HomeSort by relevance Sort by last modified time
    Searched defs:eap (Results 1 - 25 of 70) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/eap_common/
eap_common.c 2 * EAP common peer/server definitions
16 * eap_hdr_len_valid - Validate EAP header length field
17 * @msg: EAP frame (starting with EAP header)
21 * This is a helper function that does minimal validation of EAP messages. The
36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame");
42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length");
51 * eap_hdr_validate - Validate EAP heade
184 const struct eap_hdr *eap; local
    [all...]
eap_sim_common.c 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)"
981 struct eap_hdr *eap; local
1011 struct eap_hdr *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
    [all...]
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
85 struct eap_method *eap; local
88 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
90 if (eap == NULL)
93 eap->init = eap_otp_init
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
70 * error case which seems to use EAP-MSCHAPv2 like error
71 * reporting with EAP-GTC inside EAP-FAST tunnel. */
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
129 struct eap_method *eap; local
    [all...]
eap_methods.c 2 * EAP peer: Method registration
23 * eap_peer_get_eap_method - Get EAP method based on type number
24 * @vendor: EAP Vendor-Id (0 = IETF)
25 * @method: EAP type number
26 * Returns: Pointer to EAP method or %NULL if not found
40 * eap_peer_get_type - Get EAP type for the given EAP method name
41 * @name: EAP method name, e.g., TLS
42 * @vendor: Buffer for returning EAP Vendor-Id
43 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
282 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
13 * struct eap_ssl_data - TLS data for EAP methods
52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
63 * eap - EAP state machine allocated with eap_peer_sm_init()
65 struct eap_sm *eap; member in struct:eap_ssl_data
73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
79 /* EAP TLS Flags */
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
8 * This file implements a vendor specific test method using EAP expanded types.
57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
170 struct eap_method *eap; local
    [all...]
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 2716)
39 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured");
51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
89 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
116 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
154 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done")
364 struct eap_method *eap; local
394 struct eap_method *eap; local
425 struct eap_method *eap; local
    [all...]
eap_ikev2.c 2 * EAP-IKEv2 peer (RFC 5106)
51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
82 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2");
127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication
507 struct eap_method *eap; local
    [all...]
eap_leap.c 2 * EAP peer method: LEAP
70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame");
85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version "
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response"
274 const struct eap_hdr *eap; local
395 struct eap_method *eap; local
    [all...]
eap_pax.c 2 * EAP peer method: EAP-PAX (RFC 4746)
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length");
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)");
128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in "
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - "
144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short "
152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A "
162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)"
506 struct eap_method *eap; local
    [all...]
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
41 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not "
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
99 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
482 struct eap_method *eap; local
    [all...]
eap_sake.c 2 * EAP peer method: EAP-SAKE (RFC 4763)
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length "
127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or "
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received
497 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_methods.c 2 * EAP server method registration
20 * eap_server_get_eap_method - Get EAP method based on type number
21 * @vendor: EAP Vendor-Id (0 = IETF)
22 * @method: EAP type number
23 * Returns: Pointer to EAP method or %NULL if not found
37 * eap_server_get_type - Get EAP type for the given EAP method name
38 * @name: EAP method name, e.g., TLS
39 * @vendor: Buffer for returning EAP Vendor-Id
40 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
74 struct eap_method *eap; local
    [all...]
eap_server_gtc.c 2 * hostapd / EAP-GTC (RFC 3748)
33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for "
85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame");
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
112 "for EAP-FAST prefix");
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
124 "response to EAP-FAST prefix")
204 struct eap_method *eap; local
    [all...]
eap_server_identity.c 2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf);
159 struct eap_method *eap; local
162 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
165 if (eap == NULL)
168 eap->init = eap_identity_init
    [all...]
eap_server_md5.c 2 * hostapd / EAP-MD5 server
51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success")
155 struct eap_method *eap; local
    [all...]
eap_server_vendor_test.c 2 * hostapd / Test method for vendor specific (expanded) EAP type
44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s",
80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate "
99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame");
170 struct eap_method *eap; local
173 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
176 if (eap == NULL)
179 eap->init = eap_vendor_test_init;
180 eap->reset = eap_vendor_test_reset;
181 eap->buildReq = eap_vendor_test_buildReq
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
13 * struct eap_ssl_data - TLS data for EAP methods
42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
47 * eap - EAP state machine allocated with eap_server_sm_init()
49 struct eap_sm *eap; member in struct:eap_ssl_data
56 /* EAP TLS Flags */
eap_server_tls.c 2 * hostapd / EAP-TLS (RFC 2716)
47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
108 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
136 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
173 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
184 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
211 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame");
224 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS
315 struct eap_method *eap; local
343 struct eap_method *eap; local
374 struct eap_method *eap; local
    [all...]
  /external/chromium_org/chromeos/network/
client_cert_util.cc 161 // Look for EAP specific client certificate properties, which can either be
174 LOG(ERROR) << "EAP CertID differs from KeyID";
278 const base::DictionaryValue* eap = NULL; local
279 wifi->GetDictionaryWithoutPathExpansion(wifi::kEAP, &eap);
280 if (!eap)
283 dict_with_client_cert = eap;
309 const base::DictionaryValue* eap = NULL; local
310 ethernet->GetDictionaryWithoutPathExpansion(wifi::kEAP, &eap);
311 if (!eap)
313 dict_with_client_cert = eap;
    [all...]
  /external/chromium_org/components/onc/
onc_constants.h 267 namespace eap { namespace in namespace:onc
289 } // namespace eap
  /external/iproute2/tc/
m_action.c 175 int eap = 0; /* expect action parameters */ local
194 eap = 1;
208 eap = 0;
239 if (eap > 0) {
240 fprintf(stderr,"bad action empty %d\n",eap);
  /external/tcpdump/
print-eap.c 20 * Format and print EAP packets.
26 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.5 2007-10-04 16:41:33 hannes Exp $";
57 { EAP_FRAME_TYPE_PACKET, "EAP packet" },
94 #define EAP_TYPE_TTLS 21 /* draft-funk-eap-ttls-v0-01.txt */
120 /* RFC 2716 - EAP TLS bits */
134 /* EAP-AKA and EAP-SIM - RFC 4187 */
159 * Print EAP requests / responses
166 const struct eap_frame_t *eap; local
173 eap = (const struct eap_frame_t *)cp
    [all...]

Completed in 251 milliseconds

1 2 3