/freebsd-9.3-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_server.h | 164 * @phase2: Whether this is for Phase 2 identity 174 int phase2, struct eap_user *user);
|
H A D | radius_server.c | 255 * @phase2: Whether this is for Phase 2 identity 265 int phase2, struct eap_user *user); 1445 size_t identity_len, int phase2, 1452 phase2, user); 1444 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | link_test.c | 74 size_t identity_len, int phase2) 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap.h | 41 int phase2; member in struct:eap_user 88 int phase2, struct eap_user *user);
|
H A D | eap_tls_common.h | 48 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 50 int phase2; member in struct:eap_ssl_data
|
H A D | eap_i.h | 193 int phase2);
|
H A D | eap_server_tls_common.c | 31 data->phase2 = sm->init_phase2; 50 if (data->phase2) {
|
H A D | eap_server.c | 91 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 100 int phase2) 116 identity_len, phase2, user) != 0) { 1051 if (sm->user->phase2) { 99 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 496 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 615 phase2="auth=MSCHAPV2" 642 phase2="auth=MSCHAPV2" 655 phase2="autheap=TLS"
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_config.h | 375 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 380 char *phase2; member in struct:eap_peer_config 488 * key2_id - Key ID for OpenSSL engine (phase2) 496 * cert2_id - Cert ID for OpenSSL engine (phase2) 504 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
H A D | eap_tls_common.c | 98 eap_tls_params_flags(params, config->phase2); 105 struct eap_peer_config *config, int phase2) 108 if (phase2) { 109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 206 data->phase2 = sm->init_phase2; 207 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 215 if (data->phase2) { 905 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 923 if (config == NULL || config->phase2 == NULL) 926 start = buf = os_strdup(config->phase2); 102 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument [all...] |
H A D | eap_tls_common.h | 58 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 60 int phase2; member in struct:eap_ssl_data
|
H A D | eap_ttls.c | 110 if (config && config->phase2) { 111 if (os_strstr(config->phase2, "autheap=")) { 114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 117 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 120 } else if (os_strstr(config->phase2, "auth=PAP")) { 123 } else if (os_strstr(config->phase2, "auth=CHAP")) {
|
H A D | eap_mschapv2.c | 97 int phase2; member in struct:eap_mschapv2_data 136 data->phase2 = sm->init_phase2;
|
/freebsd-9.3-release/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 66 int phase2, struct eap_user *user);
|
H A D | eapol_auth_sm.c | 989 size_t identity_len, int phase2, 994 identity_len, phase2, user); 988 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/freebsd-9.3-release/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 130 const u_int8_t *phase2; member in struct:ciphertest 255 * Verify: phase1, phase2, frame length, frame contents. 263 } else if (memcmp(ctx->tx_rc4key, t->phase2, t->phase2_len)) { 264 printf("FAIL: encrypt phase2 botch\n"); 266 t->phase2, t->phase2_len); 287 * Check reason for failure: phase1, phase2, frame data (ICV). 293 } else if (memcmp(ctx->rx_rc4key, t->phase2, t->phase2_len)) { 294 printf("FAIL: decrypt phase2 botch\n"); 296 t->phase2, t->phase2_len);
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ap_config.c | 556 size_t identity_len, int phase2) 584 if (!phase2 && user->identity == NULL) { 589 if (user->phase2 == !!phase2 && user->wildcard_prefix && 597 if (user->phase2 == !!phase2 && 555 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
|
H A D | ap_config.h | 117 int phase2; member in struct:hostapd_eap_user 394 size_t identity_len, int phase2);
|
H A D | authsrv.c | 59 size_t identity_len, int phase2, 65 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 58 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | ieee802_1x.c | 1512 size_t identity_len, int phase2, 1520 identity_len, phase2); 1525 user->phase2 = phase2; 1511 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/freebsd-9.3-release/sys/gnu/fs/xfs/ |
H A D | xfs_iomap.c | 234 goto phase2; 260 phase2:
|
/freebsd-9.3-release/sys/netatalk/ |
H A D | aarp.c | 72 #include <netatalk/phase2.h>
|
/freebsd-9.3-release/contrib/wpa/hostapd/ |
H A D | config_file.c | 365 user->phase2 = 1; 445 user->phase2 = 1;
|