derive_response()
61 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response()
72 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response()
86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response()
88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key", in mschapv2_derive_response()
Deap_mschapv2.c145 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generate Challenge Response\n"); in eap_mschapv2_challenge_reply()
177 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " in eap_mschapv2_challenge_reply()
187 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply()
206 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " in eap_mschapv2_challenge_reply()
235 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge()
261 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge()
268 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", in eap_mschapv2_challenge()
322 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); in eap_mschapv2_success()
339 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", in eap_mschapv2_success()
348 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate " in eap_mschapv2_success()
[all …]
/hal_espressif-3.6.0/components/wpa_supplicant/src/common/
Dwnm_sta.c47 wpa_printf(MSG_DEBUG, "WNM: Too short TSF"); in wnm_parse_neighbor_report_elem()
56 wpa_printf(MSG_DEBUG, "WNM: Too short condensed " in wnm_parse_neighbor_report_elem()
65 wpa_printf(MSG_DEBUG, "WNM: Too short BSS transition " in wnm_parse_neighbor_report_elem()
74 wpa_printf(MSG_DEBUG, in wnm_parse_neighbor_report_elem()
84 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor " in wnm_parse_neighbor_report_elem()
95 wpa_printf(MSG_DEBUG, "WNM: Too short measurement " in wnm_parse_neighbor_report_elem()
109 wpa_printf(MSG_DEBUG, "WNM: Too short RRM enabled " in wnm_parse_neighbor_report_elem()
118 wpa_printf(MSG_DEBUG, "WNM: Too short multiple BSSID"); in wnm_parse_neighbor_report_elem()
139 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor report"); in wnm_parse_neighbor_report()
157 wpa_printf(MSG_DEBUG, "WNM: Subelement id=%u len=%u", id, elen); in wnm_parse_neighbor_report()
[all …]
Ddpp.c93 wpa_printf(MSG_DEBUG, "%s (%s,%s)", title, x, y); in dpp_debug_print_point()
332 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
337 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
347 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
424 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
428 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
432 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
449 wpa_printf(MSG_DEBUG, "DPP: Invalid URI channel-list"); in dpp_parse_uri_chan_list()
462 wpa_printf(MSG_DEBUG, "DPP: Invalid URI mac"); in dpp_parse_uri_mac()
466 wpa_printf(MSG_DEBUG, "DPP: URI mac: " MACSTR, MAC2STR(bi->mac_addr)); in dpp_parse_uri_mac()
[all …]
Dsae.c33 wpa_printf(MSG_DEBUG, "SAE: Selecting supported ECC group %d", in sae_set_group()
45 wpa_printf(MSG_DEBUG, "SAE: Selecting supported FFC group %d", in sae_set_group()
77 wpa_printf(MSG_DEBUG, in sae_set_group()
165 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR in sae_pwd_seed_key()
276 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ecc()
285 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", in sae_test_pwd_seed_ecc()
320 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ffc()
327 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, in sae_test_pwd_seed_ffc()
332 wpa_printf(MSG_DEBUG, "SAE: pwd-value >= p"); in sae_test_pwd_seed_ffc()
368 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE"); in sae_test_pwd_seed_ffc()
[all …]
Drrm.c34 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report - NONE"); in wpas_rrm_neighbor_rep_timeout_handler()
69 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len); in wpas_rrm_process_neighbor_rep()
74 wpa_printf(MSG_DEBUG, in wpas_rrm_process_neighbor_rep()
88 wpa_printf(MSG_DEBUG, "RRM: Notifying neighbor report (token = %d)", in wpas_rrm_process_neighbor_rep()
154 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request()
165 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request()
170 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request()
254 wpa_dbg(wpa_s, MSG_DEBUG, in wpas_rrm_send_neighbor_rep_request()
428 wpa_printf(MSG_DEBUG, in wpas_beacon_rep_add_frame_body()
632 wpa_hexdump_buf(MSG_DEBUG, "RRM: Radio Measurement report", *buf); in wpas_beacon_rep_table()
[all …]
/hal_espressif-3.6.0/components/wpa_supplicant/src/rsn_supp/
Dwpa.c243 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " in wpa_eapol_key_send()
249 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR in wpa_eapol_key_send()
265 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send()
266 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt)); in wpa_eapol_key_send()
303 wpa_printf(MSG_DEBUG, "Failed to read BSSID for EAPOL-Key " in wpa_sm_key_request()
344 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key Request (error=%d " in wpa_sm_key_request()
358 wpa_printf( MSG_DEBUG, "RSN: PMKSA cache entry free_cb: " in wpa_sm_pmksa_free_cb()
362 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb()
380 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb()
410 wpa_printf(MSG_DEBUG, in wpa_supplicant_get_pmk()
[all …]
/hal_espressif-3.6.0/components/wpa_supplicant/esp_supplicant/src/
Desp_wps.c157 wpa_printf(MSG_DEBUG, "wps_Task enter"); in wps_task()
171 wpa_printf(MSG_DEBUG, "wpsT: rx sig=%d", e->sig); in wps_task()
234 wpa_printf(MSG_DEBUG, "wpsT: delete task"); in wps_task()
247 wpa_printf(MSG_DEBUG, "wps post: sig=%d cnt=%d", sig, s_wps_sig_cnt[sig]); in wps_post()
251 wpa_printf(MSG_DEBUG, "wps post: sig=%d processing", sig); in wps_post()
402 wpa_hexdump_key(MSG_DEBUG, "WPS: AP PIN dev_password", in wps_init()
408 wpa_printf(MSG_DEBUG, "WPS PIN [%s]", tmpp); in wps_init()
472 wpa_printf(MSG_DEBUG, "WPS: Full PIN information revealed and " in wps_deinit()
475 wpa_printf(MSG_DEBUG, "WPS: register information revealed and " in wps_deinit()
506 wpa_printf(MSG_DEBUG, "wps build: wps pr"); in wps_build_ic_appie_wps_pr()
[all …]

123