HomeSort by relevance Sort by last modified time
    Searched defs:eap (Results 51 - 70 of 70) sorted by null

1 23

  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 37 * Enterprise configuration details for Wi-Fi. Stores details about the EAP method
45 public static final String EAP_KEY = "eap";
216 public static final class Eap {
217 /** No EAP method used. Represents an empty config */
219 /** Protected EAP */
221 /** EAP-Transport Layer Security */
223 /** EAP-Tunneled Transport Layer Security */
225 /** EAP-Password */
227 /** EAP-Subscriber Identity Module */
229 /** EAP-Authentication and Key Agreement *
551 String eap = mFields.get(EAP_KEY); local
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 18 #include "eap_server/eap.h"
232 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in "
285 wpa_printf(MSG_ERROR, "EAP user allocation failed");
298 wpa_printf(MSG_ERROR, "Invalid EAP identity "
307 "memory for EAP identity");
323 wpa_printf(MSG_ERROR, "No EAP method on line %d in "
373 wpa_printf(MSG_ERROR, "Unsupported EAP type "
388 wpa_printf(MSG_ERROR, "No EAP types configured on "
422 wpa_printf(MSG_ERROR, "Invalid EAP password
1398 struct hostapd_nai_realm_eap *eap; local
    [all...]
  /external/wpa_supplicant_8/hs20/server/
spp_server.c 1197 xml_node_t *cred, *eap, *userpw; local
1245 eap = xml_node_create(ctx->xml, userpw, NULL, "EAPMethod")
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 19 #include "eap_server/eap.h"
281 const u8 *eap, size_t len)
287 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY)
290 identity = eap_get_identity(sm->eap, &identity_len);
538 const u8 *eap, size_t len)
546 ieee802_1x_learn_identity(hapd, sm, eap, len);
548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
582 if (eap && !radius_msg_add_eap(msg, eap, len)) {
583 wpa_printf(MSG_INFO, "Could not add EAP-Message")
704 struct eap_hdr *eap; local
1108 struct wpabuf *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
183 "EAP-AKA: Use result from external USIM processing");
192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN)
1494 struct eap_method *eap; local
1524 struct eap_method *eap; local
    [all...]
eap_fast.c 2 * EAP peer method: EAP-FAST (RFC 4851)
80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC
1743 struct eap_method *eap; local
    [all...]
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
79 selected = "EAP";
84 selected = "EAP";
100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id")
1650 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 2 * EAP-FAST server (RFC 4851)
104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque"
898 struct wpabuf *eap; local
1595 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm_i.h 147 /* EAPOL/AAA <-> EAP full authenticator interface */
153 u8 last_eap_id; /* last used EAP Identifier */
156 u8 eap_type_authsrv; /* EAP type of the last EAP packet from
158 u8 eap_type_supp; /* EAP type of the last EAP packet from Supplicant */
168 struct eap_sm *eap; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/radius/
radius.c 224 { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST },
235 { RADIUS_ATTR_EAP_KEY_NAME, "EAP-Key-Name", RADIUS_ATTR_HEXDUMP },
740 struct wpabuf *eap; local
758 eap = wpabuf_alloc(len);
759 if (eap == NULL)
767 wpabuf_put_data(eap, attr + 1, flen);
771 return eap;
    [all...]
radius_server.c 18 #include "eap_server/eap.h"
74 struct eap_sm *eap; member in struct:radius_session
148 * eap_sim_db_priv - EAP-SIM/AKA database context
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
164 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST
166 * This parameter is used to set a key for EAP-FAST to encrypt the
167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If
173 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
175 * If EAP-FAST is not used, this can be set to %NULL. In theory, thi
977 struct wpabuf *eap = NULL; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 220 * eap - EAP peer configuration for this network
222 struct eap_peer_config eap; member in struct:wpa_ssid
275 * leap - Number of EAP methods using LEAP
283 * non_leap - Number of EAP methods not using LEAP
285 * This field should be set to >0 if any EAP method other than LEAP is
292 * eap_workaround - EAP workarounds enabled
294 * wpa_supplicant supports number of "EAP workarounds" to work around
299 * Strict EAP conformance mode can be configured by disabling
eapol_test.c 19 #include "eap_peer/eap.h"
57 /* last received EAP Response from Authentication Server */
174 const u8 *eap, size_t len)
181 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
194 hdr = (const struct eap_hdr *) eap;
205 "EAP-Response-Identity",
220 printf("Could not add EAP-Key-Name\n");
268 if (eap && !radius_msg_add_eap(msg, eap, len)) {
269 printf("Could not add EAP-Message\n")
646 struct eap_hdr *eap; local
698 struct wpabuf *eap; local
    [all...]
events.c 23 #include "eap_peer/eap.h"
305 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA).
314 if ((ssid != NULL && ssid->eap.pcsc == NULL) ||
318 if (ssid == NULL || ssid->eap.eap_methods == NULL) {
322 struct eap_method_type *eap = ssid->eap.eap_methods; local
323 while (eap->vendor != EAP_VENDOR_IETF ||
324 eap->method != EAP_TYPE_NONE) {
325 if (eap->vendor == EAP_VENDOR_IETF)
    [all...]
interworking.c 20 #include "eap_peer/eap.h"
335 struct nai_realm_eap *eap; member in struct:nai_realm
346 os_free(realms[i].eap);
360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
399 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
402 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP");
405 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2")
652 struct nai_realm_eap *eap = &realm->eap[e]; local
1514 struct nai_realm_eap *eap = NULL; local
    [all...]
wpa_supplicant.c 19 #include "eap_peer/eap.h"
304 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
852 * Clear forced success to clear EAP state for next
4441 struct eap_peer_config *eap = &ssid->eap; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 18 #include "eap_peer/eap.h"
36 unsigned int idleWhile; /* for EAP state machine */
123 struct eap_sm *eap; member in struct:eapol_sm
128 struct wpabuf *eapReqData; /* for EAP */
129 Boolean altAccept; /* for EAP */
130 Boolean altReject; /* for EAP */
481 if (eap_key_available(sm->eap)) {
756 * Anyway, taking the beginning of the keying material from EAP
761 wpa_hexdump_key(MSG_DEBUG, "EAPOL: using part of EAP keying "
812 /* EAP layer processing; no special code is needed, since Supplican
    [all...]
  /external/chromium_org/components/onc/
onc_constants.cc 164 const char kEAP[] = "EAP";
182 const char kEAP[] = "EAP";
193 const char kWPA_EAP[] = "WPA-EAP";
200 const char kEAP[] = "EAP";
249 namespace eap { namespace in namespace:onc
252 const char kEAP_AKA[] = "EAP-AKA";
253 const char kEAP_FAST[] = "EAP-FAST";
254 const char kEAP_SIM[] = "EAP-SIM";
255 const char kEAP_TLS[] = "EAP-TLS";
256 const char kEAP_TTLS[] = "EAP-TTLS"
    [all...]
  /external/mdnsresponder/mDNSCore/
mDNS.c 5738 CacheRecord **eap = &ExpectedAnswers; local
    [all...]
  /external/chromium_org/third_party/android_platform/webview/
frameworks.jar 

Completed in 641 milliseconds

1 23