/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_attr_parse.c | 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", in wps_set_vendor_ext_wfa_subelem() 28 wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length " in wps_set_vendor_ext_wfa_subelem() 40 wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key " in wps_set_vendor_ext_wfa_subelem() 48 wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll " in wps_set_vendor_ext_wfa_subelem() 56 wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay " in wps_set_vendor_ext_wfa_subelem() 64 wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Configuration Methods length %u", in wps_set_vendor_ext_wfa_subelem() 72 wpa_printf(MSG_DEBUG, in wps_set_vendor_ext_wfa_subelem() 78 wpa_printf(MSG_DEBUG, "WPS: Multi-AP Extension 0x%02x", in wps_set_vendor_ext_wfa_subelem() 82 wpa_printf(MSG_MSGDUMP, "WPS: Skipped unknown WFA Vendor " in wps_set_vendor_ext_wfa_subelem() 117 wpa_printf(MSG_DEBUG, "WPS: Skip invalid Vendor Extension"); in wps_parse_vendor_ext() [all …]
|
D | wps_validate.c | 25 wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute " in wps_validate_version() 32 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute " in wps_validate_version() 44 wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute " in wps_validate_version2() 51 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute " in wps_validate_version2() 63 wpa_printf(MSG_INFO, "WPS-STRICT: Request Type " in wps_validate_request_type() 70 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type " in wps_validate_request_type() 82 wpa_printf(MSG_INFO, "WPS-STRICT: Response Type " in wps_validate_response_type() 89 wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type " in wps_validate_response_type() 101 wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual " in valid_config_methods() 107 wpa_printf(MSG_INFO, "WPS-STRICT: Display flag " in valid_config_methods() [all …]
|
D | wps_attr_process.c | 24 wpa_printf(MSG_DEBUG, "WPS: No Authenticator attribute " in wps_process_authenticator() 30 wpa_printf(MSG_DEBUG, "WPS: Last message not available for " in wps_process_authenticator() 46 wpa_printf(MSG_DEBUG, "WPS: Incorrect Authenticator"); in wps_process_authenticator() 62 wpa_printf(MSG_DEBUG, "WPS: No KWA in decrypted attribute"); in wps_process_key_wrap_auth() 69 wpa_printf(MSG_DEBUG, "WPS: KWA not in the end of the " in wps_process_key_wrap_auth() 76 wpa_printf(MSG_DEBUG, "WPS: Invalid KWA"); in wps_process_key_wrap_auth() 88 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_network_idx() 93 wpa_printf(MSG_DEBUG, "WPS: Network Index: %d", *idx); in wps_process_cred_network_idx() 103 wpa_printf(MSG_DEBUG, "WPS: Credential did not include SSID"); in wps_process_cred_ssid() 126 wpa_printf(MSG_DEBUG, "WPS: Credential did not include " in wps_process_cred_auth_type() [all …]
|
D | wps_attr_build.c | 25 wpa_printf(MSG_DEBUG, "WPS: * Public Key"); in wps_build_public_key() 30 wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys"); in wps_build_public_key() 32 wpa_printf(MSG_DEBUG, in wps_build_public_key() 50 wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys"); in wps_build_public_key() 52 wpa_printf(MSG_DEBUG, in wps_build_public_key() 57 wpa_printf(MSG_DEBUG, in wps_build_public_key() 67 wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys"); in wps_build_public_key() 73 wpa_printf(MSG_DEBUG, "WPS: Failed to initialize " in wps_build_public_key() 105 wpa_printf(MSG_DEBUG, "WPS: * Request Type"); in wps_build_req_type() 115 wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type); in wps_build_resp_type() [all …]
|
D | wps_enrollee.c | 28 wpa_printf(MSG_DEBUG, "WPS: * Wi-Fi Protected Setup State (%d)", in wps_build_wps_state() 50 wpa_printf(MSG_DEBUG, "WPS: DH public keys not available for " in wps_build_e_hash() 55 wpa_printf(MSG_DEBUG, "WPS: * E-Hash1"); in wps_build_e_hash() 71 wpa_printf(MSG_DEBUG, "WPS: * E-Hash2"); in wps_build_e_hash() 87 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce1"); in wps_build_e_snonce1() 97 wpa_printf(MSG_DEBUG, "WPS: * E-SNonce2"); in wps_build_e_snonce2() 117 wpa_printf(MSG_DEBUG, "WPS: Building Message M1"); in wps_build_m1() 176 wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); in wps_build_m3() 179 wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); in wps_build_m3() 186 wpa_printf(MSG_INFO, in wps_build_m3() [all …]
|
D | wps_registrar.c | 237 wpa_printf(MSG_DEBUG, "WPS: Add authorized MAC " MACSTR, in wps_registrar_add_authorized_mac() 241 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was " in wps_registrar_add_authorized_mac() 258 wpa_printf(MSG_DEBUG, "WPS: Remove authorized MAC " MACSTR, in wps_registrar_remove_authorized_mac() 265 wpa_printf(MSG_DEBUG, "WPS: Authorized MAC was not in the " in wps_registrar_remove_authorized_mac() 415 wpa_printf(MSG_DEBUG, "WPS: Removing PBC session for " in wps_registrar_remove_pbc_session() 438 wpa_printf(MSG_DEBUG, "WPS: Checking active PBC sessions for overlap"); in wps_registrar_pbc_overlap() 441 wpa_printf(MSG_DEBUG, "WPS: Add one for the requested UUID"); in wps_registrar_pbc_overlap() 448 wpa_printf(MSG_DEBUG, "WPS: Consider PBC session with " MACSTR, in wps_registrar_pbc_overlap() 454 wpa_printf(MSG_DEBUG, "WPS: PBC walk time has expired"); in wps_registrar_pbc_overlap() 459 wpa_printf(MSG_DEBUG, "WPS: Same Enrollee"); in wps_registrar_pbc_overlap() [all …]
|
D | wps_dev_attr.c | 19 wpa_printf(MSG_DEBUG, "WPS: * Manufacturer"); in wps_build_manufacturer() 43 wpa_printf(MSG_DEBUG, "WPS: * Model Name"); in wps_build_model_name() 67 wpa_printf(MSG_DEBUG, "WPS: * Model Number"); in wps_build_model_number() 91 wpa_printf(MSG_DEBUG, "WPS: * Serial Number"); in wps_build_serial_number() 114 wpa_printf(MSG_DEBUG, "WPS: * Primary Device Type"); in wps_build_primary_dev_type() 128 wpa_printf(MSG_DEBUG, "WPS: * Secondary Device Type"); in wps_build_secondary_dev_type() 161 wpa_printf(MSG_DEBUG, "WPS: * Device Name"); in wps_build_dev_name() 197 wpa_printf(MSG_DEBUG, "WPS: * OS Version"); in wps_build_os_version() 264 wpa_printf(MSG_DEBUG, "WPS: No Manufacturer received"); in wps_process_manufacturer() 283 wpa_printf(MSG_DEBUG, "WPS: No Model Name received"); in wps_process_model_name() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_client_read.c | 52 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension header"); in tls_process_server_hello_extensions() 59 wpa_printf(MSG_DEBUG, "TLSv1: ServerHello ExtensionType %u", in tls_process_server_hello_extensions() 67 wpa_printf(MSG_INFO, "TLSv1: Truncated ServerHello extension"); in tls_process_server_hello_extensions() 90 wpa_printf(MSG_DEBUG, "TLSv1: Expected Handshake; " in tls_process_server_hello() 105 wpa_printf(MSG_DEBUG, "TLSv1: Received unexpected handshake " in tls_process_server_hello() 111 wpa_printf(MSG_DEBUG, "TLSv1: Received ServerHello"); in tls_process_server_hello() 132 wpa_printf(MSG_DEBUG, "TLSv1: Unexpected protocol version in " in tls_process_server_hello() 140 wpa_printf(MSG_DEBUG, "TLSv1: Using TLS v%s", in tls_process_server_hello() 161 wpa_printf(MSG_DEBUG, "TLSv1: Resuming old session"); in tls_process_server_hello() 182 wpa_printf(MSG_INFO, "TLSv1: Server selected unexpected " in tls_process_server_hello() [all …]
|
D | tlsv1_record.c | 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", in tlsv1_record_set_cipher_suite() 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " in tlsv1_record_change_write_cipher() 91 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_write_cipher() 111 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New read cipher suite " in tlsv1_record_change_read_cipher() 125 wpa_printf(MSG_DEBUG, "TLSv1: Failed to initialize " in tlsv1_record_change_read_cipher() 210 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 220 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Not " in tlsv1_record_send() 227 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - Failed " in tlsv1_record_send() 241 wpa_printf(MSG_DEBUG, "TLSv1: No room for " in tlsv1_record_send() 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " in tlsv1_record_receive() [all …]
|
D | tlsv1_client_ocsp.c | 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 179 wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch"); in tls_process_ocsp_single_response() 201 wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch"); in tls_process_ocsp_single_response() 227 wpa_printf(MSG_DEBUG, "OCSP: serialNumber mismatch"); in tls_process_ocsp_single_response() 247 wpa_printf(MSG_DEBUG, "OCSP: certStatus=%u", cert_status); in tls_process_ocsp_single_response() 257 wpa_printf(MSG_DEBUG, "OCSP: Failed to parse thisUpdate"); in tls_process_ocsp_single_response() 260 wpa_printf(MSG_DEBUG, "OCSP: thisUpdate %lu", (unsigned long) update); in tls_process_ocsp_single_response() 263 wpa_printf(MSG_DEBUG, in tls_process_ocsp_single_response() 279 wpa_printf(MSG_DEBUG, in tls_process_ocsp_single_response() 283 wpa_printf(MSG_DEBUG, "OCSP: nextUpdate %lu", in tls_process_ocsp_single_response() [all …]
|
D | tlsv1_cred.c | 53 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate", in tlsv1_add_cert_der() 74 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name); in tlsv1_add_cert_der() 116 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - " in tlsv1_add_cert() 121 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into " in tlsv1_add_cert() 128 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM " in tlsv1_add_cert() 135 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM " in tlsv1_add_cert() 141 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM " in tlsv1_add_cert() 171 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'", in tlsv1_set_cert_chain() 201 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() 208 wpa_printf(MSG_DEBUG, in tlsv1_set_ca_cert() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_fast_common.c | 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); in eap_fast_tlv_eap_payload() 55 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " in eap_fast_tlv_eap_payload() 156 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 167 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 173 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv() 181 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Result %d", in eap_fast_parse_tlv() 185 wpa_printf(MSG_DEBUG, "EAP-FAST: Result: %s", in eap_fast_parse_tlv() 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Too short " in eap_fast_parse_tlv() 199 wpa_printf(MSG_DEBUG, "EAP-FAST: More than one " in eap_fast_parse_tlv() 207 wpa_printf(MSG_DEBUG, "EAP-FAST: Unknown Intermediate " in eap_fast_parse_tlv() [all …]
|
D | eap_peap.c | 83 wpa_printf(MSG_DEBUG, "EAP-PEAP: Forced PEAP version %d", in eap_peap_parse_phase1() 89 wpa_printf(MSG_DEBUG, "EAP-PEAP: Force new label for key " in eap_peap_parse_phase1() 95 wpa_printf(MSG_DEBUG, "EAP-PEAP: terminate authentication on " in eap_peap_parse_phase1() 99 wpa_printf(MSG_DEBUG, "EAP-PEAP: send tunneled EAP-Success " in eap_peap_parse_phase1() 103 wpa_printf(MSG_DEBUG, "EAP-PEAP: send PEAP/TLS ACK after " in eap_peap_parse_phase1() 109 wpa_printf(MSG_DEBUG, "EAP-PEAP: Do not use cryptobinding"); in eap_peap_parse_phase1() 112 wpa_printf(MSG_DEBUG, "EAP-PEAP: Optional cryptobinding"); in eap_peap_parse_phase1() 115 wpa_printf(MSG_DEBUG, "EAP-PEAP: Require cryptobinding"); in eap_peap_parse_phase1() 120 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1() 124 wpa_printf(MSG_DEBUG, in eap_peap_parse_phase1() [all …]
|
D | eap_fast.c | 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); in eap_fast_session_ticket_cb() 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " in eap_fast_session_ticket_cb() 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " in eap_fast_session_ticket_cb() 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " in eap_fast_session_ticket_cb() 123 wpa_printf(MSG_INFO, "EAP-FAST: Automatic PAC provisioning " in eap_fast_parse_phase1() 132 wpa_printf(MSG_INFO, "EAP-FAST: Maximum PAC list length: %lu", in eap_fast_parse_phase1() 139 wpa_printf(MSG_INFO, "EAP-FAST: Using binary format for PAC " in eap_fast_parse_phase1() 173 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL."); in eap_fast_init() 181 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket " in eap_fast_init() 193 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS " in eap_fast_init() [all …]
|
D | eap_ttls.c | 109 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to initialize SSL."); in eap_ttls_init() 214 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive key"); in eap_ttls_v0_derive_key() 232 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id"); in eap_ttls_v0_derive_key() 261 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " in eap_ttls_phase2_select_eap_method() 311 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " in eap_ttls_phase2_request_eap_method() 319 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP " in eap_ttls_phase2_request_eap_method() 326 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " in eap_ttls_phase2_request_eap_method() 359 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize " in eap_ttls_phase2_request_eap_method() 379 wpa_printf(MSG_INFO, "EAP-TTLS: too short " in eap_ttls_phase2_request_eap() 384 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos); in eap_ttls_phase2_request_eap() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 30 wpa_printf(MSG_DEBUG, "FT: XXKey not available for key " in wpa_derive_ptk_ft() 92 wpa_printf(MSG_DEBUG, "FT: Capability and Policy: 0x%02x", in wpa_sm_set_ft_params() 187 wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)", in wpa_ft_gen_req_ies() 202 wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)", in wpa_ft_gen_req_ies() 223 wpa_printf(MSG_WARNING, "FT: Invalid key management type (%d)", in wpa_ft_gen_req_ies() 315 wpa_printf(MSG_INFO, "FT: Failed to calculate MIC"); in wpa_ft_gen_req_ies() 333 wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver."); in wpa_ft_install_ptk() 336 wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d", in wpa_ft_install_ptk() 346 wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver"); in wpa_ft_install_ptk() 367 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); in wpa_ft_prepare_auth_request() [all …]
|
D | wpa.c | 245 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for " in wpa_eapol_key_send() 249 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR in wpa_eapol_key_send() 300 wpa_printf(MSG_DEBUG, "Failed to read BSSID for EAPOL-Key " in wpa_sm_key_request() 343 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key Request (error=%d " in wpa_sm_key_request() 357 wpa_printf( MSG_DEBUG, "RSN: PMKSA cache entry free_cb: " in wpa_sm_pmksa_free_cb() 361 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 379 wpa_printf( MSG_DEBUG, in wpa_sm_pmksa_free_cb() 408 wpa_printf(MSG_DEBUG, in wpa_supplicant_get_pmk() 411 wpa_printf( MSG_DEBUG, in wpa_supplicant_get_pmk() 470 wpa_printf( MSG_DEBUG, in wpa_supplicant_get_pmk() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_wps.c | 126 wpa_printf(MSG_DEBUG, "wps_Task enter"); in wps_task() 135 …wpa_printf(MSG_ERROR, "wpsT: invalid sig cnt, sig=%" PRId32 " cnt=%d", e->sig, s_wps_sig_cnt[e->si… in wps_task() 140 wpa_printf(MSG_DEBUG, "wpsT: rx sig=%" PRId32 "", e->sig); in wps_task() 148 wpa_printf(MSG_ERROR, "wpsT: invalid param sig=%" PRId32 "", e->sig); in wps_task() 199 wpa_printf(MSG_ERROR, "wpsT: invalid sig=%" PRId32 "", e->sig); in wps_task() 205 wpa_printf(MSG_DEBUG, "wpsT: delete task"); in wps_task() 218 wpa_printf(MSG_DEBUG, "wps post: sig=%" PRId32 " cnt=%d", sig, s_wps_sig_cnt[sig]); in wps_post() 223 … wpa_printf(MSG_DEBUG, "wps post: sig=%" PRId32 " failed as wps task has been deinited", sig); in wps_post() 228 wpa_printf(MSG_DEBUG, "wps post: sig=%" PRId32 " processing", sig); in wps_post() 235 wpa_printf(MSG_ERROR, "WPS: E N M"); in wps_post() [all …]
|
D | esp_dpp.c | 66 wpa_printf(MSG_DEBUG,"DPP: Sent event %d to DPP task", evt_id); in esp_dpp_post_evt() 73 wpa_printf(MSG_ERROR,"DPP: Failed to send event %d to DPP task", evt_id); in esp_dpp_post_evt() 81 wpa_printf(MSG_ERROR, "Failed to post DPP auth deinit to DPP Task(status=%d)", ret); in esp_dpp_deinit_auth() 100 wpa_printf(MSG_DEBUG, in esp_dpp_auth_conf_wait_timeout() 120 wpa_printf(MSG_DEBUG, "DPP: Mgmt Tx - MAC:" MACSTR ", Channel-%d, WaitT-%d", in esp_dpp_send_action_frame() 125 wpa_printf(MSG_ERROR, "DPP: Failed to perform offchannel operation"); in esp_dpp_send_action_frame() 144 wpa_printf(MSG_INFO, "DPP: Authentication Request from " MACSTR, MAC2STR(rx_param->sa)); in esp_dpp_rx_auth_req() 149 wpa_printf(MSG_INFO, "DPP: Missing or invalid Responder Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req() 158 wpa_printf(MSG_INFO, "DPP: Missing or invalid Initiator Bootstrapping Key Hash attribute"); in esp_dpp_rx_auth_req() 168 …wpa_printf(MSG_INFO, "DPP: No matching own bootstrapping key found as responder - ignore message"); in esp_dpp_rx_auth_req() [all …]
|
D | esp_wpa3.c | 58 wpa_printf(MSG_DEBUG, in wpa3_build_sae_commit() 72 wpa_printf(MSG_DEBUG, in wpa3_build_sae_commit() 91 wpa_printf(MSG_INFO, "wpa3: Skip SAE and use cached PMK instead"); in wpa3_build_sae_commit() 108 wpa_printf(MSG_ERROR, "wpa3: could not set SAE group %d", default_group); in wpa3_build_sae_commit() 114 wpa_printf(MSG_ERROR, "wpa3: cannot prepare SAE commit with no BSSID!"); in wpa3_build_sae_commit() 121 wpa_printf(MSG_ERROR, "wpa3: failed to prepare SAE commit!"); in wpa3_build_sae_commit() 128 wpa_printf(MSG_ERROR, "wpa3: failed to prepare SAE commit!"); in wpa3_build_sae_commit() 145 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for commit msg"); in wpa3_build_sae_commit() 150 wpa_printf(MSG_ERROR, "wpa3: failed to write SAE commit msg"); in wpa3_build_sae_commit() 177 wpa_printf(MSG_ERROR, "wpa3: failed to allocate buffer for confirm msg"); in wpa3_build_sae_confirm() [all …]
|
D | esp_hostpad_wps.c | 49 wpa_printf(MSG_DEBUG, "wifi wps init"); in wifi_ap_wps_init() 150 wpa_printf(MSG_ERROR, "wps enable: wifi not started cannot enable wpsreg"); in wifi_ap_wps_enable_internal() 155 wpa_printf(MSG_ERROR, "wps enable: unable to get current wifi mode"); in wifi_ap_wps_enable_internal() 160 wpa_printf(MSG_ERROR, "wps enable: mode=%d does not include AP", mode); in wifi_ap_wps_enable_internal() 165 wpa_printf(MSG_ERROR, "wps enable: wpsreg not supported when authmode is open"); in wifi_ap_wps_enable_internal() 171 wpa_printf(MSG_ERROR, "wps enable: wps enrollee already enabled cannot enable wpsreg"); in wifi_ap_wps_enable_internal() 174 wpa_printf(MSG_DEBUG, "wps enable: already enabled"); in wifi_ap_wps_enable_internal() 180 wpa_printf(MSG_ERROR, "wps enable: invalid wps type"); in wifi_ap_wps_enable_internal() 184 wpa_printf(MSG_DEBUG, "Set factory information."); in wifi_ap_wps_enable_internal() 202 wpa_printf(MSG_INFO, "wifi_wps_enable"); in wifi_ap_wps_enable_internal() [all …]
|
D | esp_eap_client.c | 81 wpa_printf(MSG_ERROR, "EAP: failed to create EAP api lock"); in wpa2_api_lock() 136 wpa_printf(MSG_ERROR, "EAP: should never call task delete api in eap task context"); in wpa2_task_delete() 143 wpa_printf(MSG_ERROR, "EAP: failed to post task delete event, ret=%d", ret); in wpa2_task_delete() 214 …wpa_printf(MSG_ERROR, "wpa2_task: invalid sig cnt, sig=%" PRId32 " cnt=%d", e->sig, sm->wpa2_sig_c… in wpa2_task() 245 wpa_printf(MSG_DEBUG, "EAP: wifi->EAP api completed"); in wpa2_task() 248 wpa_printf(MSG_ERROR, "EAP: null wifi->EAP sync sem"); in wpa2_task() 253 wpa_printf(MSG_DEBUG, "EAP: queue deleted"); in wpa2_task() 255 wpa_printf(MSG_DEBUG, "EAP: task deleted"); in wpa2_task() 258 wpa_printf(MSG_DEBUG, "EAP: wifi->EAP api completed"); in wpa2_task() 261 wpa_printf(MSG_ERROR, "EAP: null wifi->EAP sync sem"); in wpa2_task() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wnm_sta.c | 47 wpa_printf(MSG_DEBUG, "WNM: Too short TSF"); in wnm_parse_neighbor_report_elem() 56 wpa_printf(MSG_DEBUG, "WNM: Too short condensed " in wnm_parse_neighbor_report_elem() 65 wpa_printf(MSG_DEBUG, "WNM: Too short BSS transition " in wnm_parse_neighbor_report_elem() 74 wpa_printf(MSG_DEBUG, in wnm_parse_neighbor_report_elem() 84 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor " in wnm_parse_neighbor_report_elem() 95 wpa_printf(MSG_DEBUG, "WNM: Too short measurement " in wnm_parse_neighbor_report_elem() 109 wpa_printf(MSG_DEBUG, "WNM: Too short RRM enabled " in wnm_parse_neighbor_report_elem() 118 wpa_printf(MSG_DEBUG, "WNM: Too short multiple BSSID"); in wnm_parse_neighbor_report_elem() 139 wpa_printf(MSG_DEBUG, "WNM: Too short neighbor report"); in wnm_parse_neighbor_report() 157 wpa_printf(MSG_DEBUG, "WNM: Subelement id=%u len=%u", id, elen); in wnm_parse_neighbor_report() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap_server_wsc.c | 55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", in eap_wsc_state() 124 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " in eap_wsc_build_start() 129 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); in eap_wsc_build_start() 159 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " in eap_wsc_build_msg() 174 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg() 182 wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes " in eap_wsc_build_msg() 205 wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to " in eap_wsc_buildReq() 217 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in " in eap_wsc_buildReq() 233 wpa_printf(MSG_INFO, "EAP-WSC: Invalid frame"); in eap_wsc_check() 246 wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in " in eap_wsc_process_cont() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls-rsa.c | 35 wpa_printf(MSG_ERROR, "%s", dump_buffer); in crypto_dump_verify_info() 59 wpa_printf(MSG_ERROR, "%s: memory allocation failed", __func__); in crypto_verify_cert() 66 wpa_printf(MSG_ERROR, "peer cert parsing failed"); in crypto_verify_cert() 71 wpa_printf(MSG_ERROR, "CA cert parsing failed"); in crypto_verify_cert() 103 wpa_printf(MSG_ERROR, "failed to parse public key"); in crypto_public_key_import() 126 wpa_printf(MSG_ERROR, "failed to parse private key"); in crypto_private_key_import() 142 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 148 wpa_printf(MSG_ERROR, "failed to allocate memory"); in crypto_public_key_from_cert() 155 wpa_printf(MSG_ERROR, "cert parsing failed"); in crypto_public_key_from_cert() 162 wpa_printf(MSG_ERROR, "key setup failed"); in crypto_public_key_from_cert() [all …]
|