Lines Matching full:aka
2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
30 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
87 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", in eap_aka_state()
112 "EAP-AKA: Failed to read/parse IMSI privacy certificate %s", in eap_aka_init()
119 "EAP-AKA: No support for imsi_privacy_cert in the build"); in eap_aka_init()
203 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing"); in eap_aka_ext_sim_req()
223 "EAP-AKA: Use result from external USIM processing"); in eap_aka_ext_sim_result()
232 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, in eap_aka_ext_sim_result()
239 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response"); in eap_aka_ext_sim_result()
245 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); in eap_aka_ext_sim_result()
249 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", data->ik, EAP_AKA_IK_LEN); in eap_aka_ext_sim_result()
257 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", data->ck, EAP_AKA_CK_LEN); in eap_aka_ext_sim_result()
270 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result()
276 wpa_printf(MSG_DEBUG, "EAP-AKA: Invalid external USIM processing UMTS-AUTH response"); in eap_aka_ext_sim_result()
286 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); in eap_aka_umts_auth()
309 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " in eap_aka_umts_auth()
312 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " in eap_aka_umts_auth()
341 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for " in eap_aka_umts_auth()
354 wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match " in eap_aka_umts_auth()
373 wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorithm " in eap_aka_umts_auth()
388 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym"); in eap_aka_clear_identities()
396 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old reauth_id"); in eap_aka_clear_identities()
414 "EAP-AKA: (encr) AT_NEXT_PSEUDONYM", in eap_aka_learn_ids()
430 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " in eap_aka_learn_ids()
452 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for " in eap_aka_learn_ids()
459 "EAP-AKA: (encr) AT_NEXT_REAUTH_ID", in eap_aka_learn_ids()
507 * No EAP-AKA/Identity packets were exchanged - send empty in eap_aka_add_checkcode()
514 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ in eap_aka_add_checkcode()
517 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len); in eap_aka_add_checkcode()
544 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server " in eap_aka_verify_checkcode()
545 "indicates that AKA/Identity messages were " in eap_aka_verify_checkcode()
556 wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server " in eap_aka_verify_checkcode()
557 "indicates that AKA/Identity message were not " in eap_aka_verify_checkcode()
562 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ in eap_aka_verify_checkcode()
573 wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE"); in eap_aka_verify_checkcode()
590 wpa_printf(MSG_DEBUG, "EAP-AKA: Send Client-Error (error code %d)", in eap_aka_client_error()
608 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Authentication-Reject " in eap_aka_authentication_reject()
624 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Synchronization-Failure " in eap_aka_synchronization_failure()
654 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Encrypt permanent identity", in eap_aka_encrypt_identity()
685 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Encrypted permanent identity", in eap_aka_encrypt_identity()
744 "EAP-AKA: Failed to encrypt permanent identity"); in eap_aka_response_identity()
760 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", id); in eap_aka_response_identity()
797 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)", id); in eap_aka_response_challenge()
822 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Reauthentication (id=%d)", in eap_aka_response_reauth()
841 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt " in eap_aka_response_reauth()
864 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Notification (id=%d)", id); in eap_aka_response_notification()
877 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt " in eap_aka_response_notification()
900 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Identity"); in eap_aka_process_identity()
923 wpa_printf(MSG_INFO, "EAP-AKA: Too many ID requests " in eap_aka_process_identity()
934 "EAP-AKA: Failed to store ID messages"); in eap_aka_process_identity()
966 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF " in eap_aka_prime_kdf_select()
1009 /* When the peer receives the new EAP-Request/AKA'-Challenge in eap_aka_prime_kdf_valid()
1014 * EAP-AKA' specification RFC 5448, Section 3.2. */ in eap_aka_prime_kdf_valid()
1016 wpa_printf(MSG_WARNING, "EAP-AKA': The server did not " in eap_aka_prime_kdf_valid()
1024 "EAP-AKA': The length of KDF attributes is wrong"); in eap_aka_prime_kdf_valid()
1031 "EAP-AKA': The KDF attributes except selected KDF are not same as original one"); in eap_aka_prime_kdf_valid()
1040 wpa_printf(MSG_WARNING, "EAP-AKA': The server " in eap_aka_prime_kdf_valid()
1063 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Challenge"); in eap_aka_process_challenge()
1068 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the " in eap_aka_process_challenge()
1082 wpa_printf(MSG_WARNING, "EAP-AKA': Challenge message " in eap_aka_process_challenge()
1091 wpa_printf(MSG_WARNING, "EAP-AKA': No memory for " in eap_aka_process_challenge()
1096 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': Network Name " in eap_aka_process_challenge()
1112 wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf); in eap_aka_process_challenge()
1120 wpa_printf(MSG_WARNING, "EAP-AKA: Bidding down from " in eap_aka_process_challenge()
1121 "AKA' to AKA detected"); in eap_aka_process_challenge()
1130 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message " in eap_aka_process_challenge()
1143 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication " in eap_aka_process_challenge()
1147 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication " in eap_aka_process_challenge()
1151 wpa_printf(MSG_DEBUG, "EAP-AKA: Wait for external USIM processing"); in eap_aka_process_challenge()
1154 wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication failed"); in eap_aka_process_challenge()
1164 wpa_printf(MSG_WARNING, "EAP-AKA': AMF separation bit " in eap_aka_process_challenge()
1177 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK " in eap_aka_process_challenge()
1190 wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message " in eap_aka_process_challenge()
1245 wpa_printf(MSG_WARNING, "EAP-AKA: Notification message after " in eap_aka_process_notification_reauth()
1254 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted " in eap_aka_process_notification_reauth()
1260 wpa_printf(MSG_WARNING, "EAP-AKA: Counter in notification " in eap_aka_process_notification_reauth()
1277 wpa_printf(MSG_INFO, "EAP-AKA: no AT_MAC in after_auth " in eap_aka_process_notification_auth()
1283 wpa_printf(MSG_WARNING, "EAP-AKA: Notification message " in eap_aka_process_notification_auth()
1290 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid notification " in eap_aka_process_notification_auth()
1303 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Notification"); in eap_aka_process_notification()
1305 wpa_printf(MSG_INFO, "EAP-AKA: too many notification " in eap_aka_process_notification()
1312 wpa_printf(MSG_INFO, "EAP-AKA: no AT_NOTIFICATION in " in eap_aka_process_notification()
1342 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Reauthentication"); in eap_aka_process_reauthentication()
1351 wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the " in eap_aka_process_reauthentication()
1359 wpa_printf(MSG_WARNING, "EAP-AKA: Server is trying " in eap_aka_process_reauthentication()
1367 wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication " in eap_aka_process_reauthentication()
1378 wpa_hexdump(MSG_DEBUG, "EAP-AKA: Server MAC", in eap_aka_process_reauthentication()
1382 wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication " in eap_aka_process_reauthentication()
1392 wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted " in eap_aka_process_reauthentication()
1399 wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet", in eap_aka_process_reauthentication()
1409 wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter " in eap_aka_process_reauthentication()
1426 wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S", in eap_aka_process_reauthentication()
1455 wpa_printf(MSG_DEBUG, "EAP-AKA: Maximum number of " in eap_aka_process_reauthentication()
1476 wpa_hexdump_buf(MSG_DEBUG, "EAP-AKA: EAP data", reqData); in eap_aka_process()
1478 wpa_printf(MSG_INFO, "EAP-AKA: Identity not configured"); in eap_aka_process()
1500 wpa_printf(MSG_DEBUG, "EAP-AKA: Subtype=%d", subtype); in eap_aka_process()
1527 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Client-Error"); in eap_aka_process()
1532 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown subtype=%d", subtype); in eap_aka_process()
1546 * It is possible for the server to reply with AKA in eap_aka_process()
1675 wpa_hexdump(MSG_DEBUG, "EAP-AKA: Derived Session-Id", id, *len); in eap_aka_get_session_id()
1721 EAP_VENDOR_IETF, EAP_TYPE_AKA, "AKA"); in eap_peer_aka_register()
1749 "AKA'"); in eap_peer_aka_prime_register()