Lines Matching full:peer
26 * style. In the first phase of each style, the unauthenticated peer
29 * the peer's name is presumed to be known.
40 * responding to the queries generated by the peer. EAP is an
95 "Set time limit for peer EAP authentication" },
215 * eap_client_timeout - Give up waiting for the peer to send any
227 error("EAP: timeout waiting for Request from peer");
233 * eap_authwithpeer - Authenticate to our peer (behave as client).
245 /* Save the peer name we're given */
261 * Format a standard EAP Failure message and send it to the peer.
286 * Format a standard EAP Success message and send it to the peer.
636 * Format an EAP Request message and send it to the peer. Message
663 * If we already know the peer's
868 * eap_authpeer - Authenticate our peer (behave as server).
917 * When it's time to send rechallenge the peer, this timeout is
968 /* Discard any (possibly authenticated) peer name. */
1016 * eap_protrej - Peer doesn't speak this protocol.
1032 error("EAP authentication of peer failed on Protocol-Reject");
1425 dbglog("EAP: trimming really long peer name down");
1582 warn("EAP: peer sent Subtype 2 without 1");
1601 * Can't work with this peer because
1627 warn("EAP: peer sent Subtype 3 without 1/2");
1658 * We've verified our peer. We're now mostly done,
1763 info("EAP: unauthenticated peer name \"%.*q\"", len, inp);
1794 /* Peer cannot Nak Identify Request */
1811 dbglog("EAP: peer requesting unknown Type %d", vallen);
1851 dbglog("EAP: trimming really long peer name down");
2068 error("EAP: peer reports authentication failure");