Home
last modified time | relevance | path

Searched refs:EAP_TYPE_IDENTITY (Results 1 – 16 of 16) sorted by relevance

/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_identity.c67 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len, in eap_identity_buildReq()
88 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, in eap_identity_check()
117 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, in eap_identity_process()
162 EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, in eap_server_identity_register()
H A Deap_server.c576 if (sm->currentMethod == EAP_TYPE_IDENTITY || in SM_STATE()
1686 next = EAP_TYPE_IDENTITY; in eap_sm_Policy_getNextMethod()
1711 if (sm->m && sm->currentMethod != EAP_TYPE_IDENTITY && in eap_sm_Policy_getDecision()
1736 if (sm->user && sm->currentMethod == EAP_TYPE_IDENTITY && in eap_sm_Policy_getDecision()
1738 sm->user->methods[0].method == EAP_TYPE_IDENTITY) in eap_sm_Policy_getDecision()
1747 sm->user->methods[0].method == EAP_TYPE_IDENTITY) { in eap_sm_Policy_getDecision()
1788 return method == EAP_TYPE_IDENTITY ? TRUE : FALSE; in eap_sm_Policy_doPickUp()
H A Deap_server_ttls.c965 if (eap_ttls_phase2_eap_init(sm, data, EAP_TYPE_IDENTITY) < 0) in eap_ttls_process_phase2_eap()
H A Deap_server_peap.c1200 EAP_TYPE_IDENTITY); in eap_peap_process_msg()
H A Deap_server_fast.c1502 next_type = EAP_TYPE_IDENTITY; in eap_fast_process_phase2_start()
H A Deap_server_teap.c1666 next_type = EAP_TYPE_IDENTITY; in eap_teap_process_phase2_start()
/dragonfly/contrib/tcpdump/
H A Dprint-eap.c74 #define EAP_TYPE_IDENTITY 1 macro
90 { EAP_TYPE_IDENTITY, "Identity" },
178 case EAP_TYPE_IDENTITY: in eap_print()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_defs.h69 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */, enumerator
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Deapol_test.c202 pos[0] == EAP_TYPE_IDENTITY) { in ieee802_1x_encapsulate_radius()
714 *pos = EAP_TYPE_IDENTITY; in send_eap_request_identity()
734 case EAP_TYPE_IDENTITY: return "Identity"; in eap_type_text()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap.c1236 sm->reqMethod == EAP_TYPE_IDENTITY) in eap_peer_sm_step_received()
1240 sm->reqMethod != EAP_TYPE_IDENTITY && in eap_peer_sm_step_received()
1472 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req, in eap_sm_processIdentity()
1690 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len, in eap_sm_buildIdentity()
H A Deap_peap.c615 case EAP_TYPE_IDENTITY: in eap_peap_phase2_request()
798 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { in eap_peap_decrypt()
H A Deap_ttls.c451 case EAP_TYPE_IDENTITY: in eap_ttls_phase2_request_eap()
1057 buf[sizeof(*hdr)] = EAP_TYPE_IDENTITY; in eap_ttls_fake_identity_request()
H A Deap_fast.c433 if (*pos == EAP_TYPE_IDENTITY) { in eap_fast_phase2_request()
H A Deap_teap.c394 if (*pos == EAP_TYPE_IDENTITY) { in eap_teap_phase2_request()
/dragonfly/contrib/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c133 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req()
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dieee802_1x.c341 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY) || in ieee802_1x_learn_identity()