HomeSort by: relevance | last modified time | path
    Searched refs:eap (Results 1 - 25 of 109) sorted by relevancy

1 2 3 4 5

  /src/external/bsd/wpa/dist/src/eap_peer/
Makefile 4 eap.o \
eap_otp.c 2 * EAP peer method: EAP-OTP (RFC 3748)
42 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message",
54 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured");
71 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response",
75 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
85 struct eap_method *eap; local
87 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
89 if (eap == NULL)
92 eap->init = eap_otp_init
    [all...]
eap_tls.c 2 * EAP peer method: EAP-TLS (RFC 5216, RFC 9190)
48 wpa_printf(MSG_INFO, "EAP-TLS: Private key not configured");
60 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
63 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting Smartcard "
68 wpa_printf(MSG_DEBUG, "EAP-TLS: Requesting private "
97 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
124 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
163 wpa_printf(MSG_DEBUG, "EAP-TLS: TLS processing failed");
188 wpa_printf(MSG_DEBUG, "EAP-TLS: Done")
433 struct eap_method *eap; local
459 struct eap_method *eap; local
486 struct eap_method *eap; local
    [all...]
eap_md5.c 2 * EAP peer method: EAP-MD5 (RFC 3748 and RFC 1994)
40 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
60 wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge "
68 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge",
71 wpa_printf(MSG_DEBUG, "EAP-MD5: Generating Challenge Response");
91 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
96 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, CHAP_MD5_LEN);
104 struct eap_method *eap; local
    [all...]
eap_gtc.c 2 * EAP peer method: EAP-GTC (RFC 3748)
29 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
65 wpa_printf(MSG_DEBUG, "EAP-GTC: Challenge did not start with "
70 * error case which seems to use EAP-MSCHAPv2 like error
71 * reporting with EAP-GTC inside EAP-FAST tunnel. */
86 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured")
129 struct eap_method *eap; local
    [all...]
eap_vendor_test.c 2 * EAP peer method: Test method for vendor specific (expanded) EAP type
8 * This file implements a vendor specific test method using EAP expanded types.
61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
83 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
90 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
97 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
106 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
117 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
171 struct eap_method *eap; local
    [all...]
eap_leap.c 2 * EAP peer method: LEAP
70 wpa_printf(MSG_DEBUG, "EAP-LEAP: Processing EAP-Request");
79 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid EAP-Request frame");
85 wpa_printf(MSG_WARNING, "EAP-LEAP: Unsupported LEAP version "
96 wpa_printf(MSG_INFO, "EAP-LEAP: Invalid challenge "
104 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge from AP",
107 wpa_printf(MSG_DEBUG, "EAP-LEAP: Generating Challenge Response");
121 wpa_printf(MSG_DEBUG, "EAP-LEAP: Failed to derive response")
281 const struct eap_hdr *eap; local
402 struct eap_method *eap; local
    [all...]
eap_methods.c 2 * EAP peer: Method registration
25 * eap_peer_get_eap_method - Get EAP method based on type number
26 * @vendor: EAP Vendor-Id (0 = IETF)
27 * @method: EAP type number
28 * Returns: Pointer to EAP method or %NULL if not found
43 * eap_peer_get_type - Get EAP type for the given EAP method name
44 * @name: EAP method name, e.g., TLS
45 * @vendor: Buffer for returning EAP Vendor-Id
46 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
286 struct eap_method *eap; local
    [all...]
  /src/sys/kern/
exec_ecoff.c 154 struct ecoff_aouthdr *eap = &execp->a; local
156 epp->ep_taddr = ECOFF_SEGMENT_ALIGN(execp, eap->text_start);
157 epp->ep_tsize = eap->tsize;
158 epp->ep_daddr = ECOFF_SEGMENT_ALIGN(execp, eap->data_start);
159 epp->ep_dsize = eap->dsize + eap->bsize;
160 epp->ep_entry = eap->entry;
164 eap->tsize + eap->dsize, epp->ep_taddr, vp,
169 if (eap->bsize > 0
185 struct ecoff_aouthdr *eap = &execp->a; local
225 struct ecoff_aouthdr *eap = &execp->a; local
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
ieee8021x.conf 1 # IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
8 eap=PEAP
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_methods.c 2 * EAP server method registration
20 * eap_server_get_eap_method - Get EAP method based on type number
21 * @vendor: EAP Vendor-Id (0 = IETF)
22 * @method: EAP type number
23 * Returns: Pointer to EAP method or %NULL if not found
38 * eap_server_get_type - Get EAP type for the given EAP method name
39 * @name: EAP method name, e.g., TLS
40 * @vendor: Buffer for returning EAP Vendor-Id
41 * Returns: EAP method type or %EAP_TYPE_NONE if not foun
76 struct eap_method *eap; local
    [all...]
eap_server_tls.c 2 * hostapd / EAP-TLS (RFC 5216, RFC 9190)
48 wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
82 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
106 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
129 wpa_printf(MSG_INFO, "EAP-TLS: Failed to initialize SSL.");
157 wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
195 wpa_printf(MSG_DEBUG, "EAP-TLS: %s - unexpected state %d",
206 wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
218 "EAP-TLS: No user entry found based on the serial number of the client certificate ");
221 "EAP-TLS: Updated user entry based on the serial number of the client certificate ")
430 struct eap_method *eap; local
455 struct eap_method *eap; local
482 struct eap_method *eap; local
    [all...]
eap_server_identity.c 2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf);
159 struct eap_method *eap; local
161 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
164 if (eap == NULL)
167 eap->init = eap_identity_init
    [all...]
eap_server_vendor_test.c 2 * hostapd / Test method for vendor specific (expanded) EAP type
44 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: %s -> %s",
80 wpa_printf(MSG_ERROR, "EAP-VENDOR-TEST: Failed to allocate "
99 wpa_printf(MSG_INFO, "EAP-VENDOR-TEST: Invalid frame");
170 struct eap_method *eap; local
172 eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
175 if (eap == NULL)
178 eap->init = eap_vendor_test_init;
179 eap->reset = eap_vendor_test_reset;
180 eap->buildReq = eap_vendor_test_buildReq
    [all...]
eap_server_gtc.c 2 * hostapd / EAP-GTC (RFC 3748)
33 wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
63 wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for "
85 wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame");
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
111 wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
112 "for EAP-FAST prefix");
123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
124 "response to EAP-FAST prefix")
203 struct eap_method *eap; local
    [all...]
eap_server_md5.c 2 * hostapd / EAP-MD5 server
51 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to get random data");
59 wpa_printf(MSG_ERROR, "EAP-MD5: Failed to allocate memory for "
67 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", data->challenge,
84 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame");
88 wpa_printf(MSG_INFO, "EAP-MD5: Invalid response "
108 wpa_printf(MSG_INFO, "EAP-MD5: Plaintext password not "
119 wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", pos, CHAP_MD5_LEN);
124 wpa_printf(MSG_INFO, "EAP-MD5: CHAP MD5 operation failed");
130 wpa_printf(MSG_DEBUG, "EAP-MD5: Done - Success")
155 struct eap_method *eap; local
    [all...]
  /src/sys/ufs/ufs/
extattr.h 91 * EXTATTR_NEXT(eap) returns a pointer to the next extended attribute
92 * following eap.
93 * EXTATTR_CONTENT(eap) returns a pointer to the extended attribute
94 * content referenced by eap.
95 * EXTATTR_CONTENT_SIZE(eap) returns the size of the extended attribute
96 * content referenced by eap.
98 #define EXTATTR_NEXT(eap) \
99 ((struct extattr *)(((u_char *)(eap)) + (eap)->ea_length))
100 #define EXTATTR_CONTENT(eap) \
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 158 # its certificate chain are included in EAP peer certificate events. This is
162 # EAP fast re-authentication
163 # By default, fast re-authentication is enabled for all EAP methods that
193 # Dynamic EAP methods
194 # If EAP methods were built dynamically as shared object files, they need to be
195 # loaded here before being used in the network blocks. By default, EAP methods
642 # (EAP-TLS). Full path to the file should be used since working
695 # parameter. When using Home OIs to match the network, the EAP parameters
715 # Consortium to match the network, the EAP parameters need to be
734 # eap: Pre-configured EAP metho
    [all...]
  /src/usr.sbin/bootp/bootptest/
getether.c 46 getether(char *ifname, char *eap)
61 bcopy(&phys.current_pa[0], eap, EALEN);
81 /* eap: Ether address (output) */
82 getether(char *ifname, char *eap)
107 bcopy(&ifrnit.ifr_addr.sa_data[0], eap, EALEN);
127 /* eap: Ether address (output) */
129 getether(char *ifname, char *eap)
158 bcopy(LLADDR((struct sockaddr_dl *) &ifrp->ifr_addr), eap, EALEN);
193 /* eap: Ether address (output) */
194 getether(char *ifname, char *eap)
156 bcopy(LLADDR((struct sockaddr_dl *) &ifrp->ifr_addr), eap, EALEN); local
    [all...]
  /src/external/bsd/tcpdump/dist/
print-eap.c 21 /* \summary: Extensible Authentication Protocol (EAP) printer */
25 __RCSID("$NetBSD: print-eap.c,v 1.9 2024/09/02 16:15:31 christos Exp $");
48 { EAP_FRAME_TYPE_PACKET, "EAP packet" },
85 #define EAP_TYPE_TTLS 21 /* RFC 5281, draft-funk-eap-ttls-v0-01.txt */
111 /* RFC 5216 - EAP TLS bits */
125 /* EAP-AKA and EAP-SIM - RFC 4187 */
150 * Print EAP requests / responses
161 ndo->ndo_protocol = "eap";
167 * not put an EAP header on every packet, if reassembly ca
310 const struct eap_frame_t *eap; local
    [all...]
  /src/sys/ufs/ffs/
ffs_extattr.c 385 struct extattr *eap, *eaend; local
390 eap = (struct extattr *)ptr;
392 for (; eap < eaend; eap = EXTATTR_NEXT(eap)) {
394 if (EXTATTR_NEXT(eap) > eaend)
396 if (eap->ea_namespace != nspace || eap->ea_namelength != nlen
397 || memcmp(eap->ea_name, name, nlen) != 0)
400 *eapp = eap;
721 struct extattr *eap; local
847 struct extattr *eap, *eaend; local
911 struct extattr *eap; local
959 bcopy(EXTATTR_NEXT(eap), eap, easize - i); local
    [all...]
  /src/sys/rump/dev/lib/libpci_eap/
Makefile 14 SRCS+= eap.c
  /src/external/bsd/ppp/usr.sbin/pppd/
Makefile 16 eap.c \
17 eap-tls.c \
68 .for f in chap-md5 chap_ms eap

Completed in 38 milliseconds

1 2 3 4 5