Home | History | Annotate | Download | only in eap_peer

Lines Matching defs:eap

2  * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
183 "EAP-AKA: Use result from external USIM processing");
192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN);
209 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN);
217 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN);
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
236 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response");
246 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
269 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
272 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
301 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
314 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
333 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorithm "
349 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym");
356 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old reauth_id");
362 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old eap_id");
380 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM",
396 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
415 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
424 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID",
463 * No EAP-AKA/Identity packets were exchanged - send empty
470 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
473 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
500 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server "
512 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server "
518 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
529 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE");
546 wpa_printf(MSG_DEBUG, "EAP-AKA: Send Client-Error (error code %d)",
564 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Authentication-Reject "
580 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Synchronization-Failure "
620 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", id);
640 wpa_printf(MSG_DEBUG, "Generating EAP
665 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Reauthentication (id=%d)",
684 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt "
707 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Notification (id=%d)", id);
720 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt "
743 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Identity");
766 wpa_printf(MSG_INFO, "EAP-AKA: Too many ID requests "
804 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
844 wpa_printf(MSG_WARNING, "EAP-AKA': The server did not "
855 wpa_printf(MSG_WARNING, "EAP-AKA': The server did not "
868 wpa_printf(MSG_WARNING, "EAP-AKA': The server "
891 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Challenge");
896 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the "
905 wpa_printf(MSG_WARNING, "EAP-AKA': Challenge message "
913 wpa_printf(MSG_WARNING, "EAP-AKA': No memory for "
920 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': Network Name "
932 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
940 wpa_printf(MSG_WARNING, "EAP-AKA: Bidding down from "
950 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message "
963 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication "
967 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication "
971 wpa_printf(MSG_DEBUG, "EAP-AKA: Wait for external USIM processing");
974 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication failed");
984 wpa_printf(MSG_WARNING, "EAP-AKA': AMF separation bit "
1002 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK "
1015 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message "
1065 wpa_printf(MSG_WARNING, "EAP-AKA: Notification message after "
1074 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted "
1080 wpa_printf(MSG_WARNING, "EAP-AKA: Counter in notification "
1097 wpa_printf(MSG_INFO, "EAP-AKA: no AT_MAC in after_auth "
1103 wpa_printf(MSG_WARNING, "EAP-AKA: Notification message "
1110 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid notification "
1123 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Notification");
1125 wpa_printf(MSG_INFO, "EAP-AKA: too many notification "
1132 wpa_printf(MSG_INFO, "EAP-AKA: no AT_NOTIFICATION in "
1161 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Reauthentication");
1166 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the "
1173 wpa_printf(MSG_WARNING, "EAP-AKA: Server is trying "
1181 wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication "
1188 wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication "
1198 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted "
1205 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet",
1215 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter "
1221 * However, since it was used in the last EAP-Response-Identity
1238 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S",
1267 wpa_printf(MSG_DEBUG, "EAP-AKA: Maximum number of "
1289 wpa_hexdump_buf(MSG_DEBUG, "EAP-AKA: EAP data", reqData);
1291 wpa_printf(MSG_INFO, "EAP-AKA: Identity not configured");
1313 wpa_printf(MSG_DEBUG, "EAP-AKA: Subtype=%d", subtype);
1340 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Client-Error");
1345 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown subtype=%d", subtype);
1361 * not only accept EAP-Success at this point.
1467 wpa_hexdump(MSG_DEBUG, "EAP-AKA: Derived Session-Id", id, *len);
1494 struct eap_method *eap;
1497 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
1499 if (eap == NULL)
1502 eap->init = eap_aka_init;
1503 eap->deinit = eap_aka_deinit;
1504 eap->process = eap_aka_process;
1505 eap->isKeyAvailable = eap_aka_isKeyAvailable;
1506 eap->getKey = eap_aka_getKey;
1507 eap->getSessionId = eap_aka_get_session_id;
1508 eap->has_reauth_data = eap_aka_has_reauth_data;
1509 eap->deinit_for_reauth = eap_aka_deinit_for_reauth;
1510 eap->init_for_reauth = eap_aka_init_for_reauth;
1511 eap->get_identity = eap_aka_get_identity;
1512 eap->get_emsk = eap_aka_get_emsk;
1514 ret = eap_peer_method_register(eap);
1516 eap_peer_method_free(eap);
1524 struct eap_method *eap;
1527 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
1530 if (eap == NULL)
1533 eap->init = eap_aka_prime_init;
1534 eap->deinit = eap_aka_deinit;
1535 eap->process = eap_aka_process;
1536 eap->isKeyAvailable = eap_aka_isKeyAvailable;
1537 eap->getKey = eap_aka_getKey;
1538 eap->getSessionId = eap_aka_get_session_id;
1539 eap->has_reauth_data = eap_aka_has_reauth_data;
1540 eap->deinit_for_reauth = eap_aka_deinit_for_reauth;
1541 eap->init_for_reauth = eap_aka_init_for_reauth;
1542 eap->get_identity = eap_aka_get_identity;
1543 eap->get_emsk = eap_aka_get_emsk;
1545 ret = eap_peer_method_register(eap);
1547 eap_peer_method_free(eap);