Lines Matching full:psk
2 * EAP peer method: EAP-PSK (RFC 4764)
14 * Note: EAP-PSK is an EAP authentication method and as such, completely
15 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
45 wpa_printf(MSG_INFO, "EAP-PSK: pre-shared key not configured");
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
64 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
92 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
98 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message "
106 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr1->flags);
108 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 0)",
114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
120 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory for "
126 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S",
130 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
164 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
167 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_P",
189 wpa_printf(MSG_DEBUG, "EAP-PSK: in MAC_SENT state");
194 wpa_printf(MSG_INFO, "EAP-PSK: Invalid third message "
204 wpa_printf(MSG_DEBUG, "EAP-PSK: Flags=0x%x", hdr3->flags);
206 wpa_printf(MSG_INFO, "EAP-PSK: Unexpected T=%d (expected 2)",
212 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
214 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN);
215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left);
218 wpa_printf(MSG_INFO, "EAP-PSK: Too short PCHANNEL data in "
235 wpa_printf(MSG_WARNING, "EAP-PSK: Invalid MAC_S in third "
241 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
245 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
246 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
247 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
260 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce",
262 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - hdr", reqData, 5);
263 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left);
275 wpa_printf(MSG_WARNING, "EAP-PSK: PCHANNEL decryption failed");
279 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
285 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - CONT - unsupported");
289 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_SUCCESS");
292 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_FAILURE");
293 wpa_printf(MSG_INFO, "EAP-PSK: Authentication server rejected "
320 wpa_printf(MSG_DEBUG, "EAP-PSK: Unsupported E (Ext) flag");
336 wpa_hexdump(MSG_DEBUG, "EAP-PSK: reply message (plaintext)",
340 wpa_hexdump(MSG_DEBUG, "EAP-PSK: reply message (PCHANNEL)",
343 wpa_printf(MSG_DEBUG, "EAP-PSK: Completed %ssuccessfully",
388 wpa_printf(MSG_DEBUG, "EAP-PSK: in DONE state - ignore "
453 EAP_VENDOR_IETF, EAP_TYPE_PSK, "PSK");