| /src/sys/kern/ |
| exec_ecoff.c | 154 struct ecoff_aouthdr *eap = &execp->a; local 156 epp->ep_taddr = ECOFF_SEGMENT_ALIGN(execp, eap->text_start); 157 epp->ep_tsize = eap->tsize; 158 epp->ep_daddr = ECOFF_SEGMENT_ALIGN(execp, eap->data_start); 159 epp->ep_dsize = eap->dsize + eap->bsize; 160 epp->ep_entry = eap->entry; 164 eap->tsize + eap->dsize, epp->ep_taddr, vp, 169 if (eap->bsize > 0 185 struct ecoff_aouthdr *eap = &execp->a; local 225 struct ecoff_aouthdr *eap = &execp->a; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_common.c | 2 * EAP common peer/server definitions 16 * eap_hdr_len_valid - Validate EAP header length field 17 * @msg: EAP frame (starting with EAP header) 21 * This is a helper function that does minimal validation of EAP messages. The 36 wpa_printf(MSG_INFO, "EAP: Too short EAP frame"); 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); 51 * eap_hdr_validate - Validate EAP heade 184 const struct eap_hdr *eap; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994) 40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " 68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", 71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response"); 91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN); 104 struct eap_method *eap; local [all...] |
| eap_otp.c | 2 * EAP peer method: EAP-OTP (RFC 3748) 42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", 54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", 75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); 85 struct eap_method *eap; local 87 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 89 if (eap == NULL) 92 eap->init = eap_otp_init [all...] |
| eap_gtc.c | 2 * EAP peer method: EAP-GTC (RFC 3748) 29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with " 70 * error case which seems to use EAP-MSCHAPv2 like error 71 * reporting with EAP-GTC inside EAP-FAST tunnel. */ 86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured") 129 struct eap_method *eap; local [all...] |
| eap_methods.c | 2 * EAP peer: Method registration 25 * eap_peer_get_eap_method - Get EAP method based on type number 26 * @vendor: EAP Vendor-Id (0 = IETF) 27 * @method: EAP type number 28 * Returns: Pointer to EAP method or %NULL if not found 43 * eap_peer_get_type - Get EAP type for the given EAP method name 44 * @name: EAP method name, e.g., TLS 45 * @vendor: Buffer for returning EAP Vendor-Id 46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 286 struct eap_method *eap; local [all...] |
| eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 13 * struct eap_ssl_data - TLS data for EAP methods 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 63 * eap - EAP state machine allocated with eap_peer_sm_init() 65 struct eap_sm *eap; member in struct:eap_ssl_data 73 * eap_type - EAP method used in Phase 1 90 /* EAP TLS Flags */
|
| eap_vendor_test.c | 2 * EAP peer method: Test method for vendor specific (expanded) EAP type 8 * This file implements a vendor specific test method using EAP expanded types. 61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending " 83 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 90 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 97 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message " 106 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing " 117 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response"); 171 struct eap_method *eap; local [all...] |
| eap_ikev2.c | 2 * EAP-IKEv2 peer (RFC 5106) 51 wpa_printf(MSG_DEBUG, "EAP-IKEV2: %s -> %s", 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 82 data->ikev2.key_pad = (u8 *) os_strdup("Key Pad for EAP-IKEv2"); 125 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Failed to " 142 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Generating Response"); 161 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Add Integrity Checksum " 166 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Unknown INTEG " 200 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Sending out %lu bytes " 217 wpa_printf(MSG_DEBUG, "EAP-IKEV2: Authentication 513 struct eap_method *eap; local [all...] |
| eap_leap.c | 2 * EAP peer method: LEAP 70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request"); 79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame"); 85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version " 96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge " 104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP", 107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response"); 121 wpa_printf(MSG_DEBUG, "EAP-LEAP: Failed to derive response") 281 const struct eap_hdr *eap; local 402 struct eap_method *eap; local [all...] |
| eap_pax.c | 2 * EAP peer method: EAP-PAX (RFC 4746) 57 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 63 wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); 125 wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)"); 128 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " 135 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " 144 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " 152 wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)" 543 struct eap_method *eap; local [all...] |
| eap_psk.c | 2 * EAP peer method: EAP-PSK (RFC 4764) 8 * Note: EAP-PSK is an EAP authentication method and as such, completely 41 wpa_printf(MSG_INFO, "EAP-PSK: 16-octet pre-shared key not " 53 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: AK", data->ak, EAP_PSK_AK_LEN); 54 wpa_hexdump_key(MSG_DEBUG, "EAP-PSK: KDK", data->kdk, EAP_PSK_KDK_LEN); 65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity"); 94 wpa_printf(MSG_DEBUG, "EAP-PSK: in INIT state"); 99 wpa_printf(MSG_INFO, "EAP-PSK: Invalid first message 478 struct eap_method *eap; local [all...] |
| eap_sake.c | 2 * EAP peer method: EAP-SAKE (RFC 4763) 58 wpa_printf(MSG_DEBUG, "EAP-SAKE: %s -> %s", 76 wpa_printf(MSG_INFO, "EAP-SAKE: No key of correct length " 126 wpa_printf(MSG_ERROR, "EAP-SAKE: Failed to allocate memory " 155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 161 wpa_printf(MSG_INFO, "EAP-SAKE: No AT_PERM_ID_REQ or " 166 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 173 wpa_printf(MSG_DEBUG, "EAP-SAKE: * AT_PEERID"); 196 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Challenge received 505 struct eap_method *eap; local [all...] |
| eap_tls.c | 2 * EAP peer method: EAP-TLS (RFC 5216, RFC 9190) 48 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured"); 60 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 63 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard " 68 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private " 97 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 124 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL."); 163 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed"); 188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done") 433 struct eap_method *eap; local 459 struct eap_method *eap; local 486 struct eap_method *eap; local [all...] |
| eap_tnc.c | 2 * EAP peer method: EAP-TNC (Trusted Network Connect) 27 /* EAP-TNC Flags */ 76 wpa_printf(MSG_ERROR, "EAP-TNC: Failed to allocate memory " 82 wpa_printf(MSG_DEBUG, "EAP-TNC: Send fragment ack"); 96 wpa_printf(MSG_DEBUG, "EAP-TNC: Generating Response"); 130 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 137 wpa_printf(MSG_DEBUG, "EAP-TNC: Sending out %lu bytes " 153 wpa_printf(MSG_DEBUG, "EAP-TNC: Fragment overflow"); 159 wpa_printf(MSG_DEBUG, "EAP-TNC: Received %lu bytes, waiting for 412 struct eap_method *eap; local [all...] |
| eap_wsc.c | 2 * EAP-WSC peer for Wi-Fi Protected Setup 51 wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s", 77 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_ssid"); 84 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_auth"); 94 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_auth"); 100 wpa_printf(MSG_DEBUG, "EAP-WSC: Missing new_encr"); 114 wpa_printf(MSG_DEBUG, "EAP-WSC: Unknown new_encr"); 129 wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid new_key"); 155 wpa_printf(MSG_ERROR, "EAP-WSC: WPS context not available"); 168 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity" 590 struct eap_method *eap; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_methods.c | 2 * EAP server method registration 20 * eap_server_get_eap_method - Get EAP method based on type number 21 * @vendor: EAP Vendor-Id (0 = IETF) 22 * @method: EAP type number 23 * Returns: Pointer to EAP method or %NULL if not found 38 * eap_server_get_type - Get EAP type for the given EAP method name 39 * @name: EAP method name, e.g., TLS 40 * @vendor: Buffer for returning EAP Vendor-Id 41 * Returns: EAP method type or %EAP_TYPE_NONE if not foun 76 struct eap_method *eap; local [all...] |
| eap_server_gtc.c | 2 * hostapd / EAP-GTC (RFC 3748) 33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix " 63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for " 85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame"); 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response " 112 "for EAP-FAST prefix"); 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 124 "response to EAP-FAST prefix") 203 struct eap_method *eap; local [all...] |
| eap_server_identity.c | 2 * hostapd / EAP-Identity 70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " 91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); 159 struct eap_method *eap; local 161 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 164 if (eap == NULL) 167 eap->init = eap_identity_init [all...] |
| eap_server_md5.c | 2 * hostapd / EAP-MD5 server 51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data"); 59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for " 67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge, 84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame"); 88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response " 108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not " 119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN); 124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed"); 130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success") 155 struct eap_method *eap; local [all...] |
| eap_server_vendor_test.c | 2 * hostapd / Test method for vendor specific (expanded) EAP type 44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s", 80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate " 99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame"); 170 struct eap_method *eap; local 172 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION, 175 if (eap == NULL) 178 eap->init = eap_vendor_test_init; 179 eap->reset = eap_vendor_test_reset; 180 eap->buildReq = eap_vendor_test_buildReq [all...] |
| eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions 13 * struct eap_ssl_data - TLS data for EAP methods 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 47 * eap - EAP state machine allocated with eap_server_sm_init() 49 struct eap_sm *eap; member in struct:eap_ssl_data 63 /* EAP TLS Flags */
|
| /src/libexec/utmp_update/ |
| utmp_update.c | 57 va_list sap, eap; local 66 va_copy(eap, sap); 69 verrx(1, fmt, eap); 70 va_end(eap);
|
| /src/usr.sbin/bootp/bootptest/ |
| getether.c | 46 getether(char *ifname, char *eap) 61 bcopy(&phys.current_pa[0], eap, EALEN); 81 /* eap: Ether address (output) */ 82 getether(char *ifname, char *eap) 107 bcopy(&ifrnit.ifr_addr.sa_data[0], eap, EALEN); 127 /* eap: Ether address (output) */ 129 getether(char *ifname, char *eap) 158 bcopy(LLADDR((struct sockaddr_dl *) &ifrp->ifr_addr), eap, EALEN); 193 /* eap: Ether address (output) */ 194 getether(char *ifname, char *eap) 156 bcopy(LLADDR((struct sockaddr_dl *) &ifrp->ifr_addr), eap, EALEN); local [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-eap.c | 21 /* \summary: Extensible Authentication Protocol (EAP) printer */ 25 __RCSID("$NetBSD: print-eap.c,v 1.9 2024/09/02 16:15:31 christos Exp $"); 48 { EAP_FRAME_TYPE_PACKET, "EAP packet" }, 85 #define EAP_TYPE_TTLS 21 /* RFC 5281, draft-funk-eap-ttls-v0-01.txt */ 111 /* RFC 5216 - EAP TLS bits */ 125 /* EAP-AKA and EAP-SIM - RFC 4187 */ 150 * Print EAP requests / responses 161 ndo->ndo_protocol = "eap"; 167 * not put an EAP header on every packet, if reassembly ca 310 const struct eap_frame_t *eap; local [all...] |