HomeSort by relevance Sort by last modified time
    Searched defs:eap (Results 76 - 100 of 115) sorted by null

1 2 34 5

  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 2 * hostapd / EAP-SIM (RFC 4186)
65 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
77 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured");
105 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
114 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
141 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
184 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to encrypt "
199 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
228 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Re-authentication");
232 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S"
770 struct eap_method *eap; local
    [all...]
eap_server_tnc.c 2 * EAP server method: EAP-TNC (Trusted Network Connect)
33 /* EAP-TNC Flags */
67 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
113 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for "
168 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request",
193 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
207 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
213 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
225 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request")
556 struct eap_method *eap; local
    [all...]
eap_server_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
95 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
121 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
188 * No EAP-AKA/Identity packets were exchanged - send empty
195 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */
198 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len)
1218 struct eap_method *eap; local
1246 struct eap_method *eap; local
    [all...]
eap_server_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
126 /* Note: eap is allocated memory; caller is responsible for freeing
129 u8 *eap; member in struct:eap_ttls_avp
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen)
1164 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 189 * eap - EAP peer configuration for this network
191 struct eap_peer_config eap; member in struct:wpa_ssid
239 * leap - Number of EAP methods using LEAP
247 * non_leap - Number of EAP methods not using LEAP
249 * This field should be set to >0 if any EAP method other than LEAP is
256 * eap_workaround - EAP workarounds enabled
258 * wpa_supplicant supports number of "EAP workarounds" to work around
263 * Strict EAP conformance mode can be configured by disabling
interworking.c 135 struct nai_realm_eap *eap; member in struct:nai_realm
146 os_free(realms[i].eap);
160 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
166 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
172 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
196 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
199 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
202 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP");
205 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2");
213 wpa_printf(MSG_DEBUG, "Inner EAP method: %u"
431 struct nai_realm_eap *eap = &realm->eap[e]; local
627 struct nai_realm_eap *eap = NULL; local
    [all...]
  /hardware/ti/wlan/wl1271/CUDK/configurationutility/src/
wpa_core.c 75 S32 eap; member in struct:__anon18492
275 pWpaCore->WpaSupplParams.eap = EapType;
620 if ((pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_LEAP) ||
621 (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_PEAP) ||
622 (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_FAST))
635 os_sprintf(cmd, (PS8)"SET_NETWORK %d key_mgmt WPA-EAP CCKM", NetworkID);
639 os_sprintf(cmd, (PS8)"SET_NETWORK %d key_mgmt WPA-EAP", NetworkID);
715 /* set eap of the new network block */
716 if (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_NONE)
721 if (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_MD5_CHALLENGE
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface.c 29 #include "eap_peer/eap.h"
98 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL))
238 struct eap_peer_config *eap; local
260 eap = &ssid->eap;
263 os_free(eap->identity);
264 eap->identity = (u8 *) os_strdup(pos);
265 eap->identity_len = os_strlen(pos);
266 eap->pending_req_identity = 0;
270 os_free(eap->password)
    [all...]
eapol_test.c 24 #include "eap_peer/eap.h"
61 u8 *last_eap_radius; /* last received EAP Response from Authentication
172 const u8 *eap, size_t len)
179 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
192 hdr = (const struct eap_hdr *) eap;
203 "EAP-Response-Identity",
259 if (eap && !radius_msg_add_eap(msg, eap, len)) {
260 printf("Could not add EAP-Message\n");
297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len)
480 struct eap_hdr *eap; local
532 u8 *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
37 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
90 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
147 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
165 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
194 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for
1336 struct eap_method *eap; local
1365 struct eap_method *eap; local
    [all...]
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
15 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP
18 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in
38 u8 mschapv2_id; /* usually same as EAP identifier; must be change
858 struct eap_method *eap; local
    [all...]
eap_peap.c 2 * EAP peer method: EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt)
30 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt
31 * 2 = draft-josefsson-ppext-eap-tls-eap-10.txt
55 * EAP-Success
56 * 1 = reply with tunneled EAP-Success to inne
1266 struct eap_method *eap; local
    [all...]
eap_sim.c 2 * EAP peer method: EAP-SIM (RFC 4186)
82 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
99 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
111 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
118 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
150 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
163 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM "
175 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage "
178 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage
1079 struct eap_method *eap; local
    [all...]
eap_fast.c 2 * EAP peer method: EAP-FAST (RFC 4851)
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC
1687 struct eap_method *eap; local
    [all...]
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
31 * 1 = draft-funk-eap-ttls-v1-00.txt
95 selected = "EAP";
104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
112 selected = "EAP";
128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and "
270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key")
1961 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
31 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
127 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
195 * No EAP-AKA/Identity packets were exchanged - send empty
202 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */
205 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len)
1225 struct eap_method *eap; local
1253 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 177 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST },
547 u8 *eap, *pos; local
564 eap = os_malloc(len);
565 if (eap == NULL)
568 pos = eap;
581 return eap;
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 19 #include "eap_server/eap.h"
382 const u8 *eap, size_t len)
388 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY)
391 identity = eap_get_identity(sm->eap, &identity_len);
414 const u8 *eap, size_t len)
423 ieee802_1x_learn_identity(hapd, sm, eap, len);
425 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
522 if (eap && !radius_msg_add_eap(msg, eap, len)) {
523 printf("Could not add EAP-Message\n")
591 struct eap_hdr *eap; local
982 u8 *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
82 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
139 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
154 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
157 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
186 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for
1348 struct eap_method *eap; local
1377 struct eap_method *eap; local
    [all...]
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
8 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
9 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP
12 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in
33 u8 mschapv2_id; /* usually same as EAP identifier; must be change
858 struct eap_method *eap; local
    [all...]
eap_peap.c 2 * EAP peer method: EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt)
24 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt
25 * 2 = draft-josefsson-ppext-eap-tls-eap-10.txt
49 * EAP-Success
50 * 1 = reply with tunneled EAP-Success to inne
1265 struct eap_method *eap; local
    [all...]
eap_sim.c 2 * EAP peer method: EAP-SIM (RFC 4186)
75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
92 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
104 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
143 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
156 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM "
168 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage "
171 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage
1092 struct eap_method *eap; local
    [all...]
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
77 selected = "EAP";
82 selected = "EAP";
98 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
114 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
218 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
222 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
249 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
250 "Phase 2 EAP vendor %d method %d"
1600 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius.c 218 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST },
584 u8 *eap, *pos; local
601 eap = os_malloc(len);
602 if (eap == NULL)
605 pos = eap;
618 return eap;
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/
WifiConfiguration.java 106 public EnterpriseField eap = new EnterpriseField("eap"); field in class:WifiConfiguration
128 eap, phase2, identity, anonymous_identity, password, client_cert,
141 /** WPA using EAP authentication. Generally used with an external authentication server. */
143 /** IEEE 802.1X using EAP authentication and (optionally) dynamically
185 /** LEAP/Network EAP (only used with LEAP) */
333 * Defaults to WPA-PSK WPA-EAP.

Completed in 2346 milliseconds

1 2 34 5