/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.c | 90 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 99 int phase2) 115 identity_len, phase2, user) != 0) { 1035 if (sm->user->phase2) { 1036 wpa_printf(MSG_DEBUG, "EAP: EAP-Nak received after Phase2 user" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 457 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 460 # Following certificate/private key fields are used in inner Phase2 576 phase2="auth=MSCHAPV2" 603 phase2="auth=MSCHAPV2" 616 phase2="autheap=TLS"
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 91 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 100 int phase2) 116 identity_len, phase2, user) != 0) { 1051 if (sm->user->phase2) { 1052 wpa_printf(MSG_DEBUG, "EAP: EAP-Nak received after Phase2 user" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf.orig | 509 # phase2: Phase2 (inner authentication with TLS tunnel) parameters 512 # Following certificate/private key fields are used in inner Phase2 628 phase2="auth=MSCHAPV2" 655 phase2="auth=MSCHAPV2" 668 phase2="autheap=TLS" [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 637 if (config && config->phase2) { 642 start = buf = os_strdup(config->phase2); 665 "Phase2 method '%s'", start); 693 wpa_printf(MSG_ERROR, "EAP-FAST: No Phase2 method available"); 697 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Phase2 EAP types", 802 wpa_hexdump(MSG_DEBUG, "EAP-FAST: Allowed Phase2 EAP types", [all...] |
config_ssid.h | 530 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 535 char *phase2; member in struct:wpa_ssid
|
eap_mschapv2.c | 100 int phase2; member in struct:eap_mschapv2_data 143 data->phase2 = sm->init_phase2;
|
/external/ipsec-tools/src/racoon/ |
handler.c | 692 * create new isakmp Phase 2 status record to handle isakmp in Phase2 782 * delete new isakmp Phase 2 status record to handle isakmp in Phase2 826 * create new isakmp Phase 2 status record to handle isakmp in Phase2 958 * create new isakmp Phase 2 status record to handle isakmp in Phase2
|
isakmp_inf.c | 429 * phase1 / phase2 handle, and send an event to racoonctl. 433 * Phase2 error notifications should be encrypted, so we could handle 1224 * delete all phase2 sa relatived to the destination address 1225 * (except the phase2 within which the INITIAL-CONTACT was received). [all...] |
/external/ipsec-tools/ |
ChangeLog | 158 * src/racoon/admin.c: Use separate SA addresses for phase2's 159 created by admin command. The phase2 startup overwrites src/dst with 328 the patch: iterate only on the phase2 handles that are bound by the 420 isakmp_var.h, pfkey.c: When rekeying phase2 use phase1 used to 421 negotiate phase2 as a hint to select the phase1 for rekeying the new 422 phase2. 552 phase two handler. Otherwise phase2 rekeying might fail in some 584 * src/racoon/handler.c: From Paul Moore: Phase2 message id's should 686 * src/racoon/isakmp_quick.c: From Arnaud Ebalard: Set phase2 spid [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
WifiConfiguration.java | 75 public EnterpriseField phase2 = new EnterpriseField("phase2"); field in class:WifiConfiguration 91 eap, phase2, identity, anonymous_identity, password, client_cert,
|
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 360 config.phase2.setValue((mPhase2Spinner.getSelectedItemPosition() == 0) ? "" : 544 mPhase2Spinner = (Spinner) mView.findViewById(R.id.phase2); 556 setSelection(mPhase2Spinner, config.phase2.value());
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.c | 101 int phase2, struct eap_user *user); 1245 size_t identity_len, int phase2, 1252 phase2, user);
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 262 * @phase2: Whether this is for Phase 2 identity 272 int phase2, struct eap_user *user); [all...] |
/packages/apps/Settings/res/layout/ |
wifi_config_preference.xml | 122 <Spinner android:id="@+id/phase2"
|
wifi_dialog.xml | 84 <Spinner android:id="@+id/phase2"
|
/external/llvm/docs/ |
LinkTimeOptimization.html | 23 <li><a href="#phase2">Phase 2 : Symbol Resolution</a></li> 230 <a name="phase2">Phase 2 : Symbol Resolution</a>
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 97 int phase2; member in struct:eap_mschapv2_data 136 data->phase2 = sm->init_phase2;
|
eap_fast.c | 364 "during unauthenticated provisioning; reject phase2" 572 wpa_printf(MSG_INFO, "EAP-FAST: Phase2 Request processing " [all...] |
eap_peap.c | 554 "- EAP-TLV/Phase2 Completed"); 916 wpa_printf(MSG_INFO, "EAP-PEAP: Phase2 Request " [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 98 int phase2; member in struct:eap_mschapv2_data 137 data->phase2 = sm->init_phase2;
|
eap_fast.c | 364 "during unauthenticated provisioning; reject phase2" 572 wpa_printf(MSG_INFO, "EAP-FAST: Phase2 Request processing " [all...] |
eap_peap.c | 554 "- EAP-TLV/Phase2 Completed"); 916 wpa_printf(MSG_INFO, "EAP-PEAP: Phase2 Request " [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 994 size_t identity_len, int phase2, 999 identity_len, phase2, user);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | [all...] |