HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 1 - 25 of 103) sorted by null

1 2 3 4 5

  /external/tcpdump/
print-eap.c 25 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.3 2004/04/23 19:03:39 mcr Exp $";
57 const struct eap_packet_t *eap; local
59 eap = (const struct eap_packet_t *)cp;
60 ND_TCHECK(eap->data);
62 ND_PRINT((ndo, "EAP code=%u id=%u length=%u ",
63 eap->code, eap->id, (eap->length[0]<<8) + eap->length[1]));
  /external/wpa_supplicant_8/src/eap_peer/
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
85 struct eap_method *eap; local
88 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
90 if (eap == NULL)
93 eap->init = eap_otp_init
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
    [all...]
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 2716)
39 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured");
51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
89 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
118 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
152 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
159 "client EAP encryption"
329 struct eap_method *eap; local
359 struct eap_method *eap; local
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
70 * error case which seems to use EAP-MSCHAPv2 like error
71 * reporting with EAP-GTC inside EAP-FAST tunnel. */
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
129 struct eap_method *eap; local
    [all...]
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
8 * This file implements a vendor specific test method using EAP expanded types.
57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
170 struct eap_method *eap; local
    [all...]
eap_leap.c 2 * EAP peer method: LEAP
70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame");
85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version "
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response"
274 const struct eap_hdr *eap; local
392 struct eap_method *eap; local
    [all...]
eap_methods.c 2 * EAP peer: Method registration
23 * eap_peer_get_eap_method - Get EAP method based on type number
24 * @vendor: EAP Vendor-Id (0 = IETF)
25 * @method: EAP type number
26 * Returns: Pointer to EAP method or %NULL if not found
40 * eap_peer_get_type - Get EAP type for the given EAP method name
41 * @name: EAP method name, e.g., TLS
42 * @vendor: Buffer for returning EAP Vendor-Id
43 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
282 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
ieee8021x.conf 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
8 eap=PEAP
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 2 * hostapd / EAP-TLS (RFC 2716)
47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
114 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
151 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
162 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
185 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame");
198 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS "
234 "client EAP encryption"
289 struct eap_method *eap; local
317 struct eap_method *eap; local
    [all...]
eap_server_methods.c 2 * EAP server method registration
20 * eap_server_get_eap_method - Get EAP method based on type number
21 * @vendor: EAP Vendor-Id (0 = IETF)
22 * @method: EAP type number
23 * Returns: Pointer to EAP method or %NULL if not found
37 * eap_server_get_type - Get EAP type for the given EAP method name
38 * @name: EAP method name, e.g., TLS
39 * @vendor: Buffer for returning EAP Vendor-Id
40 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
74 struct eap_method *eap; local
    [all...]
eap_server_identity.c 2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
108 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
121 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
152 struct eap_method *eap; local
155 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
158 if (eap == NULL)
161 eap->init = eap_identity_init;
162 eap->initPickUp = eap_identity_initPickUp
    [all...]
eap_server_vendor_test.c 2 * hostapd / Test method for vendor specific (expanded) EAP type
44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s",
80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate "
99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame");
170 struct eap_method *eap; local
173 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
176 if (eap == NULL)
179 eap->init = eap_vendor_test_init;
180 eap->reset = eap_vendor_test_reset;
181 eap->buildReq = eap_vendor_test_buildReq
    [all...]
eap_server_md5.c 2 * hostapd / EAP-MD5 server
51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success")
155 struct eap_method *eap; local
    [all...]
eap_server_gtc.c 2 * hostapd / EAP-GTC (RFC 3748)
33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for "
85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame");
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
112 "for EAP-FAST prefix");
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
124 "response to EAP-FAST prefix")
204 struct eap_method *eap; local
    [all...]
eap_server_ikev2.c 2 * EAP-IKEv2 server (RFC 5106)
37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
38 "to user identity from EAP-Identity");
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
94 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2");
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes
513 struct eap_method *eap; local
    [all...]
eap_server_sake.c 2 * hostapd / EAP-SAKE (RFC 4763) server
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data")
500 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 113 # EAP fast re-authentication
114 # By default, fast re-authentication is enabled for all EAP methods that
131 # Dynamic EAP methods
132 # If EAP methods were built dynamically as shared object files, they need to be
133 # loaded here before being used in the network blocks. By default, EAP methods
366 # (EAP-TLS). Full path to the file should be used since working
411 # Consortium to match the network, the EAP parameters need to be
415 # eap: Pre-configured EAP method
416 # This optional field can be used to specify which EAP method will b
    [all...]
interworking.c 19 #include "eap_peer/eap.h"
269 struct nai_realm_eap *eap; member in struct:nai_realm
280 os_free(realms[i].eap);
294 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
300 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
306 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
330 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
333 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
336 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP");
339 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2")
585 struct nai_realm_eap *eap = &realm->eap[e]; local
1162 struct nai_realm_eap *eap = NULL; local
    [all...]
config.c 15 #include "eap_peer/eap.h"
488 else if (os_strcmp(start, "WPA-EAP") == 0)
499 else if (os_strcmp(start, "FT-EAP") == 0)
505 else if (os_strcmp(start, "WPA-EAP-SHA256") == 0)
565 ret = os_snprintf(pos, end - pos, "%sWPA-EAP",
610 pos += os_snprintf(pos, end - pos, "%sFT-EAP",
620 pos += os_snprintf(pos, end - pos, "%sWPA-EAP-SHA256",
985 wpa_printf(MSG_ERROR, "Line %d: unknown EAP method "
988 " this EAP method during wpa_supplicant\n"
1014 wpa_hexdump(MSG_MSGDUMP, "eap methods"
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_common.c 2 * EAP common peer/server definitions
16 * eap_hdr_len_valid - Validate EAP header length field
17 * @msg: EAP frame (starting with EAP header)
21 * This is a helper function that does minimal validation of EAP messages. The
36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame");
42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length");
51 * eap_hdr_validate - Validate EAP heade
184 const struct eap_hdr *eap; local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_translation_tables.cc 27 { ::onc::eap::kAnonymousIdentity, shill::kEapAnonymousIdentityProperty},
28 { ::onc::eap::kIdentity, shill::kEapIdentityProperty},
30 // { ::onc::eap::kInner, shill::kEapPhase2AuthProperty },
33 // { ::onc::eap::kOuter, shill::kEapMethodProperty },
34 { ::onc::eap::kPassword, shill::kEapPasswordProperty},
35 { ::onc::eap::kSaveCredentials, shill::kSaveCredentialsProperty},
36 { ::onc::eap::kServerCAPEMs, shill::kEapCaCertPemProperty},
37 { ::onc::eap::kUseSystemCAs, shill::kEapUseSystemCasProperty},
238 { ::onc::eap::kPEAP, shill::kEapMethodPEAP},
239 { ::onc::eap::kEAP_TLS, shill::kEapMethodTLS}
    [all...]
  /external/ppp/pppd/
Android.mk 21 eap.c \

Completed in 203 milliseconds

1 2 3 4 5