/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 9 phase2="auth=MSCHAPV2"
|
/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 134 size_t identity_len, int phase2) 166 hapd->tmp_eap_user.phase2 = phase2; 180 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", 181 id_str, phase2); 189 if (user == NULL && !phase2) { 217 size_t identity_len, int phase2) 246 if (!phase2 && user->identity == NULL) { 251 if (user->phase2 == !!phase2 && user->wildcard_prefix & [all...] |
authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
ap_config.h | 124 int phase2; member in struct:hostapd_eap_user
|
hostapd.h | 429 size_t identity_len, int phase2);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
WifiConfigurationHelper.java | 111 * @param phase2 The phase 2 method or null 119 Integer phase2, String identity, String anonymousIdentity, String caCert, 128 if (phase2 == null) phase2 = WifiEnterpriseConfig.Phase2.NONE; 136 config.enterpriseConfig.setPhase2Method(phase2); 161 * "password" must also be provided. If EAP is selected, then the fiels "eap", "phase2", 212 Integer phase2 = null; local 213 if (jsonConfig.has("phase2")) { 214 phase2 = getPhase2(jsonConfig.getString("phase2")) [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 180 * @phase2: Whether this is for Phase 2 identity 190 int phase2, struct eap_user *user);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap.h | 33 int phase2; member in struct:eap_user 83 int phase2, struct eap_user *user);
|
eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
eap_i.h | 201 int phase2);
|
eap_server_tls_common.c | 55 data->phase2 = sm->init_phase2; 80 if (data->phase2) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 398 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 403 char *phase2; member in struct:eap_peer_config 511 * key2_id - Key ID for OpenSSL engine (phase2) 519 * cert2_id - Cert ID for OpenSSL engine (phase2) 527 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
eap_tls_common.c | 122 eap_tls_params_flags(params, config->phase2); 129 struct eap_peer_config *config, int phase2) 144 if (phase2) { 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 247 data->phase2 = sm->init_phase2; 250 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 258 if (data->phase2) { 1016 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 1022 * for Phase2 authentication. 1034 if (config == NULL || config->phase2 == NULL [all...] |
eap_ttls.c | 82 if (config && config->phase2) { 83 if (os_strstr(config->phase2, "autheap=")) { 86 } else if (os_strstr(config->phase2, "auth=MSCHAPV2")) { 89 } else if (os_strstr(config->phase2, "auth=MSCHAP")) { 92 } else if (os_strstr(config->phase2, "auth=PAP")) { 95 } else if (os_strstr(config->phase2, "auth=CHAP")) { 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 586 * notification, so assume that Phase2 succeeds. */ 640 * so assume that Phase2 succeeds. */ 716 * notification, so assume that Phase2 succeeds. * [all...] |
eap_mschapv2.c | 92 int phase2; member in struct:eap_mschapv2_data 131 data->phase2 = sm->init_phase2;
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 311 char phase2[32]; local 312 phase2[0] = '\0'; 315 snprintf(phase2, sizeof(phase2), "auth=%s", 320 snprintf(phase2, sizeof(phase2), "autheap=%s", 324 snprintf(phase2, sizeof(phase2), "auth=%s", 329 snprintf(phase2, sizeof(phase2), "auth=%s" [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 463 # phase2: Pre-configure Phase 2 (inner authentication) parameters 547 # phase2="auth=MSCHAPV2" [all...] |
config.h | 231 * phase2 - Phase 2 (inner authentication) parameters 235 char *phase2; member in struct:wpa_cred [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 66 int phase2, struct eap_user *user);
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
filecmp.py | 138 def phase2(self): # Distinguish files, directories, funnies member in class:dircmp 231 common_dirs = phase2, common_files=phase2, common_funny=phase2,
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
filecmp.py | 138 def phase2(self): # Distinguish files, directories, funnies member in class:dircmp 231 common_dirs = phase2, common_files=phase2, common_funny=phase2,
|
/external/chromium_org/third_party/WebKit/Source/platform/audio/ |
FFTFrame.cpp | 135 double phase2 = arg(c2); local 138 double deltaPhase2 = phase2 - lastPhase2; 140 lastPhase2 = phase2;
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiEnterpriseConfig.java | 47 public static final String PHASE2_KEY = "phase2"; 239 public static final class Phase2 { 255 private Phase2() {} 275 setPhase2Method(Phase2.NONE); 302 * @param phase2Method is the inner authentication method and can be one of {@link Phase2#NONE}, 303 * {@link Phase2#PAP}, {@link Phase2#MSCHAP}, {@link Phase2#MSCHAPV2}, 304 * {@link Phase2#GTC} 305 * @throws IllegalArgumentException on an invalid phase2 metho 552 String phase2 = mFields.get(PHASE2_KEY); local [all...] |