/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 2 * hostapd / EAP-SIM (RFC 4186) 65 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 77 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured"); 105 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start"); 114 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 141 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication " 184 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to encrypt " 199 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge"); 228 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Re-authentication"); 232 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S" 770 struct eap_method *eap; local [all...] |
eap_server_tnc.c | 2 * EAP server method: EAP-TNC (Trusted Network Connect) 33 /* EAP-TNC Flags */ 67 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 113 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for " 168 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request", 193 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 207 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 213 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 225 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request") 556 struct eap_method *eap; local [all...] |
eap_server_aka.c | 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 95 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 121 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 188 * No EAP-AKA/Identity packets were exchanged - send empty 195 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */ 198 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len) 1218 struct eap_method *eap; local 1246 struct eap_method *eap; local [all...] |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 126 /* Note: eap is allocated memory; caller is responsible for freeing 129 u8 *eap; member in struct:eap_ttls_avp 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) 1164 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 189 * eap - EAP peer configuration for this network 191 struct eap_peer_config eap; member in struct:wpa_ssid 239 * leap - Number of EAP methods using LEAP 247 * non_leap - Number of EAP methods not using LEAP 249 * This field should be set to >0 if any EAP method other than LEAP is 256 * eap_workaround - EAP workarounds enabled 258 * wpa_supplicant supports number of "EAP workarounds" to work around 263 * Strict EAP conformance mode can be configured by disabling
|
interworking.c | 135 struct nai_realm_eap *eap; member in struct:nai_realm 146 os_free(realms[i].eap); 160 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 166 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 172 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 196 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP"); 199 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP"); 202 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP"); 205 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2"); 213 wpa_printf(MSG_DEBUG, "Inner EAP method: %u" 431 struct nai_realm_eap *eap = &realm->eap[e]; local 627 struct nai_realm_eap *eap = NULL; local [all...] |
/hardware/ti/wlan/wl1271/CUDK/configurationutility/src/ |
wpa_core.c | 75 S32 eap; member in struct:__anon18492 275 pWpaCore->WpaSupplParams.eap = EapType; 620 if ((pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_LEAP) || 621 (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_PEAP) || 622 (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_FAST)) 635 os_sprintf(cmd, (PS8)"SET_NETWORK %d key_mgmt WPA-EAP CCKM", NetworkID); 639 os_sprintf(cmd, (PS8)"SET_NETWORK %d key_mgmt WPA-EAP", NetworkID); 715 /* set eap of the new network block */ 716 if (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_NONE) 721 if (pWpaCore->WpaSupplParams.eap == OS_EAP_TYPE_MD5_CHALLENGE [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface.c | 29 #include "eap_peer/eap.h" 98 if (rsn_preauth_init(wpa_s->wpa, bssid, ssid ? &ssid->eap : NULL)) 238 struct eap_peer_config *eap; local 260 eap = &ssid->eap; 263 os_free(eap->identity); 264 eap->identity = (u8 *) os_strdup(pos); 265 eap->identity_len = os_strlen(pos); 266 eap->pending_req_identity = 0; 270 os_free(eap->password) [all...] |
eapol_test.c | 24 #include "eap_peer/eap.h" 61 u8 *last_eap_radius; /* last received EAP Response from Authentication 172 const u8 *eap, size_t len) 179 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 192 hdr = (const struct eap_hdr *) eap; 203 "EAP-Response-Identity", 259 if (eap && !radius_msg_add_eap(msg, eap, len)) { 260 printf("Could not add EAP-Message\n"); 297 wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len) 480 struct eap_hdr *eap; local 532 u8 *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 37 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 90 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 147 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 165 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 194 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for 1336 struct eap_method *eap; local 1365 struct eap_method *eap; local [all...] |
eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 14 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26). 15 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP 18 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in 38 u8 mschapv2_id; /* usually same as EAP identifier; must be change 858 struct eap_method *eap; local [all...] |
eap_peap.c | 2 * EAP peer method: EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt) 30 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt 31 * 2 = draft-josefsson-ppext-eap-tls-eap-10.txt 55 * EAP-Success 56 * 1 = reply with tunneled EAP-Success to inne 1266 struct eap_method *eap; local [all...] |
eap_sim.c | 2 * EAP peer method: EAP-SIM (RFC 4186) 82 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 99 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " 111 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid " 118 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 150 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 163 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM " 175 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage " 178 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage 1079 struct eap_method *eap; local [all...] |
eap_fast.c | 2 * EAP peer method: EAP-FAST (RFC 4851) 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 88 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 92 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC 1687 struct eap_method *eap; local [all...] |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 31 * 1 = draft-funk-eap-ttls-v1-00.txt 95 selected = "EAP"; 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 112 selected = "EAP"; 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and " 270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key") 1961 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_aka.c | 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 31 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 89 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 127 wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured"); 195 * No EAP-AKA/Identity packets were exchanged - send empty 202 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */ 205 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len) 1225 struct eap_method *eap; local 1253 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 177 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST }, 547 u8 *eap, *pos; local 564 eap = os_malloc(len); 565 if (eap == NULL) 568 pos = eap; 581 return eap;
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 19 #include "eap_server/eap.h" 382 const u8 *eap, size_t len) 388 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY) 391 identity = eap_get_identity(sm->eap, &identity_len); 414 const u8 *eap, size_t len) 423 ieee802_1x_learn_identity(hapd, sm, eap, len); 425 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 522 if (eap && !radius_msg_add_eap(msg, eap, len)) { 523 printf("Could not add EAP-Message\n") 591 struct eap_hdr *eap; local 982 u8 *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf) 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 82 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 139 wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm"); 154 wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage " 157 wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage " 186 wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for 1348 struct eap_method *eap; local 1377 struct eap_method *eap; local [all...] |
eap_mschapv2.c | 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt) 8 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26). 9 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP 12 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in 33 u8 mschapv2_id; /* usually same as EAP identifier; must be change 858 struct eap_method *eap; local [all...] |
eap_peap.c | 2 * EAP peer method: EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt) 24 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt 25 * 2 = draft-josefsson-ppext-eap-tls-eap-10.txt 49 * EAP-Success 50 * 1 = reply with tunneled EAP-Success to inne 1265 struct eap_method *eap; local [all...] |
eap_sim.c | 2 * EAP peer method: EAP-SIM (RFC 4186) 75 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s", 92 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data " 104 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid " 111 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of " 143 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm"); 156 wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM " 168 wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage " 171 wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage 1092 struct eap_method *eap; local [all...] |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 77 selected = "EAP"; 82 selected = "EAP"; 98 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 114 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 218 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 222 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 249 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 250 "Phase 2 EAP vendor %d method %d" 1600 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 218 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST }, 584 u8 *eap, *pos; local 601 eap = os_malloc(len); 602 if (eap == NULL) 605 pos = eap; 618 return eap; [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 106 public EnterpriseField eap = new EnterpriseField("eap"); field in class:WifiConfiguration 128 eap, phase2, identity, anonymous_identity, password, client_cert, 141 /** WPA using EAP authentication. Generally used with an external authentication server. */ 143 /** IEEE 802.1X using EAP authentication and (optionally) dynamically 185 /** LEAP/Network EAP (only used with LEAP) */ 333 * Defaults to WPA-PSK WPA-EAP.
|