/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls_common.c | 142 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 160 if (data->eap_type == EAP_TYPE_FAST) 246 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 253 struct eap_peer_config *config, u8 eap_type) 261 data->eap_type = eap_type; 345 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 355 struct eap_ssl_data *data, u8 eap_type, 371 out[0] = eap_type; 538 * @eap_type 252 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 354 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 545 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 642 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 727 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 815 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 973 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 95 data->eap_type = EAP_UNAUTH_TLS_TYPE; 122 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 169 return eap_peer_tls_build_ack(id, data->eap_type, 0); 247 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 261 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 281 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls_common.c | 142 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 160 if (data->eap_type == EAP_TYPE_FAST) 246 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 253 struct eap_peer_config *config, u8 eap_type) 261 data->eap_type = eap_type; 345 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 355 struct eap_ssl_data *data, u8 eap_type, 371 out[0] = eap_type; 538 * @eap_type 252 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 354 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 545 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 642 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 727 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 815 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 973 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 95 data->eap_type = EAP_UNAUTH_TLS_TYPE; 122 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 169 return eap_peer_tls_build_ack(id, data->eap_type, 0); 247 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 261 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 281 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.h | 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 75 u8 eap_type; member in struct:eap_ssl_data 94 struct eap_peer_config *config, u8 eap_type); 99 struct eap_ssl_data *data, u8 eap_type, 102 EapType eap_type, int peap_version, 105 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 112 EapType eap_type, 122 EapType eap_type, int peap_version, u8 id,
|
H A D | eap_tls_common.c | 142 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 160 if (data->eap_type == EAP_TYPE_FAST) 246 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 253 struct eap_peer_config *config, u8 eap_type) 261 data->eap_type = eap_type; 345 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 355 struct eap_ssl_data *data, u8 eap_type, 371 out[0] = eap_type; 538 * @eap_type 252 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 354 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 545 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 642 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 727 eap_peer_tls_build_ack(u8 id, EapType eap_type, int peap_version) argument 815 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 973 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_tls.c | 27 u8 eap_type; member in struct:eap_tls_data 69 data->eap_type = EAP_TYPE_TLS; 95 data->eap_type = EAP_UNAUTH_TLS_TYPE; 122 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 169 return eap_peer_tls_build_ack(id, data->eap_type, 0); 247 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, 261 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, 281 return eap_peer_tls_build_ack(id, data->eap_type, 0);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_tls_common.h | 73 int verify_peer, int eap_type); 78 struct eap_ssl_data *data, u8 eap_type, 81 int eap_type, int version, u8 id); 82 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 88 struct wpabuf *respData, void *priv, int eap_type,
|
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 66 wpabuf_put_u8(buf, data->eap_type); 86 data->eap_type = EAP_TYPE_TLS; 108 data->eap_type = EAP_UNAUTH_TLS_TYPE; 131 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 152 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 174 return eap_server_tls_build_ack(id, data->eap_type, 0); 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 196 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 218 if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 47 int verify_peer, int eap_type) 74 if (eap_type != EAP_TYPE_FAST) 77 session_ctx[7] = (u8) eap_type; 132 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 142 struct eap_ssl_data *data, u8 eap_type, 160 out[0] = eap_type; 170 int eap_type, int version, u8 id) 197 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 229 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 233 req = eap_tls_msg_alloc(eap_type, 46 eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, int verify_peer, int eap_type) argument 141 eap_server_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 169 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 426 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_tls_common.h | 73 int verify_peer, int eap_type); 78 struct eap_ssl_data *data, u8 eap_type, 81 int eap_type, int version, u8 id); 82 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 88 struct wpabuf *respData, void *priv, int eap_type,
|
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 66 wpabuf_put_u8(buf, data->eap_type); 86 data->eap_type = EAP_TYPE_TLS; 108 data->eap_type = EAP_UNAUTH_TLS_TYPE; 131 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 152 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 174 return eap_server_tls_build_ack(id, data->eap_type, 0); 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 196 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 218 if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 47 int verify_peer, int eap_type) 74 if (eap_type != EAP_TYPE_FAST) 77 session_ctx[7] = (u8) eap_type; 132 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 142 struct eap_ssl_data *data, u8 eap_type, 160 out[0] = eap_type; 170 int eap_type, int version, u8 id) 197 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 229 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 233 req = eap_tls_msg_alloc(eap_type, 46 eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, int verify_peer, int eap_type) argument 141 eap_server_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 169 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 426 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_tls_common.h | 73 int verify_peer, int eap_type); 78 struct eap_ssl_data *data, u8 eap_type, 81 int eap_type, int version, u8 id); 82 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 88 struct wpabuf *respData, void *priv, int eap_type,
|
H A D | eap_server_tls.c | 24 u8 eap_type; member in struct:eap_tls_data 66 wpabuf_put_u8(buf, data->eap_type); 86 data->eap_type = EAP_TYPE_TLS; 108 data->eap_type = EAP_UNAUTH_TLS_TYPE; 131 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; 152 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); 174 return eap_server_tls_build_ack(id, data->eap_type, 0); 178 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, 196 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); 218 if (data->eap_type [all...] |
H A D | eap_server_tls_common.c | 47 int verify_peer, int eap_type) 74 if (eap_type != EAP_TYPE_FAST) 77 session_ctx[7] = (u8) eap_type; 132 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 142 struct eap_ssl_data *data, u8 eap_type, 160 out[0] = eap_type; 170 int eap_type, int version, u8 id) 197 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 229 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) argument 233 req = eap_tls_msg_alloc(eap_type, 46 eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, int verify_peer, int eap_type) argument 141 eap_server_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 169 eap_server_tls_build_msg(struct eap_ssl_data *data, int eap_type, int version, u8 id) argument 426 eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, struct wpabuf *respData, void *priv, int eap_type, int (*proc_version)(struct eap_sm *sm, void *priv, int peer_version), void (*proc_msg)(struct eap_sm *sm, void *priv, const struct wpabuf *respData)) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.h | 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
|
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.h | 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
|
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.h | 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
|
H A D | eap_common.c | 53 * @eap_type: Expected EAP type number 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 759 int eap_type = -1; local 788 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)]; 794 eap_type >= 0 ? eap_type_text(eap_type) : "??", 795 eap_type); 799 eap_type >= 0 ? eap_type_text(eap_type) : "??", 800 eap_type);
|