HomeSort by relevance Sort by last modified time
    Searched defs:eap (Results 1 - 25 of 138) sorted by null

1 2 3 4 5 6

  /external/tcpdump/
print-eap.c 25 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.3 2004/04/23 19:03:39 mcr Exp $";
57 const struct eap_packet_t *eap; local
59 eap = (const struct eap_packet_t *)cp;
60 ND_TCHECK(eap->data);
62 ND_PRINT((ndo, "EAP code=%u id=%u length=%u ",
63 eap->code, eap->id, (eap->length[0]<<8) + eap->length[1]));
  /external/wpa_supplicant/
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
54 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
84 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
98 struct eap_method *eap; local
101 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
103 if (eap == NULL)
106 eap->init = eap_otp_init
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
73 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
78 * error case which seems to use EAP-MSCHAPv2 like error
79 * reporting with EAP-GTC inside EAP-FAST tunnel. */
95 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
139 struct eap_method *eap; local
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
51 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
73 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
84 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN);
116 struct eap_method *eap; local
119 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
35 struct eap_sm *eap; member in struct:eap_ssl_data
39 /* EAP TLS Flags */
eap_methods.c 2 * EAP peer: Method registration
29 * eap_sm_get_eap_methods - Get EAP method based on type number
30 * @vendor: EAP Vendor-Id (0 = IETF)
31 * @method: EAP type number
32 * Returns: Pointer to EAP method or %NULL if not found
46 * eap_get_type - Get EAP type for the given EAP method name
47 * @name: EAP method name, e.g., TLS
48 * @vendor: Buffer for returning EAP Vendor-Id
49 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
286 struct eap_method *eap; local
    [all...]
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 2716)
40 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured");
49 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
52 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
58 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
85 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
119 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
126 "client EAP encryption",
129 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key"
266 struct eap_method *eap; local
    [all...]
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
14 * This file implements a vendor specific test method using EAP expanded types.
61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
88 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
95 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
102 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
112 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
125 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
179 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_common.c 2 * EAP common peer/server definitions
22 * eap_hdr_validate - Validate EAP header
23 * @vendor: Expected EAP Vendor-Id (0 = IETF)
24 * @eap_type: Expected EAP type number
25 * @msg: EAP frame (starting with EAP header)
27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure
29 * This is a helper function for EAP method implementations. This is usually
31 * that the received EAP request packet has a valid header. This function is
32 * able to process both legacy and expanded EAP headers and in most cases, th
163 const struct eap_hdr *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
91 struct eap_method *eap; local
94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
96 if (eap == NULL)
99 eap->init = eap_otp_init
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
76 * error case which seems to use EAP-MSCHAPv2 like error
77 * reporting with EAP-GTC inside EAP-FAST tunnel. */
92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
135 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
19 * struct eap_ssl_data - TLS data for EAP methods
68 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
84 * eap - Pointer to EAP state machine allocated with eap_peer_sm_init()
86 struct eap_sm *eap; member in struct:eap_ssl_data
90 /* EAP TLS Flags */
eap_methods.c 2 * EAP peer: Method registration
29 * eap_peer_get_eap_method - Get EAP method based on type number
30 * @vendor: EAP Vendor-Id (0 = IETF)
31 * @method: EAP type number
32 * Returns: Pointer to EAP method or %NULL if not found
46 * eap_peer_get_type - Get EAP type for the given EAP method name
47 * @name: EAP method name, e.g., TLS
48 * @vendor: Buffer for returning EAP Vendor-Id
49 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
286 struct eap_method *eap; local
    [all...]
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 2716)
41 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured");
50 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
53 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
59 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
87 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
121 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
128 "client EAP encryption",
132 wpa_hexdump_key(MSG_DEBUG, "EAP-TLS: Derived key"
266 struct eap_method *eap; local
    [all...]
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
14 * This file implements a vendor specific test method using EAP expanded types.
63 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
86 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
93 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
100 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
110 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
122 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
176 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_methods.c 2 * hostapd / EAP method registration
26 * eap_server_get_eap_method - Get EAP method based on type number
27 * @vendor: EAP Vendor-Id (0 = IETF)
28 * @method: EAP type number
29 * Returns: Pointer to EAP method or %NULL if not found
43 * eap_server_get_type - Get EAP type for the given EAP method name
44 * @name: EAP method name, e.g., TLS
45 * @vendor: Buffer for returning EAP Vendor-Id
46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
80 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions
25 struct eap_sm *eap; member in struct:eap_ssl_data
35 /* EAP TLS Flags */
  /external/wpa_supplicant_8/src/eap_common/
eap_common.c 2 * EAP common peer/server definitions
22 * eap_hdr_validate - Validate EAP header
23 * @vendor: Expected EAP Vendor-Id (0 = IETF)
24 * @eap_type: Expected EAP type number
25 * @msg: EAP frame (starting with EAP header)
27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure
29 * This is a helper function for EAP method implementations. This is usually
31 * that the received EAP request packet has a valid header. This function is
32 * able to process both legacy and expanded EAP headers and in most cases, th
163 const struct eap_hdr *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
91 struct eap_method *eap; local
94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
96 if (eap == NULL)
99 eap->init = eap_otp_init
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
76 * error case which seems to use EAP-MSCHAPv2 like error
77 * reporting with EAP-GTC inside EAP-FAST tunnel. */
92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
135 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
19 * struct eap_ssl_data - TLS data for EAP methods
58 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
74 * eap - EAP state machine allocated with eap_peer_sm_init()
76 struct eap_sm *eap; member in struct:eap_ssl_data
80 /* EAP TLS Flags */
  /external/wpa_supplicant_8/src/eap_server/
eap_server_methods.c 2 * EAP server method registration
26 * eap_server_get_eap_method - Get EAP method based on type number
27 * @vendor: EAP Vendor-Id (0 = IETF)
28 * @method: EAP type number
29 * Returns: Pointer to EAP method or %NULL if not found
43 * eap_server_get_type - Get EAP type for the given EAP method name
44 * @name: EAP method name, e.g., TLS
45 * @vendor: Buffer for returning EAP Vendor-Id
46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
80 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
19 * struct eap_ssl_data - TLS data for EAP methods
48 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
53 * eap - EAP state machine allocated with eap_server_sm_init()
55 struct eap_sm *eap; member in struct:eap_ssl_data
62 /* EAP TLS Flags */

Completed in 3464 milliseconds

1 2 3 4 5 6