/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_tls_common.h | 76 u8 eap_type; member 106 struct eap_peer_config *config, u8 eap_type); 112 struct eap_ssl_data *data, u8 eap_type, 115 enum eap_type eap_type, int peap_version, 118 struct wpabuf * eap_peer_tls_build_ack(u8 id, enum eap_type eap_type, 125 enum eap_type eap_type, 135 enum eap_type eap_type, int peap_version, u8 id,
|
D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() 167 if (sm->workaround && data->eap_type != EAP_TYPE_FAST && in eap_tls_params_from_conf() 168 data->eap_type != EAP_TYPE_TEAP) { in eap_tls_params_from_conf() 180 if (data->eap_type == EAP_TYPE_TEAP) { in eap_tls_params_from_conf() 187 if (data->eap_type == EAP_TYPE_FAST || in eap_tls_params_from_conf() 188 data->eap_type == EAP_TYPE_TEAP || in eap_tls_params_from_conf() 189 data->eap_type == EAP_TYPE_TTLS || in eap_tls_params_from_conf() 190 data->eap_type == EAP_TYPE_PEAP) { in eap_tls_params_from_conf() 195 if (data->eap_type == EAP_TYPE_TLS || in eap_tls_params_from_conf() 196 data->eap_type == EAP_UNAUTH_TLS_TYPE || in eap_tls_params_from_conf() [all …]
|
D | eap_methods.h | 15 enum eap_type method); 19 enum eap_type method, 26 enum eap_type eap_peer_get_type(const char *name, int *vendor); 27 const char * eap_get_name(int vendor, enum eap_type type); 34 static inline enum eap_type eap_peer_get_type(const char *name, int *vendor) in eap_peer_get_type() 40 static inline const char * eap_get_name(int vendor, enum eap_type type) in eap_get_name()
|
D | eap_tls.c | 27 u8 eap_type; member 75 data->eap_type = EAP_TYPE_TLS; in eap_tls_init() 101 data->eap_type = EAP_UNAUTH_TLS_TYPE; in eap_unauth_tls_init() 128 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; in eap_wfa_unauth_tls_init() 175 return eap_peer_tls_build_ack(id, data->eap_type, 0); in eap_tls_failure() 276 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, in eap_tls_process() 290 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, in eap_tls_process() 318 return eap_peer_tls_build_ack(id, data->eap_type, 0); in eap_tls_process()
|
D | eap_methods.c | 31 enum eap_type method) in eap_peer_get_eap_method() 51 enum eap_type eap_peer_get_type(const char *name, int *vendor) in eap_peer_get_type() 74 const char * eap_get_name(int vendor, enum eap_type type) in eap_get_name() 283 enum eap_type method, in eap_peer_method_alloc()
|
D | eap_i.h | 75 enum eap_type method; 315 enum eap_type selectedMethod; 325 enum eap_type reqMethod;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_tls_common.c | 162 if (sm->workaround && data->eap_type != EAP_TYPE_FAST && in eap_tls_params_from_conf() 163 data->eap_type != EAP_TYPE_TEAP) { in eap_tls_params_from_conf() 175 if (data->eap_type == EAP_TYPE_TEAP) { in eap_tls_params_from_conf() 182 if (data->eap_type == EAP_TYPE_FAST || in eap_tls_params_from_conf() 183 data->eap_type == EAP_TYPE_TEAP || in eap_tls_params_from_conf() 184 data->eap_type == EAP_TYPE_TTLS || in eap_tls_params_from_conf() 185 data->eap_type == EAP_TYPE_PEAP) { in eap_tls_params_from_conf() 190 if (data->eap_type == EAP_TYPE_TLS || in eap_tls_params_from_conf() 191 data->eap_type == EAP_UNAUTH_TLS_TYPE || in eap_tls_params_from_conf() 192 data->eap_type == EAP_WFA_UNAUTH_TLS_TYPE) { in eap_tls_params_from_conf() [all …]
|
D | eap_tls_common.h | 76 u8 eap_type; member 101 struct eap_peer_config *config, u8 eap_type); 107 struct eap_ssl_data *data, u8 eap_type, 110 EapType eap_type, int peap_version, 113 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, 120 EapType eap_type, 130 EapType eap_type, int peap_version, u8 id,
|
D | eap_tls.c | 27 u8 eap_type; member 69 data->eap_type = EAP_TYPE_TLS; in eap_tls_init() 95 data->eap_type = EAP_UNAUTH_TLS_TYPE; in eap_unauth_tls_init() 122 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; in eap_wfa_unauth_tls_init() 169 return eap_peer_tls_build_ack(id, data->eap_type, 0); in eap_tls_failure() 270 pos = eap_peer_tls_process_init(sm, &data->ssl, data->eap_type, ret, in eap_tls_process() 284 res = eap_peer_tls_process_helper(sm, &data->ssl, data->eap_type, 0, in eap_tls_process() 316 return eap_peer_tls_build_ack(id, data->eap_type, 0); in eap_tls_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() 47 int verify_peer, int eap_type) in eap_server_tls_ssl_init() argument 74 if (eap_type != EAP_TYPE_FAST) in eap_server_tls_ssl_init() 77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init() 144 struct eap_ssl_data *data, u8 eap_type, in eap_server_tls_derive_session_id() argument 152 const u8 context[] = { eap_type }; in eap_server_tls_derive_session_id() 168 id[0] = eap_type; in eap_server_tls_derive_session_id() 186 out[0] = eap_type; in eap_server_tls_derive_session_id() 196 int eap_type, int version, u8 id) in eap_server_tls_build_msg() argument 223 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg() [all …]
|
D | eap_tls_common.h | 76 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, 79 int verify_peer, int eap_type); 85 struct eap_ssl_data *data, u8 eap_type, 88 int eap_type, int version, u8 id); 89 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 95 struct wpabuf *respData, void *priv, int eap_type,
|
D | eap_server_tls.c | 24 u8 eap_type; member 67 wpabuf_put_u8(buf, data->eap_type); in eap_tls_valid_session() 87 data->eap_type = EAP_TYPE_TLS; in eap_tls_init() 111 data->eap_type = EAP_UNAUTH_TLS_TYPE; in eap_unauth_tls_init() 134 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; in eap_wfa_unauth_tls_init() 155 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); in eap_tls_build_start() 177 return eap_server_tls_build_ack(id, data->eap_type, 0); in eap_tls_buildReq() 181 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, in eap_tls_buildReq() 200 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); in eap_tls_buildReq() 236 if (data->eap_type == EAP_UNAUTH_TLS_TYPE) in eap_tls_check() [all …]
|
D | eap_methods.h | 15 enum eap_type method); 17 enum eap_type method, 21 enum eap_type eap_server_get_type(const char *name, int *vendor); 23 const char * eap_server_get_name(int vendor, enum eap_type type);
|
D | eap_server_methods.c | 26 enum eap_type method) in eap_server_get_eap_method() 46 enum eap_type eap_server_get_type(const char *name, int *vendor) in eap_server_get_type() 73 enum eap_type method, in eap_server_method_alloc() 169 const char * eap_server_get_name(int vendor, enum eap_type type) in eap_server_get_name()
|
D | eap_i.h | 26 enum eap_type method; 130 enum eap_type currentMethod; 143 enum eap_type respMethod;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_tls_common.c | 47 int verify_peer, int eap_type) in eap_server_tls_ssl_init() argument 74 if (eap_type != EAP_TYPE_FAST) in eap_server_tls_ssl_init() 77 session_ctx[7] = (u8) eap_type; in eap_server_tls_ssl_init() 143 struct eap_ssl_data *data, u8 eap_type, in eap_server_tls_derive_session_id() argument 150 if (eap_type == EAP_TYPE_TLS && data->tls_v13) { in eap_server_tls_derive_session_id() 167 id[0] = eap_type; in eap_server_tls_derive_session_id() 185 out[0] = eap_type; in eap_server_tls_derive_session_id() 195 int eap_type, int version, u8 id) in eap_server_tls_build_msg() argument 222 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg() 254 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version) in eap_server_tls_build_ack() argument [all …]
|
D | eap_server_tls.c | 24 u8 eap_type; member 67 wpabuf_put_u8(buf, data->eap_type); in eap_tls_valid_session() 87 data->eap_type = EAP_TYPE_TLS; in eap_tls_init() 111 data->eap_type = EAP_UNAUTH_TLS_TYPE; in eap_unauth_tls_init() 134 data->eap_type = EAP_WFA_UNAUTH_TLS_TYPE; in eap_wfa_unauth_tls_init() 155 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id); in eap_tls_build_start() 177 return eap_server_tls_build_ack(id, data->eap_type, 0); in eap_tls_buildReq() 181 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, in eap_tls_buildReq() 199 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id); in eap_tls_buildReq() 235 if (data->eap_type == EAP_UNAUTH_TLS_TYPE) in eap_tls_check() [all …]
|
D | eap_tls_common.h | 79 int verify_peer, int eap_type); 85 struct eap_ssl_data *data, u8 eap_type, 88 int eap_type, int version, u8 id); 89 struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 95 struct wpabuf *respData, void *priv, int eap_type,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_common.h | 23 const u8 * eap_hdr_validate(int vendor, enum eap_type eap_type, 25 struct wpabuf * eap_msg_alloc(int vendor, enum eap_type type, 29 enum eap_type eap_get_type(const struct wpabuf *msg);
|
D | eap_common.c | 66 const u8 * eap_hdr_validate(int vendor, enum eap_type eap_type, in eap_hdr_validate() argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { in eap_hdr_validate() 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) { in eap_hdr_validate() 128 struct wpabuf * eap_msg_alloc(int vendor, enum eap_type type, in eap_msg_alloc() 199 enum eap_type eap_get_type(const struct wpabuf *msg) in eap_get_type()
|
D | eap_teap_common.h | 226 enum eap_type; 227 int eap_teap_allowed_anon_prov_phase2_method(int vendor, enum eap_type type);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_common.c | 66 const u8 * eap_hdr_validate(int vendor, EapType eap_type, in eap_hdr_validate() argument 93 if (exp_vendor != vendor || exp_type != (u32) eap_type) { in eap_hdr_validate() 102 if (vendor != EAP_VENDOR_IETF || *pos != eap_type) { in eap_hdr_validate()
|
D | eap_common.h | 23 const u8 * eap_hdr_validate(int vendor, EapType eap_type,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 756 int eap_type = -1; in ieee802_1x_decapsulate_radius() local 785 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)]; in ieee802_1x_decapsulate_radius() 791 eap_type >= 0 ? eap_type_text(eap_type) : "??", in ieee802_1x_decapsulate_radius() 792 eap_type); in ieee802_1x_decapsulate_radius() 796 eap_type >= 0 ? eap_type_text(eap_type) : "??", in ieee802_1x_decapsulate_radius() 797 eap_type); in ieee802_1x_decapsulate_radius()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 754 int eap_type = -1; in ieee802_1x_decapsulate_radius() local 783 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)]; in ieee802_1x_decapsulate_radius() 789 eap_type >= 0 ? eap_type_text(eap_type) : "??", in ieee802_1x_decapsulate_radius() 790 eap_type); in ieee802_1x_decapsulate_radius() 794 eap_type >= 0 ? eap_type_text(eap_type) : "??", in ieee802_1x_decapsulate_radius() 795 eap_type); in ieee802_1x_decapsulate_radius()
|