Searched defs:vendor (Results 1 - 25 of 138) sorted by last modified time

123456

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.h119 int vendor; member in struct:hostapd_eap_user::__anon33529
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.c52 * @vendor: Expected EAP Vendor-Id (0 = IETF)
66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument
93 if (exp_vendor != vendor || exp_type != (u32) eap_type) {
102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
114 * @vendor: Vendor-Id (0 = IETF)
128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
135 len = sizeof(struct eap_hdr) + (vendor == EAP_VENDOR_IETF ? 1 : 8) +
146 if (vendor == EAP_VENDOR_IETF) {
150 wpabuf_put_be24(buf, vendor);
H A Deap_gpsk_common.c20 * @vendor: CSuite/Vendor
24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument
26 if (vendor == EAP_GPSK_VENDOR_IETF &&
30 if (vendor == EAP_GPSK_VENDOR_IETF &&
262 * @vendor: CSuite/Vendor
278 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, argument
290 vendor, specifier);
292 if (vendor != EAP_GPSK_VENDOR_IETF)
331 "key derivation", vendor, specifier);
403 * @vendor
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
481 eap_gpsk_mic_len(int vendor, int specifier) argument
523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
[all...]
H A Deap_gpsk_common.h40 u8 vendor[4]; member in struct:eap_gpsk_csuite
48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
62 size_t eap_gpsk_mic_len(int vendor, int specifier);
63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c38 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor,
123 * @vendor: Vendor-Id for expanded types or 0 = IETF for legacy types
127 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method) argument
137 for (i = 0; m[i].vendor != EAP_VENDOR_IETF ||
139 if (m[i].vendor == vendor && m[i].method == method)
261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
264 "vendor=%u method=%u -> NAK",
272 "vendor=%u method=%u", sm->reqVendor, method);
285 sm->m && sm->m->vendor
811 eap_sm_allowMethod(struct eap_sm *sm, int vendor, EapType method) argument
1866 eap_allowed_phase2_type(int vendor, int type) argument
1885 eap_get_phase2_type(const char *name, int *vendor) argument
1912 int vendor; local
[all...]
H A Deap.h21 int vendor; member in struct:eap_method_type
301 u32 eap_get_phase2_type(const char *name, int *vendor);
H A Deap_gpsk.c32 int vendor; /* CSuite/Specifier */ member in struct:eap_gpsk_data
204 data->vendor = EAP_GPSK_VENDOR_IETF;
208 int vendor, specifier; local
209 vendor = WPA_GET_BE32(csuite->vendor);
212 i, vendor, specifier);
213 if (data->vendor == EAP_GPSK_VENDOR_IETF &&
215 eap_gpsk_supported_ciphersuite(vendor, specifier) &&
218 data->vendor = vendor;
494 int vendor, specifier; local
[all...]
H A Deap_i.h65 * vendor - EAP Vendor-ID (EAP_VENDOR_*) (0 = IETF)
67 int vendor; member in struct:eap_method
372 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method);
H A Deap_methods.c24 * @vendor: EAP Vendor-Id (0 = IETF)
28 const struct eap_method * eap_peer_get_eap_method(int vendor, EapType method) argument
32 if (m->vendor == vendor && m->method == method)
42 * @vendor: Buffer for returning EAP Vendor-Id
48 EapType eap_peer_get_type(const char *name, int *vendor) argument
53 *vendor = m->vendor;
57 *vendor = EAP_VENDOR_IETF;
64 * @vendor
71 eap_get_name(int vendor, EapType type) argument
279 eap_peer_method_alloc(int version, int vendor, EapType method, const char *name) argument
[all...]
H A Deap_methods.h14 const struct eap_method * eap_peer_get_eap_method(int vendor, EapType method);
17 struct eap_method * eap_peer_method_alloc(int version, int vendor,
25 EapType eap_peer_get_type(const char *name, int *vendor);
26 const char * eap_get_name(int vendor, EapType type);
33 static inline EapType eap_peer_get_type(const char *name, int *vendor) argument
35 *vendor = EAP_VENDOR_IETF;
39 static inline const char * eap_get_name(int vendor, EapType type) argument
H A Deap_tls_common.c1044 int vendor; local
1057 method = eap_get_phase2_type(start, &vendor);
1058 if (vendor == EAP_VENDOR_IETF && method == EAP_TYPE_NONE) {
1071 methods[num_methods - 1].vendor = vendor;
1123 if (types[i].vendor == EAP_VENDOR_IETF &&
H A Dtncc.c466 unsigned int vendor, subtype; local
471 vendor = type >> 8;
478 if ((vendor == svendor || svendor == TNC_VENDORID_ANY) &&
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap.h26 int vendor; member in struct:eap_user::__anon33671
H A Deap_i.h25 int vendor; member in struct:eap_method
H A Deap_server.c42 static EapType eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor);
367 int vendor; local
373 type = eap_sm_Policy_getNextMethod(sm, &vendor);
374 if (vendor == EAP_VENDOR_IETF)
382 sm->m = eap_server_get_eap_method(vendor, type);
406 "vendor=%u method=%u", vendor, sm->currentMethod);
407 eap_log_msg(sm, "Propose EAP method vendor=%u method=%u",
408 vendor, sm->currentMethod);
1072 (sm->user->methods[i].vendor !
1124 eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor) argument
[all...]
H A Deap_server_gpsk.c32 int vendor; /* CSuite/Vendor */ member in struct:eap_gpsk_data
75 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor,
83 WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor,
152 miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
172 WPA_PUT_BE32(csuite->vendor, data->vendor);
179 if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
372 WPA_GET_BE32(csuite->vendor),
377 data->vendor = WPA_GET_BE32(csuite->vendor);
[all...]
H A Deap_server_methods.c21 * @vendor: EAP Vendor-Id (0 = IETF)
25 const struct eap_method * eap_server_get_eap_method(int vendor, EapType method) argument
29 if (m->vendor == vendor && m->method == method)
39 * @vendor: Buffer for returning EAP Vendor-Id
45 EapType eap_server_get_type(const char *name, int *vendor) argument
50 *vendor = m->vendor;
54 *vendor = EAP_VENDOR_IETF;
63 * @vendor
71 eap_server_method_alloc(int version, int vendor, EapType method, const char *name) argument
161 eap_server_get_name(int vendor, EapType type) argument
[all...]
H A Dtncs.c492 unsigned int vendor, subtype; local
497 vendor = type >> 8;
504 if ((vendor == svendor || svendor == TNC_VENDORID_ANY) &&
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.c908 * payload if a vendor attribute with subtype is found, otherwise returns NULL.
912 static u8 *radius_msg_get_vendor_attr(struct radius_msg *msg, u32 vendor, argument
941 if (ntohl(vendor_id) != vendor)
/external/wpa_supplicant_8/src/ap/
H A Dap_config.h119 int vendor; member in struct:hostapd_eap_user::__anon33782
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.c52 * @vendor: Expected EAP Vendor-Id (0 = IETF)
66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument
93 if (exp_vendor != vendor || exp_type != (u32) eap_type) {
102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
114 * @vendor: Vendor-Id (0 = IETF)
128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
135 len = sizeof(struct eap_hdr) + (vendor == EAP_VENDOR_IETF ? 1 : 8) +
146 if (vendor == EAP_VENDOR_IETF) {
150 wpabuf_put_be24(buf, vendor);
H A Deap_gpsk_common.c20 * @vendor: CSuite/Vendor
24 int eap_gpsk_supported_ciphersuite(int vendor, int specifier) argument
26 if (vendor == EAP_GPSK_VENDOR_IETF &&
30 if (vendor == EAP_GPSK_VENDOR_IETF &&
262 * @vendor: CSuite/Vendor
278 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, argument
290 vendor, specifier);
292 if (vendor != EAP_GPSK_VENDOR_IETF)
331 "key derivation", vendor, specifier);
403 * @vendor
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
481 eap_gpsk_mic_len(int vendor, int specifier) argument
523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
[all...]
H A Deap_gpsk_common.h40 u8 vendor[4]; member in struct:eap_gpsk_csuite
48 int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
62 size_t eap_gpsk_mic_len(int vendor, int specifier);
63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.c38 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor,
123 * @vendor: Vendor-Id for expanded types or 0 = IETF for legacy types
127 int eap_allowed_method(struct eap_sm *sm, int vendor, u32 method) argument
137 for (i = 0; m[i].vendor != EAP_VENDOR_IETF ||
139 if (m[i].vendor == vendor && m[i].method == method)
261 wpa_printf(MSG_DEBUG, "EAP: vendor %u method %u not allowed",
264 "vendor=%u method=%u -> NAK",
272 "vendor=%u method=%u", sm->reqVendor, method);
285 sm->m && sm->m->vendor
811 eap_sm_allowMethod(struct eap_sm *sm, int vendor, EapType method) argument
1866 eap_allowed_phase2_type(int vendor, int type) argument
1885 eap_get_phase2_type(const char *name, int *vendor) argument
1912 int vendor; local
[all...]
H A Deap.h21 int vendor; member in struct:eap_method_type
301 u32 eap_get_phase2_type(const char *name, int *vendor);

Completed in 244 milliseconds

123456