/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls-rsa.c | 35 wpa_printf(MSG_ERROR, "%s", dump_buffer); in crypto_dump_verify_info() 59 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_verify_cert() 66 wpa_printf(MSG_ERROR, "peer cert parsing failed"); in crypto_verify_cert() 71 wpa_printf(MSG_ERROR, "CA cert parsing failed"); in crypto_verify_cert() 103 wpa_printf(MSG_ERROR, "failed to parse public key"); in crypto_public_key_import() 126 wpa_printf(MSG_ERROR, "failed to parse private key"); in crypto_private_key_import() 142 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 148 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 155 wpa_printf(MSG_ERROR, "cert parsing failed"); in crypto_public_key_from_cert() 162 wpa_printf(MSG_ERROR, "key setup failed"); in crypto_public_key_from_cert() [all …]
|
D | crypto_mbedtls-ec.c | 202 wpa_printf(MSG_ERROR, "Z coordinate is neither 0 or 1"); in crypto_ec_get_affine_coordinates() 493 wpa_printf(MSG_ERROR, "error: failed to get corrdinates"); in crypto_debug_print_point() 497 wpa_hexdump(MSG_ERROR, "x:", x, 32); in crypto_debug_print_point() 498 wpa_hexdump(MSG_ERROR, "y:", y, 32); in crypto_debug_print_point() 506 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_alloc_key() 525 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_ec_set_pubkey_point() 531 wpa_printf(MSG_ERROR, "%s: Point initialization failed", __func__); in crypto_ec_set_pubkey_point() 535 wpa_printf(MSG_ERROR, "Point is at infinity"); in crypto_ec_set_pubkey_point() 539 wpa_printf(MSG_ERROR, "Point not on curve"); in crypto_ec_set_pubkey_point() 545 wpa_printf(MSG_ERROR, "Invalid key"); in crypto_ec_set_pubkey_point() [all …]
|
D | tls_mbedtls.c | 163 wpa_printf(MSG_ERROR, "%s: config not correct", __func__); in set_pki_context() 173 wpa_printf(MSG_ERROR, "mbedtls_x509_crt_parse returned -0x%x", -ret); in set_pki_context() 181 wpa_printf(MSG_ERROR, "mbedtls_pk_parse_keyfile returned -0x%x", -ret); in set_pki_context() 187 wpa_printf(MSG_ERROR, "mbedtls_ssl_conf_own_cert returned -0x%x", -ret); in set_pki_context() 200 wpa_printf(MSG_ERROR, "mbedtls_x509_crt_parse returned -0x%x", -ret); in set_ca_cert() 502 wpa_printf(MSG_ERROR, "mbedtls_ssl_config_defaults returned -0x%x", -ret); in set_client_config() 527 wpa_printf(MSG_ERROR, "Failed to set client pki context"); in set_client_config() 548 wpa_printf(MSG_ERROR, "Failed to set default cert bundle"); in set_client_config() 589 wpa_printf(MSG_ERROR, "Failed to set client configurations"); in tls_create_mbedtls_handle() 596 wpa_printf(MSG_ERROR, "mbedtls_ctr_drbg_seed returned -0x%x", -ret); in tls_create_mbedtls_handle() [all …]
|
D | crypto_mbedtls.c | 65 wpa_printf(MSG_ERROR, "mbedtls_md_info_from_type() failed"); in digest_vector() 71 wpa_printf(MSG_ERROR, "mbedtls_md_setup() returned error"); in digest_vector() 77 wpa_printf(MSG_ERROR, "mbedtls_md_starts returned error"); in digest_vector() 84 wpa_printf(MSG_ERROR, "mbedtls_md_update ret=%d", ret); in digest_vector() 216 wpa_printf(MSG_ERROR, "%s: mbedtls_md_hmac_update failed", __func__); in crypto_hash_update() 406 wpa_printf(MSG_ERROR, "%s: mbedtls_aes_setkey_enc/mbedtls_aes_setkey_dec failed", __func__); in aes_crypt_init() 521 wpa_printf(MSG_ERROR, "mbedtls_cipher_setkey returned error=%d", ret); in crypto_init_cipher_ctx() 526 wpa_printf(MSG_ERROR, "mbedtls_cipher_set_iv returned error=%d", ret); in crypto_init_cipher_ctx() 531 wpa_printf(MSG_ERROR, "mbedtls_cipher_reset() returned error=%d", ret); in crypto_init_cipher_ctx() 826 wpa_printf(MSG_ERROR, "mbedtls_ccm_setkey failed"); in aes_ccm_ae()
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_hostpad_wps.c | 150 wpa_printf(MSG_ERROR, "wps enable: wifi not started cannot enable wpsreg"); in wifi_ap_wps_enable_internal() 155 wpa_printf(MSG_ERROR, "wps enable: unable to get current wifi mode"); in wifi_ap_wps_enable_internal() 160 wpa_printf(MSG_ERROR, "wps enable: mode=%d does not include AP", mode); in wifi_ap_wps_enable_internal() 165 wpa_printf(MSG_ERROR, "wps enable: wpsreg not supported when authmode is open"); in wifi_ap_wps_enable_internal() 171 wpa_printf(MSG_ERROR, "wps enable: wps enrollee already enabled cannot enable wpsreg"); in wifi_ap_wps_enable_internal() 180 wpa_printf(MSG_ERROR, "wps enable: invalid wps type"); in wifi_ap_wps_enable_internal() 207 wpa_printf(MSG_ERROR, "failure in wifi_wps_enable"); in wifi_ap_wps_enable_internal() 255 wpa_printf(MSG_ERROR, "wps disable: failed to disable wps"); in wifi_ap_wps_disable_internal() 274 wpa_printf(MSG_ERROR, "wps start: mode=%d does not include AP", mode); in wifi_ap_wps_start_internal() 280 wpa_printf(MSG_ERROR, "wps start: wps not enabled"); in wifi_ap_wps_start_internal() [all …]
|
D | esp_wpa3.c | 108 wpa_printf(MSG_ERROR, "wpa3: could not set SAE group %d", default_group); in wpa3_build_sae_commit() 114 wpa_printf(MSG_ERROR, "wpa3: cannot prepare SAE commit with no BSSID!"); in wpa3_build_sae_commit() 121 wpa_printf(MSG_ERROR, "wpa3: failed to prepare SAE commit!"); in wpa3_build_sae_commit() 128 wpa_printf(MSG_ERROR, "wpa3: failed to prepare SAE commit!"); in wpa3_build_sae_commit() 145 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for commit msg"); in wpa3_build_sae_commit() 150 wpa_printf(MSG_ERROR, "wpa3: failed to write SAE commit msg"); in wpa3_build_sae_commit() 177 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for confirm msg"); in wpa3_build_sae_confirm() 182 wpa_printf(MSG_ERROR, "wpa3: failed to write SAE confirm msg"); in wpa3_build_sae_confirm() 310 wpa_printf(MSG_ERROR, "Invalid SAE anti-clogging token container header"); in wpa3_parse_sae_commit() 326 wpa_printf(MSG_ERROR, "wpa3: could not parse commit(%d)", ret); in wpa3_parse_sae_commit() [all …]
|
D | esp_dpp.c | 73 wpa_printf(MSG_ERROR,"DPP: Failed to send event %d to DPP task", evt_id); in esp_dpp_post_evt() 81 wpa_printf(MSG_ERROR, "Failed to post DPP auth deinit to DPP Task(status=%d)", ret); in esp_dpp_deinit_auth() 125 wpa_printf(MSG_ERROR, "DPP: Failed to perform offchannel operation"); in esp_dpp_send_action_frame() 300 wpa_printf(MSG_ERROR, "DPP: Unsupported crypto suit"); in esp_dpp_rx_auth() 438 wpa_printf(MSG_ERROR, "Listen channel not set"); in esp_dpp_task() 445 wpa_printf(MSG_ERROR, "Failed ROC. error : 0x%x", ret); in esp_dpp_task() 494 wpa_printf(MSG_ERROR, "Failed to allocate memory for Rx Action"); in esp_supp_rx_action() 501 wpa_printf(MSG_ERROR, "Failed to allocate memory for Rx Action"); in esp_supp_rx_action() 510 wpa_printf(MSG_ERROR, "Failed to post event to DPP Task(status=%d)", ret); in esp_supp_rx_action() 599 wpa_printf(MSG_ERROR, "DPP: failed to bootstrap as dpp not initialized."); in esp_supp_dpp_bootstrap_gen() [all …]
|
D | esp_eap_client.c | 81 wpa_printf(MSG_ERROR, "EAP: failed to create EAP api lock"); in wpa2_api_lock() 136 wpa_printf(MSG_ERROR, "EAP: should never call task delete api in eap task context"); in wpa2_task_delete() 143 wpa_printf(MSG_ERROR, "EAP: failed to post task delete event, ret=%d", ret); in wpa2_task_delete() 214 …wpa_printf(MSG_ERROR, "wpa2_task: invalid sig cnt, sig=%" PRId32 " cnt=%d", e->sig, sm->wpa2_sig_c… in wpa2_task() 248 wpa_printf(MSG_ERROR, "EAP: null wifi->EAP sync sem"); in wpa2_task() 261 wpa_printf(MSG_ERROR, "EAP: null wifi->EAP sync sem"); in wpa2_task() 283 wpa_printf(MSG_ERROR, "EAP: E N M"); in wpa2_post() 292 wpa_printf(MSG_ERROR, "EAP: Q S E"); in wpa2_post() 299 wpa_printf(MSG_ERROR, "EAP: null wifi->EAP sync sem"); in wpa2_post() 413 wpa_printf(MSG_ERROR, "Method private structure allocated failure"); in eap_sm_process_request() [all …]
|
D | esp_common.c | 55 wpa_printf(MSG_ERROR, "memory allocation failed"); in handle_action_frm() 176 wpa_printf(MSG_ERROR, "failed to allocate memory"); in clear_bssid_flag() 338 wpa_printf(MSG_ERROR, "%s: failed to create Supplicant API lock", __func__); in esp_supplicant_common_init() 346 wpa_printf(MSG_ERROR, "%s: failed to create Supplicant event queue", __func__); in esp_supplicant_common_init() 352 wpa_printf(MSG_ERROR, "btm: failed to create task"); in esp_supplicant_common_init() 488 wpa_printf(MSG_ERROR, "STA not associated, return"); in esp_rrm_send_neighbor_rep_request() 493 wpa_printf(MSG_ERROR, in esp_rrm_send_neighbor_rep_request() 530 wpa_printf(MSG_ERROR, "STA not associated, return"); in esp_wnm_send_bss_transition_mgmt_query() 535 wpa_printf(MSG_ERROR, "AP doesn't support BTM, return"); in esp_wnm_send_bss_transition_mgmt_query() 556 wpa_printf(MSG_ERROR, "failed to allocate memory"); in wpa_supplicant_connect() [all …]
|
D | esp_scan.c | 40 wpa_printf(MSG_ERROR, "Posting of scan done failed!"); in scan_done_event_handler() 122 wpa_printf(MSG_ERROR, "beacon/probe is having short len=%d", len); in esp_handle_beacon_probe() 128 wpa_printf(MSG_ERROR, "failed to allocate memory"); in esp_handle_beacon_probe() 189 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan() 195 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan() 211 wpa_printf(MSG_ERROR, "failed to allocate memory"); in issue_scan()
|
D | esp_wps.c | 135 …wpa_printf(MSG_ERROR, "wpsT: invalid sig cnt, sig=%" PRId32 " cnt=%d", e->sig, s_wps_sig_cnt[e->si… in wps_task() 148 wpa_printf(MSG_ERROR, "wpsT: invalid param sig=%" PRId32 "", e->sig); in wps_task() 199 wpa_printf(MSG_ERROR, "wpsT: invalid sig=%" PRId32 "", e->sig); in wps_task() 235 wpa_printf(MSG_ERROR, "WPS: E N M"); in wps_post() 246 wpa_printf(MSG_ERROR, "WPS: Q S E"); in wps_post() 272 wpa_printf(MSG_ERROR, "bssid is empty!"); in wps_sm_ether_send() 461 wpa_printf(MSG_ERROR, "eap buf allocation failed"); in wps_send_eap_identity_rsp() 471 wpa_printf(MSG_ERROR, "buf allocation failed"); in wps_send_eap_identity_rsp() 478 wpa_printf(MSG_ERROR, "wps sm ether send failed ret=%d", ret); in wps_send_eap_identity_rsp() 539 … wpa_printf(MSG_ERROR, "fun:%s. line:%d, frag buf or frag data is null", __FUNCTION__, __LINE__); in wps_enrollee_process_msg_frag() [all …]
|
D | esp_wps_i.h | 92 wpa_printf(MSG_ERROR, "wps api lock create failed");\
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_ttls.c | 109 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to initialize SSL."); in eap_ttls_init() 214 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive key"); in eap_ttls_v0_derive_key() 232 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id"); in eap_ttls_v0_derive_key() 417 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPV2 not supported in FIPS build"); in eap_ttls_phase2_request_mschapv2() 436 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to allocate memory"); in eap_ttls_phase2_request_mschapv2() 450 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " in eap_ttls_phase2_request_mschapv2() 469 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to get " in eap_ttls_phase2_request_mschapv2() 483 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " in eap_ttls_phase2_request_mschapv2() 509 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPv2 not included in the build"); in eap_ttls_phase2_request_mschapv2() 522 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAP not supported in FIPS build"); in eap_ttls_phase2_request_mschap() [all …]
|
D | eap.c | 358 wpa_printf(MSG_ERROR, "EAP: buildIdentity: configuration " in eap_sm_buildIdentity() 381 wpa_printf(MSG_ERROR, "EAP: buildIdentity: identity " in eap_sm_buildIdentity() 418 wpa_printf(MSG_ERROR, "EAP: Build Identity Resp-> configuration was not available"); in eap_sm_build_identity_resp() 435 wpa_printf(MSG_ERROR, "EAP: Build Identity Resp-> identity was not available"); in eap_sm_build_identity_resp() 597 wpa_printf(MSG_ERROR, "EAP: Set config init: EAP methods not registered."); in eap_peer_config_init() 604 wpa_printf(MSG_ERROR, "EAP: Set config init: Out of memory, set configured methods failed"); in eap_peer_config_init() 942 wpa_printf(MSG_ERROR, "EAP: Set config blob: Unable to modify the configuration blob"); in eap_set_config_blob()
|
D | eap_mschapv2.c | 193 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to derive " in eap_mschapv2_challenge_reply() 674 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: idetity not configured"); in eap_mschapv2_check_config() 680 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Password not configured"); in eap_mschapv2_check_config() 707 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Invalid header len=%lu ms_len=%lu", in eap_mschapv2_check_mslen() 789 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Unknown op code %d - ignored", in eap_mschapv2_process()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | scan.c | 46 wpa_printf(MSG_ERROR, "Memory allocation failed"); in wpa_supplicant_req_scan() 71 wpa_printf(MSG_ERROR, "Failed to issue scan - Return"); in wpa_supplicant_req_scan()
|
D | rrm.c | 30 wpa_printf(MSG_ERROR, in wpas_rrm_neighbor_rep_timeout_handler() 146 wpa_printf(MSG_ERROR, in wpas_rrm_send_neighbor_rep_request() 303 wpa_printf(MSG_ERROR, in wpas_rrm_send_msr_report_mpdu() 327 wpa_printf(MSG_ERROR, in wpas_rrm_beacon_rep_update_last_frame() 642 wpa_printf(MSG_ERROR, "RRM: Memory allocation failed"); in wpas_rrm_refuse_request() 1063 wpa_printf(MSG_ERROR, in wpas_rrm_handle_link_measurement_request() 1075 wpa_printf(MSG_ERROR, in wpas_rrm_handle_link_measurement_request() 1130 wpa_printf(MSG_ERROR, in wpas_beacon_rep_scan_process()
|
D | mbo.c | 265 wpa_printf(MSG_ERROR, "Failed to add MBO/OCE IE"); in wpas_mbo_ie() 389 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan() 403 wpa_printf(MSG_ERROR, "Invalid non-pref chan input %s", in wpas_mbo_update_non_pref_chan() 414 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan() 424 wpa_printf(MSG_ERROR, in wpas_mbo_update_non_pref_chan()
|
/hal_espressif-latest/components/wpa_supplicant/src/utils/ |
D | ext_password.c | 92 wpa_printf(MSG_ERROR, "EXT PW: mlock failed: %s", in ext_password_alloc() 108 wpa_printf(MSG_ERROR, "EXT PW: munlock failed: %s", in ext_password_free()
|
D | wpabuf.c | 42 wpa_printf( MSG_ERROR, "wpabuf: invalid magic %x", in wpabuf_overflow() 46 wpa_printf( MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu", in wpabuf_overflow() 67 wpa_printf( MSG_ERROR, "wpabuf: invalid magic %x", in wpabuf_resize() 193 wpa_printf( MSG_ERROR, "wpabuf_free: invalid magic %x", in wpabuf_free()
|
D | wpa_debug.c | 88 if (level >= MSG_ERROR) in wpa_hexdump()
|
/hal_espressif-latest/components/wpa_supplicant/include/utils/ |
D | wpa_debug.h | 26 #define MSG_ERROR ESP_LOG_ERROR macro 34 enum { MSG_MSGDUMP, MSG_DEBUG, MSG_INFO, MSG_WARNING, MSG_ERROR }; enumerator
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_common/ |
D | eap_wsc_common.c | 23 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " in eap_wsc_build_frag_ack()
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 257 wpa_msg(NULL, MSG_ERROR, in wpa_eapol_key_send() 558 wpa_printf(MSG_ERROR, "WPA: No wpa_ie set - cannot " in wpa_supplicant_send_2_of_4() 2183 wpa_printf(MSG_ERROR, in wpa_sm_init() 2388 wpa_printf(MSG_ERROR, "mgmt_cipher %d not supported", mgmt_cipher); in wpa_set_bss() 2395 wpa_printf(MSG_ERROR, "suite-b 192bit certification, only GMAC256 is supported"); in wpa_set_bss() 2399 …wpa_printf(MSG_ERROR, "suite-b 192bit certification, only group GCMP256 is supported for group dat… in wpa_set_bss() 2403 …wpa_printf(MSG_ERROR,"suite-b 192bit certification, only group GCMP256 is supported for pairwise c… in wpa_set_bss() 2407 wpa_printf(MSG_ERROR, "suite-b 192bit certification, 192bit akm supported"); in wpa_set_bss() 2655 wpa_printf(MSG_ERROR, "EAPOL TxDone with invalid payload len! (len - %zu)", len); in eapol_txcb() 2667 wpa_printf(MSG_ERROR, "Eapol message 4/4 tx failure, not installing keys"); in eapol_txcb() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | wps_hostapd.c | 43 wpa_printf(MSG_ERROR, "WPS: Failed to update beacon IEs"); in hostapd_wps_set_ie_cb() 304 wpa_printf(MSG_ERROR, "Failed to initialize WPS Registrar"); in hostapd_init_wps() 312 wpa_printf(MSG_ERROR, "Failed to register for wsc server"); in hostapd_init_wps() 534 wpa_printf(MSG_ERROR, "WPS: Disabling AP PIN"); in hostapd_wps_config_ap()
|