HomeSort by relevance Sort by last modified time
    Searched refs:eap (Results 26 - 50 of 132) sorted by null

12 3 4 5 6

  /frameworks/base/packages/Osu/src/com/android/anqp/eap/
VendorSpecificAuth.java 1 package com.android.anqp.eap;
8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188
20 public EAP.AuthInfoID getAuthInfoID() {
21 return EAP.AuthInfoID.VendorSpecific;
Credential.java 1 package com.android.anqp.eap;
9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188
26 private final EAP.AuthInfoID mAuthInfoID;
29 public Credential(EAP.AuthInfoID infoID, int length, ByteBuffer payload)
44 public EAP.AuthInfoID getAuthInfoID() {
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/
InnerAuthEAP.java 1 package com.android.server.wifi.anqp.eap;
9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188
13 private final EAP.EAPMethodID mEapMethodID;
20 mEapMethodID = EAP.mapEAPMethod(typeID);
23 public InnerAuthEAP(EAP.EAPMethodID eapMethodID) {
28 public EAP.AuthInfoID getAuthInfoID() {
29 return EAP.AuthInfoID.InnerAuthEAPMethodType;
32 public EAP.EAPMethodID getEAPMethodID() {
VendorSpecificAuth.java 1 package com.android.server.wifi.anqp.eap;
8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188
20 public EAP.AuthInfoID getAuthInfoID() {
21 return EAP.AuthInfoID.VendorSpecific;
  /external/wpa_supplicant_8/src/eap_peer/
eap_ikev2.c 2 * EAP-IKEv2 peer (RFC 5106)
51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
82 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2");
127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to "
144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response");
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes "
219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication
515 struct eap_method *eap; local
    [all...]
eap_aka.c 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing");
183 "EAP-AKA: Use result from external USIM processing");
192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts,
199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response");
205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN)
1494 struct eap_method *eap; local
1520 struct eap_method *eap; local
    [all...]
eap_pax.c 2 * EAP peer method: EAP-PAX (RFC 4746)
57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length");
126 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)");
129 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in "
136 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - "
145 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short "
153 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A "
163 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)"
537 struct eap_method *eap; local
    [all...]
eap_psk.c 2 * EAP peer method: EAP-PSK (RFC 4764)
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
41 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not "
53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN);
54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN);
65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state");
99 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message
482 struct eap_method *eap; local
    [all...]
eap_sake.c 2 * EAP peer method: EAP-SAKE (RFC 4763)
58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length "
127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or "
167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
174 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID");
197 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received
496 struct eap_method *eap; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tnc.c 2 * EAP server method: EAP-TNC (Trusted Network Connect)
32 /* EAP-TNC Flags */
66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s",
112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for "
167 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request",
192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation");
206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory "
212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack");
224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request")
556 struct eap_method *eap; local
    [all...]
eap_server_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
156 /* Note: eap is allocated memory; caller is responsible for freeing
159 u8 *eap; member in struct:eap_ttls_avp
197 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
201 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
207 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
215 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
220 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen)
1337 struct eap_method *eap; local
    [all...]
eap_server_gpsk.c 2 * hostapd / EAP-GPSK (RFC 5433) server
58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
110 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
113 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data");
117 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server",
125 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
152 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
160 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
203 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
220 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame")
633 struct eap_method *eap; local
    [all...]
eap_server_ikev2.c 2 * EAP-IKEv2 server (RFC 5106)
37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default "
38 "to user identity from EAP-Identity");
45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found");
75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s",
94 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2");
140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request");
158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum "
163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG "
194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes
552 struct eap_method *eap; local
    [all...]
eap_server_pax.c 2 * hostapd / EAP-PAX (RFC 4746) server
79 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)");
82 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data");
91 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
106 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)",
113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN);
126 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)");
132 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory "
150 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)",
159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN)
567 struct eap_method *eap; local
    [all...]
eap_server_psk.c 2 * hostapd / EAP-PSK (RFC 4764) server
8 * Note: EAP-PSK is an EAP authentication method and as such, completely
60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)");
63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data");
67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)");
102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory "
129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN)
512 struct eap_method *eap; local
    [all...]
eap_server_sake.c 2 * hostapd / EAP-SAKE (RFC 4763) server
54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s",
71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data");
75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d",
102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory "
123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ");
136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID");
151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge");
154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data")
522 struct eap_method *eap; local
    [all...]
eap_server_aka.c 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
136 /* Check if we already know the identity from EAP-Response/Identity */
156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym
1321 struct eap_method *eap; local
1346 struct eap_method *eap; local
    [all...]
eap_server_mschapv2.c 2 * hostapd / EAP-MSCHAPv2 (draft-kamath-pppext-eap-mschapv2-00.txt) server
107 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to get random "
117 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge",
155 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message",
198 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory"
211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message",
231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in
573 struct eap_method *eap; local
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
13 * struct eap_ssl_data - TLS data for EAP methods
42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
47 * eap - EAP state machine allocated with eap_server_sm_init()
49 struct eap_sm *eap; member in struct:eap_ssl_data
56 /* EAP TLS Flags */
  /external/wpa_supplicant_8/wpa_supplicant/
config.c 16 #include "eap_peer/eap.h"
674 else if (os_strcmp(start, "WPA-EAP") == 0)
685 else if (os_strcmp(start, "FT-EAP") == 0)
691 else if (os_strcmp(start, "WPA-EAP-SHA256") == 0)
709 else if (os_strcmp(start, "WPA-EAP-SUITE-B") == 0)
713 else if (os_strcmp(start, "WPA-EAP-SUITE-B-192") == 0)
765 ret = os_snprintf(pos, end - pos, "%sWPA-EAP",
816 ret = os_snprintf(pos, end - pos, "%sFT-EAP",
838 ret = os_snprintf(pos, end - pos, "%sWPA-EAP-SHA256",
896 ret = os_snprintf(pos, end - pos, "%sWPA-EAP-SUITE-B"
    [all...]
eapol_test.c 20 #include "eap_peer/eap.h"
58 /* last received EAP Response from Authentication Server */
178 const u8 *eap, size_t len)
185 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
198 hdr = (const struct eap_hdr *) eap;
209 "EAP-Response-Identity",
224 printf("Could not add EAP-Key-Name\n");
279 if (eap && !radius_msg_add_eap(msg, eap, len)) {
280 printf("Could not add EAP-Message\n")
705 struct eap_hdr *eap; local
757 struct wpabuf *eap; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
networkconfig.cpp 73 if (flags.indexOf("[WPA2-EAP") >= 0)
75 else if (flags.indexOf("[WPA-EAP") >= 0)
114 bool eap = sel == AUTH_IEEE8021X || sel == AUTH_WPA_EAP || local
116 eapSelect->setEnabled(eap);
117 identityEdit->setEnabled(eap);
118 passwordEdit->setEnabled(eap);
119 cacertEdit->setEnabled(eap);
120 phase2Select->setEnabled(eap);
121 if (eap)
165 /* Add all enabled EAP methods that can be used in the tunnel *
301 const char *eap = local
310 QString eap = eapSelect->currentText(); local
612 enum { NO_INNER, PEAP_INNER, TTLS_INNER, FAST_INNER } eap = NO_INNER; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 19 #include "eap_server/eap.h"
304 const u8 *eap, size_t len)
308 const struct eap_hdr *hdr = (const struct eap_hdr *) eap;
312 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY) ||
314 eap[sizeof(struct eap_hdr)] != EAP_ERP_TYPE_REAUTH) ||
319 identity = eap_get_identity(sm->eap, &identity_len);
592 const u8 *eap, size_t len)
600 ieee802_1x_learn_identity(hapd, sm, eap, len);
602 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
639 if (!radius_msg_add_eap(msg, eap, len))
794 struct eap_hdr *eap; local
1240 struct wpabuf *eap; local
    [all...]
  /external/ppp/pppd/
Android.mk 11 eap.c \
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 18 #include "eap_peer/eap.h"
36 unsigned int idleWhile; /* for EAP state machine */
123 struct eap_sm *eap; member in struct:eapol_sm
128 struct wpabuf *eapReqData; /* for EAP */
129 Boolean altAccept; /* for EAP */
130 Boolean altReject; /* for EAP */
319 * Prevent EAP peer state machine from failing due to prior
320 * external EAP success notification (altSuccess=TRUE in the
501 if (eap_key_available(sm->eap)) {
786 * Anyway, taking the beginning of the keying material from EAP
    [all...]

Completed in 2161 milliseconds

12 3 4 5 6