Home | History | Annotate | Download | only in eap_peer

Lines Matching defs:eap

2  * EAP peer method: EAP-FAST (RFC 4851)
80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
177 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");
185 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket "
197 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
202 wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured");
209 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
216 wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
223 wpa_printf(MSG_INFO, "EAP-FAST: No PAC configured and "
282 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive "
292 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])",
309 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block");
317 "EAP-FAST: session_key_seed (SKS = S-IMCK[0])",
323 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: server_challenge",
326 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: client_challenge",
372 wpa_printf(MSG_INFO, "EAP-FAST: Only EAP-MSCHAPv2 is allowed "
382 wpa_printf(MSG_DEBUG, "EAP-FAST: Selected Phase 2 EAP "
397 wpa_printf(MSG_DEBUG, "EAP-FAST: Selected Phase 2 EAP "
424 wpa_printf(MSG_INFO, "EAP-FAST: too short "
429 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: type=%d", *pos);
437 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 EAP sequence - "
459 wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize "
460 "Phase 2 EAP method %d", *pos);
517 wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
540 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
562 wpa_printf(MSG_DEBUG, "EAP-FAST: too short EAP "
570 wpa_printf(MSG_DEBUG, "EAP-FAST: EAP packet overflow in "
571 "EAP Payload TLV");
576 wpa_printf(MSG_INFO, "EAP-FAST: Unexpected code=%d in "
577 "Phase 2 EAP header", hdr->code);
582 wpa_printf(MSG_INFO, "EAP-FAST: Phase2 Request processing "
594 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
597 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
599 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
605 wpa_printf(MSG_INFO, "EAP-FAST: Invalid version/subtype in "
633 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
636 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
638 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
653 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 method not "
665 wpa_printf(MSG_DEBUG, "EAP-FAST: Could not get key material "
676 * EAP-FAST uses reverse order for MS-MPPE keys when deriving
677 * MSK from EAP-MSCHAPv2. Swap the keys here to get the correct
678 * ISK for EAP-FAST cryptobinding.
695 wpa_printf(MSG_DEBUG, "EAP-FAST: Determining CMK[%d] for Compound MIC "
708 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk));
714 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]",
717 wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",
768 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
773 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC",
775 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC",
778 wpa_printf(MSG_INFO, "EAP-FAST: Compound MAC did not match");
795 wpa_printf(MSG_INFO, "EAP-FAST: Failed to generate MSK");
808 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id",
811 wpa_printf(MSG_ERROR, "EAP-FAST: Failed to derive "
831 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: PAC-Key", pos, len);
833 wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid PAC-Key "
841 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len);
846 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info", pos, len);
851 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC type %d",
876 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
890 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
909 wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info - "
923 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - CRED_LIFETIME %d "
928 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID",
934 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - I-ID",
940 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID-Info",
948 wpa_printf(MSG_INFO, "EAP-FAST: Invalid PAC-Type "
952 "EAP-FAST: PAC-Info - PAC-Type",
960 wpa_printf(MSG_INFO, "EAP-FAST: Unsupported PAC Type "
965 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - PAC-Type %d",
970 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC-Info "
1000 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info overrun "
1015 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info does not include "
1048 * material and must end with an EAP-Failure.
1060 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1066 * expected to be completed with an EAP-Success. However,
1067 * RFC 5422, Section 3.5 allows EAP-Failure to be sent even
1068 * after protected success exchange in case of EAP-Fast
1072 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1101 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1104 wpa_printf(MSG_DEBUG, "EAP-FAST: Received Phase 2: "
1114 wpa_printf(MSG_DEBUG, "EAP-FAST: Nak unknown "
1119 wpa_printf(MSG_DEBUG, "EAP-FAST: ignored "
1140 wpa_hexdump_buf(MSG_DEBUG, "EAP-FAST: Encrypting Phase 2 data",
1145 wpa_printf(MSG_INFO, "EAP-FAST: Failed to encrypt a Phase 2 "
1225 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1242 wpa_printf(MSG_DEBUG, "EAP-FAST: Request Tunnel PAC");
1258 wpa_printf(MSG_DEBUG, "EAP-FAST: Unauthenticated "
1264 wpa_printf(MSG_DEBUG, "EAP-FAST: Authentication "
1275 wpa_printf(MSG_DEBUG, "EAP-FAST: No recognized TLVs - send "
1294 wpa_printf(MSG_DEBUG, "EAP-FAST: Received %lu bytes encrypted data for"
1298 wpa_printf(MSG_DEBUG, "EAP-FAST: Pending Phase 2 request - "
1320 wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1324 wpa_printf(MSG_INFO, "EAP-FAST: Too short Phase 2 "
1346 * Parse authority identity (A-ID) from the EAP-FAST/Start. This
1357 wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
1363 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len);
1385 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC found for this A-ID "
1387 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-FAST: A-ID-Info",
1415 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to add PAC-Opaque TLS "
1431 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to remove PAC-Opaque "
1446 wpa_printf(MSG_DEBUG, "EAP-FAST: Enabling unauthenticated "
1452 wpa_printf(MSG_DEBUG, "EAP-FAST: Enabling authenticated "
1463 wpa_printf(MSG_INFO, "EAP-FAST: Could not configure TLS "
1479 /* EAP-FAST Version negotiation (section 3.1) */
1480 wpa_printf(MSG_DEBUG, "EAP-FAST: Start (server ver=%d, own ver=%d)",
1484 wpa_printf(MSG_DEBUG, "EAP-FAST: Using FAST version %d",
1491 wpa_printf(MSG_DEBUG, "EAP-FAST: Trying to resume session - "
1505 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found and "
1509 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found - "
1574 "EAP-FAST: TLS done, proceed to Phase 2");
1582 wpa_printf(MSG_DEBUG, "EAP-FAST: Using "
1667 "EAP-FAST Phase2 method=%s\n",
1743 struct eap_method *eap;
1746 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
1748 if (eap == NULL)
1751 eap->init = eap_fast_init;
1752 eap->deinit = eap_fast_deinit;
1753 eap->process = eap_fast_process;
1754 eap->isKeyAvailable = eap_fast_isKeyAvailable;
1755 eap->getKey = eap_fast_getKey;
1756 eap->getSessionId = eap_fast_get_session_id;
1757 eap->get_status = eap_fast_get_status;
1759 eap->has_reauth_data = eap_fast_has_reauth_data;
1760 eap->deinit_for_reauth = eap_fast_deinit_for_reauth;
1761 eap->init_for_reauth = eap_fast_init_for_reauth;
1763 eap->get_emsk = eap_fast_get_emsk;
1765 ret = eap_peer_method_register(eap);
1767 eap_peer_method_free(eap);