/external/tcpdump/ |
print-eap.c | 25 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.3 2004/04/23 19:03:39 mcr Exp $"; 57 const struct eap_packet_t *eap; local 59 eap = (const struct eap_packet_t *)cp; 60 ND_TCHECK(eap->data); 62 ND_PRINT((ndo, "EAP code=%u id=%u length=%u ", 63 eap->code, eap->id, (eap->length[0]<<8) + eap->length[1]));
|
/external/wpa_supplicant/ |
eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 54 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 84 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 98 struct eap_method *eap; local 101 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 103 if (eap == NULL) 106 eap->init = eap_otp_init [all...] |
eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 73 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 78 * error case which seems to use EAP-MSCHAPv2 like error 79 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 95 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 139 struct eap_method *eap; local [all...] |
eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 51 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 73 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 84 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN); 116 struct eap_method *eap; local 119 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 35 struct eap_sm *eap; member in struct:eap_ssl_data 39 /* EAP TLS Flags */
|
eap_methods.c | 2 * EAP peer: Method registration 29 * eap_sm_get_eap_methods - Get EAP method based on type number 30 * @vendor: EAP Vendor-Id (0 = IETF) 31 * @method: EAP type number 32 * Returns: Pointer to EAP method or %NULL if not found 46 * eap_get_type - Get EAP type for the given EAP method name 47 * @name: EAP method name, e.g., TLS 48 * @vendor: Buffer for returning EAP Vendor-Id 49 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 286 struct eap_method *eap; local [all...] |
eap_tls.c | 2 * EAP peer method: EAP-TLS (RFC 2716) 40 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 49 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 52 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 58 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 85 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 119 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 126 "client EAP encryption", 129 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key" 266 struct eap_method *eap; local [all...] |
eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type 14 * This file implements a vendor specific test method using EAP expanded types. 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 88 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 95 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 102 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 112 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 125 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response"); 179 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_common.c | 2 * EAP common peer/server definitions 22 * eap_hdr_validate - Validate EAP header 23 * @vendor: Expected EAP Vendor-Id (0 = IETF) 24 * @eap_type: Expected EAP type number 25 * @msg: EAP frame (starting with EAP header) 27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure 29 * This is a helper function for EAP method implementations. This is usually 31 * that the received EAP request packet has a valid header. This function is 32 * able to process both legacy and expanded EAP headers and in most cases, th 163 const struct eap_hdr *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); 104 struct eap_method *eap; local 107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION [all...] |
eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 91 struct eap_method *eap; local 94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 96 if (eap == NULL) 99 eap->init = eap_otp_init [all...] |
eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 76 * error case which seems to use EAP-MSCHAPv2 like error 77 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 135 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 19 * struct eap_ssl_data - TLS data for EAP methods 68 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 84 * eap - Pointer to EAP state machine allocated with eap_peer_sm_init() 86 struct eap_sm *eap; member in struct:eap_ssl_data 90 /* EAP TLS Flags */
|
eap_methods.c | 2 * EAP peer: Method registration 29 * eap_peer_get_eap_method - Get EAP method based on type number 30 * @vendor: EAP Vendor-Id (0 = IETF) 31 * @method: EAP type number 32 * Returns: Pointer to EAP method or %NULL if not found 46 * eap_peer_get_type - Get EAP type for the given EAP method name 47 * @name: EAP method name, e.g., TLS 48 * @vendor: Buffer for returning EAP Vendor-Id 49 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 286 struct eap_method *eap; local [all...] |
eap_tls.c | 2 * EAP peer method: EAP-TLS (RFC 2716) 41 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 50 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 128 "client EAP encryption", 132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key" 266 struct eap_method *eap; local [all...] |
eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type 14 * This file implements a vendor specific test method using EAP expanded types. 63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response"); 176 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_methods.c | 2 * hostapd / EAP method registration 26 * eap_server_get_eap_method - Get EAP method based on type number 27 * @vendor: EAP Vendor-Id (0 = IETF) 28 * @method: EAP type number 29 * Returns: Pointer to EAP method or %NULL if not found 43 * eap_server_get_type - Get EAP type for the given EAP method name 44 * @name: EAP method name, e.g., TLS 45 * @vendor: Buffer for returning EAP Vendor-Id 46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 80 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions 25 struct eap_sm *eap; member in struct:eap_ssl_data 35 /* EAP TLS Flags */
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 2 * EAP common peer/server definitions 22 * eap_hdr_validate - Validate EAP header 23 * @vendor: Expected EAP Vendor-Id (0 = IETF) 24 * @eap_type: Expected EAP type number 25 * @msg: EAP frame (starting with EAP header) 27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure 29 * This is a helper function for EAP method implementations. This is usually 31 * that the received EAP request packet has a valid header. This function is 32 * able to process both legacy and expanded EAP headers and in most cases, th 163 const struct eap_hdr *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); 104 struct eap_method *eap; local 107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION [all...] |
eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 91 struct eap_method *eap; local 94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 96 if (eap == NULL) 99 eap->init = eap_otp_init [all...] |
eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 76 * error case which seems to use EAP-MSCHAPv2 like error 77 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 135 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 19 * struct eap_ssl_data - TLS data for EAP methods 58 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 74 * eap - EAP state machine allocated with eap_peer_sm_init() 76 struct eap_sm *eap; member in struct:eap_ssl_data 80 /* EAP TLS Flags */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_methods.c | 2 * EAP server method registration 26 * eap_server_get_eap_method - Get EAP method based on type number 27 * @vendor: EAP Vendor-Id (0 = IETF) 28 * @method: EAP type number 29 * Returns: Pointer to EAP method or %NULL if not found 43 * eap_server_get_type - Get EAP type for the given EAP method name 44 * @name: EAP method name, e.g., TLS 45 * @vendor: Buffer for returning EAP Vendor-Id 46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 80 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions 19 * struct eap_ssl_data - TLS data for EAP methods 48 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 53 * eap - EAP state machine allocated with eap_server_sm_init() 55 struct eap_sm *eap; member in struct:eap_ssl_data 62 /* EAP TLS Flags */
|