/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_attr_parse.c | 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem() 72 wpa_printf(MSG_DEBUG, in wps_set_vendor_ext_wfa_subelem() 78 wpa_printf(MSG_DEBUG, "WPS: Multi-AP Extension 0x%02x", in wps_set_vendor_ext_wfa_subelem() 117 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() 133 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext() 139 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 46 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 62 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 69 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 76 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 88 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 93 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 103 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 112 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid() [all …]
|
D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key() 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key() 32 wpa_printf(MSG_DEBUG, in wps_build_public_key() 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key() 52 wpa_printf(MSG_DEBUG, in wps_build_public_key() 57 wpa_printf(MSG_DEBUG, in wps_build_public_key() 67 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key() 73 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key() 78 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key() 79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key() [all …]
|
D | wps_enrollee.c | 28 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 45 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash() 46 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash() 50 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 55 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 69 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash() 71 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash() 87 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 97 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() [all …]
|
D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer() 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name() 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number() 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number() 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type() 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type() 145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type() 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name() 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version() 208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1() [all …]
|
D | wps_registrar.c | 237 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac() 241 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac() 249 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac() 258 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac() 265 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac() 274 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac() 415 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session() 417 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session() 438 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap() 441 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap() [all …]
|
D | wps_common.c | 71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); in wps_derive_keys() 77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); in wps_derive_keys() 81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_derive_keys() 82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys() 88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); in wps_derive_keys() 102 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); in wps_derive_keys() 108 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); in wps_derive_keys() 119 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); in wps_derive_keys() 128 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", in wps_derive_keys() 130 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey", in wps_derive_keys() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft() 35 wpa_hexdump_key(MSG_DEBUG, "FT: xxkey", sm->xxkey, sm->xxkey_len); in wpa_derive_ptk_ft() 36 wpa_hexdump_key(MSG_DEBUG, "FT: ssid", sm->ssid, sm->ssid_len); in wpa_derive_ptk_ft() 37 wpa_hexdump_key(MSG_DEBUG, "FT: r0kh_id", sm->r0kh_id, sm->r0kh_id_len); in wpa_derive_ptk_ft() 42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft() 43 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft() 47 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft() 48 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft() 88 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params() 92 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params() [all …]
|
D | wpa.c | 245 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " in wpa_eapol_key_send() 249 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR in wpa_eapol_key_send() 262 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send() 263 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt, sm->pmk_len)); in wpa_eapol_key_send() 300 wpa_printf(MSG_DEBUG, "Failed to read BSSID for EAPOL-Key " in wpa_sm_key_request() 343 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key Request (error=%d " in wpa_sm_key_request() 357 wpa_printf( MSG_DEBUG, "RSN: PMKSA cache entry free_cb: " in wpa_sm_pmksa_free_cb() 361 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 379 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 408 wpa_printf(MSG_DEBUG, in wpa_supplicant_get_pmk() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload() 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload() 75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret() 77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret() 91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret() 124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk() 142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk() 156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv() [all …]
|
D | mschapv2.c | 45 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", in mschapv2_derive_response() 49 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", in mschapv2_derive_response() 52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response() 54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response() 56 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", in mschapv2_derive_response() 61 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response() 72 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response() 86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response() 88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response() 102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key", in mschapv2_derive_response()
|
D | eap_peap.c | 83 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", in eap_peap_parse_phase1() 89 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " in eap_peap_parse_phase1() 95 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " in eap_peap_parse_phase1() 99 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " in eap_peap_parse_phase1() 103 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " in eap_peap_parse_phase1() 109 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); in eap_peap_parse_phase1() 112 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); in eap_peap_parse_phase1() 115 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); in eap_peap_parse_phase1() 120 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1() 124 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1() [all …]
|
D | eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb() 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " in eap_fast_session_ticket_cb() 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " in eap_fast_session_ticket_cb() 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb() 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " in eap_fast_session_ticket_cb() 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " in eap_fast_init() 280 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive " in eap_fast_derive_key_auth() 289 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_auth() 307 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block"); in eap_fast_derive_key_provisioning() 314 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_provisioning() [all …]
|
D | eap_mschapv2.c | 143 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generate Challenge Response"); in eap_mschapv2_challenge_reply() 175 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " in eap_mschapv2_challenge_reply() 185 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply() 204 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " in eap_mschapv2_challenge_reply() 233 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge() 259 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge() 266 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", in eap_mschapv2_challenge() 320 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); in eap_mschapv2_success() 337 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", in eap_mschapv2_success() 346 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate " in eap_mschapv2_success() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_client_read.c | 59 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions() 71 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions() 90 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 105 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 111 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 132 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 140 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 161 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 190 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello() 199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello() [all …]
|
D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite() 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher() 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher() 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher() 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher() 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send() 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send() 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive() [all …]
|
D | tlsv1_client_ocsp.c | 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 169 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash", in tls_process_ocsp_single_response() 173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", in tls_process_ocsp_single_response() 179 wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch"); in tls_process_ocsp_single_response() 180 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash", in tls_process_ocsp_single_response() 194 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len); in tls_process_ocsp_single_response() 201 wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch"); in tls_process_ocsp_single_response() 202 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash", in tls_process_ocsp_single_response() 227 wpa_printf(MSG_DEBUG, "OCSP: serialNumber mismatch"); in tls_process_ocsp_single_response() 247 wpa_printf(MSG_DEBUG, "OCSP: certStatus=%u", cert_status); in tls_process_ocsp_single_response() [all …]
|
D | tlsv1_client_write.c | 58 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)", in tls_send_client_hello() 161 wpa_printf(MSG_DEBUG, in tls_send_client_hello() 197 wpa_printf(MSG_DEBUG, in tls_send_client_hello() 249 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_send_client_hello() 276 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_client_certificate() 296 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_client_certificate() 321 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " in tls_write_client_certificate() 331 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_client_certificate() 355 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_dh() 362 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " in tlsv1_key_x_dh() [all …]
|
D | pkcs5.c | 129 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2() 135 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 keyDerivationFunc algorithm %s", in pkcs5_get_params_pbes2() 138 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 194 wpa_hexdump(MSG_DEBUG, in pkcs5_get_params_pbes2() 199 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", in pkcs5_get_params_pbes2() 224 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2() 230 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 encryptionScheme algorithm %s", in pkcs5_get_params_pbes2() 235 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2() 255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2() [all …]
|
D | x509v3.c | 50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free() 260 wpa_printf(MSG_DEBUG, in x509_parse_public_key() 273 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key() 349 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name() 356 wpa_printf(MSG_DEBUG, in x509_parse_name() 425 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID", in x509_parse_name() 594 wpa_hexdump_ascii(MSG_DEBUG, "X509: Unrecognized " in x509_parse_time() 600 wpa_hexdump_ascii(MSG_DEBUG, "X509: Failed to parse " in x509_parse_time() 612 wpa_hexdump_ascii(MSG_DEBUG, "X509: Unrecognized " in x509_parse_time() 618 wpa_hexdump_ascii(MSG_DEBUG, "X509: Failed to parse " in x509_parse_time() [all …]
|
D | tlsv1_cred.c | 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); in tlsv1_add_cert_der() 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " in tlsv1_add_cert() 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " in tlsv1_add_cert() 201 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 208 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 214 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 221 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 229 wpa_printf(MSG_DEBUG, "TLSv1: Only probe server certificate"); in tlsv1_set_ca_cert() 290 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key " in tlsv1_set_key_pem() 434 wpa_printf(MSG_DEBUG, in pkcs12_pkcs8_keybag() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wnm_sta.c | 47 wpa_printf(MSG_DEBUG, "WNM: Too short TSF"); in wnm_parse_neighbor_report_elem() 56 wpa_printf(MSG_DEBUG, "WNM: Too short condensed " in wnm_parse_neighbor_report_elem() 65 wpa_printf(MSG_DEBUG, "WNM: Too short BSS transition " in wnm_parse_neighbor_report_elem() 74 wpa_printf(MSG_DEBUG, in wnm_parse_neighbor_report_elem() 84 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor " in wnm_parse_neighbor_report_elem() 95 wpa_printf(MSG_DEBUG, "WNM: Too short measurement " in wnm_parse_neighbor_report_elem() 109 wpa_printf(MSG_DEBUG, "WNM: Too short RRM enabled " in wnm_parse_neighbor_report_elem() 118 wpa_printf(MSG_DEBUG, "WNM: Too short multiple BSSID"); in wnm_parse_neighbor_report_elem() 139 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor report"); in wnm_parse_neighbor_report() 157 wpa_printf(MSG_DEBUG, "WNM: Subelement id=%u len=%u", id, elen); in wnm_parse_neighbor_report() [all …]
|
D | dpp.c | 93 wpa_printf(MSG_DEBUG, "%s (%s,%s)", title, x, y); in dpp_debug_print_point() 332 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 337 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 347 wpa_printf(MSG_DEBUG, in dpp_check_attrs() 424 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 428 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 432 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list() 449 wpa_printf(MSG_DEBUG, "DPP: Invalid URI channel-list"); in dpp_parse_uri_chan_list() 462 wpa_printf(MSG_DEBUG, "DPP: Invalid URI mac"); in dpp_parse_uri_mac() 466 wpa_printf(MSG_DEBUG, "DPP: URI mac: " MACSTR, MAC2STR(bi->mac_addr)); in dpp_parse_uri_mac() [all …]
|
D | sae.c | 36 wpa_printf(MSG_DEBUG, "SAE: Selecting supported ECC group %d", in sae_set_group() 49 wpa_printf(MSG_DEBUG, "SAE: Selecting supported FFC group %d", in sae_set_group() 79 wpa_printf(MSG_DEBUG, in sae_set_group() 123 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR in sae_pwd_seed_key() 195 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ffc() 202 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, in sae_test_pwd_seed_ffc() 319 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password", in sae_derive_pwe_ecc() 347 wpa_printf(MSG_DEBUG, "SAE: Failed to derive PWE"); in sae_derive_pwe_ecc() 383 wpa_printf(MSG_DEBUG, "SAE: Could not generate PWE"); in sae_derive_pwe_ecc() 409 wpa_printf(MSG_DEBUG, "SAE: Could not solve y"); in sae_derive_pwe_ecc() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap_server_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", in eap_wsc_state() 129 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); in eap_wsc_build_start() 174 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg() 182 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg() 205 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " in eap_wsc_buildReq() 217 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " in eap_wsc_buildReq() 246 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " in eap_wsc_process_cont() 254 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow"); in eap_wsc_process_cont() 260 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting for %lu " in eap_wsc_process_cont() 274 wpa_printf(MSG_DEBUG, "EAP-WSC: No Message Length " in eap_wsc_process_fragment() [all …]
|