Lines Matching full:pwd

2  * hostapd / EAP-pwd (RFC 5931) server
62 return "PWD-ID-Req"; in eap_pwd_state_txt()
64 return "PWD-Commit-Req"; in eap_pwd_state_txt()
66 return "PWD-Confirm-Req"; in eap_pwd_state_txt()
72 return "PWD-Unk"; in eap_pwd_state_txt()
79 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s", in eap_pwd_state()
91 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " in eap_pwd_init()
101 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d", in eap_pwd_init()
111 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " in eap_pwd_init()
126 "EAP-pwd: Memory allocation of salt failed"); in eap_pwd_init()
171 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request"); in eap_pwd_build_id_req()
192 wpa_hexdump_key(MSG_DEBUG, "EAP-pwd (server): password", in eap_pwd_build_id_req()
195 wpa_hexdump(MSG_DEBUG, "EAP-pwd (server): salt", in eap_pwd_build_id_req()
215 "EAP-pwd (server): bad size %d for salted password", in eap_pwd_build_id_req()
242 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request"); in eap_pwd_build_commit_req()
259 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation " in eap_pwd_build_commit_req()
270 wpa_printf(MSG_INFO, "EAP-PWD (server): element allocation " in eap_pwd_build_commit_req()
277 wpa_printf(MSG_INFO, "EAP-PWD (server): element inversion " in eap_pwd_build_commit_req()
302 wpa_printf(MSG_INFO, "EAP-PWD (server): point assignment " in eap_pwd_build_commit_req()
322 wpa_printf(MSG_DEBUG, "EAP-pwd: Confirm/Request"); in eap_pwd_build_confirm_req()
336 wpa_printf(MSG_INFO, "EAP-PWD (server): debug allocation " in eap_pwd_build_confirm_req()
363 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_build_confirm_req()
379 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_build_confirm_req()
437 wpa_printf(MSG_DEBUG, "EAP-pwd: ACKing a fragment!!"); in eap_pwd_build_req()
479 wpa_printf(MSG_INFO, "EAP-pwd: Unknown state %d in build_req", in eap_pwd_build_req()
505 wpa_printf(MSG_DEBUG, "EAP-pwd: Fragmenting output, " in eap_pwd_build_req()
508 wpa_printf(MSG_DEBUG, "EAP-pwd: Send a %d byte fragment", in eap_pwd_build_req()
553 wpa_printf(MSG_INFO, "EAP-pwd: Invalid frame"); in eap_pwd_check()
557 wpa_printf(MSG_DEBUG, "EAP-pwd: Received frame: exch = %d, len = %d", in eap_pwd_check()
572 wpa_printf(MSG_INFO, "EAP-pwd: Unexpected opcode=%d in state=%d", in eap_pwd_check()
590 wpa_printf(MSG_INFO, "EAP-pwd: Invalid ID response"); in eap_pwd_process_id_resp()
600 wpa_printf(MSG_INFO, "EAP-pwd: peer changed parameters"); in eap_pwd_process_id_resp()
605 wpa_printf(MSG_INFO, "EAP-pwd: data was already allocated"); in eap_pwd_process_id_resp()
610 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); in eap_pwd_process_id_resp()
615 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PWD (server): peer sent id of", in eap_pwd_process_id_resp()
620 wpa_printf(MSG_INFO, "EAP-PWD: failed to allocate memory for " in eap_pwd_process_id_resp()
648 wpa_printf(MSG_INFO, "EAP-PWD (server): unable to compute " in eap_pwd_process_id_resp()
652 wpa_printf(MSG_DEBUG, "EAP-PWD (server): computed %d bit PWE...", in eap_pwd_process_id_resp()
668 wpa_printf(MSG_DEBUG, "EAP-pwd: Received commit response"); in eap_pwd_process_commit_resp()
675 "EAP-pwd: Unexpected Commit payload length %u (expected %u)", in eap_pwd_process_commit_resp()
684 wpa_printf(MSG_INFO, "EAP-PWD (server): peer data allocation " in eap_pwd_process_commit_resp()
693 wpa_printf(MSG_INFO, "EAP-PWD (server): setting peer element " in eap_pwd_process_commit_resp()
700 wpa_printf(MSG_INFO, "EAP-PWD (server): peer data allocation " in eap_pwd_process_commit_resp()
710 "EAP-PWD (server): detected reflection attack!"); in eap_pwd_process_commit_resp()
721 wpa_printf(MSG_INFO, "EAP-PWD (server): computing shared key " in eap_pwd_process_commit_resp()
733 wpa_printf(MSG_INFO, "EAP-PWD (server): shared key point is " in eap_pwd_process_commit_resp()
738 wpa_printf(MSG_INFO, "EAP-PWD (server): unable to extract " in eap_pwd_process_commit_resp()
769 "EAP-pwd: Unexpected Confirm payload length %u (expected %u)", in eap_pwd_process_confirm_resp()
786 wpa_printf(MSG_INFO, "EAP-PWD (peer): allocation fail"); in eap_pwd_process_confirm_resp()
807 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_process_confirm_resp()
823 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm point " in eap_pwd_process_confirm_resp()
845 wpa_printf(MSG_INFO, "EAP-PWD (server): confirm did not " in eap_pwd_process_confirm_resp()
850 wpa_printf(MSG_DEBUG, "EAP-pwd (server): confirm verified"); in eap_pwd_process_confirm_resp()
892 wpa_printf(MSG_INFO, "EAP-pwd: Bad response! " in eap_pwd_process()
895 wpa_printf(MSG_DEBUG, "EAP-pwd: received ACK from " in eap_pwd_process()
907 "EAP-pwd: Frame too short to contain Total-Length field"); in eap_pwd_process()
911 wpa_printf(MSG_DEBUG, "EAP-pwd: Incoming fragments, total " in eap_pwd_process()
917 "EAP-pwd: Unexpected new fragment start when previous fragment is still in use"); in eap_pwd_process()
922 wpa_printf(MSG_INFO, "EAP-pwd: Out of memory to " in eap_pwd_process()
936 "EAP-pwd: No buffer for reassembly"); in eap_pwd_process()
941 wpa_printf(MSG_DEBUG, "EAP-pwd: Buffer overflow " in eap_pwd_process()
952 wpa_printf(MSG_DEBUG, "EAP-pwd: Got a %d byte fragment", in eap_pwd_process()
963 wpa_printf(MSG_DEBUG, "EAP-pwd: Last fragment, %d bytes", in eap_pwd_process()
1063 "PWD"); in eap_server_pwd_register()