Home | History | Annotate | Download | only in eap_server

Lines Matching refs:eap

2  * hostapd / EAP-TTLS (RFC 5281)
70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
126 /* Note: eap is allocated memory; caller is responsible for freeing
129 u8 *eap;
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
200 if (parse->eap == NULL) {
201 parse->eap = os_malloc(dlen);
202 if (parse->eap == NULL) {
203 wpa_printf(MSG_WARNING, "EAP-TTLS: "
205 "for Phase 2 EAP data");
208 os_memcpy(parse->eap, dpos, dlen);
211 u8 *neweap = os_realloc(parse->eap,
214 wpa_printf(MSG_WARNING, "EAP-TTLS: "
216 "for Phase 2 EAP data");
220 parse->eap = neweap;
225 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name",
237 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: "
245 "EAP-TTLS: CHAP-Challenge (CHAP)",
252 "EAP-TTLS: CHAP-Password (CHAP)",
259 "EAP-TTLS: MS-CHAP-Challenge",
266 "EAP-TTLS: MS-CHAP-Response (MSCHAP)",
273 "EAP-TTLS: MS-CHAP2-Response (MSCHAPV2)",
278 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported "
283 wpa_printf(MSG_DEBUG, "EAP-TTLS: Ignoring unsupported "
296 os_free(parse->eap);
297 parse->eap = NULL;
321 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
351 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to allocate memory for"
376 "EAP-TTLS/EAP: Encapsulate Phase 2 data", buf);
380 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Failed to encapsulate "
385 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS/EAP: Encrypt encapsulated "
426 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Encrypting Phase 2 "
455 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase1 done, "
472 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s - unexpected state %d",
490 wpa_printf(MSG_INFO, "EAP-TTLS: Invalid frame");
505 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: No plaintext user "
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
536 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Invalid CHAP attributes "
546 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: No plaintext user "
555 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Failed to generate "
564 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch");
577 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Correct user password");
580 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Invalid user password");
596 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Invalid MS-CHAP "
606 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: No user password "
615 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Failed to generate "
624 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Challenge mismatch");
638 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
641 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Invalid NT-Response");
642 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received",
644 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected",
664 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Invalid MS-CHAP2 "
674 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user password "
681 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user identity "
703 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Failed to generate "
712 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Challenge mismatch");
722 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: User",
724 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
726 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
744 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Correct "
762 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Invalid "
764 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Received",
766 wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Expected",
809 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: %s - Phase2 not "
819 wpa_hexdump(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 type Nak'ed; "
827 wpa_printf(MSG_DEBUG, "EAP-TTLS: try EAP type %d",
830 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to "
831 "initialize EAP type %d",
845 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 check() asked to "
853 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method is in "
863 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method failed");
882 wpa_printf(MSG_DEBUG, "EAP-TTLS: try EAP type %d", next_type);
884 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to initialize "
885 "EAP type %d", next_type);
895 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s - unexpected state %d",
904 const u8 *eap, size_t eap_len)
910 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: initializing Phase 2");
913 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: failed to "
914 "initialize EAP-Identity");
920 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: too short Phase 2 EAP "
925 hdr = (struct eap_hdr *) eap;
927 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: received Phase 2 EAP: code=%d "
931 wpa_printf(MSG_INFO, "EAP-TTLS/EAP: Length mismatch in Phase 2"
932 " EAP frame (hdr len=%lu, data len in AVP=%lu)",
943 wpa_printf(MSG_INFO, "EAP-TTLS/EAP: Unexpected code=%d in "
944 "Phase 2 EAP header", hdr->code);
957 wpa_printf(MSG_DEBUG, "EAP-TTLS: received %lu bytes encrypted data for"
961 wpa_printf(MSG_DEBUG, "EAP-TTLS: Pending Phase 2 EAP response "
974 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to decrypt Phase 2 "
980 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 EAP",
984 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to parse AVPs");
1011 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 Identity not "
1019 if (data->tnc_started && parse.eap == NULL) {
1020 wpa_printf(MSG_DEBUG, "EAP-TTLS: TNC started but no EAP "
1027 if (parse.eap) {
1028 eap_ttls_process_phase2_eap(sm, data, parse.eap,
1055 os_free(parse.eap);
1065 wpa_printf(MSG_DEBUG, "EAP-TTLS: Initialize TNC");
1067 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to initialize TNC");
1083 wpa_printf(MSG_DEBUG, "EAP-TTLS: peer ver=%d, own ver=%d; "
1111 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Peer "
1115 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Peer "
1119 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Unexpected "
1129 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected state %d in %s",
1167 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
1170 wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key");
1186 struct eap_method *eap;
1189 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
1191 if (eap == NULL)
1194 eap->init = eap_ttls_init;
1195 eap->reset = eap_ttls_reset;
1196 eap->buildReq = eap_ttls_buildReq;
1197 eap->check = eap_ttls_check;
1198 eap->process = eap_ttls_process;
1199 eap->isDone = eap_ttls_isDone;
1200 eap->getKey = eap_ttls_getKey;
1201 eap->isSuccess = eap_ttls_isSuccess;
1203 ret = eap_server_method_register(eap);
1205 eap_server_method_free(eap);