/freebsd-10.1-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/freebsd-10.1-release/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 132 size_t identity_len, int phase2) 162 hapd->tmp_eap_user.phase2 = phase2; 177 "identity='%s' AND phase2=%d;", id_str, phase2); 185 if (user == NULL && !phase2) { 213 size_t identity_len, int phase2) 242 if (!phase2 && user->identity == NULL) { 247 if (user->phase2 == !!phase2 131 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 212 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | hostapd.h | 307 size_t identity_len, int phase2);
|
H A D | ap_config.h | 122 int phase2; member in struct:hostapd_eap_user
|
H A D | ieee802_1x.c | 1695 size_t identity_len, int phase2, 1702 eap_user = hostapd_get_eap_user(hapd, identity, identity_len, phase2); 1707 user->phase2 = phase2; 1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/freebsd-10.1-release/contrib/wpa/src/radius/ |
H A D | radius_server.h | 165 * @phase2: Whether this is for Phase 2 identity 175 int phase2, struct eap_user *user);
|
H A D | radius_server.c | 256 * @phase2: Whether this is for Phase 2 identity 266 int phase2, struct eap_user *user); 1474 size_t identity_len, int phase2, 1481 phase2, user); 1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | link_test.c | 74 size_t identity_len, int phase2) 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | eap.h | 33 int phase2; member in struct:eap_user 80 int phase2, struct eap_user *user);
|
H A D | eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
H A D | eap_i.h | 194 int phase2);
|
H A D | eap_server_tls_common.c | 37 data->phase2 = sm->init_phase2; 55 if (data->phase2) {
|
H A D | eap_server.c | 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 94 int phase2) 110 identity_len, phase2, user) != 0) { 1067 if (sm->user->phase2) { 93 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
|
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 380 # phase2: Pre-configure Phase 2 (inner authentication) parameters 411 # phase2="auth=MSCHAPV2" 727 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 733 # phase2 parameter when EAP-TLS is used within the inner tunnel): 913 phase2="auth=MSCHAPV2" 940 phase2="auth=MSCHAPV2" 953 phase2="autheap=TLS"
|
H A D | config.h | 194 * phase2 - Phase 2 (inner authentication) parameters 198 char *phase2; member in struct:wpa_cred
|
H A D | config_file.c | 655 STR(phase2); 744 if (cred->phase2) 745 fprintf(f, "\tphase2=\"%s\"\n", cred->phase2);
|
H A D | interworking.c | 1113 if (cred->phase2) { 1114 os_free(ssid->eap.phase2); 1115 ssid->eap.phase2 = os_strdup(cred->phase2); 1277 if (wpa_config_set(ssid, "phase2", buf, 0) < 0) 1283 if (wpa_config_set(ssid, "phase2", "\"auth=PAP\"", 0) < 1288 if (wpa_config_set(ssid, "phase2", "\"auth=CHAP\"", 0) 1293 if (wpa_config_set(ssid, "phase2", "\"auth=MSCHAP\"", 1298 if (wpa_config_set(ssid, "phase2", "\"auth=MSCHAPV2\"", 1304 if (wpa_config_set(ssid, "phase2", "\"aut [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 372 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 377 char *phase2; member in struct:eap_peer_config 485 * key2_id - Key ID for OpenSSL engine (phase2) 493 * cert2_id - Cert ID for OpenSSL engine (phase2) 501 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
H A D | eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
H A D | eap_tls_common.c | 108 eap_tls_params_flags(params, config->phase2); 115 struct eap_peer_config *config, int phase2) 130 if (phase2) { 131 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 229 data->phase2 = sm->init_phase2; 232 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 240 if (data->phase2) { 948 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 966 if (config == NULL || config->phase2 == NULL) 969 start = buf = os_strdup(config->phase2); 112 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument [all...] |
H A D | eap_ttls.c | 80 if (config && config->phase2) { 81 if (os_strstr(config->phase2, "autheap=")) { 84 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 87 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 90 } else if (os_strstr(config->phase2, "auth=PAP")) { 93 } else if (os_strstr(config->phase2, "auth=CHAP")) {
|
H A D | eap_mschapv2.c | 92 int phase2; member in struct:eap_mschapv2_data 131 data->phase2 = sm->init_phase2;
|
/freebsd-10.1-release/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 63 int phase2, struct eap_user *user);
|
/freebsd-10.1-release/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 130 const u_int8_t *phase2; member in struct:ciphertest 255 * Verify: phase1, phase2, frame length, frame contents. 263 } else if (memcmp(ctx->tx_rc4key, t->phase2, t->phase2_len)) { 264 printf("FAIL: encrypt phase2 botch\n"); 266 t->phase2, t->phase2_len); 287 * Check reason for failure: phase1, phase2, frame data (ICV). 293 } else if (memcmp(ctx->rx_rc4key, t->phase2, t->phase2_len)) { 294 printf("FAIL: decrypt phase2 botch\n"); 296 t->phase2, t->phase2_len);
|