Home
last modified time | relevance | path

Searched refs:MSG_INFO (Results 1 – 25 of 54) sorted by relevance

123

/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_validate.c25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version()
32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version()
44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2()
51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2()
63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type()
70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type()
82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type()
89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type()
101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods()
107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods()
[all …]
Dwps_attr_process.c217 wpa_printf(MSG_INFO, "WPS: WPA/WPA2-Personal passphrase uses " in wps_workaround_cred_key()
219 wpa_hexdump_ascii_key(MSG_INFO, "WPS: Network Key", in wps_workaround_cred_key()
237 wpa_printf(MSG_INFO, "WPS: Reject credential with invalid WPA/WPA2-Personal passphrase"); in wps_workaround_cred_key()
238 wpa_hexdump_ascii_key(MSG_INFO, "WPS: Network Key", in wps_workaround_cred_key()
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_common.c36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); in eap_hdr_len_valid()
42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); in eap_hdr_len_valid()
84 wpa_printf(MSG_INFO, "EAP: Invalid expanded EAP " in eap_hdr_validate()
94 wpa_printf(MSG_INFO, "EAP: Invalid expanded frame " in eap_hdr_validate()
103 wpa_printf(MSG_INFO, "EAP: Invalid frame type"); in eap_hdr_validate()
Deap_tls_common.c132 wpa_printf(MSG_INFO, "SSL: Failed to get configuration blobs"); in eap_tls_params_from_conf()
159 wpa_printf(MSG_INFO, "SSL: Failed to initialize new TLS " in eap_tls_init_connection()
175 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); in eap_tls_init_connection()
186 wpa_printf(MSG_INFO, "TLS: Failed to set TLS connection " in eap_tls_init_connection()
229 wpa_printf(MSG_INFO, "TLS: Include TLS Message Length in " in eap_peer_tls_ssl_init()
362 wpa_printf(MSG_INFO, "SSL: Too long TLS fragment (size over " in eap_peer_tls_reassemble_fragment()
370 wpa_printf(MSG_INFO, "SSL: more data than TLS message length " in eap_peer_tls_reassemble_fragment()
377 wpa_printf(MSG_INFO, "SSL: Could not allocate memory for TLS " in eap_peer_tls_reassemble_fragment()
387 wpa_printf(MSG_INFO, "SSL: Need %lu bytes more input " in eap_peer_tls_reassemble_fragment()
463 wpa_printf(MSG_INFO, "SSL: eap_tls_process_input - pending " in eap_tls_process_input()
[all …]
Deap_fast.c123 wpa_printf(MSG_INFO, "EAP-FAST: Automatic PAC provisioning " in eap_fast_parse_phase1()
132 wpa_printf(MSG_INFO, "EAP-FAST: Maximum PAC list length: %lu", in eap_fast_parse_phase1()
139 wpa_printf(MSG_INFO, "EAP-FAST: Using binary format for PAC " in eap_fast_parse_phase1()
173 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); in eap_fast_init()
181 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket " in eap_fast_init()
198 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured"); in eap_fast_init()
205 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file"); in eap_fast_init()
212 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file"); in eap_fast_init()
219 wpa_printf(MSG_INFO, "EAP-FAST: No PAC configured and " in eap_fast_init()
374 wpa_printf(MSG_INFO, "EAP-FAST: Only EAP-MSCHAPv2 is allowed " in eap_fast_select_phase2_method()
[all …]
Deap_peap.c181 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL."); in eap_peap_init()
582 wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV " in eap_tlv_process()
589 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success " in eap_tlv_process()
592 wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure" in eap_tlv_process()
597 wpa_printf(MSG_INFO, in eap_tlv_process()
606 wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure"); in eap_tlv_process()
610 wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result " in eap_tlv_process()
665 wpa_printf(MSG_INFO, "EAP-PEAP: too short " in eap_peap_phase2_request()
894 wpa_printf(MSG_INFO, "EAP-PEAPv2: Too short Phase 2 " in eap_peap_decrypt()
902 wpa_printf(MSG_INFO, "EAP-PEAPv2: Not an EAP TLV"); in eap_peap_decrypt()
[all …]
Deap_tls.c40 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); in eap_tls_init()
51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); in eap_tls_init()
130 wpa_printf(MSG_INFO, "EAP-TLS: Failed to derive key"); in eap_tls_success()
Deap_fast_pac.c268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " in eap_fast_init_pac_data()
279 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " in eap_fast_init_pac_data()
468 wpa_printf(MSG_INFO, "EAP-FAST: %s in '%s:%d'", in eap_fast_load_pac()
560 wpa_printf(MSG_INFO, "EAP-FAST: Failed to open PAC " in eap_fast_write_pac()
565 wpa_printf(MSG_INFO, "EAP-FAST: Failed to write all " in eap_fast_write_pac()
770 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " in eap_fast_load_pac_bin()
780 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file '%s' - " in eap_fast_load_pac_bin()
795 wpa_printf(MSG_INFO, "EAP-FAST: Invalid PAC file '%s' (bin)", in eap_fast_load_pac_bin()
860 wpa_printf(MSG_INFO, "EAP-FAST: Failed to parse PAC file '%s' (bin)", in eap_fast_load_pac_bin()
Deap_mschapv2.c235 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge data " in eap_mschapv2_challenge()
244 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid challenge length " in eap_mschapv2_challenge()
251 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Too short challenge" in eap_mschapv2_challenge()
284 wpa_msg(sm->msg_ctx, MSG_INFO, in eap_mschapv2_password_changed()
339 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Authentication succeeded"); in eap_mschapv2_success()
450 wpa_msg(sm->msg_ctx, MSG_INFO, in eap_mschapv2_failure_txt()
696 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Invalid header: len=%lu " in eap_mschapv2_check_mslen()
701 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: workaround, ignore" in eap_mschapv2_check_mslen()
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dpkcs1.c120 wpa_printf(MSG_INFO, "LibTomCrypt: Too short padding"); in pkcs1_v15_private_key_decrypt()
158 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
167 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in pkcs1_decrypt_public_key()
177 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in pkcs1_decrypt_public_key()
184 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in pkcs1_decrypt_public_key()
219 wpa_printf(MSG_INFO, "PKCS #1: RSA decrypt failed"); in pkcs1_v15_sig_ver()
320 wpa_printf(MSG_INFO, "PKCS #1: Digest value does not match calculated hash"); in pkcs1_v15_sig_ver()
326 wpa_printf(MSG_INFO, in pkcs1_v15_sig_ver()
Dtlsv1_cred.c53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der()
128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert()
135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert()
141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert()
171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain()
241 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory " in tlsv1_set_ca_cert()
1019 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key"); in tlsv1_set_key()
1057 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_private_key()
1156 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end " in tlsv1_set_dhparams_blob()
1163 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams"); in tlsv1_set_dhparams_blob()
[all …]
Dpkcs5.c202 wpa_printf(MSG_INFO, "PKCS #5: Unsupported iterationCount=0x%x", in pkcs5_get_params_pbes2()
285 wpa_printf(MSG_INFO, "PKCS #5: unsupported encryption " in pkcs5_get_params()
352 wpa_printf(MSG_INFO, "PKCS #5: Unsupported " in pkcs5_get_params()
588 wpa_printf(MSG_INFO, "PKCS #5: invalid length of ciphertext " in pkcs5_decrypt()
610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt()
616 wpa_hexdump(MSG_INFO, "PKCS #5: Invalid PS", in pkcs5_decrypt()
Dtlsv1_client_read.c52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); in tls_process_server_hello_extensions()
67 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); in tls_process_server_hello_extensions()
182 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello()
212 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello()
226 wpa_printf(MSG_INFO, in tls_process_server_hello()
695 wpa_printf(MSG_INFO, "TLSv1: Reject under 768-bit DH prime (insecure; only %u bits)", in tlsv1_process_diffie_hellman()
812 wpa_printf(MSG_INFO, "TLSv1: Too short OCSPResponse"); in tls_process_certificate_status_ocsp_response()
819 wpa_printf(MSG_INFO, "TLSv1: Truncated OCSPResponse"); in tls_process_certificate_status_ocsp_response()
894 wpa_printf(MSG_INFO, "TLSv1: Too short CertificateStatus"); in tls_process_certificate_status()
1238 wpa_printf(MSG_INFO, in tls_process_server_hello_done()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Dtls_internal.c212 wpa_printf(MSG_INFO, in tls_connection_set_params()
222 wpa_printf(MSG_INFO, "TLS: subject_match not supported"); in tls_connection_set_params()
228 wpa_printf(MSG_INFO, "TLS: altsubject_match not supported"); in tls_connection_set_params()
234 wpa_printf(MSG_INFO, "TLS: suffix_match not supported"); in tls_connection_set_params()
240 wpa_printf(MSG_INFO, "TLS: domain_match not supported"); in tls_connection_set_params()
246 wpa_printf(MSG_INFO, "TLS: openssl_ciphers not supported"); in tls_connection_set_params()
252 wpa_printf(MSG_INFO, "TLS: openssl_ecdh_curves not supported"); in tls_connection_set_params()
260 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA " in tls_connection_set_params()
269 wpa_printf(MSG_INFO, "TLS: Failed to configure client " in tls_connection_set_params()
279 wpa_printf(MSG_INFO, "TLS: Failed to load private key"); in tls_connection_set_params()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwps_hostapd.c86 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_REG_SUCCESS MACSTR " %s", in hostapd_wps_reg_success_cb()
108 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED); in hostapd_wps_reenable_ap_pin()
211 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_SUCCESS); in hostapd_wps_event_cb()
218 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_OVERLAP); in hostapd_wps_event_cb()
222 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_TIMEOUT); in hostapd_wps_event_cb()
227 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_ACTIVE); in hostapd_wps_event_cb()
231 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_DISABLE); in hostapd_wps_event_cb()
397 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_CANCEL); in wps_cancel()
418 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_PIN_DISABLED); in hostapd_wps_ap_pin_timeout()
429 wpa_msg(hapd->msg_ctx, MSG_INFO, WPS_EVENT_AP_SETUP_UNLOCKED); in hostapd_wps_ap_pin_enable()
Dieee802_1x.c78 wpa_printf(MSG_INFO, "%s: too short response data", __func__); in handle_eap_response()
99 wpa_printf(MSG_INFO, " too short EAP packet"); in handle_eap()
173 wpa_printf(MSG_INFO, " too short IEEE 802.1X packet"); in ieee802_1x_receive()
183 wpa_printf(MSG_INFO, in ieee802_1x_receive()
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae_pk.c583 wpa_printf(MSG_INFO, in sae_pk_valid_fingerprint()
632 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
640 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
651 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
659 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
670 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
677 wpa_printf(MSG_INFO, "SAE-PK: Unsupported public key type %u", in sae_check_confirm_pk()
688 wpa_printf(MSG_INFO, "SAE-PK: Failed to parse K_AP"); in sae_check_confirm_pk()
714 wpa_printf(MSG_INFO, in sae_check_confirm_pk()
Ddpp.c242 wpa_msg(auth->msg_ctx, MSG_INFO, DPP_EVENT_FAIL "%s", txt); in dpp_auth_fail()
605 wpa_printf(MSG_INFO, "DPP: Not a DPP URI"); in dpp_parse_uri()
638 wpa_printf(MSG_INFO, "DPP: URI missing public-key"); in dpp_parse_uri()
715 wpa_printf(MSG_INFO, in dpp_set_keypair()
783 wpa_printf(MSG_INFO, "DPP: Unsupported curve: %s", in dpp_keygen()
1039 wpa_printf(MSG_INFO, "DPP: TESTING - no Wrapped Data"); in dpp_auth_build_req()
1049 wpa_printf(MSG_INFO, "DPP: TESTING - no I-nonce"); in dpp_auth_build_req()
1053 wpa_printf(MSG_INFO, "DPP: TESTING - invalid I-nonce"); in dpp_auth_build_req()
1075 wpa_printf(MSG_INFO, "DPP: TESTING - no I-capab"); in dpp_auth_build_req()
1089 wpa_printf(MSG_INFO, "DPP: TESTING - zero I-capabilities"); in dpp_auth_build_req()
[all …]
/hal_espressif-latest/components/wpa_supplicant/include/utils/
Dwpa_debug.h28 #define MSG_INFO ESP_LOG_INFO macro
34 enum { MSG_MSGDUMP, MSG_DEBUG, MSG_INFO, MSG_WARNING, MSG_ERROR }; enumerator
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_eap_client.c402 wpa_msg(sm->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in eap_sm_process_request()
581 wpa_printf(MSG_INFO, "EAP Re-authentication in progress"); in eap_sm_rx_eapol_internal()
596 wpa_printf(MSG_INFO, ">>>>>EAP FINISH"); in eap_sm_rx_eapol_internal()
601 … wpa_printf(MSG_INFO, ">>>>>EAP FAILED, receive EAP_SUCCESS but pmk is empty, potential attack!"); in eap_sm_rx_eapol_internal()
607 wpa_printf(MSG_INFO, ">>>>>EAP FAILED"); in eap_sm_rx_eapol_internal()
742 wpa_printf(MSG_INFO, "wifi_task prio:%d, stack:%d", WPA2_TASK_PRIORITY, WPA2_TASK_STACK_SIZE); in eap_peer_sm_init()
803 wpa_printf(MSG_INFO, "WiFi Enterprise enable"); in esp_client_enable_fn()
837 wpa_printf(MSG_INFO, "EAP: already enabled"); in esp_wifi_sta_enterprise_enable()
862 wpa_printf(MSG_INFO, "WiFi enterprise disable"); in eap_client_disable_fn()
885 wpa_printf(MSG_INFO, "EAP: already disabled"); in esp_wifi_sta_enterprise_disable()
Desp_scan.c56 wpa_printf(MSG_INFO, "not able to find another candidate, do nothing"); in handle_wnm_scan_done()
79 wpa_printf(MSG_INFO, "scan done received"); in esp_supplicant_handle_scan_done_evt()
242 wpa_printf(MSG_INFO, "scan issued at time=%llu", wpa_s->scan_start_tsf); in issue_scan()
Desp_dpp.c144 wpa_printf(MSG_INFO, "DPP: Authentication Request from " MACSTR, MAC2STR(rx_param->sa)); in esp_dpp_rx_auth_req()
149 wpa_printf(MSG_INFO, "DPP: Missing or invalid Responder Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req()
158 wpa_printf(MSG_INFO, "DPP: Missing or invalid Initiator Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req()
168 …wpa_printf(MSG_INFO, "DPP: No matching own bootstrapping key found as responder - ignore message"); in esp_dpp_rx_auth_req()
237 wpa_printf(MSG_INFO, DPP_EVENT_CONNECTOR "%s", in esp_dpp_handle_config_obj()
617 wpa_printf(MSG_INFO, "Bootstrap type %d not supported", type); in esp_supp_dpp_bootstrap_gen()
752 wpa_printf(MSG_INFO, "esp_dpp_task prio:%d, stack:%d", 2, DPP_TASK_STACK_SIZE); in esp_supp_dpp_init()
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dcrypto_mbedtls-rsa.c364 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in crypto_public_key_decrypt_pkcs1()
373 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature " in crypto_public_key_decrypt_pkcs1()
383 wpa_printf(MSG_INFO, "LibTomCrypt: Too short signature " in crypto_public_key_decrypt_pkcs1()
390 wpa_printf(MSG_INFO, "LibTomCrypt: Invalid signature EB " in crypto_public_key_decrypt_pkcs1()
Dtls_mbedtls.c138 wpa_printf(MSG_INFO, "len=%zu not available in input", len); in tls_mbedtls_read()
543 wpa_printf(MSG_INFO, "Using default cert bundle"); in set_client_config()
674 wpa_printf(MSG_INFO, "TLS: global settings are not supported"); in tls_global_set_verify()
682 wpa_printf(MSG_INFO, "TLS: tls_connection_set_verify not supported"); in tls_connection_set_verify()
784 wpa_printf(MSG_INFO, "%s: ret is %d line:%d", __func__, ret, __LINE__); in tls_connection_handshake()
789 wpa_printf(MSG_INFO, "application data is null, adding one byte for ack"); in tls_connection_handshake()
992 wpa_printf(MSG_INFO, "TLS: Global parameters not supported"); in tls_global_set_params()
1053 …wpa_printf(MSG_INFO, "TLS: tls_connection_get_eap_fast_key not supported, please unset mbedtls cry… in tls_connection_get_eap_fast_key()
1061 …wpa_printf(MSG_INFO, "TLS: tls_connection_client_hello_ext not supported, please unset mbedtls cry… in tls_connection_client_hello_ext()
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap_server.c273 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_STARTED in SM_STATE()
305 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in SM_STATE()
330 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_RETRANSMIT MACSTR, in SM_STATE()
374 wpa_printf(MSG_INFO, "EAP: SEND_REQUEST - no eapReqData"); in SM_STATE()
591 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_PROPOSED_METHOD in SM_STATE()
647 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, in SM_STATE()
662 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_FAILURE in SM_STATE()
679 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_SUCCESS in SM_STATE()
766 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_FAILURE in erp_send_finish_reauth()
794 wpa_msg(sm->cfg->msg_ctx, MSG_INFO, WPA_EVENT_EAP_SUCCESS in erp_send_finish_reauth()
[all …]

123