Home | History | Annotate | Download | only in eap_peer

Lines Matching defs:eap

2  * EAP peer method: EAP-TTLS (RFC 5281)
79 selected = "EAP";
84 selected = "EAP";
100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id");
272 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
273 "Phase 2 EAP vendor %d method %d",
322 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
323 "EAP method");
330 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP "
337 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
338 "Phase 2 EAP vendor %d method %d (TNC)",
370 wpa_printf(MSG_INFO, "EAP-TTLS: failed to initialize "
371 "Phase 2 EAP method %d", method);
390 wpa_printf(MSG_INFO, "EAP-TTLS: too short "
395 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos);
416 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response",
434 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request");
444 "EAP-TTLS/MSCHAPV2: Failed to allocate memory");
458 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive "
477 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to get "
491 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive "
506 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPv2 not included in the build");
523 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAP Request");
533 "EAP-TTLS/MSCHAP: Failed to allocate memory");
547 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAP: Failed to derive "
567 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
572 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password",
575 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP implicit challenge",
577 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAP response", pos, 24);
585 /* EAP-TTLS/MSCHAP does not provide tunneled success
605 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 PAP Request");
615 "EAP-TTLS/PAP: Failed to allocate memory");
624 /* User-Password; in RADIUS, this is encrypted, but EAP-TTLS encrypts
639 /* EAP-TTLS/PAP does not provide tunneled success notification,
658 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 CHAP Request");
668 "EAP-TTLS/CHAP: Failed to allocate memory");
682 wpa_printf(MSG_ERROR, "EAP-TTLS/CHAP: Failed to derive "
700 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: CHAP username",
702 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: CHAP password",
704 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: CHAP implicit challenge",
706 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: CHAP password",
715 /* EAP-TTLS/CHAP does not provide tunneled success
736 wpa_printf(MSG_DEBUG, "EAP-TTLS: Processing TNC");
747 "EAP-TTLS: Identity not configured");
756 "EAP-TTLS: Password not configured");
779 wpa_printf(MSG_ERROR, "EAP-TTLS: Phase 2 - Unknown");
804 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
808 wpa_printf(MSG_WARNING, "EAP-TTLS: Failed to allocate "
809 "memory for Phase 2 EAP data");
817 wpa_printf(MSG_WARNING, "EAP-TTLS: Failed to allocate "
818 "memory for Phase 2 EAP data");
843 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
848 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
855 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length %d",
864 wpa_printf(MSG_WARNING, "EAP-TTLS: Vendor AVP "
869 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
875 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
883 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: AVP - Reply-Message",
887 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: MS-CHAP2-Success",
890 wpa_printf(MSG_WARNING, "EAP-TTLS: Unexpected "
899 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: MS-CHAP-Error",
903 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported mandatory AVP "
908 wpa_printf(MSG_DEBUG, "EAP-TTLS: Ignoring unsupported AVP "
926 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 AVPs", pos, left);
928 wpa_printf(MSG_WARNING, "EAP-TTLS: Too short Phase 2 AVP frame"
960 wpa_printf(MSG_DEBUG, "EAP-TTLS: empty data in beginning of "
961 "Phase 2 - use fake EAP-Request Identity");
964 wpa_printf(MSG_WARNING, "EAP-TTLS: failed to allocate "
965 "memory for fake EAP-Identity Request");
987 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Encrypting Phase 2 data",
992 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to encrypt a Phase 2 "
1012 wpa_printf(MSG_WARNING, "EAP-TTLS: No EAP Message in the "
1017 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP",
1022 wpa_printf(MSG_WARNING, "EAP-TTLS: Too short Phase 2 EAP "
1030 wpa_printf(MSG_INFO, "EAP-TTLS: Length mismatch in Phase 2 "
1031 "EAP frame (EAP hdr len=%lu, EAP data len in "
1037 wpa_printf(MSG_DEBUG, "EAP-TTLS: received Phase 2: code=%d "
1043 wpa_printf(MSG_INFO, "EAP-TTLS: Phase2 Request "
1049 wpa_printf(MSG_INFO, "EAP-TTLS: Unexpected code=%d in "
1050 "Phase 2 EAP header", hdr->code);
1065 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Received "
1077 * Allow EAP-TNC to be started after successfully
1083 wpa_printf(MSG_WARNING, "EAP-TTLS: no MS-CHAP2-Success AVP "
1088 wpa_printf(MSG_WARNING, "EAP-TTLS: Ident mismatch for Phase 2 "
1096 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid authenticator "
1101 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 MSCHAPV2 "
1109 * with EAP-Success after this.
1113 wpa_printf(MSG_ERROR, "EAP-TTLS: MSCHAPv2 not included in the build");
1126 /* TNC uses inner EAP method after non-EAP TTLS phase 2. */
1128 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received "
1129 "unexpected tunneled data (no EAP)");
1134 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received "
1135 "EAP after non-EAP, but not ready for TNC");
1139 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
1140 "non-EAP method");
1200 /* EAP-TTLS/{MSCHAP,PAP,CHAP} should not send any TLS tunneled
1202 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received unexpected "
1243 wpa_printf(MSG_INFO, "EAP-TTLS: Phase2 Request "
1255 * processing when EAP request is re-processed after
1284 * EAP-TTLS does not use Phase2 on fast re-auth; this must be done only
1286 * Authentication Servers terminate EAP-TTLS before reaching this
1292 wpa_printf(MSG_DEBUG, "EAP-TTLS: Session resumption - "
1318 wpa_printf(MSG_DEBUG, "EAP-TTLS: received %lu bytes encrypted data for"
1323 wpa_printf(MSG_DEBUG, "EAP-TTLS: Pending Phase 2 request - "
1393 wpa_printf(MSG_DEBUG, "EAP-TTLS: TLS done, proceed to "
1396 wpa_printf(MSG_DEBUG, "EAP-TTLS: fast reauth - may "
1407 wpa_printf(MSG_WARNING, "EAP-TTLS: "
1441 wpa_printf(MSG_DEBUG, "EAP-TTLS: Authentication "
1458 wpa_printf(MSG_DEBUG, "EAP-TTLS: Authentication "
1483 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start (server ver=%d, own "
1568 "EAP-TTLSv%d Phase2 method=",
1575 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n",
1650 struct eap_method *eap;
1653 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
1655 if (eap == NULL)
1658 eap->init = eap_ttls_init;
1659 eap->deinit = eap_ttls_deinit;
1660 eap->process = eap_ttls_process;
1661 eap->isKeyAvailable = eap_ttls_isKeyAvailable;
1662 eap->getKey = eap_ttls_getKey;
1663 eap->getSessionId = eap_ttls_get_session_id;
1664 eap->get_status = eap_ttls_get_status;
1665 eap->has_reauth_data = eap_ttls_has_reauth_data;
1666 eap->deinit_for_reauth = eap_ttls_deinit_for_reauth;
1667 eap->init_for_reauth = eap_ttls_init_for_reauth;
1669 ret = eap_peer_method_register(eap);
1671 eap_peer_method_free(eap);