/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 59 size_t identity_len, int phase2, 65 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
ap_config.h | 118 int phase2; member in struct:hostapd_eap_user 417 size_t identity_len, int phase2);
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 171 * @phase2: Whether this is for Phase 2 identity 181 int phase2, struct eap_user *user);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 510 "starting Phase2"); 913 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s - Phase2 not " 923 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed; " 942 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 check() asked to " 950 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 method is in " 960 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 method failed"); 972 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 getKey " 985 wpa_hexdump_ascii(MSG_DEBUG, "EAP_PEAP: Phase2 " 1204 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Phase1 done, include first Phase2 " [all...] |
eap_ttls.c | 569 "starting Phase2"); 974 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: %s - Phase2 not " 984 wpa_hexdump(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 type Nak'ed; " 1010 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 check() asked to " 1018 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method is in " 1028 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method failed"); 1036 wpa_hexdump_ascii(MSG_DEBUG, "EAP_TTLS: Phase2 " [all...] |
eap_fast.c | 553 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase1 done, starting Phase2"); 978 wpa_printf(MSG_DEBUG, "EAP-FAST: %s - Phase2 not " 988 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 type Nak'ed; " 1018 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase2 check() asked to " 1030 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase2 method failed"); 1039 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Phase2 " [all...] |
eap_tls_common.c | 28 data->phase2 = sm->init_phase2; 47 if (data->phase2) {
|
eap_gtc.c | 159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
|
eap_i.h | 191 int phase2);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_peap.c | 513 "starting Phase2"); 916 wpa_printf(MSG_DEBUG, "EAP-PEAP: %s - Phase2 not " 926 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Phase2 type Nak'ed; " 945 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 check() asked to " 953 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 method is in " 963 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 method failed"); 975 wpa_printf(MSG_DEBUG, "EAP-PEAP: Phase2 getKey " 988 wpa_hexdump_ascii(MSG_DEBUG, "EAP_PEAP: Phase2 " 1180 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Phase1 done, include first Phase2 " [all...] |
eap_server_ttls.c | 547 "starting Phase2"); 952 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: %s - Phase2 not " 962 wpa_hexdump(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 type Nak'ed; " 988 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 check() asked to " 996 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method is in " 1006 wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method failed"); 1014 wpa_hexdump_ascii(MSG_DEBUG, "EAP_TTLS: Phase2 " 1170 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 Identity not " [all...] |
eap_server_fast.c | 554 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase1 done, starting Phase2"); 983 wpa_printf(MSG_DEBUG, "EAP-FAST: %s - Phase2 not " 993 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 type Nak'ed; " 1023 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase2 check() asked to " 1035 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase2 method failed"); 1044 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Phase2 " [all...] |
eap_server_tls_common.c | 31 data->phase2 = sm->init_phase2; 49 if (data->phase2) {
|
eap_i.h | 200 int phase2);
|
eap_server_gtc.c | 159 wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
|
/external/llvm/utils/release/ |
test-release.sh | 293 llvmCore_phase2_objdir=$BuildDir/Phase2/$Flavor/llvmCore-$Release-rc$RC.obj 294 llvmCore_phase2_installdir=$BuildDir/Phase2/$Flavor/llvmCore-$Release-rc$RC.install 347 # Compare .o files between Phase2 and Phase3 and report which ones differ. 351 p3=`echo $o | sed -e 's,Phase2,Phase3,'`
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 92 phase2="auth=MSCHAPV2" 114 phase2="auth=MD5"
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 366 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 371 char *phase2; member in struct:eap_peer_config 479 * key2_id - Key ID for OpenSSL engine (phase2) 487 * cert2_id - Cert ID for OpenSSL engine (phase2) 495 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
eap_ttls.c | 110 if (config && config->phase2) { 111 if (os_strstr(config->phase2, "autheap=")) { 114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 117 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 120 } else if (os_strstr(config->phase2, "auth=PAP")) { 123 } else if (os_strstr(config->phase2, "auth=CHAP")) { 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 803 * notification, so assume that Phase2 succeeds. */ 864 * so assume that Phase2 succeeds. */ 947 * notification, so assume that Phase2 succeeds. * [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 375 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 380 char *phase2; member in struct:eap_peer_config 488 * key2_id - Key ID for OpenSSL engine (phase2) 496 * cert2_id - Cert ID for OpenSSL engine (phase2) 504 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
eap_ttls.c | 110 if (config && config->phase2) { 111 if (os_strstr(config->phase2, "autheap=")) { 114 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 117 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 120 } else if (os_strstr(config->phase2, "auth=PAP")) { 123 } else if (os_strstr(config->phase2, "auth=CHAP")) { 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 808 * notification, so assume that Phase2 succeeds. */ 869 * so assume that Phase2 succeeds. */ 952 * notification, so assume that Phase2 succeeds. * [all...] |
/external/wpa_supplicant/ |
eap_tls_common.c | 82 struct wpa_ssid *config, int phase2) 86 if (phase2) 171 data->phase2 = sm->init_phase2; 172 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 180 if (data->phase2) {
|
wpa_supplicant.conf.orig | 379 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 382 # Following certificate/private key fields are used in inner Phase2 493 # phase2="auth=MSCHAPV2" 520 # phase2="auth=MSCHAPV2" 533 # phase2="autheap=TLS"
|
eap_tlv.c | 177 "- EAP-TLV/Phase2 Completed");
|
/external/ipsec-tools/src/racoon/ |
isakmp.c | 715 "phase2 negotiation failed.\n"); 1026 "phase2", [all...] |