Home | History | Annotate | Download | only in eap_server

Lines Matching full:sake

2  * hostapd / EAP-SAKE (RFC 4763) server
56 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
73 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
77 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
101 struct eap_sake_hdr *sake;
110 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
115 sake = wpabuf_put(msg, sizeof(*sake));
116 sake->version = EAP_SAKE_VERSION;
117 sake->session_id = data->session_id;
118 sake->subtype = subtype;
131 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
142 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
146 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
165 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
169 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
181 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_RAND_S");
186 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
202 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Confirm");
211 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_MIC_S");
220 wpa_printf(MSG_INFO, "EAP-SAKE: Failed to compute MIC");
242 wpa_printf(MSG_DEBUG, "EAP-SAKE: Unknown state %d in buildReq",
261 wpa_printf(MSG_INFO, "EAP-SAKE: Invalid frame");
271 wpa_printf(MSG_INFO, "EAP-SAKE: Unknown version %d", version);
276 wpa_printf(MSG_INFO, "EAP-SAKE: Session ID mismatch (%d,%d)",
281 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received frame: subtype=%d", subtype);
295 wpa_printf(MSG_INFO, "EAP-SAKE: Unexpected subtype=%d in state=%d",
310 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity");
327 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Challenge");
333 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Challenge did not "
353 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with "
370 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P");
390 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Confirm");
396 wpa_printf(MSG_INFO, "EAP-SAKE: Response/Confirm did not "
407 wpa_printf(MSG_INFO, "EAP-SAKE: Incorrect AT_MIC_P");
419 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Auth-Reject");
442 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Received attributes",
519 EAP_VENDOR_IETF, EAP_TYPE_SAKE, "SAKE");