mirror of
https://github.com/espressif/esp-idf.git
synced 2025-10-13 08:06:16 +00:00
wpa_supplicant:Remove stray \n in supplicant logging
This commit is contained in:
@@ -634,7 +634,7 @@ static int eap_peap_phase2_request(struct eap_sm *sm,
|
||||
return -1;
|
||||
}
|
||||
pos = (u8 *) (hdr + 1);
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: type=%d\n", *pos);
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Request: type=%d", *pos);
|
||||
switch (*pos) {
|
||||
case EAP_TYPE_IDENTITY:
|
||||
*resp = eap_sm_build_identity_resp(sm, hdr->identifier, 1);
|
||||
@@ -702,7 +702,7 @@ static int eap_peap_phase2_request(struct eap_sm *sm,
|
||||
data->phase2_type.method =
|
||||
data->phase2_types[i].method;
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Selected "
|
||||
"Phase 2 EAP vendor %d method %d\n",
|
||||
"Phase 2 EAP vendor %d method %d",
|
||||
data->phase2_type.vendor,
|
||||
data->phase2_type.method);
|
||||
break;
|
||||
@@ -730,7 +730,7 @@ static int eap_peap_phase2_request(struct eap_sm *sm,
|
||||
}
|
||||
if (data->phase2_priv == NULL || data->phase2_method == NULL) {
|
||||
wpa_printf(MSG_ERROR, "EAP-PEAP: failed to initialize "
|
||||
"Phase 2 EAP method %d\n", *pos);
|
||||
"Phase 2 EAP method %d", *pos);
|
||||
ret->methodState = METHOD_DONE;
|
||||
ret->decision = DECISION_FAIL;
|
||||
return -1;
|
||||
@@ -750,7 +750,7 @@ static int eap_peap_phase2_request(struct eap_sm *sm,
|
||||
}
|
||||
|
||||
if (*resp == NULL) {
|
||||
wpa_printf(MSG_ERROR, "phase 2 response failure\n");
|
||||
wpa_printf(MSG_ERROR, "phase 2 response failure");
|
||||
wpabuf_free(data->pending_phase2_req);
|
||||
data->pending_phase2_req = wpabuf_alloc_copy(hdr, len);
|
||||
}
|
||||
@@ -781,7 +781,7 @@ eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data,
|
||||
size_t len;
|
||||
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: received %lu bytes encrypted data for"
|
||||
" Phase 2\n", (unsigned long) wpabuf_len(in_data));
|
||||
" Phase 2", (unsigned long) wpabuf_len(in_data));
|
||||
|
||||
if (data->pending_phase2_req) {
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Pending Phase 2 request - "
|
||||
@@ -929,12 +929,12 @@ continue_req:
|
||||
&resp)) {
|
||||
wpabuf_free(in_decrypted);
|
||||
wpa_printf(MSG_ERROR, "EAP-PEAP: Phase2 Request "
|
||||
"processing failed\n");
|
||||
"processing failed");
|
||||
return 0;
|
||||
}
|
||||
break;
|
||||
case EAP_CODE_SUCCESS:
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Success\n");
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Success");
|
||||
if (data->peap_version == 1) {
|
||||
/* EAP-Success within TLS tunnel is used to indicate
|
||||
* shutdown of the TLS channel. The authentication has
|
||||
@@ -983,7 +983,7 @@ continue_req:
|
||||
}
|
||||
break;
|
||||
case EAP_CODE_FAILURE:
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Failure\n");
|
||||
wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 Failure");
|
||||
ret->decision = DECISION_FAIL;
|
||||
ret->methodState = METHOD_MAY_CONT;
|
||||
ret->allowNotifications = FALSE;
|
||||
|
Reference in New Issue
Block a user