/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.h | 119 int vendor; member in struct:hostapd_eap_user::__anon33529
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 52 * @vendor: Expected EAP Vendor-Id (0 = IETF) 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) { 114 * @vendor: Vendor-Id (0 = IETF) 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 135 len = sizeof(struct eap_hdr) + (vendor == EAP_VENDOR_IETF ? 1 : 8) + 146 if (vendor == EAP_VENDOR_IETF) { 150 wpabuf_put_be24(buf, vendor);
|
H A D | eap_gpsk_common.c | 20 * @vendor: CSuite/Vendor 24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument 26 if (vendor == EAP_GPSK_VENDOR_IETF && 30 if (vendor == EAP_GPSK_VENDOR_IETF && 262 * @vendor: CSuite/Vendor 278 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, argument 290 vendor, specifier); 292 if (vendor != EAP_GPSK_VENDOR_IETF) 331 "key derivation", vendor, specifier); 403 * @vendor 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument 481 eap_gpsk_mic_len(int vendor, int specifier) argument 523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
H A D | eap_gpsk_common.h | 40 u8 vendor[4]; member in struct:eap_gpsk_csuite 48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier); 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, 62 size_t eap_gpsk_mic_len(int vendor, int specifier); 63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 38 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor, 123 * @vendor: Vendor-Id for expanded types or 0 = IETF for legacy types 127 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method) argument 137 for (i = 0; m[i].vendor != EAP_VENDOR_IETF || 139 if (m[i].vendor == vendor && m[i].method == method) 261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 264 "vendor=%u method=%u -> NAK", 272 "vendor=%u method=%u", sm->reqVendor, method); 285 sm->m && sm->m->vendor 811 eap_sm_allowMethod(struct eap_sm *sm, int vendor, EapType method) argument 1866 eap_allowed_phase2_type(int vendor, int type) argument 1885 eap_get_phase2_type(const char *name, int *vendor) argument 1912 int vendor; local [all...] |
H A D | eap.h | 21 int vendor; member in struct:eap_method_type 301 u32 eap_get_phase2_type(const char *name, int *vendor);
|
H A D | eap_gpsk.c | 32 int vendor; /* CSuite/Specifier */ member in struct:eap_gpsk_data 204 data->vendor = EAP_GPSK_VENDOR_IETF; 208 int vendor, specifier; local 209 vendor = WPA_GET_BE32(csuite->vendor); 212 i, vendor, specifier); 213 if (data->vendor == EAP_GPSK_VENDOR_IETF && 215 eap_gpsk_supported_ciphersuite(vendor, specifier) && 218 data->vendor = vendor; 494 int vendor, specifier; local [all...] |
H A D | eap_i.h | 65 * vendor - EAP Vendor-ID (EAP_VENDOR_*) (0 = IETF) 67 int vendor; member in struct:eap_method 372 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method);
|
H A D | eap_methods.c | 24 * @vendor: EAP Vendor-Id (0 = IETF) 28 const struct eap_method * eap_peer_get_eap_method(int vendor, EapType method) argument 32 if (m->vendor == vendor && m->method == method) 42 * @vendor: Buffer for returning EAP Vendor-Id 48 EapType eap_peer_get_type(const char *name, int *vendor) argument 53 *vendor = m->vendor; 57 *vendor = EAP_VENDOR_IETF; 64 * @vendor 71 eap_get_name(int vendor, EapType type) argument 279 eap_peer_method_alloc(int version, int vendor, EapType method, const char *name) argument [all...] |
H A D | eap_methods.h | 14 const struct eap_method * eap_peer_get_eap_method(int vendor, EapType method); 17 struct eap_method * eap_peer_method_alloc(int version, int vendor, 25 EapType eap_peer_get_type(const char *name, int *vendor); 26 const char * eap_get_name(int vendor, EapType type); 33 static inline EapType eap_peer_get_type(const char *name, int *vendor) argument 35 *vendor = EAP_VENDOR_IETF; 39 static inline const char * eap_get_name(int vendor, EapType type) argument
|
H A D | eap_tls_common.c | 1044 int vendor; local 1057 method = eap_get_phase2_type(start, &vendor); 1058 if (vendor == EAP_VENDOR_IETF && method == EAP_TYPE_NONE) { 1071 methods[num_methods - 1].vendor = vendor; 1123 if (types[i].vendor == EAP_VENDOR_IETF &&
|
H A D | tncc.c | 466 unsigned int vendor, subtype; local 471 vendor = type >> 8; 478 if ((vendor == svendor || svendor == TNC_VENDORID_ANY) &&
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap.h | 26 int vendor; member in struct:eap_user::__anon33671
|
H A D | eap_i.h | 25 int vendor; member in struct:eap_method
|
H A D | eap_server.c | 42 static EapType eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor); 367 int vendor; local 373 type = eap_sm_Policy_getNextMethod(sm, &vendor); 374 if (vendor == EAP_VENDOR_IETF) 382 sm->m = eap_server_get_eap_method(vendor, type); 406 "vendor=%u method=%u", vendor, sm->currentMethod); 407 eap_log_msg(sm, "Propose EAP method vendor=%u method=%u", 408 vendor, sm->currentMethod); 1072 (sm->user->methods[i].vendor ! 1124 eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor) argument [all...] |
H A D | eap_server_gpsk.c | 32 int vendor; /* CSuite/Vendor */ member in struct:eap_gpsk_data 75 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor, 83 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor, 152 miclen = eap_gpsk_mic_len(data->vendor, data->specifier); 172 WPA_PUT_BE32(csuite->vendor, data->vendor); 179 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor, 372 WPA_GET_BE32(csuite->vendor), 377 data->vendor = WPA_GET_BE32(csuite->vendor); [all...] |
H A D | eap_server_methods.c | 21 * @vendor: EAP Vendor-Id (0 = IETF) 25 const struct eap_method * eap_server_get_eap_method(int vendor, EapType method) argument 29 if (m->vendor == vendor && m->method == method) 39 * @vendor: Buffer for returning EAP Vendor-Id 45 EapType eap_server_get_type(const char *name, int *vendor) argument 50 *vendor = m->vendor; 54 *vendor = EAP_VENDOR_IETF; 63 * @vendor 71 eap_server_method_alloc(int version, int vendor, EapType method, const char *name) argument 161 eap_server_get_name(int vendor, EapType type) argument [all...] |
H A D | tncs.c | 492 unsigned int vendor, subtype; local 497 vendor = type >> 8; 504 if ((vendor == svendor || svendor == TNC_VENDORID_ANY) &&
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 908 * payload if a vendor attribute with subtype is found, otherwise returns NULL. 912 static u8 *radius_msg_get_vendor_attr(struct radius_msg *msg, u32 vendor, argument 941 if (ntohl(vendor_id) != vendor)
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.h | 119 int vendor; member in struct:hostapd_eap_user::__anon33782
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 52 * @vendor: Expected EAP Vendor-Id (0 = IETF) 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) { 114 * @vendor: Vendor-Id (0 = IETF) 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 135 len = sizeof(struct eap_hdr) + (vendor == EAP_VENDOR_IETF ? 1 : 8) + 146 if (vendor == EAP_VENDOR_IETF) { 150 wpabuf_put_be24(buf, vendor);
|
H A D | eap_gpsk_common.c | 20 * @vendor: CSuite/Vendor 24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument 26 if (vendor == EAP_GPSK_VENDOR_IETF && 30 if (vendor == EAP_GPSK_VENDOR_IETF && 262 * @vendor: CSuite/Vendor 278 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, argument 290 vendor, specifier); 292 if (vendor != EAP_GPSK_VENDOR_IETF) 331 "key derivation", vendor, specifier); 403 * @vendor 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument 481 eap_gpsk_mic_len(int vendor, int specifier) argument 523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
H A D | eap_gpsk_common.h | 40 u8 vendor[4]; member in struct:eap_gpsk_csuite 48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier); 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, 62 size_t eap_gpsk_mic_len(int vendor, int specifier); 63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 38 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor, 123 * @vendor: Vendor-Id for expanded types or 0 = IETF for legacy types 127 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method) argument 137 for (i = 0; m[i].vendor != EAP_VENDOR_IETF || 139 if (m[i].vendor == vendor && m[i].method == method) 261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed", 264 "vendor=%u method=%u -> NAK", 272 "vendor=%u method=%u", sm->reqVendor, method); 285 sm->m && sm->m->vendor 811 eap_sm_allowMethod(struct eap_sm *sm, int vendor, EapType method) argument 1866 eap_allowed_phase2_type(int vendor, int type) argument 1885 eap_get_phase2_type(const char *name, int *vendor) argument 1912 int vendor; local [all...] |
H A D | eap.h | 21 int vendor; member in struct:eap_method_type 301 u32 eap_get_phase2_type(const char *name, int *vendor);
|