/external/tcpdump/ |
Android.mk | 40 print-eap.c\
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines 52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN); 71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN); 72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN); 73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN); 82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys"); 94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr", 96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut", 98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)" 982 struct eap_hdr *eap; local 1012 struct eap_hdr *eap; local [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_utils.cc | 205 ExpandField(eap::kAnonymousIdentity, substitution, onc_object); 206 ExpandField(eap::kIdentity, substitution, onc_object); 572 eap::kServerCARefs, 573 eap::kServerCARef, 574 eap::kServerCAPEMs,
|
onc_validator.cc | 756 using namespace ::onc::eap;
|
/external/iproute2/tc/ |
m_action.c | 175 int eap = 0; /* expect action parameters */ local 194 eap = 1; 208 eap = 0; 239 if (eap > 0) { 240 fprintf(stderr,"bad action empty %d\n",eap);
|
/external/wpa_supplicant_8/src/ap/ |
gas_serv.c | 254 struct hostapd_nai_realm_eap *eap = &realm->eap_method[i]; local 255 wpabuf_put_u8(buf, 2 + (3 * eap->num_auths)); 256 wpabuf_put_u8(buf, eap->eap_method); 257 wpabuf_put_u8(buf, eap->num_auths); 258 for (j = 0; j < eap->num_auths; j++) { 259 wpabuf_put_u8(buf, eap->auth_id[j]); 261 wpabuf_put_u8(buf, eap->auth_val[j]); 363 * 2. all realms that share the same EAP methods in a NAI Realm Data
|
wps_hostapd.c | 403 * EAP-WSC to be finished. 536 fprintf(nconf, "WPA-EAP"); 636 * EAP-WSC to be finished. [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
wifi_config_view.cc | 83 PHASE_2_AUTH_INDEX_AUTO = 0, // LEAP, EAP-TLS have only this auth. 88 PHASE_2_AUTH_INDEX_CHAP = 5, // EAP-TTLS has up to this auth. 413 // If we're using EAP, we must have a method. 455 // No password for EAP-TLS. 465 // User certs only for EAP-TLS. 486 // If EAP method changes, the phase 2 auth choices may have changed also. 696 // Hidden 802.1X EAP Wi-Fi connection. 714 // Visible 802.1X EAP Wi-Fi connection. 894 ParseWiFiEAPUIProperty(&eap_method_ui_data_, wifi, ::onc::eap::kOuter); 895 ParseWiFiEAPUIProperty(&phase_2_auth_ui_data_, wifi, ::onc::eap::kInner) [all...] |
wimax_config_view.cc | 204 &save_credentials_ui_data_, wimax, ::onc::eap::kSaveCredentials); 206 &identity_ui_data_, wimax, ::onc::eap::kIdentity);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.c | 19 #include "eap_peer/eap.h" 306 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 810 * Clear forced success to clear EAP state for next 3703 struct eap_peer_config *eap = &ssid->eap; local [all...] |
events.c | 23 #include "eap_peer/eap.h" 272 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA). 281 if (ssid->eap.pcsc == NULL || wpa_s->scard != NULL) 284 if (ssid->eap.eap_methods == NULL) { 288 struct eap_method_type *eap = ssid->eap.eap_methods; local 289 while (eap->vendor != EAP_VENDOR_IETF || 290 eap->method != EAP_TYPE_NONE) { 291 if (eap->vendor == EAP_VENDOR_IETF) [all...] |
preauth_test.c | 20 #include "eap_peer/eap.h" 302 wpa_printf(MSG_ERROR, "Failed to register EAP methods"); 338 if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap))
|
config_file.c | 21 #include "eap_peer/eap.h" 580 value = wpa_config_get(ssid, "eap"); 640 #define INTe(t) write_int(f, #t, ssid->eap.t, 0) 642 #define INT_DEFe(t, def) write_int(f, #t, ssid->eap.t, def)
|
config_winreg.c | 804 value = wpa_config_get(ssid, "eap"); 809 wpa_config_write_reg_string(hk, "eap", value); 860 #define INTe(t) write_int(netw, #t, ssid->eap.t, 0) 862 #define INT_DEFe(t, def) write_int(netw, #t, ssid->eap.t, def)
|
nmake.mak | 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to 86 $(OBJDIR)\eap.obj \
|
scan.c | 62 if (!ssid->eap.phase1) 65 if (os_strstr(ssid->eap.phase1, "pbc=1")) [all...] |
wpas_glue.c | 133 /* Current SSID is not using IEEE 802.1X/EAP, so drop possible 268 * EAP-LEAP is an exception from other EAP methods: it 684 wpa_printf(MSG_WARNING, "Unhandled EAP param %d needed", 689 wpas_notify_eap_status(wpa_s, "eap parameter needed", field_name); 758 wpa_hexdump_ascii(MSG_DEBUG, "EAP method updated anonymous_identity", 916 conf.eap_conf_ctx = &ssid->eap;
|
/external/chromium_org/components/onc/ |
onc_constants.cc | 112 const char kEAP[] = "EAP"; 129 const char kEAP[] = "EAP"; 141 const char kWPA_EAP[] = "WPA-EAP"; 185 namespace eap { namespace in namespace:onc 191 const char kEAP_AKA[] = "EAP-AKA"; 192 const char kEAP_FAST[] = "EAP-FAST"; 193 const char kEAP_SIM[] = "EAP-SIM"; 194 const char kEAP_TLS[] = "EAP-TLS"; 195 const char kEAP_TTLS[] = "EAP-TTLS"; 210 } // namespace eap [all...] |
onc_constants.h | 208 namespace eap { namespace in namespace:onc 233 } // namespace eap
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 43 * Enterprise configuration details for Wi-Fi. Stores details about the EAP method 80 private static final String EAP_KEY = "eap"; 218 public static final class Eap { 219 /** No EAP method used. Represents an empty config */ 221 /** Protected EAP */ 223 /** EAP-Transport Layer Security */ 225 /** EAP-Tunneled Transport Layer Security */ 227 /** EAP-Password */ 233 private Eap() {} 268 * Set the EAP authentication method 641 String eap = mFields.get(EAP_KEY); local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 224 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST }, 712 struct wpabuf *eap; local 730 eap = wpabuf_alloc(len); 731 if (eap == NULL) 739 wpabuf_put_data(eap, attr + 1, flen); 743 return eap; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions 36 data->eap = sm; 57 * since the outer authentication with EAP-PEAP does not yet
|
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 18 #include "eap_server/eap.h" 207 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 231 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in " 238 wpa_printf(MSG_ERROR, "EAP user allocation failed"); 251 wpa_printf(MSG_ERROR, "Invalid EAP identity " 260 "memory for EAP identity"); 276 wpa_printf(MSG_ERROR, "No EAP method on line %d in " 322 wpa_printf(MSG_ERROR, "Unsupported EAP type " 337 wpa_printf(MSG_ERROR, "No EAP types configured on " 371 wpa_printf(MSG_ERROR, "Invalid EAP password 1486 struct hostapd_nai_realm_eap *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 124 * TLS Sesson Ticket extension for EAP-TLS, EAP-PEAP, and 125 * EAP-TTLS (EAP-FAST uses session ticket, so any server that 126 * supports EAP-FAST does not need this workaround). 214 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init() 217 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 220 * This function is used to initialize shared TLS functionality for EAP-TLS [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 35 import android.net.wifi.WifiEnterpriseConfig.Eap; 384 case Eap.PEAP: 555 // Note: XL SetupWizard won't hide "EAP" settings here. 579 mView.findViewById(R.id.eap).setVisibility(View.GONE); 582 mView.findViewById(R.id.eap).setVisibility(View.VISIBLE); 604 case Eap.PEAP: 631 mEapMethodSpinner.setSelection(Eap.PEAP); 632 showEapFieldsByMethod(Eap.PEAP); 640 * EAP-PWD valid fields include 643 * EAP-PEAP valid fields includ [all...] |