/external/wpa_supplicant/ |
eap_ttls.c | 103 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 104 selected = "MSCHAPV2"; 647 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request"); 649 /* MSCHAPv2 does not include optional domain name in the 666 "EAP-TTLS/MSCHAPV2: Failed to allocate memory"); 679 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " 700 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: implicit auth_challenge", 702 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: MSCHAPV2: peer_challenge", 704 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 username", 706 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 password" 1082 u8 *resp = NULL, *mschapv2 = NULL, *eapdata = NULL; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ttls.c | 25 #include "mschapv2.h" 69 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ 114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 115 selected = "MSCHAPV2"; 649 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request"); 659 "EAP-TTLS/MSCHAPV2: Failed to allocate memory"); 673 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " 713 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: EAP workaround - " 1058 u8 *mschapv2; member in struct:ttls_parse_avp 1160 parse->mschapv2 = dpos [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 23 #include "mschapv2.h" 69 u8 master_key[MSCHAPV2_MASTER_KEY_LEN]; /* MSCHAPv2 master key */ 114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 115 selected = "MSCHAPV2"; 649 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase 2 MSCHAPV2 Request"); 659 "EAP-TTLS/MSCHAPV2: Failed to allocate memory"); 673 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " 699 wpa_printf(MSG_ERROR, "EAP-TTLS/MSCHAPV2: Failed to derive " 718 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: EAP workaround - " 1061 u8 *mschapv2; member in struct:ttls_parse_avp [all...] |