Home | History | Annotate | Download | only in eap_server

Lines Matching refs:psk

2  * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
9 * different from WPA-PSK. This file is not needed for WPA-PSK functionality.
58 struct eap_psk_hdr_1 *psk;
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
71 sizeof(*psk) + sm->server_id_len,
74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
80 psk = wpabuf_put(req, sizeof(*psk));
81 psk->flags = EAP_PSK_FLAGS_SET_T(0); /* T=0 */
82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
93 struct eap_psk_hdr_3 *psk;
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
108 psk = wpabuf_put(req, sizeof(*psk));
109 psk->flags = EAP_PSK_FLAGS_SET_T(2); /* T=2 */
110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN);
130 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: MSK", data->msk, EAP_MSK_LEN);
131 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: EMSK", data->emsk, EAP_EMSK_LEN);
138 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (plaintext)",
144 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL (encrypted)",
166 wpa_printf(MSG_DEBUG, "EAP-PSK: Unknown state %d in buildReq",
184 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
189 wpa_printf(MSG_DEBUG, "EAP-PSK: received frame: T=%d", t);
192 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-2 - "
198 wpa_printf(MSG_DEBUG, "EAP-PSK: Expected PSK-4 - "
205 wpa_printf(MSG_DEBUG, "EAP-PSK: Too short frame");
226 wpa_printf(MSG_DEBUG, "EAP-PSK: Received PSK-2");
231 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
241 wpa_printf(MSG_INFO, "EAP-PSK: Failed to allocate memory for "
247 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PSK: ID_P",
251 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: unknown ID_P",
271 "EAP-PSK: EAP-PSK not enabled for ID_P",
279 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in "
289 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
290 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
292 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
318 wpa_printf(MSG_INFO, "EAP-PSK: Invalid MAC_P");
319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
341 wpa_printf(MSG_DEBUG, "EAP-PSK: Received PSK-4");
345 wpa_printf(MSG_INFO, "EAP-PSK: Invalid frame");
352 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Encrypted PCHANNEL", pos, left);
355 wpa_printf(MSG_INFO, "EAP-PSK: Too short PCHANNEL data in "
356 "PSK-4 (len=%lu, expected 21)",
362 wpa_printf(MSG_DEBUG, "EAP-PSK: Nonce did not increase");
382 wpa_printf(MSG_WARNING, "EAP-PSK: PCHANNEL decryption failed");
387 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Decrypted PCHANNEL message",
393 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - CONT - unsupported");
397 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_SUCCESS");
401 wpa_printf(MSG_DEBUG, "EAP-PSK: R flag - DONE_FAILURE");
417 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
494 EAP_VENDOR_IETF, EAP_TYPE_PSK, "PSK");