Lines Matching full:pwd
2 * EAP peer method: EAP-pwd (RFC 5931)
66 return "PWD-ID-Req"; in eap_pwd_state_txt()
68 return "PWD-Commit-Req"; in eap_pwd_state_txt()
70 return "PWD-Confirm-Req"; in eap_pwd_state_txt()
78 return "PWD-UNK"; in eap_pwd_state_txt()
86 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s", in eap_pwd_state()
103 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); in eap_pwd_init()
109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); in eap_pwd_init()
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail"); in eap_pwd_init()
119 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_init()
128 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail"); in eap_pwd_init()
274 "EAP-PWD: Server EAP-pwd-ID proposal: group=%u random=%u prf=%u prep=%u", in eap_pwd_perform_id_exchange()
280 "EAP-pwd: Unsupported or disabled proposal"); in eap_pwd_perform_id_exchange()
291 "EAP-PWD: Unsupported password pre-processing technique (Prep=%u)", in eap_pwd_perform_id_exchange()
299 "EAP-PWD: Unhashed password not available"); in eap_pwd_perform_id_exchange()
304 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d", in eap_pwd_perform_id_exchange()
311 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_perform_id_exchange()
318 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_perform_id_exchange()
324 wpa_hexdump_ascii(MSG_INFO, "EAP-PWD (peer): server sent id of", in eap_pwd_perform_id_exchange()
329 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_perform_id_exchange()
378 "EAP-PWD (client): uninitialized EAP-pwd group"); in eap_pwd_perform_commit_exchange()
389 "EAP-pwd commit request, password prep is MS"); in eap_pwd_perform_commit_exchange()
392 "EAP-PWD (peer): MS password hash not supported in FIPS mode"); in eap_pwd_perform_commit_exchange()
398 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_perform_commit_exchange()
426 "EAP-pwd commit request, password prep is salted sha1"); in eap_pwd_perform_commit_exchange()
428 wpa_printf(MSG_DEBUG, "EAP-pwd: Invalid Salt-len"); in eap_pwd_perform_commit_exchange()
435 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_perform_commit_exchange()
442 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Unsalted password", in eap_pwd_perform_commit_exchange()
444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
453 "EAP-pwd: sha1 hashed %d byte salt with password", in eap_pwd_perform_commit_exchange()
458 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Salted password", in eap_pwd_perform_commit_exchange()
463 "EAP-pwd commit request, password prep is salted sha256"); in eap_pwd_perform_commit_exchange()
465 wpa_printf(MSG_DEBUG, "EAP-pwd: Invalid Salt-len"); in eap_pwd_perform_commit_exchange()
472 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_perform_commit_exchange()
479 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Unsalted password", in eap_pwd_perform_commit_exchange()
481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
492 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Salted password", in eap_pwd_perform_commit_exchange()
498 "EAP-pwd commit request, password prep is salted sha512"); in eap_pwd_perform_commit_exchange()
500 wpa_printf(MSG_DEBUG, "EAP-pwd: Invalid Salt-len"); in eap_pwd_perform_commit_exchange()
507 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_perform_commit_exchange()
514 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Unsalted password", in eap_pwd_perform_commit_exchange()
516 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange()
527 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd: Salted password", in eap_pwd_perform_commit_exchange()
533 "EAP-pwd commit request, password prep is NONE"); in eap_pwd_perform_commit_exchange()
536 "EAP-PWD: Unhashed password not available"); in eap_pwd_perform_commit_exchange()
542 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_perform_commit_exchange()
552 "EAP-pwd: Unsupported password pre-processing technique (Prep=%u)", in eap_pwd_perform_commit_exchange()
567 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute PWE"); in eap_pwd_perform_commit_exchange()
572 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): computed %d bit PWE...", in eap_pwd_perform_commit_exchange()
581 wpa_printf(MSG_INFO, "EAP-PWD (peer): scalar allocation fail"); in eap_pwd_perform_commit_exchange()
591 wpa_printf(MSG_INFO, "EAP-PWD (peer): element allocation " in eap_pwd_perform_commit_exchange()
598 wpa_printf(MSG_INFO, "EAP-PWD (peer): element inversion fail"); in eap_pwd_perform_commit_exchange()
606 wpa_printf(MSG_INFO, "EAP-PWD (peer): peer data allocation " in eap_pwd_perform_commit_exchange()
614 wpa_printf(MSG_INFO, "EAP-PWD (peer): setting peer element " in eap_pwd_perform_commit_exchange()
622 "EAP-PWD (peer): setting peer scalar fail"); in eap_pwd_perform_commit_exchange()
633 wpa_printf(MSG_INFO, "EAP-PWD (peer): computing shared key " in eap_pwd_perform_commit_exchange()
645 wpa_printf(MSG_INFO, "EAP-PWD (peer): shared key point is at " in eap_pwd_perform_commit_exchange()
651 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to extract " in eap_pwd_perform_commit_exchange()
675 wpa_printf(MSG_INFO, "EAP-PWD (peer): point assignment fail"); in eap_pwd_perform_commit_exchange()
708 "EAP-pwd: Unexpected Confirm payload length %u (expected %u)", in eap_pwd_perform_confirm_exchange()
731 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm allocation " in eap_pwd_perform_confirm_exchange()
756 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_perform_confirm_exchange()
772 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_perform_confirm_exchange()
794 wpa_printf(MSG_INFO, "EAP-PWD (peer): confirm did not verify"); in eap_pwd_perform_confirm_exchange()
798 wpa_printf(MSG_DEBUG, "EAP-pwd (peer): confirm verified"); in eap_pwd_perform_confirm_exchange()
818 wpa_printf(MSG_INFO, "EAP-PWD (peer): confirm point " in eap_pwd_perform_confirm_exchange()
834 wpa_printf(MSG_INFO, "EAP-PWD (peer): confirm point " in eap_pwd_perform_confirm_exchange()
857 wpa_printf(MSG_INFO, "EAP-PWD (peer): unable to compute MSK | " in eap_pwd_perform_confirm_exchange()
897 wpa_printf(MSG_DEBUG, "EAP-pwd: Got a frame but pos is %s and " in eap_pwd_process()
924 wpa_printf(MSG_DEBUG, "EAP-pwd: Got an ACK for a fragment"); in eap_pwd_process()
953 wpa_printf(MSG_DEBUG, "EAP-pwd: Send %s fragment of %d bytes", in eap_pwd_process()
972 "EAP-pwd: Frame too short to contain Total-Length field"); in eap_pwd_process()
977 wpa_printf(MSG_DEBUG, "EAP-pwd: Incoming fragments whose " in eap_pwd_process()
983 "EAP-pwd: Unexpected new fragment start when previous fragment is still in use"); in eap_pwd_process()
1003 "EAP-pwd: No buffer for reassembly"); in eap_pwd_process()
1010 wpa_printf(MSG_INFO, "EAP-pwd: Buffer overflow attack " in eap_pwd_process()
1027 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a %d byte fragment", in eap_pwd_process()
1035 wpa_printf(MSG_DEBUG, "EAP-pwd: Last fragment, %d bytes", in eap_pwd_process()
1040 wpa_printf(MSG_DEBUG, "EAP-pwd: processing frame: exch %d, len %d", in eap_pwd_process()
1057 wpa_printf(MSG_INFO, "EAP-pwd: Ignoring message with unknown " in eap_pwd_process()
1094 wpa_printf(MSG_DEBUG, "EAP-pwd: Fragmenting output, total " in eap_pwd_process()
1159 EAP_VENDOR_IETF, EAP_TYPE_PWD, "PWD"); in eap_peer_pwd_register()