Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:eap

2  * EAP peer method: LEAP
70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame");
85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version "
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response",
143 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Success");
150 wpa_printf(MSG_INFO, "EAP-LEAP: EAP-Success received in "
166 wpa_printf(MSG_WARNING, "EAP-LEAP: Failed to read random data "
173 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
194 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Response");
202 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Response frame");
208 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version "
219 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid response "
226 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Response from AP",
248 wpa_printf(MSG_WARNING, "EAP-LEAP: AP sent an invalid "
250 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: Expected response from AP",
258 /* LEAP is somewhat odd method since it sends EAP-Success in the middle
259 * of the authentication. Use special variable to transit EAP state
274 const struct eap_hdr *eap;
280 wpa_printf(MSG_INFO, "EAP-LEAP: Password not configured");
287 * LEAP needs to be able to handle EAP-Success frame which does not
289 * here. This validation will be done separately for EAP-Request and
290 * EAP-Response frames.
292 eap = wpabuf_head(reqData);
293 if (wpabuf_len(reqData) < sizeof(*eap) ||
294 be_to_host16(eap->length) > wpabuf_len(reqData)) {
295 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid frame");
307 switch (eap->code) {
315 wpa_printf(MSG_INFO, "EAP-LEAP: Unexpected EAP code (%d) - "
316 "ignored", eap->code);
361 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: pw_hash_hash",
363 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_challenge",
365 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: peer_response",
367 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_challenge",
369 wpa_hexdump(MSG_DEBUG, "EAP-LEAP: ap_response",
383 wpa_hexdump_key(MSG_DEBUG, "EAP-LEAP: master key", key, LEAP_KEY_LEN);
395 struct eap_method *eap;
398 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
400 if (eap == NULL)
403 eap->init = eap_leap_init;
404 eap->deinit = eap_leap_deinit;
405 eap->process = eap_leap_process;
406 eap->isKeyAvailable = eap_leap_isKeyAvailable;
407 eap->getKey = eap_leap_getKey;
409 ret = eap_peer_method_register(eap);
411 eap_peer_method_free(eap);