Searched refs:phase2 (Results 1 - 25 of 28) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf9 phase2="auth=MSCHAPV2"
/freebsd-9.3-release/contrib/wpa/src/radius/
H A Dradius_server.h164 * @phase2: Whether this is for Phase 2 identity
174 int phase2, struct eap_user *user);
H A Dradius_server.c255 * @phase2: Whether this is for Phase 2 identity
265 int phase2, struct eap_user *user);
1445 size_t identity_len, int phase2,
1452 phase2, user);
1444 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/tests/
H A Dlink_test.c74 size_t identity_len, int phase2)
73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap.h41 int phase2; member in struct:eap_user
88 int phase2, struct eap_user *user);
H A Deap_tls_common.h48 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
50 int phase2; member in struct:eap_ssl_data
H A Deap_i.h193 int phase2);
H A Deap_server_tls_common.c31 data->phase2 = sm->init_phase2;
50 if (data->phase2) {
H A Deap_server.c91 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
100 int phase2)
116 identity_len, phase2, user) != 0) {
1051 if (sm->user->phase2) {
99 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf496 # phase2: Phase2 (inner authentication with TLS tunnel) parameters
615 phase2="auth=MSCHAPV2"
642 phase2="auth=MSCHAPV2"
655 phase2="autheap=TLS"
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_config.h375 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters
380 char *phase2; member in struct:eap_peer_config
488 * key2_id - Key ID for OpenSSL engine (phase2)
496 * cert2_id - Cert ID for OpenSSL engine (phase2)
504 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
H A Deap_tls_common.c98 eap_tls_params_flags(params, config->phase2);
105 struct eap_peer_config *config, int phase2)
108 if (phase2) {
109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options");
206 data->phase2 = sm->init_phase2;
207 if (eap_tls_params_from_conf(sm, data, &params, config, data->phase2) <
215 if (data->phase2) {
905 * @prefix: 'phase2' configuration prefix, e.g., "auth="
923 if (config == NULL || config->phase2 == NULL)
926 start = buf = os_strdup(config->phase2);
102 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument
[all...]
H A Deap_tls_common.h58 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
60 int phase2; member in struct:eap_ssl_data
H A Deap_ttls.c110 if (config && config->phase2) {
111 if (os_strstr(config->phase2, "autheap=")) {
114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) {
117 } else if (os_strstr(config->phase2, "auth=MSCHAP")) {
120 } else if (os_strstr(config->phase2, "auth=PAP")) {
123 } else if (os_strstr(config->phase2, "auth=CHAP")) {
H A Deap_mschapv2.c97 int phase2; member in struct:eap_mschapv2_data
136 data->phase2 = sm->init_phase2;
/freebsd-9.3-release/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h66 int phase2, struct eap_user *user);
H A Deapol_auth_sm.c989 size_t identity_len, int phase2,
994 identity_len, phase2, user);
988 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/freebsd-9.3-release/tools/regression/net80211/tkip/
H A Dtest_tkip.c130 const u_int8_t *phase2; member in struct:ciphertest
255 * Verify: phase1, phase2, frame length, frame contents.
263 } else if (memcmp(ctx->tx_rc4key, t->phase2, t->phase2_len)) {
264 printf("FAIL: encrypt phase2 botch\n");
266 t->phase2, t->phase2_len);
287 * Check reason for failure: phase1, phase2, frame data (ICV).
293 } else if (memcmp(ctx->rx_rc4key, t->phase2, t->phase2_len)) {
294 printf("FAIL: decrypt phase2 botch\n");
296 t->phase2, t->phase2_len);
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dap_config.c556 size_t identity_len, int phase2)
584 if (!phase2 && user->identity == NULL) {
589 if (user->phase2 == !!phase2 && user->wildcard_prefix &&
597 if (user->phase2 == !!phase2 &&
555 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
H A Dap_config.h117 int phase2; member in struct:hostapd_eap_user
394 size_t identity_len, int phase2);
H A Dauthsrv.c59 size_t identity_len, int phase2,
65 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
58 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
H A Dieee802_1x.c1512 size_t identity_len, int phase2,
1520 identity_len, phase2);
1525 user->phase2 = phase2;
1511 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/freebsd-9.3-release/sys/gnu/fs/xfs/
H A Dxfs_iomap.c234 goto phase2;
260 phase2:
/freebsd-9.3-release/sys/netatalk/
H A Daarp.c72 #include <netatalk/phase2.h>
/freebsd-9.3-release/contrib/wpa/hostapd/
H A Dconfig_file.c365 user->phase2 = 1;
445 user->phase2 = 1;

Completed in 174 milliseconds

12