HomeSort by relevance Sort by last modified time
    Searched refs:EAP_TYPE_IDENTITY (Results 1 - 25 of 30) sorted by null

1 2

  /external/wpa_supplicant/
eap_defs.h 43 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
eap_peap.c 296 case EAP_TYPE_IDENTITY:
476 in_decrypted[4] == EAP_TYPE_IDENTITY) {
525 in_decrypted[4] == EAP_TYPE_IDENTITY) {
eapol_test.c 161 pos[0] == EAP_TYPE_IDENTITY) {
438 *pos = EAP_TYPE_IDENTITY;
458 case EAP_TYPE_IDENTITY: return "Identity";
eap.c 638 sm->reqMethod == EAP_TYPE_IDENTITY)
642 sm->reqMethod != EAP_TYPE_IDENTITY &&
1001 *pos++ = EAP_TYPE_IDENTITY;
    [all...]
eap_ttls.c 537 case EAP_TYPE_IDENTITY:
1150 in_decrypted[sizeof(*hdr)] = EAP_TYPE_IDENTITY;
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_defs.h 47 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
  /external/wpa_supplicant_8/src/eap_common/
eap_defs.h 47 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_identity.c 73 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len,
94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
162 EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
eap.c 348 if (sm->currentMethod == EAP_TYPE_IDENTITY ||
1060 next = EAP_TYPE_IDENTITY;
1085 if (sm->m && sm->currentMethod != EAP_TYPE_IDENTITY &&
1110 if (sm->user && sm->currentMethod == EAP_TYPE_IDENTITY &&
1112 sm->user->methods[0].method == EAP_TYPE_IDENTITY)
1121 sm->user->methods[0].method == EAP_TYPE_IDENTITY) {
1155 return method == EAP_TYPE_IDENTITY ? TRUE : FALSE;
    [all...]
eap_peap.c 1207 if (eap_peap_phase2_init(sm, data, EAP_TYPE_IDENTITY))
    [all...]
eap_fast.c     [all...]
eap_ttls.c 1086 if (eap_ttls_phase2_eap_init(sm, data, EAP_TYPE_IDENTITY) < 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_identity.c 73 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len,
94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
162 EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
eap_server.c 355 if (sm->currentMethod == EAP_TYPE_IDENTITY ||
1076 next = EAP_TYPE_IDENTITY;
1101 if (sm->m && sm->currentMethod != EAP_TYPE_IDENTITY &&
1126 if (sm->user && sm->currentMethod == EAP_TYPE_IDENTITY &&
1128 sm->user->methods[0].method == EAP_TYPE_IDENTITY)
1137 sm->user->methods[0].method == EAP_TYPE_IDENTITY) {
1171 return method == EAP_TYPE_IDENTITY ? TRUE : FALSE;
    [all...]
eap_server_peap.c 1183 if (eap_peap_phase2_init(sm, data, EAP_TYPE_IDENTITY))
    [all...]
eap_server_fast.c     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 195 pos[0] == EAP_TYPE_IDENTITY) {
492 *pos = EAP_TYPE_IDENTITY;
512 case EAP_TYPE_IDENTITY: return "Identity";
  /external/wpa_supplicant_8/wpa_supplicant/
eapol_test.c 197 pos[0] == EAP_TYPE_IDENTITY) {
520 *pos = EAP_TYPE_IDENTITY;
540 case EAP_TYPE_IDENTITY: return "Identity";
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c 633 sm->reqMethod == EAP_TYPE_IDENTITY)
637 sm->reqMethod != EAP_TYPE_IDENTITY &&
1010 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len,
    [all...]
eap_peap.c 631 case EAP_TYPE_IDENTITY:
812 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) {
    [all...]
eap_ttls.c 593 case EAP_TYPE_IDENTITY:
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 631 case EAP_TYPE_IDENTITY:
812 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) {
    [all...]
eap.c 642 sm->reqMethod == EAP_TYPE_IDENTITY)
646 sm->reqMethod != EAP_TYPE_IDENTITY &&
1019 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len,
    [all...]
eap_ttls.c 593 case EAP_TYPE_IDENTITY:
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 138 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY)

Completed in 138 milliseconds

1 2