Searched refs:phase2 (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-13-stable/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf9 phase2="auth=MSCHAPV2"
/freebsd-13-stable/contrib/wpa/src/ap/
H A Deap_user_db.c136 size_t identity_len, int phase2)
173 hapd->tmp_eap_user.phase2 = phase2;
188 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;",
189 id_str, phase2);
202 if (user == NULL && !phase2) {
233 size_t identity_len, int phase2)
262 if (!phase2 && user->identity == NULL) {
267 if (user->phase2 == !!phase2
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dauthsrv.c53 size_t identity_len, int phase2,
60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
H A Dhostapd.h645 size_t identity_len, int phase2);
H A Dap_config.h171 int phase2; member in struct:hostapd_eap_user
/freebsd-13-stable/contrib/wpa/src/radius/
H A Dradius_server.h201 * @phase2: Whether this is for Phase 2 identity
211 int phase2, struct eap_user *user);
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf632 # phase2: Pre-configure Phase 2 (inner authentication) parameters
718 # phase2="auth=MSCHAPV2"
1250 # phase2: Phase2 (inner authentication with TLS tunnel) parameters
1257 # phase2 parameter when EAP-TLS is used within the inner tunnel):
1580 phase2="auth=MSCHAPV2"
1607 phase2="auth=MSCHAPV2"
1620 phase2="autheap=TLS"
1891 phase2="auth=PAP"
H A Dconfig.h284 * phase2 - Phase 2 (inner authentication) parameters
288 char *phase2; member in struct:wpa_cred
H A Dconfig_file.c801 STR(phase2);
988 if (cred->phase2)
989 fprintf(f, "\tphase2=\"%s\"\n", cred->phase2);
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_config.h489 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters
496 char *phase2; member in struct:eap_peer_config
604 * key2_id - Key ID for OpenSSL engine (phase2)
612 * cert2_id - Cert ID for OpenSSL engine (phase2)
620 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
H A Deap_tls_common.h52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
54 int phase2; member in struct:eap_ssl_data
H A Deap_tls_common.c152 eap_tls_params_flags(params, config->phase2);
159 struct eap_peer_config *config, int phase2)
202 if (phase2) {
203 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options");
310 data->phase2 = sm->init_phase2;
313 if (eap_tls_params_from_conf(sm, data, &params, config, data->phase2) <
321 if (data->phase2) {
1084 * @prefix: 'phase2' configuration prefix, e.g., "auth="
1102 if (config == NULL || config->phase2 == NULL)
1105 start = buf = os_strdup(config->phase2);
156 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument
[all...]
H A Deap_mschapv2.c92 int phase2; member in struct:eap_mschapv2_data
129 data->phase2 = sm->init_phase2;
474 config && config->phase2 &&
475 os_strstr(config->phase2, "mschapv2_retry=0")) {
H A Deap_ttls.c90 if (config && config->phase2) {
93 while ((token = cstr_token(config->phase2, " \t", &last))) {
132 if (os_strstr(config->phase2, "autheap=")) {
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_tls_common.h42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
44 int phase2; member in struct:eap_ssl_data
H A Deap.h36 int phase2; member in struct:eap_user
100 int phase2, struct eap_user *user);
H A Deap_server_tls.c25 int phase2; member in struct:eap_tls_data
89 data->phase2 = sm->init_phase2;
215 data->phase2) < 0)
H A Deap_i.h227 int phase2);
H A Deap_server_tls_common.c58 data->phase2 = sm->init_phase2;
89 if (data->phase2) {
H A Deap_server_eke.c33 int phase2; member in struct:eap_eke_data
95 data->phase2 = sm->init_phase2;
481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) {
H A Deap_server.c151 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
160 int phase2)
176 identity_len, phase2, user) != 0) {
1661 if (sm->user->phase2) {
159 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
/freebsd-13-stable/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h75 int phase2, struct eap_user *user);
/freebsd-13-stable/tools/regression/net80211/tkip/
H A Dtest_tkip.c131 const u_int8_t *phase2; member in struct:ciphertest
256 * Verify: phase1, phase2, frame length, frame contents.
264 } else if (memcmp(ctx->tx_rc4key, t->phase2, t->phase2_len)) {
265 printf("FAIL: encrypt phase2 botch\n");
267 t->phase2, t->phase2_len);
288 * Check reason for failure: phase1, phase2, frame data (ICV).
294 } else if (memcmp(ctx->rx_rc4key, t->phase2, t->phase2_len)) {
295 printf("FAIL: decrypt phase2 botch\n");
297 t->phase2, t->phase2_len);
/freebsd-13-stable/contrib/llvm-project/libunwind/src/
H A DUnwind-seh.cpp218 bool phase2 = (state & (_UA_SEARCH_PHASE|_UA_CLEANUP_PHASE)) == _UA_CLEANUP_PHASE; local
234 return phase2 ? _URC_INSTALL_CONTEXT : _URC_HANDLER_FOUND;
236 return phase2 ? _URC_FATAL_PHASE2_ERROR : _URC_FATAL_PHASE1_ERROR;
362 /// When \c _Unwind_RaiseException() is in phase2, it hands control
/freebsd-13-stable/contrib/wpa/hs20/client/
H A Dosu_client.c1509 const char *phase2 = NULL; local
1517 phase2 = "auth=PAP";
1519 phase2 = "auth=CHAP";
1521 phase2 = "auth=MSCHAP";
1523 phase2 = "auth=MSCHAPV2";
1525 if (!phase2) {
1530 if (set_cred_quoted(ctx->ifname, id, "phase2", phase2) < 0)
1531 wpa_printf(MSG_INFO, "Failed to set cred phase2");

Completed in 303 milliseconds

12