Home
last modified time | relevance | path

Searched refs:MSG_DEBUG (Results 1 – 25 of 84) sorted by relevance

1234

/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_attr_parse.c28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem()
40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem()
48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem()
56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem()
64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem()
72 wpa_printf(MSG_DEBUG, in wps_set_vendor_ext_wfa_subelem()
78 wpa_printf(MSG_DEBUG, "WPS: Multi-AP Extension 0x%02x", in wps_set_vendor_ext_wfa_subelem()
117 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext()
133 wpa_printf(MSG_DEBUG, "WPS: Too long Vendor Extension (%u)", in wps_parse_vendor_ext()
139 wpa_printf(MSG_DEBUG, "WPS: Skipped Vendor Extension " in wps_parse_vendor_ext()
[all …]
Dwps_attr_process.c24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator()
30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator()
46 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator()
62 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth()
69 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth()
76 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth()
88 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx()
93 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx()
103 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid()
112 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", ssid, ssid_len); in wps_process_cred_ssid()
[all …]
Dwps_attr_build.c25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key()
30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key()
32 wpa_printf(MSG_DEBUG, in wps_build_public_key()
50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key()
52 wpa_printf(MSG_DEBUG, in wps_build_public_key()
57 wpa_printf(MSG_DEBUG, in wps_build_public_key()
67 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key()
73 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key()
78 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_build_public_key()
79 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey); in wps_build_public_key()
[all …]
Dwps_enrollee.c28 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state()
45 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); in wps_build_e_hash()
46 wpa_hexdump(MSG_DEBUG, "WPS: E-S2", in wps_build_e_hash()
50 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash()
55 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash()
69 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash1", hash, SHA256_MAC_LEN); in wps_build_e_hash()
71 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash()
79 wpa_hexdump(MSG_DEBUG, "WPS: E-Hash2", hash, SHA256_MAC_LEN); in wps_build_e_hash()
87 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1()
97 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2()
[all …]
Dwps_dev_attr.c19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer()
43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name()
67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number()
91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number()
114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type()
128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type()
145 wpa_hexdump(MSG_DEBUG, "WPS: * Requested Device Type", in wps_build_req_dev_type()
161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name()
197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version()
208 wpa_hexdump(MSG_DEBUG, "WPS: * Vendor Extension M1", in wps_build_vendor_ext_m1()
[all …]
Dwps_registrar.c237 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac()
241 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac()
249 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_add_authorized_mac()
258 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac()
265 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac()
274 wpa_hexdump(MSG_DEBUG, "WPS: Authorized MACs", in wps_registrar_remove_authorized_mac()
415 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session()
417 wpa_hexdump(MSG_DEBUG, "WPS: Removed UUID-E", in wps_registrar_remove_pbc_session()
438 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap()
441 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap()
[all …]
Dwps_common.c71 wpa_printf(MSG_DEBUG, "WPS: Own DH private key not available"); in wps_derive_keys()
77 wpa_printf(MSG_DEBUG, "WPS: Peer DH public key not available"); in wps_derive_keys()
81 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey); in wps_derive_keys()
82 wpa_hexdump_buf(MSG_DEBUG, "WPS: DH peer Public Key", pubkey); in wps_derive_keys()
88 wpa_printf(MSG_DEBUG, "WPS: Failed to derive DH shared key"); in wps_derive_keys()
102 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH shared key", dh_shared); in wps_derive_keys()
108 wpa_hexdump_key(MSG_DEBUG, "WPS: DHKey", dhkey, sizeof(dhkey)); in wps_derive_keys()
119 wpa_hexdump_key(MSG_DEBUG, "WPS: KDK", kdk, sizeof(kdk)); in wps_derive_keys()
128 wpa_hexdump_key(MSG_DEBUG, "WPS: AuthKey", in wps_derive_keys()
130 wpa_hexdump_key(MSG_DEBUG, "WPS: KeyWrapKey", in wps_derive_keys()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/
Dwpa_ft.c30 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft()
35 wpa_hexdump_key(MSG_DEBUG, "FT: xxkey", sm->xxkey, sm->xxkey_len); in wpa_derive_ptk_ft()
36 wpa_hexdump_key(MSG_DEBUG, "FT: ssid", sm->ssid, sm->ssid_len); in wpa_derive_ptk_ft()
37 wpa_hexdump_key(MSG_DEBUG, "FT: r0kh_id", sm->r0kh_id, sm->r0kh_id_len); in wpa_derive_ptk_ft()
42 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R0", sm->pmk_r0, PMK_LEN); in wpa_derive_ptk_ft()
43 wpa_hexdump(MSG_DEBUG, "FT: PMKR0Name", in wpa_derive_ptk_ft()
47 wpa_hexdump_key(MSG_DEBUG, "FT: PMK-R1", sm->pmk_r1, PMK_LEN); in wpa_derive_ptk_ft()
48 wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", sm->pmk_r1_name, in wpa_derive_ptk_ft()
88 wpa_hexdump(MSG_DEBUG, "FT: Mobility domain", in wpa_sm_set_ft_params()
92 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params()
[all …]
Dwpa.c245 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " in wpa_eapol_key_send()
249 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR in wpa_eapol_key_send()
262 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", kck, kck_len); in wpa_eapol_key_send()
263 wpa_hexdump(MSG_DEBUG, "WPA: Derived Key MIC", key_mic, wpa_mic_len(sm->key_mgmt, sm->pmk_len)); in wpa_eapol_key_send()
300 wpa_printf(MSG_DEBUG, "Failed to read BSSID for EAPOL-Key " in wpa_sm_key_request()
343 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key Request (error=%d " in wpa_sm_key_request()
357 wpa_printf( MSG_DEBUG, "RSN: PMKSA cache entry free_cb: " in wpa_sm_pmksa_free_cb()
361 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb()
379 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb()
408 wpa_printf(MSG_DEBUG, in wpa_supplicant_get_pmk()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_fast_common.c52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload()
55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload()
75 wpa_hexdump(MSG_DEBUG, "EAP-FAST: client_random", in eap_fast_derive_master_secret()
77 wpa_hexdump(MSG_DEBUG, "EAP-FAST: server_random", in eap_fast_derive_master_secret()
91 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: master_secret", in eap_fast_derive_master_secret()
124 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (MSK)", in eap_fast_derive_eap_msk()
142 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Derived key (EMSK)", in eap_fast_derive_eap_emsk()
156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv()
173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv()
[all …]
Dmschapv2.c45 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", in mschapv2_derive_response()
49 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", in mschapv2_derive_response()
52 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", in mschapv2_derive_response()
54 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", in mschapv2_derive_response()
56 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", in mschapv2_derive_response()
61 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", in mschapv2_derive_response()
72 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", in mschapv2_derive_response()
86 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", in mschapv2_derive_response()
88 wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", in mschapv2_derive_response()
102 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key", in mschapv2_derive_response()
Deap_peap.c83 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", in eap_peap_parse_phase1()
89 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " in eap_peap_parse_phase1()
95 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " in eap_peap_parse_phase1()
99 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " in eap_peap_parse_phase1()
103 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " in eap_peap_parse_phase1()
109 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); in eap_peap_parse_phase1()
112 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); in eap_peap_parse_phase1()
115 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); in eap_peap_parse_phase1()
120 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1()
124 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1()
[all …]
Deap_fast.c80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb()
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " in eap_fast_session_ticket_cb()
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " in eap_fast_session_ticket_cb()
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); in eap_fast_session_ticket_cb()
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " in eap_fast_session_ticket_cb()
193 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " in eap_fast_init()
280 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive " in eap_fast_derive_key_auth()
289 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_auth()
307 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block"); in eap_fast_derive_key_provisioning()
314 wpa_hexdump_key(MSG_DEBUG, in eap_fast_derive_key_provisioning()
[all …]
Deap_mschapv2.c143 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Generate Challenge Response"); in eap_mschapv2_challenge_reply()
175 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: peer_challenge generated " in eap_mschapv2_challenge_reply()
185 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: auth_challenge generated " in eap_mschapv2_challenge_reply()
204 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: TX identifier %d mschapv2_id %d " in eap_mschapv2_challenge_reply()
233 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received challenge"); in eap_mschapv2_challenge()
259 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Using challenge from the " in eap_mschapv2_challenge()
266 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Authentication Servername", in eap_mschapv2_challenge()
320 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Received success"); in eap_mschapv2_success()
337 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Success message", in eap_mschapv2_success()
346 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Failed to allocate " in eap_mschapv2_success()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_client_read.c59 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions()
71 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerHello extension data", in tls_process_server_hello_extensions()
90 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello()
105 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello()
111 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello()
132 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello()
140 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello()
161 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello()
190 wpa_printf(MSG_DEBUG, "TLSv1: Server selected a different " in tls_process_server_hello()
199 wpa_printf(MSG_DEBUG, "TLSv1: Failed to set CipherSuite for " in tls_process_server_hello()
[all …]
Dtlsv1_record.c36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite()
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher()
91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher()
111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher()
125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher()
210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send()
220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send()
227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send()
241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send()
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive()
[all …]
Dtlsv1_client_ocsp.c104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data()
169 wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash", in tls_process_ocsp_single_response()
173 wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN", in tls_process_ocsp_single_response()
179 wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch"); in tls_process_ocsp_single_response()
180 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash", in tls_process_ocsp_single_response()
194 wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len); in tls_process_ocsp_single_response()
201 wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch"); in tls_process_ocsp_single_response()
202 wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash", in tls_process_ocsp_single_response()
227 wpa_printf(MSG_DEBUG, "OCSP: serialNumber mismatch"); in tls_process_ocsp_single_response()
247 wpa_printf(MSG_DEBUG, "OCSP: certStatus=%u", cert_status); in tls_process_ocsp_single_response()
[all …]
Dtlsv1_client_write.c58 wpa_printf(MSG_DEBUG, "TLSv1: Send ClientHello (ver %s)", in tls_send_client_hello()
161 wpa_printf(MSG_DEBUG, in tls_send_client_hello()
197 wpa_printf(MSG_DEBUG, in tls_send_client_hello()
249 wpa_printf(MSG_DEBUG, "TLSv1: Failed to create TLS record"); in tls_send_client_hello()
276 wpa_printf(MSG_DEBUG, "TLSv1: Send Certificate"); in tls_write_client_certificate()
296 wpa_printf(MSG_DEBUG, "TLSv1: Not enough buffer space " in tls_write_client_certificate()
321 wpa_printf(MSG_DEBUG, "TLSv1: Full client certificate chain " in tls_write_client_certificate()
331 wpa_printf(MSG_DEBUG, "TLSv1: Failed to generate a record"); in tls_write_client_certificate()
355 wpa_printf(MSG_DEBUG, "TLSv1: Failed to allocate " in tlsv1_key_x_dh()
362 wpa_printf(MSG_DEBUG, "TLSv1: Failed to get random " in tlsv1_key_x_dh()
[all …]
Dpkcs5.c129 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2()
135 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 keyDerivationFunc algorithm %s", in pkcs5_get_params_pbes2()
138 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2()
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
194 wpa_hexdump(MSG_DEBUG, in pkcs5_get_params_pbes2()
199 wpa_printf(MSG_DEBUG, "PKCS #5: iterationCount=0x%x", in pkcs5_get_params_pbes2()
224 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2()
230 wpa_printf(MSG_DEBUG, "PKCS #5: PBES2 encryptionScheme algorithm %s", in pkcs5_get_params_pbes2()
235 wpa_printf(MSG_DEBUG, in pkcs5_get_params_pbes2()
255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2()
[all …]
Dx509v3.c50 wpa_printf(MSG_DEBUG, "X509: x509_certificate_free: cer=%p " in x509_certificate_free()
260 wpa_printf(MSG_DEBUG, in x509_parse_public_key()
273 wpa_printf(MSG_DEBUG, "X509: Failed to allocate memory for " in x509_parse_public_key()
349 wpa_printf(MSG_DEBUG, "X509: Failed to parse " in x509_parse_name()
356 wpa_printf(MSG_DEBUG, in x509_parse_name()
425 wpa_hexdump(MSG_DEBUG, "X509: Unrecognized OID", in x509_parse_name()
594 wpa_hexdump_ascii(MSG_DEBUG, "X509: Unrecognized " in x509_parse_time()
600 wpa_hexdump_ascii(MSG_DEBUG, "X509: Failed to parse " in x509_parse_time()
612 wpa_hexdump_ascii(MSG_DEBUG, "X509: Unrecognized " in x509_parse_time()
618 wpa_hexdump_ascii(MSG_DEBUG, "X509: Failed to parse " in x509_parse_time()
[all …]
Dtlsv1_cred.c74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); in tlsv1_add_cert_der()
116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " in tlsv1_add_cert()
121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " in tlsv1_add_cert()
201 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert()
208 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert()
214 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert()
221 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert()
229 wpa_printf(MSG_DEBUG, "TLSv1: Only probe server certificate"); in tlsv1_set_ca_cert()
290 wpa_printf(MSG_DEBUG, "TLSv1: Unsupported private key " in tlsv1_set_key_pem()
434 wpa_printf(MSG_DEBUG, in pkcs12_pkcs8_keybag()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dwnm_sta.c47 wpa_printf(MSG_DEBUG, "WNM: Too short TSF"); in wnm_parse_neighbor_report_elem()
56 wpa_printf(MSG_DEBUG, "WNM: Too short condensed " in wnm_parse_neighbor_report_elem()
65 wpa_printf(MSG_DEBUG, "WNM: Too short BSS transition " in wnm_parse_neighbor_report_elem()
74 wpa_printf(MSG_DEBUG, in wnm_parse_neighbor_report_elem()
84 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor " in wnm_parse_neighbor_report_elem()
95 wpa_printf(MSG_DEBUG, "WNM: Too short measurement " in wnm_parse_neighbor_report_elem()
109 wpa_printf(MSG_DEBUG, "WNM: Too short RRM enabled " in wnm_parse_neighbor_report_elem()
118 wpa_printf(MSG_DEBUG, "WNM: Too short multiple BSSID"); in wnm_parse_neighbor_report_elem()
139 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor report"); in wnm_parse_neighbor_report()
157 wpa_printf(MSG_DEBUG, "WNM: Subelement id=%u len=%u", id, elen); in wnm_parse_neighbor_report()
[all …]
Ddpp.c93 wpa_printf(MSG_DEBUG, "%s (%s,%s)", title, x, y); in dpp_debug_print_point()
332 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
337 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
347 wpa_printf(MSG_DEBUG, in dpp_check_attrs()
424 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
428 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
432 wpa_printf(MSG_DEBUG, in dpp_parse_uri_chan_list()
449 wpa_printf(MSG_DEBUG, "DPP: Invalid URI channel-list"); in dpp_parse_uri_chan_list()
462 wpa_printf(MSG_DEBUG, "DPP: Invalid URI mac"); in dpp_parse_uri_mac()
466 wpa_printf(MSG_DEBUG, "DPP: URI mac: " MACSTR, MAC2STR(bi->mac_addr)); in dpp_parse_uri_mac()
[all …]
Dsae.c36 wpa_printf(MSG_DEBUG, "SAE: Selecting supported ECC group %d", in sae_set_group()
49 wpa_printf(MSG_DEBUG, "SAE: Selecting supported FFC group %d", in sae_set_group()
79 wpa_printf(MSG_DEBUG, in sae_set_group()
123 wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR in sae_pwd_seed_key()
195 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-seed", pwd_seed, SHA256_MAC_LEN); in sae_test_pwd_seed_ffc()
202 wpa_hexdump_key(MSG_DEBUG, "SAE: pwd-value", pwd_value, in sae_test_pwd_seed_ffc()
319 wpa_hexdump_ascii_key(MSG_DEBUG, "SAE: password", in sae_derive_pwe_ecc()
347 wpa_printf(MSG_DEBUG, "SAE: Failed to derive PWE"); in sae_derive_pwe_ecc()
383 wpa_printf(MSG_DEBUG, "SAE: Could not generate PWE"); in sae_derive_pwe_ecc()
409 wpa_printf(MSG_DEBUG, "SAE: Could not solve y"); in sae_derive_pwe_ecc()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap_server_wsc.c55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", in eap_wsc_state()
129 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); in eap_wsc_build_start()
174 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg()
182 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg()
205 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " in eap_wsc_buildReq()
217 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " in eap_wsc_buildReq()
246 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " in eap_wsc_process_cont()
254 wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow"); in eap_wsc_process_cont()
260 wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting for %lu " in eap_wsc_process_cont()
274 wpa_printf(MSG_DEBUG, "EAP-WSC: No Message Length " in eap_wsc_process_fragment()
[all …]

1234