HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 76 - 100 of 103) sorted by null

1 2 34 5

  /external/tcpdump/
Android.mk 40 print-eap.c\
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)"
982 struct eap_hdr *eap; local
1012 struct eap_hdr *eap; local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_utils.cc 205 ExpandField(eap::kAnonymousIdentity, substitution, onc_object);
206 ExpandField(eap::kIdentity, substitution, onc_object);
572 eap::kServerCARefs,
573 eap::kServerCARef,
574 eap::kServerCAPEMs,
onc_validator.cc 756 using namespace ::onc::eap;
  /external/iproute2/tc/
m_action.c 175 int eap = 0; /* expect action parameters */ local
194 eap = 1;
208 eap = 0;
239 if (eap > 0) {
240 fprintf(stderr,"bad action empty %d\n",eap);
  /external/wpa_supplicant_8/src/ap/
gas_serv.c 254 struct hostapd_nai_realm_eap *eap = &realm->eap_method[i]; local
255 wpabuf_put_u8(buf, 2 + (3 * eap->num_auths));
256 wpabuf_put_u8(buf, eap->eap_method);
257 wpabuf_put_u8(buf, eap->num_auths);
258 for (j = 0; j < eap->num_auths; j++) {
259 wpabuf_put_u8(buf, eap->auth_id[j]);
261 wpabuf_put_u8(buf, eap->auth_val[j]);
363 * 2. all realms that share the same EAP methods in a NAI Realm Data
wps_hostapd.c 403 * EAP-WSC to be finished.
536 fprintf(nconf, "WPA-EAP");
636 * EAP-WSC to be finished.
    [all...]
  /external/chromium_org/chrome/browser/chromeos/options/
wifi_config_view.cc 83 PHASE_2_AUTH_INDEX_AUTO = 0, // LEAP, EAP-TLS have only this auth.
88 PHASE_2_AUTH_INDEX_CHAP = 5, // EAP-TTLS has up to this auth.
413 // If we're using EAP, we must have a method.
455 // No password for EAP-TLS.
465 // User certs only for EAP-TLS.
486 // If EAP method changes, the phase 2 auth choices may have changed also.
696 // Hidden 802.1X EAP Wi-Fi connection.
714 // Visible 802.1X EAP Wi-Fi connection.
894 ParseWiFiEAPUIProperty(&eap_method_ui_data_, wifi, ::onc::eap::kOuter);
895 ParseWiFiEAPUIProperty(&phase_2_auth_ui_data_, wifi, ::onc::eap::kInner)
    [all...]
wimax_config_view.cc 204 &save_credentials_ui_data_, wimax, ::onc::eap::kSaveCredentials);
206 &identity_ui_data_, wimax, ::onc::eap::kIdentity);
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.c 19 #include "eap_peer/eap.h"
306 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
810 * Clear forced success to clear EAP state for next
3703 struct eap_peer_config *eap = &ssid->eap; local
    [all...]
events.c 23 #include "eap_peer/eap.h"
272 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA).
281 if (ssid->eap.pcsc == NULL || wpa_s->scard != NULL)
284 if (ssid->eap.eap_methods == NULL) {
288 struct eap_method_type *eap = ssid->eap.eap_methods; local
289 while (eap->vendor != EAP_VENDOR_IETF ||
290 eap->method != EAP_TYPE_NONE) {
291 if (eap->vendor == EAP_VENDOR_IETF)
    [all...]
preauth_test.c 20 #include "eap_peer/eap.h"
302 wpa_printf(MSG_ERROR, "Failed to register EAP methods");
338 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap))
config_file.c 21 #include "eap_peer/eap.h"
580 value = wpa_config_get(ssid, "eap");
640 #define INTe(t) write_int(f, #t, ssid->eap.t, 0)
642 #define INT_DEFe(t, def) write_int(f, #t, ssid->eap.t, def)
config_winreg.c 804 value = wpa_config_get(ssid, "eap");
809 wpa_config_write_reg_string(hk, "eap", value);
860 #define INTe(t) write_int(netw, #t, ssid->eap.t, 0)
862 #define INT_DEFe(t, def) write_int(netw, #t, ssid->eap.t, def)
nmake.mak 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to
86 $(OBJDIR)\eap.obj \
scan.c 62 if (!ssid->eap.phase1)
65 if (os_strstr(ssid->eap.phase1, "pbc=1"))
    [all...]
wpas_glue.c 133 /* Current SSID is not using IEEE 802.1X/EAP, so drop possible
268 * EAP-LEAP is an exception from other EAP methods: it
684 wpa_printf(MSG_WARNING, "Unhandled EAP param %d needed",
689 wpas_notify_eap_status(wpa_s, "eap parameter needed", field_name);
758 wpa_hexdump_ascii(MSG_DEBUG, "EAP method updated anonymous_identity",
916 conf.eap_conf_ctx = &ssid->eap;
  /external/chromium_org/components/onc/
onc_constants.cc 112 const char kEAP[] = "EAP";
129 const char kEAP[] = "EAP";
141 const char kWPA_EAP[] = "WPA-EAP";
185 namespace eap { namespace in namespace:onc
191 const char kEAP_AKA[] = "EAP-AKA";
192 const char kEAP_FAST[] = "EAP-FAST";
193 const char kEAP_SIM[] = "EAP-SIM";
194 const char kEAP_TLS[] = "EAP-TLS";
195 const char kEAP_TTLS[] = "EAP-TTLS";
210 } // namespace eap
    [all...]
onc_constants.h 208 namespace eap { namespace in namespace:onc
233 } // namespace eap
  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 43 * Enterprise configuration details for Wi-Fi. Stores details about the EAP method
80 private static final String EAP_KEY = "eap";
218 public static final class Eap {
219 /** No EAP method used. Represents an empty config */
221 /** Protected EAP */
223 /** EAP-Transport Layer Security */
225 /** EAP-Tunneled Transport Layer Security */
227 /** EAP-Password */
233 private Eap() {}
268 * Set the EAP authentication method
641 String eap = mFields.get(EAP_KEY); local
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius.c 224 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST },
712 struct wpabuf *eap; local
730 eap = wpabuf_alloc(len);
731 if (eap == NULL)
739 wpabuf_put_data(eap, attr + 1, flen);
743 return eap;
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls_common.c 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
36 data->eap = sm;
57 * since the outer authentication with EAP-PEAP does not yet
  /external/wpa_supplicant_8/hostapd/
config_file.c 18 #include "eap_server/eap.h"
207 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
231 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in "
238 wpa_printf(MSG_ERROR, "EAP user allocation failed");
251 wpa_printf(MSG_ERROR, "Invalid EAP identity "
260 "memory for EAP identity");
276 wpa_printf(MSG_ERROR, "No EAP method on line %d in "
322 wpa_printf(MSG_ERROR, "Unsupported EAP type "
337 wpa_printf(MSG_ERROR, "No EAP types configured on "
371 wpa_printf(MSG_ERROR, "Invalid EAP password
1486 struct hostapd_nai_realm_eap *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.c 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
124 * TLS Sesson Ticket extension for EAP-TLS, EAP-PEAP, and
125 * EAP-TTLS (EAP-FAST uses session ticket, so any server that
126 * supports EAP-FAST does not need this workaround).
214 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
217 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
220 * This function is used to initialize shared TLS functionality for EAP-TLS
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/
WifiConfigController.java 35 import android.net.wifi.WifiEnterpriseConfig.Eap;
384 case Eap.PEAP:
555 // Note: XL SetupWizard won't hide "EAP" settings here.
579 mView.findViewById(R.id.eap).setVisibility(View.GONE);
582 mView.findViewById(R.id.eap).setVisibility(View.VISIBLE);
604 case Eap.PEAP:
631 mEapMethodSpinner.setSelection(Eap.PEAP);
632 showEapFieldsByMethod(Eap.PEAP);
640 * EAP-PWD valid fields include
643 * EAP-PEAP valid fields includ
    [all...]

Completed in 1423 milliseconds

1 2 34 5