Home | History | Annotate | Download | only in eap_server

Lines Matching refs:eap

2  * hostapd / EAP-EKE (RFC 6124) server
61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code);
122 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x",
187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity");
245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit");
248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured");
257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key");
278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH");
286 wpa_printf(MSG_INFO, "EAP-EKE: Failed to build DHComponent_S");
311 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Confirm");
325 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S",
350 if (eap_eke_auth(&data->sess, "EAP-EKE server", data->msgs, auth) < 0) {
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len);
375 wpa_printf(MSG_DEBUG, "EAP-EKE: Unknown state %d in buildReq",
393 wpa_printf(MSG_INFO, "EAP-EKE: Invalid frame");
398 wpa_printf(MSG_DEBUG, "EAP-EKE: Received frame: EKE-Exch=%d", eke_exch);
412 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected EKE-Exch=%d in state=%d",
427 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Identity");
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload");
444 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected NumProposals %d (expected 1)",
453 wpa_printf(MSG_INFO, "EAP-EKE: Unexpected Proposal (%u:%u:%u:%u)",
459 wpa_printf(MSG_DEBUG, "EAP-EKE: Selected Proposal (%u:%u:%u:%u)",
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid");
478 wpa_printf(MSG_DEBUG, "EAP-EKE: Peer IDType %u", data->peerid_type);
479 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: Peer Identity",
483 wpa_printf(MSG_INFO, "EAP-EKE: Peer Identity not found from user database");
494 wpa_printf(MSG_INFO, "EAP-EKE: Matching user entry does not allow EAP-EKE");
500 wpa_printf(MSG_INFO, "EAP-EKE: No password configured for peer");
523 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Commit");
534 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short EAP-EKE-Commit");
539 wpa_hexdump(MSG_DEBUG, "EAP-EKE: DHComponent_P",
543 wpa_hexdump(MSG_DEBUG, "EAP-EKE: PNonce_P", pos, data->sess.pnonce_len);
546 wpa_hexdump(MSG_DEBUG, "EAP-EKE: CBValue", pos, end - pos);
550 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive shared secret");
558 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive Ke/Ki");
566 wpa_printf(MSG_INFO, "EAP-EKE: Failed to decrypt PNonce_P");
571 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_P protected data too short to include Nonce_P");
575 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P",
597 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Confirm");
604 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Confirm");
607 wpa_printf(MSG_DEBUG, "EAPEAP-EKE-Confirm");
615 wpa_printf(MSG_INFO, "EAP-EKE: Failed to decrypt PNonce_S");
620 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_S protected data too short to include Nonce_S");
624 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_S",
627 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_S does not match previously sent Nonce_S");
632 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth_p) < 0) {
633 wpa_printf(MSG_INFO, "EAP-EKE: Could not derive Auth_P");
637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len);
640 wpa_printf(MSG_INFO, "EAP-EKE: Auth_P does not match");
649 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive MSK/EMSK");
669 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Failure");
672 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short EAP-EKE-Failure");
678 wpa_printf(MSG_DEBUG, "EAP-EKE: Peer reported failure code 0x%x", code);
700 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Received payload", pos, end - pos);
771 struct eap_method *eap;
774 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
776 if (eap == NULL)
779 eap->init = eap_eke_init;
780 eap->reset = eap_eke_reset;
781 eap->buildReq = eap_eke_buildReq;
782 eap->check = eap_eke_check;
783 eap->process = eap_eke_process;
784 eap->isDone = eap_eke_isDone;
785 eap->getKey = eap_eke_getKey;
786 eap->isSuccess = eap_eke_isSuccess;
787 eap->get_emsk = eap_eke_get_emsk;
789 ret = eap_server_method_register(eap);
791 eap_server_method_free(eap);