/frameworks/base/packages/Osu/src/com/android/anqp/eap/ |
VendorSpecificAuth.java | 1 package com.android.anqp.eap; 8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 20 public EAP.AuthInfoID getAuthInfoID() { 21 return EAP.AuthInfoID.VendorSpecific;
|
Credential.java | 1 package com.android.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 26 private final EAP.AuthInfoID mAuthInfoID; 29 public Credential(EAP.AuthInfoID infoID, int length, ByteBuffer payload) 44 public EAP.AuthInfoID getAuthInfoID() {
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/ |
InnerAuthEAP.java | 1 package com.android.server.wifi.anqp.eap; 9 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 13 private final EAP.EAPMethodID mEapMethodID; 20 mEapMethodID = EAP.mapEAPMethod(typeID); 23 public InnerAuthEAP(EAP.EAPMethodID eapMethodID) { 28 public EAP.AuthInfoID getAuthInfoID() { 29 return EAP.AuthInfoID.InnerAuthEAPMethodType; 32 public EAP.EAPMethodID getEAPMethodID() {
|
VendorSpecificAuth.java | 1 package com.android.server.wifi.anqp.eap; 8 * An EAP authentication parameter, IEEE802.11-2012, table 8-188 20 public EAP.AuthInfoID getAuthInfoID() { 21 return EAP.AuthInfoID.VendorSpecific;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 2 * EAP-IKEv2 peer (RFC 5106) 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 82 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2"); 127 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 144 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 168 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 202 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 219 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication 515 struct eap_method *eap; local [all...] |
eap_aka.c | 2 * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448) 29 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 80 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 163 wpa_printf(MSG_DEBUG, "EAP-AKA: Use external USIM processing"); 183 "EAP-AKA: Use result from external USIM processing"); 192 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 199 wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized external USIM processing response"); 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN) 1494 struct eap_method *eap; local 1520 struct eap_method *eap; local [all...] |
eap_pax.c | 2 * EAP peer method: EAP-PAX (RFC 4746) 57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); 126 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)"); 129 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " 136 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " 145 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " 153 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " 163 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)" 537 struct eap_method *eap; local [all...] |
eap_psk.c | 2 * EAP peer method: EAP-PSK (RFC 4764) 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 41 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 99 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message 482 struct eap_method *eap; local [all...] |
eap_sake.c | 2 * EAP peer method: EAP-SAKE (RFC 4763) 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 127 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 156 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 162 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 167 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 174 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 197 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received 496 struct eap_method *eap; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 2 * EAP server method: EAP-TNC (Trusted Network Connect) 32 /* EAP-TNC Flags */ 66 wpa_printf(MSG_DEBUG, "EAP-TNC: %s -> %s", 112 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory for " 167 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TNC: Request", 192 wpa_printf(MSG_DEBUG, "EAP-TNC: Unknown recommendation"); 206 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 212 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 224 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Request") 556 struct eap_method *eap; local [all...] |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 156 /* Note: eap is allocated memory; caller is responsible for freeing 159 u8 *eap; member in struct:eap_ttls_avp 197 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 201 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 207 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 215 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 220 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 226 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) 1337 struct eap_method *eap; local [all...] |
eap_server_gpsk.c | 2 * hostapd / EAP-GPSK (RFC 5433) server 58 wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s", 110 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1"); 113 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data"); 117 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 125 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 152 wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3"); 160 wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory " 203 wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq", 220 wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame") 633 struct eap_method *eap; local [all...] |
eap_server_ikev2.c | 2 * EAP-IKEv2 server (RFC 5106) 37 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No IDr received - default " 38 "to user identity from EAP-Identity"); 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); 75 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 94 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2"); 140 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Request"); 158 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 163 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 194 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes 552 struct eap_method *eap; local [all...] |
eap_server_pax.c | 2 * hostapd / EAP-PAX (RFC 4746) server 79 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (sending)"); 82 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data"); 91 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory " 106 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 113 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN); 126 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (sending)"); 132 wpa_printf(MSG_ERROR, "EAP-PAX: Failed to allocate memory " 150 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 159 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", pos, EAP_PAX_ICV_LEN) 567 struct eap_method *eap; local [all...] |
eap_server_psk.c | 2 * hostapd / EAP-PSK (RFC 4764) server 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 60 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-1 (sending)"); 63 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to get random data"); 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 74 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory " 97 wpa_printf(MSG_DEBUG, "EAP-PSK: PSK-3 (sending)"); 102 wpa_printf(MSG_ERROR, "EAP-PSK: Failed to allocate memory " 129 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: TEK", data->tek, EAP_PSK_TEK_LEN) 512 struct eap_method *eap; local [all...] |
eap_server_sake.c | 2 * hostapd / EAP-SAKE (RFC 4763) server 54 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 71 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data"); 75 wpa_printf(MSG_DEBUG, "EAP-SAKE: Initialized Session ID %d", 102 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 133 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PERM_ID_REQ"); 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_SERVERID"); 151 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge"); 154 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to get random data") 522 struct eap_method *eap; local [all...] |
eap_server_aka.c | 2 * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448) 25 u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */ 83 wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s", 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 111 wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication"); 136 /* Check if we already know the identity from EAP-Response/Identity */ 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym 1321 struct eap_method *eap; local 1346 struct eap_method *eap; local [all...] |
eap_server_mschapv2.c | 2 * hostapd / EAP-MSCHAPv2 (draft-kamath-pppext-eap-mschapv2-00.txt) server 107 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to get random " 117 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 133 wpa_hexdump(MSG_MSGDUMP, "EAP-MSCHAPV2: Challenge", 155 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 178 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Success Request Message", 198 wpa_printf(MSG_ERROR, "EAP-MSCHAPV2: Failed to allocate memory" 211 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-MSCHAPV2: Failure Request Message", 231 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Unknown state %d in 573 struct eap_method *eap; local [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions 13 * struct eap_ssl_data - TLS data for EAP methods 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 47 * eap - EAP state machine allocated with eap_server_sm_init() 49 struct eap_sm *eap; member in struct:eap_ssl_data 56 /* EAP TLS Flags */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 16 #include "eap_peer/eap.h" 674 else if (os_strcmp(start, "WPA-EAP") == 0) 685 else if (os_strcmp(start, "FT-EAP") == 0) 691 else if (os_strcmp(start, "WPA-EAP-SHA256") == 0) 709 else if (os_strcmp(start, "WPA-EAP-SUITE-B") == 0) 713 else if (os_strcmp(start, "WPA-EAP-SUITE-B-192") == 0) 765 ret = os_snprintf(pos, end - pos, "%sWPA-EAP", 816 ret = os_snprintf(pos, end - pos, "%sFT-EAP", 838 ret = os_snprintf(pos, end - pos, "%sWPA-EAP-SHA256", 896 ret = os_snprintf(pos, end - pos, "%sWPA-EAP-SUITE-B" [all...] |
eapol_test.c | 20 #include "eap_peer/eap.h" 58 /* last received EAP Response from Authentication Server */ 178 const u8 *eap, size_t len) 185 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 198 hdr = (const struct eap_hdr *) eap; 209 "EAP-Response-Identity", 224 printf("Could not add EAP-Key-Name\n"); 279 if (eap && !radius_msg_add_eap(msg, eap, len)) { 280 printf("Could not add EAP-Message\n") 705 struct eap_hdr *eap; local 757 struct wpabuf *eap; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 73 if (flags.indexOf("[WPA2-EAP") >= 0) 75 else if (flags.indexOf("[WPA-EAP") >= 0) 114 bool eap = sel == AUTH_IEEE8021X || sel == AUTH_WPA_EAP || local 116 eapSelect->setEnabled(eap); 117 identityEdit->setEnabled(eap); 118 passwordEdit->setEnabled(eap); 119 cacertEdit->setEnabled(eap); 120 phase2Select->setEnabled(eap); 121 if (eap) 165 /* Add all enabled EAP methods that can be used in the tunnel * 301 const char *eap = local 310 QString eap = eapSelect->currentText(); local 612 enum { NO_INNER, PEAP_INNER, TTLS_INNER, FAST_INNER } eap = NO_INNER; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 19 #include "eap_server/eap.h" 304 const u8 *eap, size_t len) 308 const struct eap_hdr *hdr = (const struct eap_hdr *) eap; 312 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY) || 314 eap[sizeof(struct eap_hdr)] != EAP_ERP_TYPE_REAUTH) || 319 identity = eap_get_identity(sm->eap, &identity_len); 592 const u8 *eap, size_t len) 600 ieee802_1x_learn_identity(hapd, sm, eap, len); 602 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 639 if (!radius_msg_add_eap(msg, eap, len)) 794 struct eap_hdr *eap; local 1240 struct wpabuf *eap; local [all...] |
/external/ppp/pppd/ |
Android.mk | 11 eap.c \
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 18 #include "eap_peer/eap.h" 36 unsigned int idleWhile; /* for EAP state machine */ 123 struct eap_sm *eap; member in struct:eapol_sm 128 struct wpabuf *eapReqData; /* for EAP */ 129 Boolean altAccept; /* for EAP */ 130 Boolean altReject; /* for EAP */ 319 * Prevent EAP peer state machine from failing due to prior 320 * external EAP success notification (altSuccess=TRUE in the 501 if (eap_key_available(sm->eap)) { 786 * Anyway, taking the beginning of the keying material from EAP [all...] |