Lines Matching full:sake

2  * EAP server/peer: EAP-SAKE shared routines
25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S"); in eap_sake_parse_add_attr()
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with " in eap_sake_parse_add_attr()
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P"); in eap_sake_parse_add_attr()
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with " in eap_sake_parse_add_attr()
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S"); in eap_sake_parse_add_attr()
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with " in eap_sake_parse_add_attr()
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P"); in eap_sake_parse_add_attr()
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with " in eap_sake_parse_add_attr()
61 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SERVERID"); in eap_sake_parse_add_attr()
66 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PEERID"); in eap_sake_parse_add_attr()
71 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SPI_S"); in eap_sake_parse_add_attr()
76 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_SPI_P"); in eap_sake_parse_add_attr()
81 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_ANY_ID_REQ"); in eap_sake_parse_add_attr()
83 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid AT_ANY_ID_REQ" in eap_sake_parse_add_attr()
90 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PERM_ID_REQ"); in eap_sake_parse_add_attr()
92 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid " in eap_sake_parse_add_attr()
99 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_ENCR_DATA"); in eap_sake_parse_add_attr()
104 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_IV"); in eap_sake_parse_add_attr()
109 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_PADDING"); in eap_sake_parse_add_attr()
112 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_PADDING " in eap_sake_parse_add_attr()
119 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_NEXT_TMPID"); in eap_sake_parse_add_attr()
124 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MSK_LIFE"); in eap_sake_parse_add_attr()
126 wpa_printf(MSG_DEBUG, "EAP-SAKE: Invalid " in eap_sake_parse_add_attr()
134 wpa_printf(MSG_DEBUG, "EAP-SAKE: Unknown non-skippable" in eap_sake_parse_add_attr()
138 wpa_printf(MSG_DEBUG, "EAP-SAKE: Ignoring unknown skippable " in eap_sake_parse_add_attr()
144 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_IV included without " in eap_sake_parse_add_attr()
154 * eap_sake_parse_attributes - Parse EAP-SAKE attributes
170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Too short attribute"); in eap_sake_parse_attributes()
179 "EAP-SAKE: Invalid attribute length (%d)", in eap_sake_parse_attributes()
186 wpa_printf(MSG_DEBUG, "EAP-SAKE: Attribute underflow"); in eap_sake_parse_attributes()
201 * eap_sake_kdf - EAP-SAKE Key Derivation Function (KDF)
260 * eap_sake_derive_keys - Derive EAP-SAKE keys
270 * This function derives EAP-SAKE keys as defined in RFC 4763, section 3.2.6.
280 wpa_printf(MSG_DEBUG, "EAP-SAKE: Deriving keys"); in eap_sake_derive_keys()
282 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: Root-Secret-A", in eap_sake_derive_keys()
285 "SAKE Master Secret A", in eap_sake_derive_keys()
289 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: SMS-A", sms_a, EAP_SAKE_SMS_LEN); in eap_sake_derive_keys()
294 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Auth", in eap_sake_derive_keys()
296 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: TEK-Cipher", in eap_sake_derive_keys()
299 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: Root-Secret-B", in eap_sake_derive_keys()
302 "SAKE Master Secret B", in eap_sake_derive_keys()
306 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: SMS-B", sms_b, EAP_SAKE_SMS_LEN); in eap_sake_derive_keys()
313 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: MSK", msk, EAP_MSK_LEN); in eap_sake_derive_keys()
314 wpa_hexdump_key(MSG_DEBUG, "EAP-SAKE: EMSK", emsk, EAP_EMSK_LEN); in eap_sake_derive_keys()
320 * eap_sake_compute_mic - Compute EAP-SAKE MIC for an EAP packet