Searched refs:eap_type (Results 1 - 25 of 41) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_tls_common.h73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
75 u8 eap_type; member in struct:eap_ssl_data
94 struct eap_peer_config *config, u8 eap_type);
99 struct eap_ssl_data *data, u8 eap_type,
102 EapType eap_type, int peap_version,
105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type,
112 EapType eap_type,
122 EapType eap_type, int peap_version, u8 id,
H A Deap_tls_common.c132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) {
231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
238 struct eap_peer_config *config, u8 eap_type)
246 data->eap_type = eap_type;
364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
374 struct eap_ssl_data *data, u8 eap_type,
397 out[0] = eap_type;
567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...)
574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument
237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument
373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument
672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument
832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument
990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_tls.c27 u8 eap_type; member in struct:eap_tls_data
68 data->eap_type = EAP_TYPE_TLS;
94 data->eap_type = EAP_UNAUTH_TLS_TYPE;
121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
181 return eap_peer_tls_build_ack(id, data->eap_type, 0);
232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret,
245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0,
257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_tls_common.h73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
75 u8 eap_type; member in struct:eap_ssl_data
94 struct eap_peer_config *config, u8 eap_type);
99 struct eap_ssl_data *data, u8 eap_type,
102 EapType eap_type, int peap_version,
105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type,
112 EapType eap_type,
122 EapType eap_type, int peap_version, u8 id,
H A Deap_tls_common.c132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) {
231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
238 struct eap_peer_config *config, u8 eap_type)
246 data->eap_type = eap_type;
364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
374 struct eap_ssl_data *data, u8 eap_type,
397 out[0] = eap_type;
567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...)
574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument
237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument
373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument
672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument
832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument
990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_tls.c27 u8 eap_type; member in struct:eap_tls_data
68 data->eap_type = EAP_TYPE_TLS;
94 data->eap_type = EAP_UNAUTH_TLS_TYPE;
121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
181 return eap_peer_tls_build_ack(id, data->eap_type, 0);
232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret,
245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0,
257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_tls_common.h73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
75 u8 eap_type; member in struct:eap_ssl_data
94 struct eap_peer_config *config, u8 eap_type);
99 struct eap_ssl_data *data, u8 eap_type,
102 EapType eap_type, int peap_version,
105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type,
112 EapType eap_type,
122 EapType eap_type, int peap_version, u8 id,
H A Deap_tls_common.c132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) {
231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
238 struct eap_peer_config *config, u8 eap_type)
246 data->eap_type = eap_type;
364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
374 struct eap_ssl_data *data, u8 eap_type,
397 out[0] = eap_type;
567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...)
574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument
237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument
373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument
672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument
832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument
990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_tls.c27 u8 eap_type; member in struct:eap_tls_data
68 data->eap_type = EAP_TYPE_TLS;
94 data->eap_type = EAP_UNAUTH_TLS_TYPE;
121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
181 return eap_peer_tls_build_ack(id, data->eap_type, 0);
232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret,
245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0,
257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.h15 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
H A Deap_common.c53 * @eap_type: Expected EAP type number
66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument
93 if (exp_vendor != vendor || exp_type != (u32) eap_type) {
102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.h15 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
H A Deap_common.c53 * @eap_type: Expected EAP type number
66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument
93 if (exp_vendor != vendor || exp_type != (u32) eap_type) {
102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_common.h15 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
H A Deap_common.c53 * @eap_type: Expected EAP type number
66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument
93 if (exp_vendor != vendor || exp_type != (u32) eap_type) {
102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_tls_common.h78 int eap_type, int version, u8 id);
79 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
85 struct wpabuf *respData, void *priv, int eap_type,
H A Deap_server_tls.c24 u8 eap_type; member in struct:eap_tls_data
69 data->eap_type = EAP_TYPE_TLS;
91 data->eap_type = EAP_UNAUTH_TLS_TYPE;
113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id);
156 return eap_server_tls_build_ack(id, data->eap_type, 0);
160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0,
178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id);
199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE)
203 else if (data->eap_type
[all...]
H A Deap_server_tls_common.c144 int eap_type, int version, u8 id)
171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument
207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id);
401 struct wpabuf *respData, void *priv, int eap_type,
412 if (eap_type == EAP_UNAUTH_TLS_TYPE)
416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE)
421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData,
143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument
400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_tls_common.h78 int eap_type, int version, u8 id);
79 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
85 struct wpabuf *respData, void *priv, int eap_type,
H A Deap_server_tls.c24 u8 eap_type; member in struct:eap_tls_data
69 data->eap_type = EAP_TYPE_TLS;
91 data->eap_type = EAP_UNAUTH_TLS_TYPE;
113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id);
156 return eap_server_tls_build_ack(id, data->eap_type, 0);
160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0,
178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id);
199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE)
203 else if (data->eap_type
[all...]
H A Deap_server_tls_common.c144 int eap_type, int version, u8 id)
171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument
207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id);
401 struct wpabuf *respData, void *priv, int eap_type,
412 if (eap_type == EAP_UNAUTH_TLS_TYPE)
416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE)
421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData,
143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument
400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_tls_common.h78 int eap_type, int version, u8 id);
79 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
85 struct wpabuf *respData, void *priv, int eap_type,
H A Deap_server_tls.c24 u8 eap_type; member in struct:eap_tls_data
69 data->eap_type = EAP_TYPE_TLS;
91 data->eap_type = EAP_UNAUTH_TLS_TYPE;
113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE;
134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id);
156 return eap_server_tls_build_ack(id, data->eap_type, 0);
160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0,
178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id);
199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE)
203 else if (data->eap_type
[all...]
H A Deap_server_tls_common.c144 int eap_type, int version, u8 id)
171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument
207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id);
401 struct wpabuf *respData, void *priv, int eap_type,
412 if (eap_type == EAP_UNAUTH_TLS_TYPE)
416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE)
421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData,
143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument
400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Deapol_test.c700 int eap_type = -1; local
729 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)];
735 eap_type >= 0 ? eap_type_text(eap_type) : "??",
736 eap_type);
740 eap_type >= 0 ? eap_type_text(eap_type) : "??",
741 eap_type);

Completed in 278 milliseconds

12