Home | History | Annotate | Download | only in eap_server

Lines Matching refs:ikev2

2  * EAP-IKEv2 server (RFC 5106)
14 #include "ikev2.h"
18 struct ikev2_initiator_data ikev2;
37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
92 data->ikev2.state = SA_INIT;
93 data->ikev2.peer_auth = PEER_AUTH_SECRET;
94 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2");
95 if (data->ikev2.key_pad == NULL)
97 data->ikev2.key_pad_len = 21;
100 data->ikev2.proposal.proposal_num = 1;
101 data->ikev2.proposal.integ = AUTH_HMAC_SHA1_96;
102 data->ikev2.proposal.prf = PRF_HMAC_SHA1;
103 data->ikev2.proposal.encr = ENCR_AES_CBC;
104 data->ikev2.proposal.dh = DH_GROUP2_1024BIT_MODP;
106 data->ikev2.IDi = (u8 *) os_strdup("hostapd");
107 data->ikev2.IDi_len = 7;
109 data->ikev2.get_shared_secret = eap_ikev2_get_shared_secret;
110 data->ikev2.cb_ctx = sm;
115 ikev2_initiator_deinit(&data->ikev2);
126 ikev2_initiator_deinit(&data->ikev2);
137 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
155 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
158 integ = ikev2_get_integ(data->ikev2.proposal.integ);
160 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
184 ikev2_integ_hash(data->ikev2.proposal.integ,
185 data->ikev2.keys.SK_ai,
186 data->ikev2.keys.SK_integ_len,
191 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
198 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
216 data->out_buf = ikev2_initiator_build(&data->ikev2);
218 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
219 "generate IKEv2 message");
230 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected state %d in "
246 wpa_printf(MSG_INFO, "EAP-IKEV2: Invalid frame");
260 data->ikev2.proposal.integ, &data->ikev2.keys, 0,
267 wpa_printf(MSG_INFO, "EAP-IKEV2: The message should have "
281 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment overflow");
287 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Received %lu bytes, waiting for %lu "
301 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No Message Length field in "
310 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No memory for "
315 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Received %lu bytes in first "
328 data->ikev2.proposal.prf, &data->ikev2.keys,
329 data->ikev2.i_nonce, data->ikev2.i_nonce_len,
330 data->ikev2.r_nonce, data->ikev2.r_nonce_len,
332 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to derive "
372 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Message underflow");
380 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Invalid Message "
387 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Received packet: Flags 0x%x "
392 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unexpected payload "
397 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Fragment acknowledged");
425 if (ikev2_initiator_process(&data->ikev2, data->in_buf) < 0) {
432 switch (data->ikev2.state) {
441 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication completed "
467 return data->state == DONE && data->ikev2.state == IKEV2_DONE &&
515 "IKEV2");