/frameworks/base/core/tests/ConnectivityManagerTest/assets/ |
accesspoints.xml | 30 <phase2>MSCHAPV2</phase2>
|
/external/wpa_supplicant/examples/ |
ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_tls_common.h | 48 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 50 int phase2; member in struct:eap_ssl_data
|
eap.h | 41 int phase2; member in struct:eap_user 88 int phase2, struct eap_user *user);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert, 59 * <phase2>MSCHAP2</phase2> 114 boolean phase2 = false; 142 if (tagName.equalsIgnoreCase("phase2")) { 143 phase2 = true; 215 config.phase2.setValue(""); 261 if (phase2) { 263 config.phase2.setValue("auth=" + phase2Value); 264 phase2 = false [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.h | 41 int phase2; member in struct:eap_user 88 int phase2, struct eap_user *user);
|
eap_tls_common.h | 23 int phase2; member in struct:eap_ssl_data
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 298 char phase2[32]; local 299 phase2[0] = '\0'; 302 snprintf(phase2, sizeof(phase2), "auth=%s", 307 snprintf(phase2, sizeof(phase2), "autheap=%s", 311 snprintf(phase2, sizeof(phase2), "auth=%s", 316 snprintf(phase2, sizeof(phase2), "auth=%s" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.h | 58 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 60 int phase2; member in struct:eap_ssl_data
|
eap_tls_common.c | 98 eap_tls_params_flags(params, config->phase2); 105 struct eap_peer_config *config, int phase2) 108 if (phase2) { 109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 206 data->phase2 = sm->init_phase2; 207 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 215 if (data->phase2) { 906 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 912 * for Phase2 authentication. 924 if (config == NULL || config->phase2 == NULL [all...] |
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 317 char phase2[32]; local 318 phase2[0] = '\0'; 321 snprintf(phase2, sizeof(phase2), "auth=%s", 326 snprintf(phase2, sizeof(phase2), "autheap=%s", 330 snprintf(phase2, sizeof(phase2), "auth=%s", 335 snprintf(phase2, sizeof(phase2), "auth=%s" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.h | 39 int phase2, struct eap_user *user);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.h | 68 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 70 int phase2; member in struct:eap_ssl_data
|
eap_tls_common.c | 98 eap_tls_params_flags(params, config->phase2); 105 struct eap_peer_config *config, int phase2) 108 if (phase2) { 109 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 202 data->phase2 = sm->init_phase2; 203 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 211 if (data->phase2) { 949 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 955 * for Phase2 authentication. 967 if (config == NULL || config->phase2 == NULL [all...] |
/external/wpa_supplicant/ |
eap_tls_common.h | 30 int phase2; member in struct:eap_ssl_data
|
eap_ttls.c | 99 if (config && config->phase2) { 100 if (os_strstr(config->phase2, "autheap=")) { 103 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 106 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 109 } else if (os_strstr(config->phase2, "auth=PAP")) { 112 } else if (os_strstr(config->phase2, "auth=CHAP")) { 117 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 120 if (config && config->phase2) { 125 start = buf = os_strdup(config->phase2); 148 "Unsupported Phase2 EAP [all...] |
eap_peap.c | 111 if (config && config->phase2) { 116 start = buf = os_strdup(config->phase2); 139 "Phase2 method '%s'", start); 167 wpa_printf(MSG_ERROR, "EAP-PEAP: No Phase2 method available"); 171 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 EAP types", 251 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Allowed Phase2 EAP types", 548 wpa_printf(MSG_INFO, "EAP-PEAP: Phase2 Request " 834 "EAP-PEAPv%d Phase2 method=%s\n",
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 69 int phase2, struct eap_user *user);
|
/external/wpa_supplicant_8/src/ap/ |
ap_config.c | 578 size_t identity_len, int phase2) 606 if (!phase2 && user->identity == NULL) { 611 if (user->phase2 == !!phase2 && user->wildcard_prefix && 619 if (user->phase2 == !!phase2 &&
|
/external/webkit/Source/WebCore/platform/audio/ |
FFTFrame.cpp | 133 double phase2 = arg(c2); local 136 double deltaPhase2 = phase2 - lastPhase2; 138 lastPhase2 = phase2;
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.in | 50 phase2 15 sec;
|