/frameworks/base/packages/Osu/src/com/android/anqp/eap/ |
AuthParam.java | 1 package com.android.anqp.eap; 8 public EAP.AuthInfoID getAuthInfoID();
|
InnerAuthEAP.java | 1 package com.android.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 13 private final EAP.EAPMethodID mEapMethodID; 20 mEapMethodID = EAP.mapEAPMethod(typeID); 23 public InnerAuthEAP(EAP.EAPMethodID eapMethodID) { 28 public EAP.AuthInfoID getAuthInfoID() { 29 return EAP.AuthInfoID.InnerAuthEAPMethodType; 32 public EAP.EAPMethodID getEAPMethodID() {
|
VendorSpecificAuth.java | 1 package com.android.anqp.eap; 8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 20 public EAP.AuthInfoID getAuthInfoID() { 21 return EAP.AuthInfoID.VendorSpecific;
|
Credential.java | 1 package com.android.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 26 private final EAP.AuthInfoID mAuthInfoID; 29 public Credential(EAP.AuthInfoID infoID, int length, ByteBuffer payload) 44 public EAP.AuthInfoID getAuthInfoID() {
|
ExpandedEAPMethod.java | 1 package com.android.anqp.eap; 12 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 16 private final EAP.AuthInfoID mAuthInfoID; 20 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int length, ByteBuffer payload) 38 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int vendorID, long vendorType) { 45 public EAP.AuthInfoID getAuthInfoID() {
|
NonEAPInnerAuth.java | 1 package com.android.anqp.eap; 12 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 57 public EAP.AuthInfoID getAuthInfoID() { 58 return EAP.AuthInfoID.NonEAPInnerAuthType;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/ |
AuthParam.java | 1 package com.android.server.wifi.anqp.eap; 8 public EAP.AuthInfoID getAuthInfoID();
|
InnerAuthEAP.java | 1 package com.android.server.wifi.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 13 private final EAP.EAPMethodID mEapMethodID; 20 mEapMethodID = EAP.mapEAPMethod(typeID); 23 public InnerAuthEAP(EAP.EAPMethodID eapMethodID) { 28 public EAP.AuthInfoID getAuthInfoID() { 29 return EAP.AuthInfoID.InnerAuthEAPMethodType; 32 public EAP.EAPMethodID getEAPMethodID() {
|
VendorSpecificAuth.java | 1 package com.android.server.wifi.anqp.eap; 8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 20 public EAP.AuthInfoID getAuthInfoID() { 21 return EAP.AuthInfoID.VendorSpecific;
|
Credential.java | 1 package com.android.server.wifi.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 26 private final EAP.AuthInfoID mAuthInfoID; 29 public Credential(EAP.AuthInfoID infoID, int length, ByteBuffer payload) 44 public EAP.AuthInfoID getAuthInfoID() {
|
ExpandedEAPMethod.java | 1 package com.android.server.wifi.anqp.eap; 12 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 16 private final EAP.AuthInfoID mAuthInfoID; 20 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int length, ByteBuffer payload) 38 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int vendorID, long vendorType) { 45 public EAP.AuthInfoID getAuthInfoID() {
|
NonEAPInnerAuth.java | 1 package com.android.server.wifi.anqp.eap; 12 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 57 public EAP.AuthInfoID getAuthInfoID() { 58 return EAP.AuthInfoID.NonEAPInnerAuthType;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 2 * EAP common peer/server definitions 16 * eap_hdr_len_valid - Validate EAP header length field 17 * @msg: EAP frame (starting with EAP header) 21 * This is a helper function that does minimal validation of EAP messages. The 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); 51 * eap_hdr_validate - Validate EAP heade 184 const struct eap_hdr *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); 104 struct eap_method *eap; local [all...] |
eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 85 struct eap_method *eap; local 87 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 89 if (eap == NULL) 92 eap->init = eap_otp_init [all...] |
eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 70 * error case which seems to use EAP-MSCHAPv2 like error 71 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 129 struct eap_method *eap; local [all...] |
eap_methods.c | 2 * EAP peer: Method registration 25 * eap_peer_get_eap_method - Get EAP method based on type number 26 * @vendor: EAP Vendor-Id (0 = IETF) 27 * @method: EAP type number 28 * Returns: Pointer to EAP method or %NULL if not found 42 * eap_peer_get_type - Get EAP type for the given EAP method name 43 * @name: EAP method name, e.g., TLS 44 * @vendor: Buffer for returning EAP Vendor-Id 45 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 284 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 13 * struct eap_ssl_data - TLS data for EAP methods 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 63 * eap - EAP state machine allocated with eap_peer_sm_init() 65 struct eap_sm *eap; member in struct:eap_ssl_data 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 79 /* EAP TLS Flags */
|
eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type 8 * This file implements a vendor specific test method using EAP expanded types. 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 83 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 90 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 97 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 106 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 117 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response"); 171 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_methods.c | 2 * EAP server method registration 20 * eap_server_get_eap_method - Get EAP method based on type number 21 * @vendor: EAP Vendor-Id (0 = IETF) 22 * @method: EAP type number 23 * Returns: Pointer to EAP method or %NULL if not found 37 * eap_server_get_type - Get EAP type for the given EAP method name 38 * @name: EAP method name, e.g., TLS 39 * @vendor: Buffer for returning EAP Vendor-Id 40 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 74 struct eap_method *eap; local [all...] |
eap_server_gtc.c | 2 * hostapd / EAP-GTC (RFC 3748) 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for " 85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame"); 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 112 "for EAP-FAST prefix"); 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 124 "response to EAP-FAST prefix") 204 struct eap_method *eap; local [all...] |
eap_server_identity.c | 2 * hostapd / EAP-Identity 70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " 91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); 159 struct eap_method *eap; local 161 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 164 if (eap == NULL) 167 eap->init = eap_identity_init [all...] |
eap_server_md5.c | 2 * hostapd / EAP-MD5 server 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success") 155 struct eap_method *eap; local [all...] |
eap_server_vendor_test.c | 2 * hostapd / Test method for vendor specific (expanded) EAP type 44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s", 80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate " 99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame"); 170 struct eap_method *eap; local 172 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 175 if (eap == NULL) 178 eap->init = eap_vendor_test_init; 179 eap->reset = eap_vendor_test_reset; 180 eap->buildReq = eap_vendor_test_buildReq [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions 13 * struct eap_ssl_data - TLS data for EAP methods 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 47 * eap - EAP state machine allocated with eap_server_sm_init() 49 struct eap_sm *eap; member in struct:eap_ssl_data 56 /* EAP TLS Flags */
|