/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 37 * Enterprise configuration details for Wi-Fi. Stores details about the EAP method 45 public static final String EAP_KEY = "eap"; 216 public static final class Eap { 217 /** No EAP method used. Represents an empty config */ 219 /** Protected EAP */ 221 /** EAP-Transport Layer Security */ 223 /** EAP-Tunneled Transport Layer Security */ 225 /** EAP-Password */ 227 /** EAP-Subscriber Identity Module */ 229 /** EAP-Authentication and Key Agreement * 551 String eap = mFields.get(EAP_KEY); local [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 18 #include "eap_server/eap.h" 232 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in " 285 wpa_printf(MSG_ERROR, "EAP user allocation failed"); 298 wpa_printf(MSG_ERROR, "Invalid EAP identity " 307 "memory for EAP identity"); 323 wpa_printf(MSG_ERROR, "No EAP method on line %d in " 373 wpa_printf(MSG_ERROR, "Unsupported EAP type " 388 wpa_printf(MSG_ERROR, "No EAP types configured on " 422 wpa_printf(MSG_ERROR, "Invalid EAP password 1398 struct hostapd_nai_realm_eap *eap; local [all...] |
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 1197 xml_node_t *cred, *eap, *userpw; local 1245 eap = xml_node_create(ctx->xml, userpw, NULL, "EAPMethod") [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 19 #include "eap_server/eap.h" 281 const u8 *eap, size_t len) 287 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY) 290 identity = eap_get_identity(sm->eap, &identity_len); 538 const u8 *eap, size_t len) 546 ieee802_1x_learn_identity(hapd, sm, eap, len); 548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 582 if (eap && !radius_msg_add_eap(msg, eap, len)) { 583 wpa_printf(MSG_INFO, "Could not add EAP-Message") 704 struct eap_hdr *eap; local 1108 struct wpabuf *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448) 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing"); 183 "EAP-AKA: Use result from external USIM processing"); 192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response"); 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN) 1494 struct eap_method *eap; local 1524 struct eap_method *eap; local [all...] |
eap_fast.c | 2 * EAP peer method: EAP-FAST (RFC 4851) 80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall " 88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a " 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for " 123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning " 132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC 1743 struct eap_method *eap; local [all...] |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 79 selected = "EAP"; 84 selected = "EAP"; 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id", 245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id") 1650 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 2 * EAP-FAST server (RFC 4851) 104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s", 134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback"); 135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)", 139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid " 148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque " 154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque", 159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory " 166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt " 179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque" 898 struct wpabuf *eap; local 1595 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm_i.h | 147 /* EAPOL/AAA <-> EAP full authenticator interface */ 153 u8 last_eap_id; /* last used EAP Identifier */ 156 u8 eap_type_authsrv; /* EAP type of the last EAP packet from 158 u8 eap_type_supp; /* EAP type of the last EAP packet from Supplicant */ 168 struct eap_sm *eap; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 224 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST }, 235 { RADIUS_ATTR_EAP_KEY_NAME, "EAP-Key-Name", RADIUS_ATTR_HEXDUMP }, 740 struct wpabuf *eap; local 758 eap = wpabuf_alloc(len); 759 if (eap == NULL) 767 wpabuf_put_data(eap, attr + 1, flen); 771 return eap; [all...] |
radius_server.c | 18 #include "eap_server/eap.h" 74 struct eap_sm *eap; member in struct:radius_session 148 * eap_sim_db_priv - EAP-SIM/AKA database context 150 * This is passed to the EAP-SIM/AKA server implementation as a 158 * This is passed to the EAP server implementation as a callback 164 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST 166 * This parameter is used to set a key for EAP-FAST to encrypt the 167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If 173 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 175 * If EAP-FAST is not used, this can be set to %NULL. In theory, thi 977 struct wpabuf *eap = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config_ssid.h | 220 * eap - EAP peer configuration for this network 222 struct eap_peer_config eap; member in struct:wpa_ssid 275 * leap - Number of EAP methods using LEAP 283 * non_leap - Number of EAP methods not using LEAP 285 * This field should be set to >0 if any EAP method other than LEAP is 292 * eap_workaround - EAP workarounds enabled 294 * wpa_supplicant supports number of "EAP workarounds" to work around 299 * Strict EAP conformance mode can be configured by disabling
|
eapol_test.c | 19 #include "eap_peer/eap.h" 57 /* last received EAP Response from Authentication Server */ 174 const u8 *eap, size_t len) 181 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 194 hdr = (const struct eap_hdr *) eap; 205 "EAP-Response-Identity", 220 printf("Could not add EAP-Key-Name\n"); 268 if (eap && !radius_msg_add_eap(msg, eap, len)) { 269 printf("Could not add EAP-Message\n") 646 struct eap_hdr *eap; local 698 struct wpabuf *eap; local [all...] |
events.c | 23 #include "eap_peer/eap.h" 305 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA). 314 if ((ssid != NULL && ssid->eap.pcsc == NULL) || 318 if (ssid == NULL || ssid->eap.eap_methods == NULL) { 322 struct eap_method_type *eap = ssid->eap.eap_methods; local 323 while (eap->vendor != EAP_VENDOR_IETF || 324 eap->method != EAP_TYPE_NONE) { 325 if (eap->vendor == EAP_VENDOR_IETF) [all...] |
interworking.c | 20 #include "eap_peer/eap.h" 335 struct nai_realm_eap *eap; member in struct:nai_realm 346 os_free(realms[i].eap); 360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields"); 366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield"); 372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u", 396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP"); 399 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP"); 402 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP"); 405 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2") 652 struct nai_realm_eap *eap = &realm->eap[e]; local 1514 struct nai_realm_eap *eap = NULL; local [all...] |
wpa_supplicant.c | 19 #include "eap_peer/eap.h" 304 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 852 * Clear forced success to clear EAP state for next 4441 struct eap_peer_config *eap = &ssid->eap; local [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 18 #include "eap_peer/eap.h" 36 unsigned int idleWhile; /* for EAP state machine */ 123 struct eap_sm *eap; member in struct:eapol_sm 128 struct wpabuf *eapReqData; /* for EAP */ 129 Boolean altAccept; /* for EAP */ 130 Boolean altReject; /* for EAP */ 481 if (eap_key_available(sm->eap)) { 756 * Anyway, taking the beginning of the keying material from EAP 761 wpa_hexdump_key(MSG_DEBUG, "EAPOL: using part of EAP keying " 812 /* EAP layer processing; no special code is needed, since Supplican [all...] |
/external/chromium_org/components/onc/ |
onc_constants.cc | 164 const char kEAP[] = "EAP"; 182 const char kEAP[] = "EAP"; 193 const char kWPA_EAP[] = "WPA-EAP"; 200 const char kEAP[] = "EAP"; 249 namespace eap { namespace in namespace:onc 252 const char kEAP_AKA[] = "EAP-AKA"; 253 const char kEAP_FAST[] = "EAP-FAST"; 254 const char kEAP_SIM[] = "EAP-SIM"; 255 const char kEAP_TLS[] = "EAP-TLS"; 256 const char kEAP_TTLS[] = "EAP-TTLS" [all...] |
/external/mdnsresponder/mDNSCore/ |
mDNS.c | 5738 CacheRecord **eap = &ExpectedAnswers; local [all...] |
/external/chromium_org/third_party/android_platform/webview/ |
frameworks.jar | |