Home | History | Annotate | Download | only in eap_peer

Lines Matching defs:pac

49 	int provisioning_allowed; /* Allowed PAC provisioning modes */
50 int provisioning; /* doing PAC provisioning (not the normal auth) */
61 struct eap_fast_pac *pac;
89 "new PAC-Key");
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
202 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured");
208 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) {
209 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
215 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0) {
216 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
220 eap_fast_pac_list_truncate(data->pac, data->max_pac_list_len);
222 if (data->pac == NULL && !data->provisioning_allowed) {
223 wpa_printf(MSG_INFO, "EAP-FAST: No PAC configured and "
236 struct eap_fast_pac *pac, *prev;
246 pac = data->pac;
248 while (pac) {
249 prev = pac;
250 pac = pac->next;
540 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
726 struct eap_tlv_hdr *pac;
735 pac = (struct eap_tlv_hdr *) (act + 1);
736 pac->tlv_type = host_to_be16(EAP_TLV_PAC_TLV);
737 pac->length = host_to_be16(sizeof(*type));
739 type = (struct eap_tlv_pac_type_tlv *) (pac + 1);
831 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: PAC-Key", pos, len);
833 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid PAC-Key "
841 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len);
846 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info", pos, len);
851 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC type %d",
859 u8 *pac, size_t pac_len)
866 pos = pac;
876 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
890 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
909 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info - "
916 * This is not currently saved separately in PAC files since
917 * the server can automatically initiate PAC update when
918 * needed. Anyway, the information is available from PAC-Info
923 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - CRED_LIFETIME %d "
928 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID",
934 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - I-ID",
940 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID-Info",
946 /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
948 wpa_printf(MSG_INFO, "EAP-FAST: Invalid PAC-Type "
952 "EAP-FAST: PAC-Info - PAC-Type",
960 wpa_printf(MSG_INFO, "EAP-FAST: Unsupported PAC Type "
965 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - PAC-Type %d",
970 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC-Info "
988 /* PAC-Type defaults to Tunnel PAC (Type 1) */
1000 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info overrun "
1015 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info does not include "
1027 u8 *pac, size_t pac_len)
1033 if (eap_fast_process_pac_tlv(&entry, pac, pac_len) ||
1037 eap_fast_add_pac(&data->pac, &data->current_pac, &entry);
1038 eap_fast_pac_list_truncate(data->pac, data->max_pac_list_len);
1040 eap_fast_save_pac_bin(sm, data->pac, config->pac_file);
1042 eap_fast_save_pac(sm, data->pac, config->pac_file);
1060 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1065 * This is PAC refreshing, i.e., normal authentication that is
1072 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1073 "- PAC refreshing completed successfully");
1224 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
1225 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1228 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
1229 tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
1235 !data->anon_provisioning && !tlv.pac &&
1239 * Need to request Tunnel PAC when using authenticated
1242 wpa_printf(MSG_DEBUG, "EAP-FAST: Request Tunnel PAC");
1372 data->current_pac = eap_fast_get_pac(data->pac, a_id, a_id_len,
1376 * Tunnel PAC was not available for this A-ID. Try to use
1377 * Machine Authentication PAC, if one is available.
1380 data->pac, a_id, a_id_len,
1385 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC found for this A-ID "
1386 "(PAC-Type %d)", data->current_pac->pac_type);
1396 struct eap_fast_pac *pac)
1402 olen = pac->pac_opaque_len;
1409 os_memcpy(ehdr + 1, pac->pac_opaque, olen);
1415 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to add PAC-Opaque TLS "
1431 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to remove PAC-Opaque "
1492 "do not add PAC-Opaque to TLS ClientHello");
1497 * PAC found for the A-ID and we are not resuming an old
1498 * session, so add PAC-Opaque extension to ClientHello.
1503 /* No PAC found, so we must provision one. */
1505 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found and "
1509 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found - "