ESP-IDF
TAG
is only used within ESP-IDF.
Symbol previews are coming soon...
Symbols
loading...
Files
loading...
Summary
Syntax
Examples
References
Call Tree
Data Use
Class Tree
Override Tree
Implementations
Instances
Lifecycle
SourceVu
ESP-IDF Framework and Examples
ESP-IDF
TAG
TAG variable
Syntax
Show:
Summary
Declaration
from
security2.c:28
static
const
char
*
TAG
=
"security2"
;
Examples
References
from
examples
Code
Location
Referrer
static
const
char
*
TAG
=
"security2"
;
security2.c:28
ESP_LOGD
(
TAG
,
"%s ->"
,
msg
)
;
security2.c:64
hexdump()
ESP_LOG_BUFFER_HEX_LEVEL
(
TAG
,
buf
,
len
,
ESP_LOG_DEBUG
)
;
security2.c:65
hexdump()
ESP_LOGD
(
TAG
,
"Request to handle setup0_command"
)
;
security2.c:75
handle_session_command0()
ESP_LOGW
(
TAG
,
"Invalid state of session %d (expected %d). Restarting session."
,
security2.c:79
handle_session_command0()
ESP_LOGE
(
TAG
,
"Invalid public key length"
)
;
security2.c:85
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to post secure session invalid security params event"
)
;
security2.c:87
handle_session_command0()
ESP_LOGE
(
TAG
,
"Invalid username"
)
;
security2.c:93
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to post secure session invalid security params event"
)
;
security2.c:95
handle_session_command0()
ESP_LOGE
(
TAG
,
"Invalid security params"
)
;
security2.c:101
handle_session_command0()
ESP_LOGD
(
TAG
,
"Username: %.*s"
,
in
->
sc0
->
client_username
.
len
,
in
->
sc0
->
client_username
.
data
)
;
security2.c:106
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to initialise security context!"
)
;
security2.c:114
handle_session_command0()
ESP_LOGI
(
TAG
,
"Using salt and verifier to generate public key..."
)
;
security2.c:125
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to set salt and verifier!"
)
;
security2.c:130
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to device public key!"
)
;
security2.c:135
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to generate device session key!"
)
;
security2.c:144
handle_session_command0()
ESP_LOGE
(
TAG
,
"Error allocating memory for response0"
)
;
security2.c:153
handle_session_command0()
ESP_LOGE
(
TAG
,
"Failed to allocate memory!"
)
;
security2.c:182
handle_session_command0()
ESP_LOGD
(
TAG
,
"Session setup phase1 done"
)
;
security2.c:190
handle_session_command0()
ESP_LOGD
(
TAG
,
"Request to handle setup1_command"
)
;
security2.c:198
handle_session_command1()
ESP_LOGE
(
TAG
,
"Invalid state of session %d (expected %d)"
,
SESSION_STATE_CMD1
,
cur_session
->
state
)
;
security2.c:203
handle_session_command1()
ESP_RETURN_ON_FALSE
(
in
->
sc1
->
client_proof
.
len
==
CLIENT_PROOF_LEN
,
ESP_FAIL
,
TAG
,
"The client proof length does not match"
)
;
security2.c:207
handle_session_command1()
ESP_LOGE
(
TAG
,
"Failed to allocate memory!"
)
;
security2.c:213
handle_session_command1()
ESP_LOGE
(
TAG
,
"Failed to authenticate client proof!"
)
;
security2.c:218
handle_session_command1()
ESP_LOGE
(
TAG
,
"Failed to post credential mismatch event"
)
;
security2.c:221
handle_session_command1()
ESP_LOGE
(
TAG
,
"Failure at mbedtls_gcm_setkey_enc with error code : -0x%x"
,
-
mbed_err
)
;
security2.c:238
handle_session_command1()
ESP_LOGE
(
TAG
,
"Error allocating memory for response1"
)
;
security2.c:247
handle_session_command1()
ESP_LOGE
(
TAG
,
"Failed to post secure session setup success event"
)
;
security2.c:275
handle_session_command1()
ESP_LOGD
(
TAG
,
"Secure session established successfully"
)
;
security2.c:277
handle_session_command1()
ESP_LOGE
(
TAG
,
"Empty session data"
)
;
security2.c:290
sec2_session_setup()
ESP_LOGE
(
TAG
,
"Invalid security message type"
)
;
security2.c:302
sec2_session_setup()
ESP_LOGE
(
TAG
,
"Attempt to close invalid session"
)
;
security2.c:350
sec2_close_session()
ESP_LOGE
(
TAG
,
"Closing old session with id %"
PRIu32
,
cur_session
->
id
)
;
security2.c:379
sec2_new_session()
ESP_LOGE
(
TAG
,
"Error allocating new session"
)
;
security2.c:394
sec2_init()
ESP_LOGE
(
TAG
,
"Session with ID %"
PRId32
"not found"
,
session_id
)
;
security2.c:423
sec2_encrypt()
ESP_LOGE
(
TAG
,
"Secure session not established"
)
;
security2.c:428
sec2_encrypt()
ESP_LOGE
(
TAG
,
"Failed to allocate encrypt buf len %d"
,
*
outlen
)
;
security2.c:435
sec2_encrypt()
ESP_LOGE
(
TAG
,
"Failed at mbedtls_gcm_crypt_and_tag with error code : %d"
,
ret
)
;
security2.c:444
sec2_encrypt()
ESP_LOGE
(
TAG
,
"Session with ID %"
PRId32
"not found"
,
session_id
)
;
security2.c:463
sec2_decrypt()
ESP_LOGE
(
TAG
,
"Secure session not established"
)
;
security2.c:468
sec2_decrypt()
ESP_LOGE
(
TAG
,
"Failed to allocate decrypt buf len %d"
,
*
outlen
)
;
security2.c:475
sec2_decrypt()
ESP_LOGE
(
TAG
,
"Failed at mbedtls_gcm_auth_decrypt : %d"
,
ret
)
;
security2.c:482
sec2_decrypt()
ESP_LOGE
(
TAG
,
"Invalid session context data"
)
;
security2.c:497
sec2_req_handler()
ESP_LOGE
(
TAG
,
"Invalid session ID:%"
PRId32
"(expected %"
PRId32
")"
,
session_id
,
cur_session
->
id
)
;
security2.c:502
sec2_req_handler()
ESP_LOGE
(
TAG
,
"Unable to unpack setup_req"
)
;
security2.c:512
sec2_req_handler()
ESP_LOGE
(
TAG
,
"Security version mismatch. Closing connection"
)
;
security2.c:516
sec2_req_handler()
ESP_LOGE
(
TAG
,
"Session setup error %d"
,
ret
)
;
security2.c:524
sec2_req_handler()
ESP_LOGE
(
TAG
,
"System out of memory"
)
;
security2.c:535
sec2_req_handler()
Call Tree
from
examples
All items filtered out
All items filtered out
Data Use
from
examples
TAG
is read by 10 functions:
All items filtered out
TAG
hexdump()
handle_session_command0()
handle_session_command1()
sec2_session_setup()
sec2_close_session()
sec2_new_session()
sec2_init()
sec2_encrypt()
sec2_decrypt()
sec2_req_handler()
All items filtered out
Class Tree
from
examples
All items filtered out
All items filtered out
Override Tree
from
examples
All items filtered out
All items filtered out
Implementations
from
examples
All items filtered out
All items filtered out
Instances
from
examples
Lifecycle
from
examples
All items filtered out
All items filtered out