HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 1 - 25 of 189) sorted by null

1 2 3 4 5 6 7 8

  /external/tcpdump/
print-eap.c 25 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.3 2004/04/23 19:03:39 mcr Exp $";
57 const struct eap_packet_t *eap; local
59 eap = (const struct eap_packet_t *)cp;
60 ND_TCHECK(eap->data);
62 ND_PRINT((ndo, "EAP code=%u id=%u length=%u ",
63 eap->code, eap->id, (eap->length[0]<<8) + eap->length[1]));
  /external/wpa_supplicant/examples/
ieee8021x.conf 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
8 eap=PEAP
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/examples/
ieee8021x.conf 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
8 eap=PEAP
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
91 struct eap_method *eap; local
94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
96 if (eap == NULL)
99 eap->init = eap_otp_init
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
35 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
68 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
71 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
76 * error case which seems to use EAP-MSCHAPv2 like error
77 * reporting with EAP-GTC inside EAP-FAST tunnel. */
92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
135 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
48 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
77 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
91 struct eap_method *eap; local
94 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
96 if (eap == NULL)
99 eap->init = eap_otp_init
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
54 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
66 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
74 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
77 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
107 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
ieee8021x.conf 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
8 eap=PEAP
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
  /external/wpa_supplicant_8/src/eap_server/
eap_server_methods.c 2 * EAP server method registration
26 * eap_server_get_eap_method - Get EAP method based on type number
27 * @vendor: EAP Vendor-Id (0 = IETF)
28 * @method: EAP type number
29 * Returns: Pointer to EAP method or %NULL if not found
43 * eap_server_get_type - Get EAP type for the given EAP method name
44 * @name: EAP method name, e.g., TLS
45 * @vendor: Buffer for returning EAP Vendor-Id
46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
80 struct eap_method *eap; local
    [all...]
eap_server_identity.c 2 * hostapd / EAP-Identity
76 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
97 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
114 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
158 struct eap_method *eap; local
161 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
164 if (eap == NULL)
167 eap->init = eap_identity_init;
168 eap->initPickUp = eap_identity_initPickUp
    [all...]
eap_server_vendor_test.c 2 * hostapd / Test method for vendor specific (expanded) EAP type
50 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s",
86 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate "
105 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame");
176 struct eap_method *eap; local
179 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
182 if (eap == NULL)
185 eap->init = eap_vendor_test_init;
186 eap->reset = eap_vendor_test_reset;
187 eap->buildReq = eap_vendor_test_buildReq
    [all...]
eap_server_md5.c 2 * hostapd / EAP-MD5 server
57 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
65 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
73 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
90 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
94 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
114 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
125 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
132 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success");
135 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure")
157 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant/
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
54 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
84 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
98 struct eap_method *eap; local
101 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
103 if (eap == NULL)
106 eap->init = eap_otp_init
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
34 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
70 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
73 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
78 * error case which seems to use EAP-MSCHAPv2 like error
79 * reporting with EAP-GTC inside EAP-FAST tunnel. */
95 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
139 struct eap_method *eap; local
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
51 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
73 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
81 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
84 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
108 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN);
116 struct eap_method *eap; local
119 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
265 # WPA-EAP = WPA using EAP authentication
266 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
270 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithm
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf.orig 113 # EAP fast re-authentication
114 # By default, fast re-authentication is enabled for all EAP methods that
131 # Dynamic EAP methods
132 # If EAP methods were built dynamically as shared object files, they need to be
133 # loaded here before being used in the network blocks. By default, EAP methods
307 # WPA-EAP = WPA using EAP authentication
308 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
312 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithm
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_identity.c 2 * hostapd / EAP-Identity
76 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
97 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
114 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
158 struct eap_method *eap; local
161 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
164 if (eap == NULL)
167 eap->init = eap_identity_init;
168 eap->initPickUp = eap_identity_initPickUp
    [all...]
eap_vendor_test.c 2 * hostapd / Test method for vendor specific (expanded) EAP type
50 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s",
86 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate "
105 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame");
176 struct eap_method *eap; local
179 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
182 if (eap == NULL)
185 eap->init = eap_vendor_test_init;
186 eap->reset = eap_vendor_test_reset;
187 eap->buildReq = eap_vendor_test_buildReq
    [all...]
eap_md5.c 2 * hostapd / EAP-MD5 server
56 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
64 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
72 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
89 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
93 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
113 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
124 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
131 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success");
134 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Failure")
156 struct eap_method *eap; local
    [all...]

Completed in 404 milliseconds

1 2 3 4 5 6 7 8