Lines Matching full:phase
79 "EAP-TTLS: Do not require Phase 2 authentication"); in eap_ttls_parse_phase1()
83 "EAP-TTLS: Require Phase 2 authentication for initial connection"); in eap_ttls_parse_phase1()
87 "EAP-TTLS: Require Phase 2 authentication for all cases"); in eap_ttls_parse_phase1()
364 "Phase 2 EAP vendor %d method %d", in eap_ttls_phase2_select_eap_method()
431 "Phase 2 EAP vendor %d method %d (TNC)", in eap_ttls_phase2_request_eap_method()
464 "EAP-TTLS: failed to initialize Phase 2 EAP method %u:%u", in eap_ttls_phase2_request_eap_method()
485 "Phase 2 request (len=%lu)", (unsigned long) len); in eap_ttls_phase2_request_eap()
489 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP Request: type=%d", *pos); in eap_ttls_phase2_request_eap()
497 "EAP-TTLS: Too short Phase 2 request (expanded header) (len=%lu)", in eap_ttls_phase2_request_eap()
546 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request"); in eap_ttls_phase2_request_mschapv2()
640 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAP Request"); in eap_ttls_phase2_request_mschap()
739 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 PAP Request"); in eap_ttls_phase2_request_pap()
796 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 CHAP Request"); in eap_ttls_phase2_request_chap()
918 wpa_printf(MSG_ERROR, "EAP-TTLS: Phase 2 - Unknown"); in eap_ttls_phase2_request()
948 "memory for Phase 2 EAP data"); in eap_ttls_parse_attr_eap()
956 "memory for Phase 2 EAP data"); in eap_ttls_parse_attr_eap()
1064 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 AVPs", pos, left); in eap_ttls_parse_avps()
1066 wpa_printf(MSG_WARNING, "EAP-TTLS: Too short Phase 2 AVP frame" in eap_ttls_parse_avps()
1099 "Phase 2 - use fake EAP-Request Identity"); in eap_ttls_fake_identity_request()
1125 wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Encrypting Phase 2 data", in eap_ttls_encrypt_response()
1130 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to encrypt a Phase 2 " in eap_ttls_encrypt_response()
1156 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Phase 2 EAP", in eap_ttls_process_phase2_eap()
1161 wpa_printf(MSG_WARNING, "EAP-TTLS: Too short Phase 2 EAP " in eap_ttls_process_phase2_eap()
1169 wpa_printf(MSG_INFO, "EAP-TTLS: Length mismatch in Phase 2 " in eap_ttls_process_phase2_eap()
1176 wpa_printf(MSG_DEBUG, "EAP-TTLS: received Phase 2: code=%d " in eap_ttls_process_phase2_eap()
1189 "Phase 2 EAP header", hdr->code); in eap_ttls_process_phase2_eap()
1227 wpa_printf(MSG_WARNING, "EAP-TTLS: Ident mismatch for Phase 2 " in eap_ttls_process_phase2_mschapv2()
1236 "response in Phase 2 MSCHAPV2 success request"); in eap_ttls_process_phase2_mschapv2()
1240 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 MSCHAPV2 " in eap_ttls_process_phase2_mschapv2()
1265 /* TNC uses inner EAP method after non-EAP TTLS phase 2. */ in eap_ttls_process_tnc_start()
1267 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received " in eap_ttls_process_tnc_start()
1273 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received " in eap_ttls_process_tnc_start()
1341 wpa_printf(MSG_INFO, "EAP-TTLS: Phase 2 received unexpected " in eap_ttls_process_decrypted()
1428 * point, but some do not. Make wpa_supplicant stop phase 2 here, if in eap_ttls_phase2_start()
1434 "skip phase 2"); in eap_ttls_phase2_start()
1460 " Phase 2", in eap_ttls_decrypt()
1464 wpa_printf(MSG_DEBUG, "EAP-TTLS: Pending Phase 2 request - " in eap_ttls_decrypt()
1591 "Phase 2"); in eap_ttls_process_handshake()
1594 "skip Phase 2"); in eap_ttls_process_handshake()
1606 "start for Phase 2"); in eap_ttls_process_handshake()
1662 * This is needed to cover the case where the final Phase 2 in eap_ttls_check_auth_status()