HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 51 - 75 of 104) sorted by null

1 23 4 5

  /external/wpa_supplicant_8/src/eap_peer/
eap_peap.c 2 * EAP peer method: EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt)
24 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt
48 * EAP-Success
49 * 1 = reply with tunneled EAP-Success to inner
50 * EAP-Success and expect AS to send outer
51 * (unencrypted) EAP-Success after thi
1233 struct eap_method *eap; local
    [all...]
eap_wsc.c 2 * EAP-WSC peer for Wi-Fi Protected Setup
55 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
81 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid");
88 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth");
98 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth");
104 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr");
118 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr");
133 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key");
159 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available");
172 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity"
578 struct eap_method *eap; local
    [all...]
eap_sim.c 2 * EAP peer method: EAP-SIM (RFC 4186)
73 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
90 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
102 wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
109 wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing");
188 "EAP-SIM: Use result from external SIM processing");
194 wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response");
201 wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND"
1237 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
13 * struct eap_ssl_data - TLS data for EAP methods
52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
63 * eap - EAP state machine allocated with eap_peer_sm_init()
65 struct eap_sm *eap; member in struct:eap_ssl_data
73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
79 /* EAP TLS Flags */
eap_gpsk.c 2 * EAP peer method: EAP-GPSK (RFC 5433)
69 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
88 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
115 wpa_printf(MSG_DEBUG, "EAP-GPSK: Forced cipher %u",
151 wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short GPSK-1 packet");
157 wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server overflow");
163 wpa_printf(MSG_DEBUG, "EAP-GPSK: No memory for ID_Server");
168 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Server",
183 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow")
770 struct eap_method *eap; local
    [all...]
eap_pwd.c 2 * EAP peer method: EAP-pwd (RFC 5931)
77 wpa_printf(MSG_DEBUG, "EAP-PWD: %s -> %s",
92 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!");
98 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
103 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation data fail");
108 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail");
114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail");
124 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation psk fail");
241 wpa_printf(MSG_DEBUG, "EAP-PWD (peer): using group %d"
952 struct eap_method *eap; local
    [all...]
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
79 selected = "EAP";
84 selected = "EAP";
100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
230 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
234 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
242 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
245 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id")
1650 struct eap_method *eap; local
    [all...]
eap_eke.c 2 * EAP peer method: EAP-EKE (RFC 6124)
59 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
77 wpa_printf(MSG_INFO, "EAP-EKE: No password configured");
104 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced dhgroup %u",
111 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced encr %u",
118 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced prf %u",
125 wpa_printf(MSG_DEBUG, "EAP-EKE: Forced mac %u",
156 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
203 wpa_printf(MSG_DEBUG, "EAP-EKE: Sending EAP-EKE-Failure/Response - code=0x%x"
746 struct eap_method *eap; local
    [all...]
eap_fast.c 2 * EAP peer method: EAP-FAST (RFC 4851)
80 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
84 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
88 wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
99 wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
123 wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
132 wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC
1743 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.c 17 #include "eap_server/eap.h"
87 struct eap_hdr eap; local
89 os_memset(&eap, 0, sizeof(eap));
91 eap.code = success ? EAP_CODE_SUCCESS : EAP_CODE_FAILURE;
92 eap.identifier = ++sm->last_eap_id;
93 eap.length = host_to_be16(sizeof(eap));
96 "Sending canned EAP packet %s (identifier %d)",
97 success ? "SUCCESS" : "FAILURE", eap.identifier)
    [all...]
eapol_auth_sm_i.h 147 /* EAPOL/AAA <-> EAP full authenticator interface */
153 u8 last_eap_id; /* last used EAP Identifier */
156 u8 eap_type_authsrv; /* EAP type of the last EAP packet from
158 u8 eap_type_supp; /* EAP type of the last EAP packet from Supplicant */
168 struct eap_sm *eap; member in struct:eapol_state_machine
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 2 * hostapd / EAP-EKE (RFC 6124) server
61 wpa_printf(MSG_DEBUG, "EAP-EKE: %s -> %s",
70 wpa_printf(MSG_DEBUG, "EAP-EKE: Failure - code 0x%x", code);
122 wpa_printf(MSG_ERROR, "EAP-EKE: Failed to allocate memory");
166 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Failure: Failure-Code=0x%x",
187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity");
245 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Commit");
248 wpa_printf(MSG_INFO, "EAP-EKE: Password with not configured");
257 wpa_printf(MSG_INFO, "EAP-EKE: Failed to derive key");
278 wpa_printf(MSG_INFO, "EAP-EKE: Failed to initialize DH")
771 struct eap_method *eap; local
    [all...]
eap_server_sim.c 2 * hostapd / EAP-SIM (RFC 4186)
67 wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
79 wpa_printf(MSG_WARNING, "EAP-SIM: eap_sim_db not configured");
107 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Start");
113 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
166 wpa_printf(MSG_DEBUG, "EAP-SIM: Max fast re-authentication "
209 wpa_printf(MSG_WARNING, "EAP-SIM: Failed to encrypt "
224 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Challenge");
253 wpa_printf(MSG_DEBUG, "EAP-SIM: Generating Re-authentication");
257 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S"
825 struct eap_method *eap; local
    [all...]
eap_server_fast.c 2 * EAP-FAST server (RFC 4851)
104 wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",
134 wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
135 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",
139 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "
148 wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "
154 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",
159 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "
166 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "
179 wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque"
898 struct wpabuf *eap; local
1595 struct eap_method *eap; local
    [all...]
eap_server_peap.c 2 * hostapd / EAP-PEAP (draft-josefsson-pppext-eap-tls-eap-10.txt)
24 * 1 = draft-josefsson-ppext-eap-tls-eap-05.txt
94 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s -> %s",
147 wpa_printf(MSG_DEBUG, "EAP-PEAP: forcing version %d",
155 wpa_printf(MSG_INFO, "EAP-PEAP: Failed to initialize SSL.");
187 wpa_printf(MSG_ERROR, "EAP-PEAP: Failed to allocate memory for"
210 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase 2 method not ready")
1234 struct eap_method *eap; local
    [all...]
eap_server_pwd.c 2 * hostapd / EAP-pwd (RFC 5931) server
75 wpa_printf(MSG_DEBUG, "EAP-pwd: %s -> %s",
87 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not "
97 wpa_printf(MSG_DEBUG, "EAP-pwd: Selected group number %d",
107 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password "
118 wpa_printf(MSG_INFO, "EAP-PWD: bn context allocation fail");
164 wpa_printf(MSG_DEBUG, "EAP-pwd: ID/Request");
196 wpa_printf(MSG_DEBUG, "EAP-pwd: Commit/Request");
208 wpa_printf(MSG_INFO, "EAP-PWD (server): scalar allocation "
219 "EAP-pwd (server): unable to get randomness")
1025 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.h 2 * EAP server/peer: EAP-SAKE shared routines
91 int peer, const u8 *eap, size_t eap_len,
eap_sake_common.c 2 * EAP server/peer: EAP-SAKE shared routines
25 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_S");
27 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_S with "
34 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_RAND_P");
36 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_RAND_P with "
43 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_S");
45 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_S with "
52 wpa_printf(MSG_DEBUG, "EAP-SAKE: Parse: AT_MIC_P");
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: AT_MIC_P with
    [all...]
eap_sim_common.c 2 * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
52 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: MK", mk, EAP_SIM_MK_LEN);
71 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: IK", ik, EAP_AKA_IK_LEN);
72 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: CK", ck, EAP_AKA_CK_LEN);
73 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: MK", mk, EAP_SIM_MK_LEN);
82 wpa_printf(MSG_ERROR, "EAP-SIM: Failed to derive keys");
94 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_encr",
96 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: K_aut",
98 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: keying material (MSK)"
981 struct eap_hdr *eap; local
1011 struct eap_hdr *eap; local
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_signature.cc 63 { ::onc::eap::kAnonymousIdentity, &kStringSignature},
67 { ::onc::eap::kIdentity, &kStringSignature},
68 { ::onc::eap::kInner, &kStringSignature},
69 { ::onc::eap::kOuter, &kStringSignature},
70 { ::onc::eap::kPassword, &kStringSignature},
71 { ::onc::eap::kSaveCredentials, &kBoolSignature},
73 { ::onc::eap::kServerCAPEMs, &kStringListSignature},
74 { ::onc::eap::kServerCARef, &kStringSignature},
75 { ::onc::eap::kServerCARefs, &kStringListSignature},
76 { ::onc::eap::kUseSystemCAs, &kBoolSignature}
    [all...]
  /external/ppp/pppd/
Makefile.linux 16 demand.c utils.c tty.c eap.c chap-md5.c
20 upap.h eap.h
25 eap.o chap-md5.o
73 # Enable EAP SRP-SHA1 authentication (requires libsrp)
97 # EAP SRP-SHA1
  /external/wpa_supplicant_8/src/radius/
radius_server.c 18 #include "eap_server/eap.h"
74 struct eap_sm *eap; member in struct:radius_session
148 * eap_sim_db_priv - EAP-SIM/AKA database context
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
164 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST
166 * This parameter is used to set a key for EAP-FAST to encrypt the
167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If
173 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
175 * If EAP-FAST is not used, this can be set to %NULL. In theory, thi
977 struct wpabuf *eap = NULL; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
config_ssid.h 220 * eap - EAP peer configuration for this network
222 struct eap_peer_config eap; member in struct:wpa_ssid
275 * leap - Number of EAP methods using LEAP
283 * non_leap - Number of EAP methods not using LEAP
285 * This field should be set to >0 if any EAP method other than LEAP is
292 * eap_workaround - EAP workarounds enabled
294 * wpa_supplicant supports number of "EAP workarounds" to work around
299 * Strict EAP conformance mode can be configured by disabling
wps_supplicant.c 21 #include "eap_peer/eap.h"
81 eap_is_wps_pin_enrollee(&wpa_s->current_ssid->eap)) {
416 if (ssid->eap.identity &&
417 ssid->eap.identity_len == WSC_ID_REGISTRAR_LEN &&
418 os_memcmp(ssid->eap.identity, WSC_ID_REGISTRAR,
422 os_free(ssid->eap.identity);
423 ssid->eap.identity = NULL;
424 ssid->eap.identity_len = 0;
425 os_free(ssid->eap.phase1);
426 ssid->eap.phase1 = NULL
    [all...]
  /frameworks/base/wifi/java/android/net/wifi/
WifiEnterpriseConfig.java 37 * Enterprise configuration details for Wi-Fi. Stores details about the EAP method
45 public static final String EAP_KEY = "eap";
216 public static final class Eap {
217 /** No EAP method used. Represents an empty config */
219 /** Protected EAP */
221 /** EAP-Transport Layer Security */
223 /** EAP-Tunneled Transport Layer Security */
225 /** EAP-Password */
227 /** EAP-Subscriber Identity Module */
229 /** EAP-Authentication and Key Agreement *
551 String eap = mFields.get(EAP_KEY); local
    [all...]

Completed in 644 milliseconds

1 23 4 5