/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 2 * hostapd / EAP-TLS (RFC 2716) 47 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s", 64 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 86 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 108 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 136 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for " 173 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d", 184 wpa_printf(MSG_DEBUG, "EAP-TLS: Done"); 211 wpa_printf(MSG_INFO, "EAP-TLS: Invalid frame"); 224 wpa_printf(MSG_DEBUG, "EAP-TLS: Client acknowledged final TLS 315 struct eap_method *eap; local 343 struct eap_method *eap; local 374 struct eap_method *eap; local [all...] |
eap_server_methods.c | 2 * EAP server method registration 20 * eap_server_get_eap_method - Get EAP method based on type number 21 * @vendor: EAP Vendor-Id (0 = IETF) 22 * @method: EAP type number 23 * Returns: Pointer to EAP method or %NULL if not found 37 * eap_server_get_type - Get EAP type for the given EAP method name 38 * @name: EAP method name, e.g., TLS 39 * @vendor: Buffer for returning EAP Vendor-Id 40 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 74 struct eap_method *eap; local [all...] |
eap_server_identity.c | 2 * hostapd / EAP-Identity 70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " 91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); 159 struct eap_method *eap; local 162 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 165 if (eap == NULL) 168 eap->init = eap_identity_init [all...] |
eap_server_vendor_test.c | 2 * hostapd / Test method for vendor specific (expanded) EAP type 44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s", 80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate " 99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame"); 170 struct eap_method *eap; local 173 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 176 if (eap == NULL) 179 eap->init = eap_vendor_test_init; 180 eap->reset = eap_vendor_test_reset; 181 eap->buildReq = eap_vendor_test_buildReq [all...] |
eap_server_md5.c | 2 * hostapd / EAP-MD5 server 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success") 155 struct eap_method *eap; local [all...] |
eap_server_gtc.c | 2 * hostapd / EAP-GTC (RFC 3748) 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for " 85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame"); 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 112 "for EAP-FAST prefix"); 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 124 "response to EAP-FAST prefix") 204 struct eap_method *eap; local [all...] |
eap_server_ikev2.c | 2 * EAP-IKEv2 server (RFC 5106) 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 38 "to user identity from EAP-Identity"); 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 94 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2"); 140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes 516 struct eap_method *eap; local [all...] |
eap_server_sake.c | 2 * hostapd / EAP-SAKE (RFC 4763) server 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data") 500 struct eap_method *eap; local [all...] |
eap_server_wsc.c | 2 * EAP-WSC server for Wi-Fi Protected Setup 57 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 72 wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External " 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 110 wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not " 123 wpa_printf(MSG_DEBUG, "EAP-WSC: No AP PIN (password) " 135 wpa_printf(MSG_DEBUG, "EAP-WSC: Prefer PSK format for P2P " 173 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for " 178 wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start"); 208 wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for 490 struct eap_method *eap; local [all...] |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 126 /* Note: eap is allocated memory; caller is responsible for freeing 129 u8 *eap; member in struct:eap_ttls_avp 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) 1186 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 85 struct eap_method *eap; local 88 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 90 if (eap == NULL) 93 eap->init = eap_otp_init [all...] |
eap_tls.c | 2 * EAP peer method: EAP-TLS (RFC 2716) 39 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 51 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 54 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 60 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 89 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 116 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 154 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done") 364 struct eap_method *eap; local 394 struct eap_method *eap; local 425 struct eap_method *eap; local [all...] |
eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); 104 struct eap_method *eap; local [all...] |
eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 70 * error case which seems to use EAP-MSCHAPv2 like error 71 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 129 struct eap_method *eap; local [all...] |
eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type 8 * This file implements a vendor specific test method using EAP expanded types. 57 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 80 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 87 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 94 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 104 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 116 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response"); 170 struct eap_method *eap; local [all...] |
eap_leap.c | 2 * EAP peer method: LEAP 70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame"); 85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version " 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 123 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Response" 274 const struct eap_hdr *eap; local 395 struct eap_method *eap; local [all...] |
eap_methods.c | 2 * EAP peer: Method registration 23 * eap_peer_get_eap_method - Get EAP method based on type number 24 * @vendor: EAP Vendor-Id (0 = IETF) 25 * @method: EAP type number 26 * Returns: Pointer to EAP method or %NULL if not found 40 * eap_peer_get_type - Get EAP type for the given EAP method name 41 * @name: EAP method name, e.g., TLS 42 * @vendor: Buffer for returning EAP Vendor-Id 43 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 282 struct eap_method *eap; local [all...] |
eap_ikev2.c | 2 * EAP-IKEv2 peer (RFC 5106) 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 82 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2"); 127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication 507 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2 8 eap=PEAP
|
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 6 ssid="example wpa2-eap network" 7 key_mgmt=WPA-EAP 11 eap=TLS
|
openCryptoki.conf | 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and 24 key_mgmt=WPA-EAP 25 eap=TLS
|
/external/tcpdump/ |
print-eap.c | 20 * Format and print EAP packets. 26 "@(#) $Header: /tcpdump/master/tcpdump/print-eap.c,v 1.5 2007-10-04 16:41:33 hannes Exp $"; 57 { EAP_FRAME_TYPE_PACKET, "EAP packet" }, 94 #define EAP_TYPE_TTLS 21 /* draft-funk-eap-ttls-v0-01.txt */ 120 /* RFC 2716 - EAP TLS bits */ 134 /* EAP-AKA and EAP-SIM - RFC 4187 */ 159 * Print EAP requests / responses 166 const struct eap_frame_t *eap; local 173 eap = (const struct eap_frame_t *)cp [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 117 # EAP fast re-authentication 118 # By default, fast re-authentication is enabled for all EAP methods that 135 # Dynamic EAP methods 136 # If EAP methods were built dynamically as shared object files, they need to be 137 # loaded here before being used in the network blocks. By default, EAP methods 404 # (EAP-TLS). Full path to the file should be used since working 451 # Consortium to match the network, the EAP parameters need to be 455 # eap: Pre-configured EAP method 456 # This optional field can be used to specify which EAP method will b [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 2 * EAP common peer/server definitions 16 * eap_hdr_len_valid - Validate EAP header length field 17 * @msg: EAP frame (starting with EAP header) 21 * This is a helper function that does minimal validation of EAP messages. The 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); 51 * eap_hdr_validate - Validate EAP heade 184 const struct eap_hdr *eap; local [all...] |
/external/ppp/pppd/ |
Android.mk | 21 eap.c \
|