HomeSort by relevance Sort by last modified time
    Searched refs:pac (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast_pac.c 2 * EAP peer method: EAP-FAST PAC file processing
22 /* TODO: encrypt PAC-Key in the PAC file */
27 "wpa_supplicant EAP-FAST PAC file - version 1";
36 * Sequence of PAC entries:
37 * 2-octet PAC-Type (big endian)
38 * 32-octet PAC-Key
39 * 2-octet PAC-Opaque length (big endian)
40 * <variable len> PAC-Opaque data (length bytes)
41 * 2-octet PAC-Info length (big endian
79 struct eap_fast_pac *pac = pac_root; local
96 struct eap_fast_pac *pac, *prev; local
149 struct eap_fast_pac *pac; local
420 struct eap_fast_pac *pac = NULL; local
619 struct eap_fast_pac *pac; local
670 struct eap_fast_pac *pac, *prev; local
754 struct eap_fast_pac *pac, *prev; local
869 struct eap_fast_pac *pac; local
    [all...]
eap_fast_pac.h 2 * EAP peer method: EAP-FAST PAC file processing
38 void eap_fast_free_pac(struct eap_fast_pac *pac);
eap_fast.c 55 int provisioning_allowed; /* Allowed PAC provisioning modes */
56 int provisioning; /* doing PAC provisioning (not the normal auth) */
65 struct eap_fast_pac *pac; member in struct:eap_fast_data
93 "new PAC-Key");
103 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
127 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
136 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
143 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
204 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) {
210 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0)
230 struct eap_fast_pac *pac, *prev; local
716 struct eap_tlv_hdr *pac; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast_pac.c 2 * EAP peer method: EAP-FAST PAC file processing
16 /* TODO: encrypt PAC-Key in the PAC file */
21 "wpa_supplicant EAP-FAST PAC file - version 1";
30 * Sequence of PAC entries:
31 * 2-octet PAC-Type (big endian)
32 * 32-octet PAC-Key
33 * 2-octet PAC-Opaque length (big endian)
34 * <variable len> PAC-Opaque data (length bytes)
35 * 2-octet PAC-Info length (big endian
73 struct eap_fast_pac *pac = pac_root; local
90 struct eap_fast_pac *pac, *prev; local
143 struct eap_fast_pac *pac; local
414 struct eap_fast_pac *pac = NULL; local
615 struct eap_fast_pac *pac; local
666 struct eap_fast_pac *pac, *prev; local
750 struct eap_fast_pac *pac, *prev; local
865 struct eap_fast_pac *pac; local
    [all...]
eap_fast_pac.h 2 * EAP peer method: EAP-FAST PAC file processing
32 void eap_fast_free_pac(struct eap_fast_pac *pac);
eap_fast.c 49 int provisioning_allowed; /* Allowed PAC provisioning modes */
50 int provisioning; /* doing PAC provisioning (not the normal auth) */
59 struct eap_fast_pac *pac; member in struct:eap_fast_data
87 "new PAC-Key");
97 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
121 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
130 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
137 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
198 eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) {
204 eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0)
224 struct eap_fast_pac *pac, *prev; local
711 struct eap_tlv_hdr *pac; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_fast_common.h 27 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field
29 * in the general PAC TLV format (Section 4.2).
61 /* RFC 5422: 4.2.6 PAC-Type TLV */
64 /* User Authorization PAC */
67 /* Machine Authentication PAC */
94 u8 *pac; member in struct:eap_fast_tlv_parse
eap_fast_common.c 88 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
94 "PAC to master secret label hash",
288 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
289 if (tlv->pac) {
291 "PAC TLV in the message");
295 tlv->pac = pos;
  /external/wpa_supplicant_8/src/eap_common/
eap_fast_common.h 21 * RFC 5422: Section 4.2.1 - Formats for PAC TLV Attributes / Type Field
23 * in the general PAC TLV format (Section 4.2).
55 /* RFC 5422: 4.2.6 PAC-Type TLV */
58 /* User Authorization PAC */
61 /* Machine Authentication PAC */
88 u8 *pac; member in struct:eap_fast_tlv_parse
eap_fast_common.c 82 * master_secret = T-PRF(PAC-Key, "PAC to master secret label hash",
88 "PAC to master secret label hash",
282 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV", pos, len);
283 if (tlv->pac) {
285 "PAC TLV in the message");
289 tlv->pac = pos;
  /external/chromium/chrome/common/extensions/docs/examples/extensions/proxy_configuration/test/
proxy_form_controller_test.js 30 ProxyFormController.ProxyTypes.PAC,
192 document.getElementById(ProxyFormController.ProxyTypes.PAC)
218 // Test `AUTO` normalization to `PAC`
225 document.getElementById(ProxyFormController.ProxyTypes.PAC)
248 // PAC
250 mode: ProxyFormController.ProxyTypes.PAC,
255 document.getElementById(ProxyFormController.ProxyTypes.PAC)
288 mode: ProxyFormController.ProxyTypes.PAC,
290 pacScript: {url: 'http://example.com/this/is/a/pac.script'}
293 'http://example.com/this/is/a/pac.script'
    [all...]
  /external/javassist/src/main/javassist/compiler/
MemberResolver.java 422 String pac = (String)it.next(); local
423 String fqName = pac + '.' + orgName;
433 if (pac.endsWith("." + orgName)) {
434 CtClass cc = classPool.get(pac);
441 classPool.recordInvalidClassName(pac);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_fast.c 30 /* Private PAC-Opaque TLV types */
64 int send_new_pac; /* server triggered re-keying of Tunnel PAC */
66 u8 *identity; /* from PAC-Opaque */
140 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
153 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
159 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
165 "for decrypting PAC-Opaque");
172 "PAC-Opaque");
175 * This may have been caused by server changing the PAC-Opaque
176 * encryption key, so just ignore this PAC-Opaque instead o
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 25 /* Private PAC-Opaque TLV types */
59 int send_new_pac; /* server triggered re-keying of Tunnel PAC */
61 u8 *identity; /* from PAC-Opaque */
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
160 "for decrypting PAC-Opaque");
167 "PAC-Opaque");
170 * This may have been caused by server changing the PAC-Opaque
171 * encryption key, so just ignore this PAC-Opaque instead o
    [all...]
  /sdk/sdkmanager/libs/sdkuilib/src/com/android/sdkuilib/internal/repository/core/
PackagesDiffLogic.java 785 PkgCategoryApi pac = (PkgCategoryApi) cat; local
786 if (pac.getPlatformName() == null) {
    [all...]
  /external/chromium/chrome/browser/resources/net_internals/
logviewpainter.js 371 // (auto-detect, custom pac url, or manual settings).
379 modes.push(['PAC script: ' + config.pac_url]);

Completed in 328 milliseconds