Home | History | Annotate | Download | only in eap_server

Lines Matching defs:psk

2  * hostapd / EAP-PSK (RFC 4764) server
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
65 struct eap_psk_hdr_1 *psk;
67 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
70 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
78 sizeof(*psk) + data->id_s_len,
81 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
87 psk = wpabuf_put(req, sizeof(*psk));
88 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
100 struct eap_psk_hdr_3 *psk;
104 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
107 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
109 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
115 psk = wpabuf_put(req, sizeof(*psk));
116 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */
117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
127 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s))
134 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
135 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
136 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
143 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
149 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
171 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
189 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
194 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
197 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - "
203 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-4 - "
210 wpa_printf(MSG_DEBUG, "EAP-PSK: Too short frame");
231 wpa_printf(MSG_DEBUG, "EAP-PSK: Received PSK-2");
236 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
246 wpa_printf(MSG_INFO, "EAP-PSK: Failed to allocate memory for "
252 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
256 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: unknown ID_P",
276 "EAP-PSK: EAP-PSK not enabled for ID_P",
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in "
294 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
295 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
323 wpa_printf(MSG_INFO, "EAP-PSK: Invalid MAC_P");
324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
346 wpa_printf(MSG_DEBUG, "EAP-PSK: Received PSK-4");
350 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
357 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
360 wpa_printf(MSG_INFO, "EAP-PSK: Too short PCHANNEL data in "
361 "PSK-4 (len=%lu, expected 21)",
367 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase");
387 wpa_printf(MSG_WARNING, "EAP-PSK: PCHANNEL decryption failed");
392 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
398 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - CONT - unsupported");
402 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_SUCCESS");
406 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_FAILURE");
422 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
499 EAP_VENDOR_IETF, EAP_TYPE_PSK, "PSK");