HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 26 - 50 of 104) sorted by null

12 3 4 5

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tnc.c 2 * EAP server method: EAP-TNC (Trusted Network Connect)
32 /* EAP-TNC Flags */
66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for "
167 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request",
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request")
556 struct eap_method *eap; local
    [all...]
eap_server_gpsk.c 2 * hostapd / EAP-GPSK (RFC 5433) server
56 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
108 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
111 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data");
115 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server",
123 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
150 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
158 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
201 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
218 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame")
598 struct eap_method *eap; local
    [all...]
eap_server_pax.c 2 * hostapd / EAP-PAX (RFC 4746) server
78 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
81 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data");
90 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)",
112 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
131 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
149 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN)
547 struct eap_method *eap; local
    [all...]
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN)
490 struct eap_method *eap; local
    [all...]
eap_server_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
136 /* Check if we already know the identity from EAP-Response/Identity */
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym
1299 struct eap_method *eap; local
1327 struct eap_method *eap; local
    [all...]
eap_server_mschapv2.c 2 * hostapd / EAP-MSCHAPv2 (draft-kamath-pppext-eap-mschapv2-00.txt) server
107 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to get random "
117 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
155 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message",
198 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message",
231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in
557 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
13 * struct eap_ssl_data - TLS data for EAP methods
42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
47 * eap - EAP state machine allocated with eap_server_sm_init()
49 struct eap_sm *eap; member in struct:eap_ssl_data
56 /* EAP TLS Flags */
  /external/chromium_org/chromeos/network/onc/
onc_normalizer.h 40 void NormalizeEAP(base::DictionaryValue* eap);
onc_normalizer.cc 103 void Normalizer::NormalizeEAP(base::DictionaryValue* eap) {
104 using namespace ::onc::eap;
107 eap->GetStringWithoutPathExpansion(::onc::client_cert::kClientCertType,
109 RemoveEntryUnless(eap,
112 RemoveEntryUnless(eap,
117 eap->GetStringWithoutPathExpansion(kOuter, &outer);
118 RemoveEntryUnless(eap, kAnonymousIdentity,
120 RemoveEntryUnless(eap, kInner,
onc_translation_tables.cc 25 { ::onc::eap::kAnonymousIdentity, shill::kEapAnonymousIdentityProperty},
26 { ::onc::eap::kIdentity, shill::kEapIdentityProperty},
28 // { ::onc::eap::kInner, shill::kEapPhase2AuthProperty },
31 // { ::onc::eap::kOuter, shill::kEapMethodProperty },
32 { ::onc::eap::kPassword, shill::kEapPasswordProperty},
33 { ::onc::eap::kSaveCredentials, shill::kSaveCredentialsProperty},
34 { ::onc::eap::kServerCAPEMs, shill::kEapCaCertPemProperty},
35 { ::onc::eap::kUseSystemCAs, shill::kEapUseSystemCasProperty},
297 { ::onc::eap::kPEAP, shill::kEapMethodPEAP},
298 { ::onc::eap::kEAP_TLS, shill::kEapMethodTLS}
    [all...]
onc_translator_onc_to_shill.cc 230 onc_object_->GetStringWithoutPathExpansion(::onc::eap::kOuter, &outer);
234 if (outer == ::onc::eap::kPEAP || outer == ::onc::eap::kEAP_TTLS) {
236 std::string inner = ::onc::eap::kAutomatic;
239 onc_object_->GetStringWithoutPathExpansion(::onc::eap::kInner, &inner);
240 if (inner != ::onc::eap::kAutomatic) {
242 outer == ::onc::eap::kPEAP ? kEAP_PEAP_InnerTable :
  /external/chromium_org/chromeos/network/
client_cert_util.cc 161 // Look for EAP specific client certificate properties, which can either be
174 LOG(ERROR) << "EAP CertID differs from KeyID";
278 const base::DictionaryValue* eap = NULL; local
279 wifi->GetDictionaryWithoutPathExpansion(wifi::kEAP, &eap);
280 if (!eap)
283 dict_with_client_cert = eap;
309 const base::DictionaryValue* eap = NULL; local
310 ethernet->GetDictionaryWithoutPathExpansion(wifi::kEAP, &eap);
311 if (!eap)
313 dict_with_client_cert = eap;
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
183 "EAP-AKA: Use result from external USIM processing");
192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN)
1494 struct eap_method *eap; local
1524 struct eap_method *eap; local
    [all...]
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
41 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not "
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
99 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
482 struct eap_method *eap; local
    [all...]
eap_sake.c 2 * EAP peer method: EAP-SAKE (RFC 4763)
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length "
127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or "
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
175 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
198 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received
497 struct eap_method *eap; local
    [all...]
eap_tnc.c 2 * EAP peer method: EAP-TNC (Trusted Network Connect)
26 /* EAP-TNC Flags */
71 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
77 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
91 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response");
125 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
132 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes "
148 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow");
154 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for
412 struct eap_method *eap; local
    [all...]
eap_pax.c 2 * EAP peer method: EAP-PAX (RFC 4746)
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
62 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length");
125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)");
128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in "
135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - "
144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short "
152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A "
162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)"
506 struct eap_method *eap; local
    [all...]
eap_mschapv2.c 2 * EAP peer method: EAP-MSCHAPV2 (draft-kamath-pppext-eap-mschapv2-00.txt)
8 * This file implements EAP peer part of EAP-MSCHAPV2 method (EAP type 26).
9 * draft-kamath-pppext-eap-mschapv2-00.txt defines the Microsoft EAP CHAP
12 * RFC 2759. Use of EAP-MSCHAPV2 derived keys with MPPE cipher is described in
33 u8 mschapv2_id; /* usually same as EAP identifier; must be change
869 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
interworking.c 20 #include "eap_peer/eap.h"
335 struct nai_realm_eap *eap; member in struct:nai_realm
346 os_free(realms[i].eap);
360 wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
366 wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
372 wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
396 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
399 wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
402 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP");
405 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2")
652 struct nai_realm_eap *eap = &realm->eap[e]; local
1514 struct nai_realm_eap *eap = NULL; local
    [all...]
config.c 16 #include "eap_peer/eap.h"
504 else if (os_strcmp(start, "WPA-EAP") == 0)
515 else if (os_strcmp(start, "FT-EAP") == 0)
521 else if (os_strcmp(start, "WPA-EAP-SHA256") == 0)
585 ret = os_snprintf(pos, end - pos, "%sWPA-EAP",
636 ret = os_snprintf(pos, end - pos, "%sFT-EAP",
658 ret = os_snprintf(pos, end - pos, "%sWPA-EAP-SHA256",
1053 wpa_printf(MSG_ERROR, "Line %d: unknown EAP method "
1056 " this EAP method during wpa_supplicant\n"
1082 wpa_hexdump(MSG_MSGDUMP, "eap methods"
    [all...]
eapol_test.c 19 #include "eap_peer/eap.h"
57 /* last received EAP Response from Authentication Server */
174 const u8 *eap, size_t len)
181 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
194 hdr = (const struct eap_hdr *) eap;
205 "EAP-Response-Identity",
220 printf("Could not add EAP-Key-Name\n");
268 if (eap && !radius_msg_add_eap(msg, eap, len)) {
269 printf("Could not add EAP-Message\n")
646 struct eap_hdr *eap; local
698 struct wpabuf *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 72 if (flags.indexOf("[WPA2-EAP") >= 0)
74 else if (flags.indexOf("[WPA-EAP") >= 0)
113 bool eap = sel == AUTH_IEEE8021X || sel == AUTH_WPA_EAP || local
115 eapSelect->setEnabled(eap);
116 identityEdit->setEnabled(eap);
117 passwordEdit->setEnabled(eap);
118 cacertEdit->setEnabled(eap);
119 phase2Select->setEnabled(eap);
120 if (eap)
164 /* Add all enabled EAP methods that can be used in the tunnel *
300 const char *eap = local
309 QString eap = eapSelect->currentText(); local
611 enum { NO_INNER, PEAP_INNER, TTLS_INNER, FAST_INNER } eap = NO_INNER; local
    [all...]
  /external/ppp/pppd/
Makefile.sol2 11 OBJS = main.o magic.o fsm.o lcp.o ipcp.o upap.o chap-new.o eap.o md5.o \
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 18 #include "eap_peer/eap.h"
36 unsigned int idleWhile; /* for EAP state machine */
123 struct eap_sm *eap; member in struct:eapol_sm
128 struct wpabuf *eapReqData; /* for EAP */
129 Boolean altAccept; /* for EAP */
130 Boolean altReject; /* for EAP */
481 if (eap_key_available(sm->eap)) {
756 * Anyway, taking the beginning of the keying material from EAP
761 wpa_hexdump_key(MSG_DEBUG, "EAPOL: using part of EAP keying "
812 /* EAP layer processing; no special code is needed, since Supplican
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 19 #include "eap_server/eap.h"
281 const u8 *eap, size_t len)
287 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY)
290 identity = eap_get_identity(sm->eap, &identity_len);
538 const u8 *eap, size_t len)
546 ieee802_1x_learn_identity(hapd, sm, eap, len);
548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
582 if (eap && !radius_msg_add_eap(msg, eap, len)) {
583 wpa_printf(MSG_INFO, "Could not add EAP-Message")
704 struct eap_hdr *eap; local
1108 struct wpabuf *eap; local
    [all...]

Completed in 1049 milliseconds

12 3 4 5