/hal_espressif-3.6.0/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wpa3.c | 52 wpa_printf(MSG_ERROR, "wpa3: could not set SAE group %d", default_group); in wpa3_build_sae_commit() 58 wpa_printf(MSG_ERROR, "wpa3: cannot prepare SAE commit with no BSSID!"); in wpa3_build_sae_commit() 64 wpa_printf(MSG_ERROR, "wpa3: failed to prepare SAE commit!"); in wpa3_build_sae_commit() 72 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for commit msg"); in wpa3_build_sae_commit() 77 wpa_printf(MSG_ERROR, "wpa3: failed to write SAE commit msg"); in wpa3_build_sae_commit() 104 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for confirm msg"); in wpa3_build_sae_confirm() 109 wpa_printf(MSG_ERROR, "wpa3: failed to write SAE confirm msg"); in wpa3_build_sae_confirm() 162 wpa_printf(MSG_ERROR, "wpa3: failed to parse SAE commit in state(%d)!", in wpa3_parse_sae_commit() 176 wpa_printf(MSG_ERROR, "wpa3: could not parse commit(%d)", ret); in wpa3_parse_sae_commit() 182 wpa_printf(MSG_ERROR, "wpa3: could not process commit(%d)", ret); in wpa3_parse_sae_commit() [all …]
|
D | esp_common.c | 36 wpa_printf(MSG_ERROR, "memory allocation failed"); in handle_action_frm() 157 wpa_printf(MSG_ERROR, "failed to allocate memory"); in clear_bssid_flag() 194 wpa_printf(MSG_ERROR, "Not able to get connected bssid"); in supplicant_sta_conn_handler() 268 wpa_printf(MSG_ERROR, "btm: failed to create task"); in esp_supplicant_common_init() 275 wpa_printf(MSG_ERROR, "%s: failed to create Supplicant API lock", __func__); in esp_supplicant_common_init() 308 wpa_printf(MSG_ERROR, "failed to send task delete event"); in esp_supplicant_common_deinit() 354 wpa_printf(MSG_ERROR, "failed to allocate memory"); in wpa_supplicant_connect() 482 wpa_printf(MSG_ERROR, "failed to allocate ie"); in esp_set_scan_ie() 508 wpa_printf(MSG_ERROR, "failed to allocate ie"); in esp_set_assoc_ie() 539 wpa_printf(MSG_ERROR, "failed to get tx power"); in esp_get_tx_power() [all …]
|
D | esp_wpa2.c | 111 wpa_printf(MSG_ERROR, "WPA2: should never call task delete api in wpa2 task context"); in wpa2_task_delete() 118 wpa_printf(MSG_ERROR, "WPA2: failed to post task delete event, ret=%d", ret); in wpa2_task_delete() 189 …wpa_printf(MSG_ERROR, "wpa2_task: invalid sig cnt, sig=%d cnt=%d", e->sig, sm->wpa2_sig_cnt[e->sig… in wpa2_task() 246 wpa_printf(MSG_ERROR, "WPA2: E N M\n"); in wpa2_post() 255 wpa_printf(MSG_ERROR, "WPA2: Q S E"); in wpa2_post() 279 wpa_printf(MSG_ERROR, "wpa2: invalid data"); in wpa2_sm_ether_send() 431 wpa_printf(MSG_ERROR, "Method private structure allocated failure\n"); in eap_sm_process_request() 458 wpa_printf(MSG_ERROR, "Response build fail, return."); in eap_sm_process_request() 532 wpa_printf(MSG_ERROR, "Unknown EAPOL packet type - %d\n", hdr->type); in wpa2_ent_rx_eapol() 675 wpa_printf(MSG_ERROR, "bssid is empty!"); in wpa2_start_eapol_internal() [all …]
|
D | esp_wps.c | 30 wpa_printf(MSG_ERROR, "wps api lock create failed");\ 166 … wpa_printf(MSG_ERROR, "wpsT: invalid sig cnt, sig=%d cnt=%d", e->sig, s_wps_sig_cnt[e->sig]); in wps_task() 179 wpa_printf(MSG_ERROR, "wpsT: invalid param sig=%d", e->sig); in wps_task() 228 wpa_printf(MSG_ERROR, "wpsT: invalid sig=%d", e->sig); in wps_task() 258 wpa_printf(MSG_ERROR, "WPS: E N M"); in wps_post() 269 wpa_printf(MSG_ERROR, "WPS: Q S E"); in wps_post() 657 wpa_printf(MSG_ERROR, "bssid is empty!"); in wps_send_eap_identity_rsp() 700 wpa_printf(MSG_ERROR, "bssid is empty!"); in wps_send_frag_ack() 743 … wpa_printf(MSG_ERROR, "fun:%s. line:%d, frag buf or frag data is null", __FUNCTION__, __LINE__); in wps_enrollee_process_msg_frag() 749 wpa_printf(MSG_ERROR, "fun:%s. line:%d, flag error:%02x", __FUNCTION__, __LINE__, flag); in wps_enrollee_process_msg_frag() [all …]
|
D | esp_scan.c | 110 wpa_printf(MSG_ERROR, "beacon/probe is having short len=%d\n", len); in esp_handle_beacon_probe() 116 wpa_printf(MSG_ERROR, "failed to allocate memory"); in esp_handle_beacon_probe() 177 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan() 183 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan() 199 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan()
|
D | esp_dpp.c | 80 wpa_printf(MSG_ERROR, "DPP: Failed to perfrm offchannel operation"); in esp_send_action_frame() 243 wpa_printf(MSG_ERROR, "DPP: Unsupported crypto suit"); in esp_dpp_rx_auth() 406 wpa_printf(MSG_ERROR, "Failed to allocate memory for Rx Action"); in esp_supp_rx_action() 413 wpa_printf(MSG_ERROR, "Failed to allocate memory for Rx Action"); in esp_supp_rx_action() 422 wpa_printf(MSG_ERROR, "Failed to post event to DPP Task(status=%d)", ret); in esp_supp_rx_action() 512 wpa_printf(MSG_ERROR, "Invalid Channel list - %s", chan_list); in esp_supp_dpp_bootstrap_gen() 592 wpa_printf(MSG_ERROR, "DPP: ROC not possible before wifi is started"); in esp_supp_dpp_start_listen() 621 wpa_printf(MSG_ERROR, "DPP: failed to create task"); in esp_supp_dpp_init() 628 wpa_printf(MSG_ERROR, "DPP: dpp_init: failed to create DPP API lock"); in esp_supp_dpp_init()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/crypto/ |
D | crypto_mbedtls-rsa.c | 45 wpa_printf(MSG_ERROR, "%s", dump_buffer); in crypto_dump_verify_info() 61 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_verify_cert() 68 wpa_printf(MSG_ERROR, "peer cert parsing failed"); in crypto_verify_cert() 73 wpa_printf(MSG_ERROR, "CA cert parsing failed"); in crypto_verify_cert() 105 wpa_printf(MSG_ERROR, "failed to parse public key"); in crypto_public_key_import() 127 wpa_printf(MSG_ERROR, "failed to parse private key"); in crypto_private_key_import() 143 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 149 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 156 wpa_printf(MSG_ERROR, "cert parsing failed"); in crypto_public_key_from_cert() 163 wpa_printf(MSG_ERROR, "key setup failed"); in crypto_public_key_from_cert() [all …]
|
D | tls_mbedtls.c | 138 wpa_printf(MSG_ERROR, "%s: config not correct", __func__); in set_pki_context() 148 wpa_printf(MSG_ERROR, "mbedtls_x509_crt_parse returned -0x%x", -ret); in set_pki_context() 156 wpa_printf(MSG_ERROR, "mbedtls_pk_parse_keyfile returned -0x%x", -ret); in set_pki_context() 162 wpa_printf(MSG_ERROR, "mbedtls_ssl_conf_own_cert returned -0x%x", -ret); in set_pki_context() 175 wpa_printf(MSG_ERROR, "mbedtls_x509_crt_parse returned -0x%x", -ret); in set_ca_cert() 479 wpa_printf(MSG_ERROR, "mbedtls_ssl_config_defaults returned -0x%x", -ret); in set_client_config() 505 wpa_printf(MSG_ERROR, "Failed to set client pki context"); in set_client_config() 533 wpa_printf(MSG_ERROR, "Failed to set client configurations"); in tls_create_mbedtls_handle() 540 wpa_printf(MSG_ERROR, "mbedtls_ctr_drbg_seed returned -0x%x", -ret); in tls_create_mbedtls_handle() 548 wpa_printf(MSG_ERROR, "mbedtls_ssl_setup returned -0x%x", -ret); in tls_create_mbedtls_handle() [all …]
|
D | crypto_mbedtls-ec.c | 205 wpa_printf(MSG_ERROR, "Z coordinate is neither 0 or 1"); in crypto_ec_get_affine_coordinates() 502 wpa_printf(MSG_ERROR, "error: failed to get corrdinates\n"); in crypto_debug_print_point() 506 wpa_hexdump(MSG_ERROR, "x:", x, 32); in crypto_debug_print_point() 507 wpa_hexdump(MSG_ERROR, "y:", y, 32); in crypto_debug_print_point() 515 wpa_printf(MSG_ERROR, "%s: memory allocation failed\n", __func__); in crypto_alloc_key() 533 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_ec_set_pubkey_point() 539 wpa_printf(MSG_ERROR, "%s: Point initialization failed", __func__); in crypto_ec_set_pubkey_point() 543 wpa_printf(MSG_ERROR, "Point is at infinity"); in crypto_ec_set_pubkey_point() 547 wpa_printf(MSG_ERROR, "Point not on curve"); in crypto_ec_set_pubkey_point() 553 wpa_printf(MSG_ERROR, "Invalid key"); in crypto_ec_set_pubkey_point() [all …]
|
D | crypto_mbedtls.c | 52 wpa_printf(MSG_ERROR, "mbedtls_md_info_from_type() failed"); in digest_vector() 58 wpa_printf(MSG_ERROR, "mbedtls_md_setup() returned error"); in digest_vector() 64 wpa_printf(MSG_ERROR, "mbedtls_md_starts returned error"); in digest_vector() 71 wpa_printf(MSG_ERROR, "mbedtls_md_update ret=%d", ret); in digest_vector() 291 wpa_printf(MSG_ERROR, "%s: mbedtls_aes_setkey_enc/mbedtls_aes_setkey_dec failed", __func__); in aes_crypt_init() 405 wpa_printf(MSG_ERROR, "mbedtls_cipher_setkey returned error"); in crypto_init_cipher_ctx() 409 wpa_printf(MSG_ERROR, "mbedtls_cipher_set_iv returned error"); in crypto_init_cipher_ctx() 413 wpa_printf(MSG_ERROR, "mbedtls_cipher_reset() returned error"); in crypto_init_cipher_ctx() 720 wpa_printf(MSG_ERROR, "mbedtls_ccm_setkey failed"); in aes_ccm_ae() 771 wpa_printf(MSG_ERROR, "%s:memory allocation failed", __func__); in rc4_skip() [all …]
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/eap_peer/ |
D | eap_ttls.c | 109 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to initialize SSL.\n"); in eap_ttls_init() 214 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive key\n"); in eap_ttls_v0_derive_key() 232 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id\n"); in eap_ttls_v0_derive_key() 417 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPV2 not supported in FIPS build"); in eap_ttls_phase2_request_mschapv2() 436 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to allocate memory\n"); in eap_ttls_phase2_request_mschapv2() 450 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " in eap_ttls_phase2_request_mschapv2() 469 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to get " in eap_ttls_phase2_request_mschapv2() 483 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " in eap_ttls_phase2_request_mschapv2() 509 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPv2 not included in the build\n"); in eap_ttls_phase2_request_mschapv2() 522 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAP not supported in FIPS build"); in eap_ttls_phase2_request_mschap() [all …]
|
D | eap.c | 277 wpa_printf(MSG_ERROR, "EAP: buildIdentity: configuration " in eap_sm_buildIdentity() 300 wpa_printf(MSG_ERROR, "EAP: buildIdentity: identity " in eap_sm_buildIdentity() 337 wpa_printf(MSG_ERROR, "EAP: Build Identity Resp-> configuration was not available\n"); in eap_sm_build_identity_resp() 354 wpa_printf(MSG_ERROR, "EAP: Build Identity Resp-> identity was not available\n"); in eap_sm_build_identity_resp() 808 wpa_printf(MSG_ERROR, "EAP: Set config blob: Unable to modify the configuration blob"); in eap_set_config_blob()
|
D | eap_mschapv2.c | 195 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to derive " in eap_mschapv2_challenge_reply() 676 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: idetity not configured\n"); in eap_mschapv2_check_config() 682 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Password not configured\n"); in eap_mschapv2_check_config() 709 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Invalid header len=%lu ms_len=%lu\n", in eap_mschapv2_check_mslen() 791 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Unknown op code %d - ignored\n", in eap_mschapv2_process()
|
D | eap_peap.c | 732 wpa_printf(MSG_ERROR, "EAP-PEAP: failed to initialize " in eap_peap_phase2_request() 753 wpa_printf(MSG_ERROR, "phase 2 response failure\n"); in eap_peap_phase2_request() 931 wpa_printf(MSG_ERROR, "EAP-PEAP: Phase2 Request " in eap_peap_decrypt() 1146 wpa_printf(MSG_ERROR, "EAP-PEAP: Failed to " in eap_peap_process()
|
D | eap_tls.c | 140 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to derive Session-Id"); in eap_tls_success()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/utils/ |
D | wpabuf.c | 42 wpa_printf( MSG_ERROR, "wpabuf: invalid magic %x", in wpabuf_overflow() 46 wpa_printf( MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu", in wpabuf_overflow() 67 wpa_printf( MSG_ERROR, "wpabuf: invalid magic %x", in wpabuf_resize() 193 wpa_printf( MSG_ERROR, "wpabuf_free: invalid magic %x", in wpabuf_free()
|
D | ext_password.c | 92 wpa_printf(MSG_ERROR, "EXT PW: mlock failed: %s", in ext_password_alloc() 108 wpa_printf(MSG_ERROR, "EXT PW: munlock failed: %s", in ext_password_free()
|
D | wpa_debug.c | 94 if (level < MSG_ERROR) in wpa_hexdump()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/common/ |
D | scan.c | 42 wpa_printf(MSG_ERROR, "Memory allocation failed"); in wpa_supplicant_req_scan() 65 wpa_printf(MSG_ERROR, "Failed to issue scan - Return"); in wpa_supplicant_req_scan()
|
D | rrm.c | 29 wpa_printf(MSG_ERROR, in wpas_rrm_neighbor_rep_timeout_handler() 145 wpa_printf(MSG_ERROR, in wpas_rrm_send_neighbor_rep_request() 305 wpa_printf(MSG_ERROR, in wpas_rrm_send_msr_report_mpdu() 329 wpa_printf(MSG_ERROR, in wpas_rrm_beacon_rep_update_last_frame() 644 wpa_printf(MSG_ERROR, "RRM: Memory allocation failed"); in wpas_rrm_refuse_request() 1065 wpa_printf(MSG_ERROR, in wpas_rrm_handle_link_measurement_request() 1077 wpa_printf(MSG_ERROR, in wpas_rrm_handle_link_measurement_request() 1132 wpa_printf(MSG_ERROR, in wpas_beacon_rep_scan_process()
|
D | sae.c | 875 wpa_printf(MSG_ERROR, "SAE: failed bignum operation on own commit scalar"); in sae_write_commit() 885 wpa_printf(MSG_ERROR, "SAE: failed bignum op while deriving ec point"); in sae_write_commit() 896 wpa_printf(MSG_ERROR, "SAE: failed bignum operation on commit elem ffc"); in sae_write_commit() 1314 wpa_printf(MSG_ERROR, "SAE: failed bignum op while deriving ec point"); in sae_cn_confirm_ecc() 1319 wpa_printf(MSG_ERROR, "SAE: failed bignum op while deriving ec point"); in sae_cn_confirm_ecc() 1340 wpa_printf(MSG_ERROR, "SAE: failed bignum op while generating SAE confirm - e1"); in sae_cn_confirm_ffc() 1345 wpa_printf(MSG_ERROR, "SAE: failed bignum op while generating SAE confirm - e2"); in sae_cn_confirm_ffc() 1373 wpa_printf(MSG_ERROR, "SAE: failed generate SAE confirm (ecc)"); in sae_write_confirm() 1382 wpa_printf(MSG_ERROR, "SAE: failed generate SAE confirm (ffc)"); in sae_write_confirm() 1411 wpa_printf(MSG_ERROR, "SAE: failed to check SAE confirm (ecc)"); in sae_check_confirm() [all …]
|
D | mbo.c | 265 wpa_printf(MSG_ERROR, "Failed to add MBO/OCE IE"); in wpas_mbo_ie() 389 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan() 403 wpa_printf(MSG_ERROR, "Invalid non-pref chan input %s", in wpas_mbo_update_non_pref_chan() 414 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan() 424 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan()
|
/hal_espressif-3.6.0/components/wpa_supplicant/include/utils/ |
D | wpa_debug.h | 26 #define MSG_ERROR ESP_LOG_ERROR macro 34 enum { MSG_MSGDUMP, MSG_DEBUG, MSG_INFO, MSG_WARNING, MSG_ERROR }; enumerator
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/wps/ |
D | wps_common.c | 360 wpa_printf(MSG_ERROR, "WPS: Failed to allocate memory for OOB " in wps_get_oob_cred() 397 wpa_printf(MSG_ERROR, "WPS: Failed to build NFC password " in wps_build_nfc_pw_token() 421 wpa_printf(MSG_ERROR, "WPS: Failed to parse OOB " in wps_oob_use_cred()
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/ap/ |
D | wpa_auth.c | 288 wpa_printf( MSG_ERROR, "Failed to get random data for WPA " in wpa_group_init() 328 wpa_printf( MSG_ERROR, "Could not generate WPA IE."); in wpa_init() 343 wpa_printf( MSG_ERROR, "FT PMK cache initialization failed."); in wpa_init() 1391 wpa_printf( MSG_ERROR, "WPA: Failed to get random data for " in SM_STATE() 1755 wpa_printf( MSG_ERROR, "FT: Failed to insert " in SM_STATE() 1783 wpa_printf( MSG_ERROR, "FT: Failed to insert FTIE " in SM_STATE() 2357 wpa_printf( MSG_ERROR, "WPA: wpa_sm_step() called recursively"); in wpa_sm_step()
|