/freebsd-13-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 136 size_t identity_len, int phase2) 173 hapd->tmp_eap_user.phase2 = phase2; 188 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", 189 id_str, phase2); 202 if (user == NULL && !phase2) { 233 size_t identity_len, int phase2) 262 if (!phase2 && user->identity == NULL) { 267 if (user->phase2 == !!phase2 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | authsrv.c | 53 size_t identity_len, int phase2, 60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | hostapd.h | 645 size_t identity_len, int phase2);
|
H A D | ap_config.h | 171 int phase2; member in struct:hostapd_eap_user
|
/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius_server.h | 201 * @phase2: Whether this is for Phase 2 identity 211 int phase2, struct eap_user *user);
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 632 # phase2: Pre-configure Phase 2 (inner authentication) parameters 718 # phase2="auth=MSCHAPV2" 1250 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 1257 # phase2 parameter when EAP-TLS is used within the inner tunnel): 1580 phase2="auth=MSCHAPV2" 1607 phase2="auth=MSCHAPV2" 1620 phase2="autheap=TLS" 1891 phase2="auth=PAP"
|
H A D | config.h | 284 * phase2 - Phase 2 (inner authentication) parameters 288 char *phase2; member in struct:wpa_cred
|
H A D | config_file.c | 801 STR(phase2); 988 if (cred->phase2) 989 fprintf(f, "\tphase2=\"%s\"\n", cred->phase2);
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 489 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 496 char *phase2; member in struct:eap_peer_config 604 * key2_id - Key ID for OpenSSL engine (phase2) 612 * cert2_id - Cert ID for OpenSSL engine (phase2) 620 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
H A D | eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
H A D | eap_tls_common.c | 152 eap_tls_params_flags(params, config->phase2); 159 struct eap_peer_config *config, int phase2) 202 if (phase2) { 203 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 310 data->phase2 = sm->init_phase2; 313 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 321 if (data->phase2) { 1084 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 1102 if (config == NULL || config->phase2 == NULL) 1105 start = buf = os_strdup(config->phase2); 156 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument [all...] |
H A D | eap_mschapv2.c | 92 int phase2; member in struct:eap_mschapv2_data 129 data->phase2 = sm->init_phase2; 474 config && config->phase2 && 475 os_strstr(config->phase2, "mschapv2_retry=0")) {
|
H A D | eap_ttls.c | 90 if (config && config->phase2) { 93 while ((token = cstr_token(config->phase2, " \t", &last))) { 132 if (os_strstr(config->phase2, "autheap=")) {
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
H A D | eap.h | 36 int phase2; member in struct:eap_user 100 int phase2, struct eap_user *user);
|
H A D | eap_server_tls.c | 25 int phase2; member in struct:eap_tls_data 89 data->phase2 = sm->init_phase2; 215 data->phase2) < 0)
|
H A D | eap_i.h | 227 int phase2);
|
H A D | eap_server_tls_common.c | 58 data->phase2 = sm->init_phase2; 89 if (data->phase2) {
|
H A D | eap_server_eke.c | 33 int phase2; member in struct:eap_eke_data 95 data->phase2 = sm->init_phase2; 481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) {
|
H A D | eap_server.c | 151 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 160 int phase2) 176 identity_len, phase2, user) != 0) { 1661 if (sm->user->phase2) { 159 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
|
/freebsd-13-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 75 int phase2, struct eap_user *user);
|
/freebsd-13-stable/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 131 const u_int8_t *phase2; member in struct:ciphertest 256 * Verify: phase1, phase2, frame length, frame contents. 264 } else if (memcmp(ctx->tx_rc4key, t->phase2, t->phase2_len)) { 265 printf("FAIL: encrypt phase2 botch\n"); 267 t->phase2, t->phase2_len); 288 * Check reason for failure: phase1, phase2, frame data (ICV). 294 } else if (memcmp(ctx->rx_rc4key, t->phase2, t->phase2_len)) { 295 printf("FAIL: decrypt phase2 botch\n"); 297 t->phase2, t->phase2_len);
|
/freebsd-13-stable/contrib/llvm-project/libunwind/src/ |
H A D | Unwind-seh.cpp | 218 bool phase2 = (state & (_UA_SEARCH_PHASE|_UA_CLEANUP_PHASE)) == _UA_CLEANUP_PHASE; local 234 return phase2 ? _URC_INSTALL_CONTEXT : _URC_HANDLER_FOUND; 236 return phase2 ? _URC_FATAL_PHASE2_ERROR : _URC_FATAL_PHASE1_ERROR; 362 /// When \c _Unwind_RaiseException() is in phase2, it hands control
|
/freebsd-13-stable/contrib/wpa/hs20/client/ |
H A D | osu_client.c | 1509 const char *phase2 = NULL; local 1517 phase2 = "auth=PAP"; 1519 phase2 = "auth=CHAP"; 1521 phase2 = "auth=MSCHAP"; 1523 phase2 = "auth=MSCHAPV2"; 1525 if (!phase2) { 1530 if (set_cred_quoted(ctx->ifname, id, "phase2", phase2) < 0) 1531 wpa_printf(MSG_INFO, "Failed to set cred phase2");
|