/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 68 data->eap_type = EAP_TYPE_TLS; 94 data->eap_type = EAP_UNAUTH_TLS_TYPE; 121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 181 return eap_peer_tls_build_ack(id, data->eap_type, 0); 232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
H A D | eap_tls_common.c | 132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 238 struct eap_peer_config *config, u8 eap_type) 246 data->eap_type = eap_type; 364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 374 struct eap_ssl_data *data, u8 eap_type, 397 out[0] = eap_type; 567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...) 574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument 237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 314 u8 eap_type = EAP_TYPE_PEAP; local 322 addr[1] = &eap_type;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 68 data->eap_type = EAP_TYPE_TLS; 94 data->eap_type = EAP_UNAUTH_TLS_TYPE; 121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 181 return eap_peer_tls_build_ack(id, data->eap_type, 0); 232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
H A D | eap_tls_common.c | 132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 238 struct eap_peer_config *config, u8 eap_type) 246 data->eap_type = eap_type; 364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 374 struct eap_ssl_data *data, u8 eap_type, 397 out[0] = eap_type; 567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...) 574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument 237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 314 u8 eap_type = EAP_TYPE_PEAP; local 322 addr[1] = &eap_type;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 68 data->eap_type = EAP_TYPE_TLS; 94 data->eap_type = EAP_UNAUTH_TLS_TYPE; 121 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 181 return eap_peer_tls_build_ack(id, data->eap_type, 0); 232 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 245 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
H A D | eap_tls_common.c | 132 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 231 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 238 struct eap_peer_config *config, u8 eap_type) 246 data->eap_type = eap_type; 364 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 374 struct eap_ssl_data *data, u8 eap_type, 397 out[0] = eap_type; 567 * @eap_type: EAP type (EAP_TYPE_TLS, EAP_TYPE_PEAP, ...) 574 static int eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, argument 237 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 751 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 314 u8 eap_type = EAP_TYPE_PEAP; local 322 addr[1] = &eap_type;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 91 data->eap_type = EAP_UNAUTH_TLS_TYPE; 113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 156 return eap_server_tls_build_ack(id, data->eap_type, 0); 160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE) 203 else if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 144 int eap_type, int version, u8 id) 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id); 401 struct wpabuf *respData, void *priv, int eap_type, 412 if (eap_type == EAP_UNAUTH_TLS_TYPE) 416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE) 421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData, 143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
|
H A D | eap_server_fast.c | 939 EapType eap_type) 947 eap_type); 938 eap_fast_phase2_init(struct eap_sm *sm, struct eap_fast_data *data, EapType eap_type) argument
|
H A D | eap_server_peap.c | 370 u8 eap_type = EAP_TYPE_PEAP; local 394 addr[1] = &eap_type; 540 EapType eap_type) 548 eap_type); 539 eap_peap_phase2_init(struct eap_sm *sm, struct eap_peap_data *data, EapType eap_type) argument
|
H A D | eap_server_ttls.c | 777 EapType eap_type) 785 eap_type); 775 eap_ttls_phase2_eap_init(struct eap_sm *sm, struct eap_ttls_data *data, EapType eap_type) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 91 data->eap_type = EAP_UNAUTH_TLS_TYPE; 113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 156 return eap_server_tls_build_ack(id, data->eap_type, 0); 160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE) 203 else if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 144 int eap_type, int version, u8 id) 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id); 401 struct wpabuf *respData, void *priv, int eap_type, 412 if (eap_type == EAP_UNAUTH_TLS_TYPE) 416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE) 421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData, 143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 91 data->eap_type = EAP_UNAUTH_TLS_TYPE; 113 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 134 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 156 return eap_server_tls_build_ack(id, data->eap_type, 0); 160 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 199 if (data->eap_type == EAP_UNAUTH_TLS_TYPE) 203 else if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 144 int eap_type, int version, u8 id) 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 203 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id); 401 struct wpabuf *respData, void *priv, int eap_type, 412 if (eap_type == EAP_UNAUTH_TLS_TYPE) 416 else if (eap_type == EAP_WFA_UNAUTH_TLS_TYPE) 421 pos = eap_hdr_validate(EAP_VENDOR_IETF, eap_type, respData, 143 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 400 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 1110 int eap_type = -1; local 1145 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)]; 1150 if (eap_type >= 0) 1151 sm->eap_type_authsrv = eap_type; 1153 eap_type >= 0 ? eap_server_get_name(0, eap_type) : 1155 eap_type); 1159 eap_type >= 0 ? eap_server_get_name(0, eap_type) : 1161 eap_type); [all...] |