/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
D | wps_attr_process.c | 217 wpa_printf(MSG_INFO, "WPS: WPA/WPA2-Personal passphrase uses " in wps_workaround_cred_key() 219 wpa_hexdump_ascii_key(MSG_INFO, "WPS: Network Key", in wps_workaround_cred_key() 237 wpa_printf(MSG_INFO, "WPS: Reject credential with invalid WPA/WPA2-Personal passphrase"); in wps_workaround_cred_key() 238 wpa_hexdump_ascii_key(MSG_INFO, "WPS: Network Key", in wps_workaround_cred_key()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_common.c | 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_len_valid() 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_len_valid() 84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate() 94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate() 103 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
|
D | eap_tls_common.c | 132 wpa_printf(MSG_INFO, "SSL: Failed to get configuration blobs"); in eap_tls_params_from_conf() 159 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " in eap_tls_init_connection() 175 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); in eap_tls_init_connection() 186 wpa_printf(MSG_INFO, "TLS: Failed to set TLS connection " in eap_tls_init_connection() 229 wpa_printf(MSG_INFO, "TLS: Include TLS Message Length in " in eap_peer_tls_ssl_init() 362 wpa_printf(MSG_INFO, "SSL: Too long TLS fragment (size over " in eap_peer_tls_reassemble_fragment() 370 wpa_printf(MSG_INFO, "SSL: more data than TLS message length " in eap_peer_tls_reassemble_fragment() 377 wpa_printf(MSG_INFO, "SSL: Could not allocate memory for TLS " in eap_peer_tls_reassemble_fragment() 387 wpa_printf(MSG_INFO, "SSL: Need %lu bytes more input " in eap_peer_tls_reassemble_fragment() 463 wpa_printf(MSG_INFO, "SSL: eap_tls_process_input - pending " in eap_tls_process_input() [all …]
|
D | eap_fast.c | 123 wpa_printf(MSG_INFO, "EAP-FAST: Automatic PAC provisioning " in eap_fast_parse_phase1() 132 wpa_printf(MSG_INFO, "EAP-FAST: Maximum PAC list length: %lu", in eap_fast_parse_phase1() 139 wpa_printf(MSG_INFO, "EAP-FAST: Using binary format for PAC " in eap_fast_parse_phase1() 173 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); in eap_fast_init() 181 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket " in eap_fast_init() 198 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured"); in eap_fast_init() 205 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file"); in eap_fast_init() 212 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file"); in eap_fast_init() 219 wpa_printf(MSG_INFO, "EAP-FAST: No PAC configured and " in eap_fast_init() 374 wpa_printf(MSG_INFO, "EAP-FAST: Only EAP-MSCHAPv2 is allowed " in eap_fast_select_phase2_method() [all …]
|
D | eap_peap.c | 181 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); in eap_peap_init() 582 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV " in eap_tlv_process() 589 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success " in eap_tlv_process() 592 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure" in eap_tlv_process() 597 wpa_printf(MSG_INFO, in eap_tlv_process() 606 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure"); in eap_tlv_process() 610 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result " in eap_tlv_process() 665 wpa_printf(MSG_INFO, "EAP-PEAP: too short " in eap_peap_phase2_request() 894 wpa_printf(MSG_INFO, "EAP-PEAPv2: Too short Phase 2 " in eap_peap_decrypt() 902 wpa_printf(MSG_INFO, "EAP-PEAPv2: Not an EAP TLV"); in eap_peap_decrypt() [all …]
|
D | eap_tls.c | 40 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); in eap_tls_init() 51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); in eap_tls_init() 130 wpa_printf(MSG_INFO, "EAP-TLS: Failed to derive key"); in eap_tls_success()
|
D | eap_fast_pac.c | 268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " in eap_fast_init_pac_data() 279 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " in eap_fast_init_pac_data() 468 wpa_printf(MSG_INFO, "EAP-FAST: %s in '%s:%d'", in eap_fast_load_pac() 560 wpa_printf(MSG_INFO, "EAP-FAST: Failed to open PAC " in eap_fast_write_pac() 565 wpa_printf(MSG_INFO, "EAP-FAST: Failed to write all " in eap_fast_write_pac() 770 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " in eap_fast_load_pac_bin() 780 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " in eap_fast_load_pac_bin() 795 wpa_printf(MSG_INFO, "EAP-FAST: Invalid PAC file '%s' (bin)", in eap_fast_load_pac_bin() 860 wpa_printf(MSG_INFO, "EAP-FAST: Failed to parse PAC file '%s' (bin)", in eap_fast_load_pac_bin()
|
D | eap_mschapv2.c | 235 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " in eap_mschapv2_challenge() 244 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " in eap_mschapv2_challenge() 251 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" in eap_mschapv2_challenge() 284 wpa_msg(sm->msg_ctx, MSG_INFO, in eap_mschapv2_password_changed() 339 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Authentication succeeded"); in eap_mschapv2_success() 450 wpa_msg(sm->msg_ctx, MSG_INFO, in eap_mschapv2_failure_txt() 696 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid header: len=%lu " in eap_mschapv2_check_mslen() 701 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: workaround, ignore" in eap_mschapv2_check_mslen()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | pkcs1.c | 120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); in pkcs1_v15_private_key_decrypt() 158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key() 167 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in pkcs1_decrypt_public_key() 177 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in pkcs1_decrypt_public_key() 184 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key() 219 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver() 320 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver() 326 wpa_printf(MSG_INFO, in pkcs1_v15_sig_ver()
|
D | tlsv1_cred.c | 53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 241 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert() 1019 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key() 1057 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key() 1156 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob() 1163 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob() [all …]
|
D | pkcs5.c | 202 wpa_printf(MSG_INFO, "PKCS #5: Unsupported iterationCount=0x%x", in pkcs5_get_params_pbes2() 285 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption " in pkcs5_get_params() 352 wpa_printf(MSG_INFO, "PKCS #5: Unsupported " in pkcs5_get_params() 588 wpa_printf(MSG_INFO, "PKCS #5: invalid length of ciphertext " in pkcs5_decrypt() 610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt() 616 wpa_hexdump(MSG_INFO, "PKCS #5: Invalid PS", in pkcs5_decrypt()
|
D | tlsv1_client_read.c | 52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); in tls_process_server_hello_extensions() 67 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); in tls_process_server_hello_extensions() 182 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() 212 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() 226 wpa_printf(MSG_INFO, in tls_process_server_hello() 695 wpa_printf(MSG_INFO, "TLSv1: Reject under 768-bit DH prime (insecure; only %u bits)", in tlsv1_process_diffie_hellman() 812 wpa_printf(MSG_INFO, "TLSv1: Too short OCSPResponse"); in tls_process_certificate_status_ocsp_response() 819 wpa_printf(MSG_INFO, "TLSv1: Truncated OCSPResponse"); in tls_process_certificate_status_ocsp_response() 894 wpa_printf(MSG_INFO, "TLSv1: Too short CertificateStatus"); in tls_process_certificate_status() 1238 wpa_printf(MSG_INFO, in tls_process_server_hello_done() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | tls_internal.c | 212 wpa_printf(MSG_INFO, in tls_connection_set_params() 222 wpa_printf(MSG_INFO, "TLS: subject_match not supported"); in tls_connection_set_params() 228 wpa_printf(MSG_INFO, "TLS: altsubject_match not supported"); in tls_connection_set_params() 234 wpa_printf(MSG_INFO, "TLS: suffix_match not supported"); in tls_connection_set_params() 240 wpa_printf(MSG_INFO, "TLS: domain_match not supported"); in tls_connection_set_params() 246 wpa_printf(MSG_INFO, "TLS: openssl_ciphers not supported"); in tls_connection_set_params() 252 wpa_printf(MSG_INFO, "TLS: openssl_ecdh_curves not supported"); in tls_connection_set_params() 260 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA " in tls_connection_set_params() 269 wpa_printf(MSG_INFO, "TLS: Failed to configure client " in tls_connection_set_params() 279 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); in tls_connection_set_params() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | wps_hostapd.c | 86 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_REG_SUCCESS MACSTR " %s", in hostapd_wps_reg_success_cb() 108 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED); in hostapd_wps_reenable_ap_pin() 211 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_SUCCESS); in hostapd_wps_event_cb() 218 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_OVERLAP); in hostapd_wps_event_cb() 222 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_TIMEOUT); in hostapd_wps_event_cb() 227 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_ACTIVE); in hostapd_wps_event_cb() 231 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_DISABLE); in hostapd_wps_event_cb() 397 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_CANCEL); in wps_cancel() 418 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_PIN_DISABLED); in hostapd_wps_ap_pin_timeout() 429 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED); in hostapd_wps_ap_pin_enable()
|
D | ieee802_1x.c | 78 wpa_printf(MSG_INFO, "%s: too short response data", __func__); in handle_eap_response() 99 wpa_printf(MSG_INFO, " too short EAP packet"); in handle_eap() 173 wpa_printf(MSG_INFO, " too short IEEE 802.1X packet"); in ieee802_1x_receive() 183 wpa_printf(MSG_INFO, in ieee802_1x_receive()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae_pk.c | 583 wpa_printf(MSG_INFO, in sae_pk_valid_fingerprint() 632 wpa_printf(MSG_INFO, in sae_check_confirm_pk() 640 wpa_printf(MSG_INFO, in sae_check_confirm_pk() 651 wpa_printf(MSG_INFO, in sae_check_confirm_pk() 659 wpa_printf(MSG_INFO, in sae_check_confirm_pk() 670 wpa_printf(MSG_INFO, in sae_check_confirm_pk() 677 wpa_printf(MSG_INFO, "SAE-PK: Unsupported public key type %u", in sae_check_confirm_pk() 688 wpa_printf(MSG_INFO, "SAE-PK: Failed to parse K_AP"); in sae_check_confirm_pk() 714 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
|
D | dpp.c | 242 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail() 605 wpa_printf(MSG_INFO, "DPP: Not a DPP URI"); in dpp_parse_uri() 638 wpa_printf(MSG_INFO, "DPP: URI missing public-key"); in dpp_parse_uri() 715 wpa_printf(MSG_INFO, in dpp_set_keypair() 783 wpa_printf(MSG_INFO, "DPP: Unsupported curve: %s", in dpp_keygen() 1039 wpa_printf(MSG_INFO, "DPP: TESTING - no Wrapped Data"); in dpp_auth_build_req() 1049 wpa_printf(MSG_INFO, "DPP: TESTING - no I-nonce"); in dpp_auth_build_req() 1053 wpa_printf(MSG_INFO, "DPP: TESTING - invalid I-nonce"); in dpp_auth_build_req() 1075 wpa_printf(MSG_INFO, "DPP: TESTING - no I-capab"); in dpp_auth_build_req() 1089 wpa_printf(MSG_INFO, "DPP: TESTING - zero I-capabilities"); in dpp_auth_build_req() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/include/utils/ |
D | wpa_debug.h | 28 #define MSG_INFO ESP_LOG_INFO macro 34 enum { MSG_MSGDUMP, MSG_DEBUG, MSG_INFO, MSG_WARNING, MSG_ERROR }; enumerator
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_eap_client.c | 402 wpa_msg(sm->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in eap_sm_process_request() 581 wpa_printf(MSG_INFO, "EAP Re-authentication in progress"); in eap_sm_rx_eapol_internal() 596 wpa_printf(MSG_INFO, ">>>>>EAP FINISH"); in eap_sm_rx_eapol_internal() 601 … wpa_printf(MSG_INFO, ">>>>>EAP FAILED, receive EAP_SUCCESS but pmk is empty, potential attack!"); in eap_sm_rx_eapol_internal() 607 wpa_printf(MSG_INFO, ">>>>>EAP FAILED"); in eap_sm_rx_eapol_internal() 742 wpa_printf(MSG_INFO, "wifi_task prio:%d, stack:%d", WPA2_TASK_PRIORITY, WPA2_TASK_STACK_SIZE); in eap_peer_sm_init() 803 wpa_printf(MSG_INFO, "WiFi Enterprise enable"); in esp_client_enable_fn() 837 wpa_printf(MSG_INFO, "EAP: already enabled"); in esp_wifi_sta_enterprise_enable() 862 wpa_printf(MSG_INFO, "WiFi enterprise disable"); in eap_client_disable_fn() 885 wpa_printf(MSG_INFO, "EAP: already disabled"); in esp_wifi_sta_enterprise_disable()
|
D | esp_scan.c | 56 wpa_printf(MSG_INFO, "not able to find another candidate, do nothing"); in handle_wnm_scan_done() 79 wpa_printf(MSG_INFO, "scan done received"); in esp_supplicant_handle_scan_done_evt() 242 wpa_printf(MSG_INFO, "scan issued at time=%llu", wpa_s->scan_start_tsf); in issue_scan()
|
D | esp_dpp.c | 144 wpa_printf(MSG_INFO, "DPP: Authentication Request from " MACSTR, MAC2STR(rx_param->sa)); in esp_dpp_rx_auth_req() 149 wpa_printf(MSG_INFO, "DPP: Missing or invalid Responder Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req() 158 wpa_printf(MSG_INFO, "DPP: Missing or invalid Initiator Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req() 168 …wpa_printf(MSG_INFO, "DPP: No matching own bootstrapping key found as responder - ignore message"); in esp_dpp_rx_auth_req() 237 wpa_printf(MSG_INFO, DPP_EVENT_CONNECTOR "%s", in esp_dpp_handle_config_obj() 617 wpa_printf(MSG_INFO, "Bootstrap type %d not supported", type); in esp_supp_dpp_bootstrap_gen() 752 wpa_printf(MSG_INFO, "esp_dpp_task prio:%d, stack:%d", 2, DPP_TASK_STACK_SIZE); in esp_supp_dpp_init()
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls-rsa.c | 364 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in crypto_public_key_decrypt_pkcs1() 373 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in crypto_public_key_decrypt_pkcs1() 383 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in crypto_public_key_decrypt_pkcs1() 390 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in crypto_public_key_decrypt_pkcs1()
|
D | tls_mbedtls.c | 138 wpa_printf(MSG_INFO, "len=%zu not available in input", len); in tls_mbedtls_read() 543 wpa_printf(MSG_INFO, "Using default cert bundle"); in set_client_config() 674 wpa_printf(MSG_INFO, "TLS: global settings are not supported"); in tls_global_set_verify() 682 wpa_printf(MSG_INFO, "TLS: tls_connection_set_verify not supported"); in tls_connection_set_verify() 784 wpa_printf(MSG_INFO, "%s: ret is %d line:%d", __func__, ret, __LINE__); in tls_connection_handshake() 789 wpa_printf(MSG_INFO, "application data is null, adding one byte for ack"); in tls_connection_handshake() 992 wpa_printf(MSG_INFO, "TLS: Global parameters not supported"); in tls_global_set_params() 1053 …wpa_printf(MSG_INFO, "TLS: tls_connection_get_eap_fast_key not supported, please unset mbedtls cry… in tls_connection_get_eap_fast_key() 1061 …wpa_printf(MSG_INFO, "TLS: tls_connection_client_hello_ext not supported, please unset mbedtls cry… in tls_connection_client_hello_ext()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap_server.c | 273 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_STARTED in SM_STATE() 305 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in SM_STATE() 330 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_RETRANSMIT MACSTR, in SM_STATE() 374 wpa_printf(MSG_INFO, "EAP: SEND_REQUEST - no eapReqData"); in SM_STATE() 591 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in SM_STATE() 647 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, in SM_STATE() 662 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_FAILURE in SM_STATE() 679 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_SUCCESS in SM_STATE() 766 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_FAILURE in erp_send_finish_reauth() 794 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_SUCCESS in erp_send_finish_reauth() [all …]
|