/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast_pac.c | 2 * EAP peer method: EAP-FAST PAC file processing 22 /* TODO: encrypt PAC-Key in the PAC file */ 27 "wpa_supplicant EAP-FAST PAC file - version 1"; 36 * Sequence of PAC entries: 37 * 2-octet PAC-Type (big endian) 38 * 32-octet PAC-Key 39 * 2-octet PAC-Opaque length (big endian) 40 * <variable len> PAC-Opaque data (length bytes) 41 * 2-octet PAC-Info length (big endian 79 struct eap_fast_pac *pac = pac_root; local 96 struct eap_fast_pac *pac, *prev; local 149 struct eap_fast_pac *pac; local 420 struct eap_fast_pac *pac = NULL; local 619 struct eap_fast_pac *pac; local 670 struct eap_fast_pac *pac, *prev; local 754 struct eap_fast_pac *pac, *prev; local 869 struct eap_fast_pac *pac; local [all...] |
eap_fast_pac.h | 2 * EAP peer method: EAP-FAST PAC file processing 38 void eap_fast_free_pac(struct eap_fast_pac *pac);
|
eap_fast.c | 55 int provisioning_allowed; /* Allowed PAC provisioning modes */ 56 int provisioning; /* doing PAC provisioning (not the normal auth) */ 65 struct eap_fast_pac *pac; member in struct:eap_fast_data 93 "new PAC-Key"); 103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 204 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) { 210 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0) 230 struct eap_fast_pac *pac, *prev; local 716 struct eap_tlv_hdr *pac; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast_pac.c | 2 * EAP peer method: EAP-FAST PAC file processing 22 /* TODO: encrypt PAC-Key in the PAC file */ 27 "wpa_supplicant EAP-FAST PAC file - version 1"; 36 * Sequence of PAC entries: 37 * 2-octet PAC-Type (big endian) 38 * 32-octet PAC-Key 39 * 2-octet PAC-Opaque length (big endian) 40 * <variable len> PAC-Opaque data (length bytes) 41 * 2-octet PAC-Info length (big endian 79 struct eap_fast_pac *pac = pac_root; local 96 struct eap_fast_pac *pac, *prev; local 149 struct eap_fast_pac *pac; local 420 struct eap_fast_pac *pac = NULL; local 621 struct eap_fast_pac *pac; local 672 struct eap_fast_pac *pac, *prev; local 756 struct eap_fast_pac *pac, *prev; local 871 struct eap_fast_pac *pac; local [all...] |
eap_fast_pac.h | 2 * EAP peer method: EAP-FAST PAC file processing 38 void eap_fast_free_pac(struct eap_fast_pac *pac);
|
eap_fast.c | 55 int provisioning_allowed; /* Allowed PAC provisioning modes */ 56 int provisioning; /* doing PAC provisioning (not the normal auth) */ 65 struct eap_fast_pac *pac; member in struct:eap_fast_data 93 "new PAC-Key"); 103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC " 204 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) { 210 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0) 230 struct eap_fast_pac *pac, *prev; local 716 struct eap_tlv_hdr *pac; local [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 27 * - encrypt PAC-Key in the PAC file 41 "wpa_supplicant EAP-FAST PAC file - version 1"; 104 int provisioning_allowed; /* is PAC provisioning allowed */ 105 int provisioning; /* doing PAC provisioning (not the normal auth) */ 111 struct eap_fast_pac *pac; member in struct:eap_fast_data 121 static void eap_fast_free_pac(struct eap_fast_pac *pac) 123 os_free(pac->pac_opaque); 124 os_free(pac->pac_info); 125 os_free(pac->a_id) 135 struct eap_fast_pac *pac = data->pac; local 151 struct eap_fast_pac *pac, *prev; local 308 struct eap_fast_pac *pac = NULL; local 527 struct eap_fast_pac *pac; local 733 struct eap_fast_pac *pac, *prev; local 1533 u8 *eap_payload_tlv = NULL, *pac = NULL; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.h | 27 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field 29 * in the general PAC TLV format (Section 4.2). 61 /* RFC 5422: 4.2.6 PAC-Type TLV */ 64 /* User Authorization PAC */ 67 /* Machine Authentication PAC */ 94 u8 *pac; member in struct:eap_fast_tlv_parse
|
eap_fast_common.c | 88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 94 "PAC to master secret label hash", 288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); 289 if (tlv->pac) { 291 "PAC TLV in the message"); 295 tlv->pac = pos;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.h | 27 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field 29 * in the general PAC TLV format (Section 4.2). 61 /* RFC 5422: 4.2.6 PAC-Type TLV */ 64 /* User Authorization PAC */ 67 /* Machine Authentication PAC */ 94 u8 *pac; member in struct:eap_fast_tlv_parse
|
eap_fast_common.c | 88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash", 94 "PAC to master secret label hash", 288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len); 289 if (tlv->pac) { 291 "PAC TLV in the message"); 295 tlv->pac = pos;
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/proxy_configuration/test/ |
proxy_form_controller_test.js | 30 ProxyFormController.ProxyTypes.PAC, 192 document.getElementById(ProxyFormController.ProxyTypes.PAC) 218 // Test `AUTO` normalization to `PAC` 225 document.getElementById(ProxyFormController.ProxyTypes.PAC) 248 // PAC 250 mode: ProxyFormController.ProxyTypes.PAC, 255 document.getElementById(ProxyFormController.ProxyTypes.PAC) 288 mode: ProxyFormController.ProxyTypes.PAC, 290 pacScript: {url: 'http://example.com/this/is/a/pac.script'} 293 'http://example.com/this/is/a/pac.script' [all...] |
/external/javassist/src/main/javassist/compiler/ |
MemberResolver.java | 422 String pac = (String)it.next(); local 423 String fqName = pac + '.' + orgName; 433 if (pac.endsWith("." + orgName)) { 434 CtClass cc = classPool.get(pac); 441 classPool.recordInvalidClassName(pac);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 30 /* Private PAC-Opaque TLV types */ 64 int send_new_pac; /* server triggered re-keying of Tunnel PAC */ 66 u8 *identity; /* from PAC-Opaque */ 140 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 153 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 159 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 165 "for decrypting PAC-Opaque"); 172 "PAC-Opaque"); 175 * This may have been caused by server changing the PAC-Opaque 176 * encryption key, so just ignore this PAC-Opaque instead o [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 31 /* Private PAC-Opaque TLV types */ 65 int send_new_pac; /* server triggered re-keying of Tunnel PAC */ 67 u8 *identity; /* from PAC-Opaque */ 141 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 154 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 160 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 166 "for decrypting PAC-Opaque"); 173 "PAC-Opaque"); 176 * This may have been caused by server changing the PAC-Opaque 177 * encryption key, so just ignore this PAC-Opaque instead o [all...] |
/sdk/sdkmanager/libs/sdkuilib/src/com/android/sdkuilib/internal/repository/sdkman2/ |
PackagesDiffLogic.java | 779 PkgCategoryApi pac = (PkgCategoryApi) cat; local 780 if (pac.getPlatformName() == null) { 789 pac.setPlatformName(platformName); [all...] |
/external/chromium/chrome/browser/resources/net_internals/ |
logviewpainter.js | 371 // (auto-detect, custom pac url, or manual settings). 379 modes.push(['PAC script: ' + config.pac_url]);
|