Home | History | Annotate | Download | only in eap_server

Lines Matching refs:sake

2  * hostapd / EAP-SAKE (RFC 4763) server
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
78 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
82 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
106 struct eap_sake_hdr *sake;
115 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
120 sake = wpabuf_put(msg, sizeof(*sake));
121 sake->version = EAP_SAKE_VERSION;
122 sake->session_id = data->session_id;
123 sake->subtype = subtype;
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
147 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
170 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
174 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
191 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
207 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
216 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S");
225 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
247 wpa_printf(MSG_DEBUG, "EAP-SAKE: Unknown state %d in buildReq",
266 wpa_printf(MSG_INFO, "EAP-SAKE: Invalid frame");
276 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version);
281 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)",
286 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received frame: subtype=%d", subtype);
300 wpa_printf(MSG_INFO, "EAP-SAKE: Unexpected subtype=%d in state=%d",
315 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity");
332 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
338 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Challenge did not "
358 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with "
375 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P");
395 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Confirm");
401 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Confirm did not "
412 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P");
424 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
447 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes",
524 EAP_VENDOR_IETF, EAP_TYPE_SAKE, "SAKE");