HomeSort by relevance Sort by last modified time
    Searched refs:pac (Results 1 - 7 of 7) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast_pac.c 2 * EAP peer method: EAP-FAST PAC file processing
22 /* TODO: encrypt PAC-Key in the PAC file */
27 "wpa_supplicant EAP-FAST PAC file - version 1";
36 * Sequence of PAC entries:
37 * 2-octet PAC-Type (big endian)
38 * 32-octet PAC-Key
39 * 2-octet PAC-Opaque length (big endian)
40 * <variable len> PAC-Opaque data (length bytes)
41 * 2-octet PAC-Info length (big endian
79 struct eap_fast_pac *pac = pac_root; local
96 struct eap_fast_pac *pac, *prev; local
149 struct eap_fast_pac *pac; local
420 struct eap_fast_pac *pac = NULL; local
619 struct eap_fast_pac *pac; local
670 struct eap_fast_pac *pac, *prev; local
754 struct eap_fast_pac *pac, *prev; local
869 struct eap_fast_pac *pac; local
    [all...]
eap_fast_pac.h 2 * EAP peer method: EAP-FAST PAC file processing
38 void eap_fast_free_pac(struct eap_fast_pac *pac);
eap_fast.c 55 int provisioning_allowed; /* Allowed PAC provisioning modes */
56 int provisioning; /* doing PAC provisioning (not the normal auth) */
65 struct eap_fast_pac *pac; member in struct:eap_fast_data
93 "new PAC-Key");
103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
204 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) {
210 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0)
230 struct eap_fast_pac *pac, *prev; local
716 struct eap_tlv_hdr *pac; local
    [all...]
  /external/wpa_supplicant/
eap_fast.c 27 * - encrypt PAC-Key in the PAC file
41 "wpa_supplicant EAP-FAST PAC file - version 1";
104 int provisioning_allowed; /* is PAC provisioning allowed */
105 int provisioning; /* doing PAC provisioning (not the normal auth) */
111 struct eap_fast_pac *pac; member in struct:eap_fast_data
121 static void eap_fast_free_pac(struct eap_fast_pac *pac)
123 os_free(pac->pac_opaque);
124 os_free(pac->pac_info);
125 os_free(pac->a_id)
135 struct eap_fast_pac *pac = data->pac; local
151 struct eap_fast_pac *pac, *prev; local
308 struct eap_fast_pac *pac = NULL; local
527 struct eap_fast_pac *pac; local
733 struct eap_fast_pac *pac, *prev; local
1533 u8 *eap_payload_tlv = NULL, *pac = NULL; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_fast_common.h 27 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field
29 * in the general PAC TLV format (Section 4.2).
61 /* RFC 5422: 4.2.6 PAC-Type TLV */
64 /* User Authorization PAC */
67 /* Machine Authentication PAC */
94 u8 *pac; member in struct:eap_fast_tlv_parse
eap_fast_common.c 88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
94 "PAC to master secret label hash",
288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
289 if (tlv->pac) {
291 "PAC TLV in the message");
295 tlv->pac = pos;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_fast.c 30 /* Private PAC-Opaque TLV types */
64 int send_new_pac; /* server triggered re-keying of Tunnel PAC */
66 u8 *identity; /* from PAC-Opaque */
140 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
153 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
159 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
165 "for decrypting PAC-Opaque");
172 "PAC-Opaque");
175 * This may have been caused by server changing the PAC-Opaque
176 * encryption key, so just ignore this PAC-Opaque instead o
    [all...]

Completed in 131 milliseconds