/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_wsc.c | 146 const char *phase1; in eap_wsc_init() local 184 phase1 = eap_get_config_phase1(sm); in eap_wsc_init() 185 if (phase1 == NULL) { in eap_wsc_init() 192 pos = os_strstr(phase1, "pin="); in eap_wsc_init() 206 pos = os_strstr(phase1, "pbc=1"); in eap_wsc_init() 211 pos = os_strstr(phase1, "dev_pw_id="); in eap_wsc_init() 227 pos = os_strstr(phase1, " pkhash="); in eap_wsc_init() 245 res = eap_wsc_new_ap_settings(&new_ap_settings, phase1); in eap_wsc_init()
|
D | eap_peap.c | 74 const char *phase1) in eap_peap_parse_phase1() argument 78 pos = os_strstr(phase1, "peapver="); in eap_peap_parse_phase1() 86 if (os_strstr(phase1, "peaplabel=1")) { in eap_peap_parse_phase1() 92 if (os_strstr(phase1, "peap_outer_success=0")) { in eap_peap_parse_phase1() 96 } else if (os_strstr(phase1, "peap_outer_success=1")) { in eap_peap_parse_phase1() 100 } else if (os_strstr(phase1, "peap_outer_success=2")) { in eap_peap_parse_phase1() 106 if (os_strstr(phase1, "crypto_binding=0")) { in eap_peap_parse_phase1() 109 } else if (os_strstr(phase1, "crypto_binding=1")) { in eap_peap_parse_phase1() 112 } else if (os_strstr(phase1, "crypto_binding=2")) { in eap_peap_parse_phase1() 118 if (os_strstr(phase1, "tnc=soh2")) { in eap_peap_parse_phase1() [all …]
|
D | eap_eke.c | 73 const char *phase1; in eap_eke_init() local 97 phase1 = eap_get_config_phase1(sm); in eap_eke_init() 98 if (phase1) { in eap_eke_init() 101 pos = os_strstr(phase1, "dhgroup="); in eap_eke_init() 108 pos = os_strstr(phase1, "encr="); in eap_eke_init() 115 pos = os_strstr(phase1, "prf="); in eap_eke_init() 122 pos = os_strstr(phase1, "mac="); in eap_eke_init()
|
D | eap_config.h | 432 char *phase1; member
|
D | eap_gpsk.c | 84 const char *phase1; in eap_gpsk_init() local 108 phase1 = eap_get_config_phase1(sm); in eap_gpsk_init() 109 if (phase1) { in eap_gpsk_init() 112 pos = os_strstr(phase1, "cipher="); in eap_gpsk_init()
|
D | eap_fast.c | 117 const char *phase1) in eap_fast_parse_phase1() argument 121 pos = os_strstr(phase1, "fast_provisioning="); in eap_fast_parse_phase1() 128 pos = os_strstr(phase1, "fast_max_pac_list_len="); in eap_fast_parse_phase1() 137 pos = os_strstr(phase1, "fast_pac_format=binary"); in eap_fast_parse_phase1() 160 if (config->phase1) in eap_fast_init() 161 eap_fast_parse_phase1(data, config->phase1); in eap_fast_init()
|
D | eap_tls_common.c | 109 eap_tls_params_flags(params, config->phase1); in eap_tls_params_from_conf1() 281 if (config->phase1 && in eap_peer_tls_ssl_init() 282 os_strstr(config->phase1, "include_tls_length=1")) { in eap_peer_tls_ssl_init()
|
D | eap.c | 954 return config && config->phase1 && in eap_peer_sm_allow_canned() 955 os_strstr(config->phase1, "allow_canned_success=1"); in eap_peer_sm_allow_canned() 2659 return config->phase1; in eap_get_config_phase1() 2916 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pbc=1") == NULL) in eap_is_wps_pbc_enrollee() 2929 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL) in eap_is_wps_pin_enrollee()
|
D | eap_sim.c | 97 if (config && config->phase1) { in eap_sim_init() 98 char *pos = os_strstr(config->phase1, "sim_min_num_chal="); in eap_sim_init() 114 data->result_ind = os_strstr(config->phase1, "result_ind=1") != in eap_sim_init()
|
D | eap_aka.c | 90 const char *phase1 = eap_get_config_phase1(sm); in eap_aka_init() local 102 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpa_supplicant.conf | 1323 phase1="peaplabel=1" 1455 phase1="fast_provisioning=1" 1466 phase1="fast_provisioning=1" 1560 phase1="peaplabel=0"
|
D | eap_testing.txt | 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 126 (phase1="peap_outer_success=0 peaplabel=1") (in "IETF Draft 5" mode) 321 "IETF Draft 5" mode requires phase1="peap_outer_success=0 peaplabel=1" 322 'Cisco ACU 5.05' mode works without phase1 configuration 381 - phase1="peap_outer_success=0 peaplabel=1"
|
D | config.h | 242 char *phase1; member
|
D | config_file.c | 716 STR(phase1); in wpa_config_write_network() 874 if (cred->phase1) in wpa_config_write_cred() 875 fprintf(f, "\tphase1=\"%s\"\n", cred->phase1); in wpa_config_write_cred()
|
D | config.c | 1943 { STRe(phase1) }, 2184 os_free(eap->phase1); in eap_peer_config_free() 2264 os_free(cred->phase1); in wpa_config_free_cred() 3024 os_free(cred->phase1); in wpa_config_set_cred() 3025 cred->phase1 = val; in wpa_config_set_cred() 3340 return alloc_strdup(cred->phase1); in wpa_config_get_cred_no_key()
|
D | interworking.c | 1509 if (cred->phase1) { in interworking_set_eap_params() 1510 os_free(ssid->eap.phase1); in interworking_set_eap_params() 1511 ssid->eap.phase1 = os_strdup(cred->phase1); in interworking_set_eap_params()
|
D | ChangeLog | 58 (phase1="tls_disable_tlsv1_0=1") 98 servers with phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1" 244 * added phase1 network parameter options for disabling TLS v1.1 and v1.2 1085 EAP-SIM and EAP-AKA (phase1="result_ind=1") 1164 store in a PAC list (fast_max_pac_list_len=<max> in phase1 string) 1166 (fast_pac_format=binary in phase1 string) 1748 * added new phase1 option parameter, include_tls_length=1, to force 1892 peap_outer_success=0 on phase1 parameters in wpa_supplicant.conf 1895 * PEAPv1: changed phase1 option peaplabel to use default to 0, i.e., to 1913 (phase1="sim_min_num_chal=3" can be used to require three challenges) [all …]
|
/external/libunwind_llvm/src/ |
D | Unwind-sjlj.c | 289 _Unwind_Reason_Code phase1 = unwind_phase1(exception_object); in _Unwind_SjLj_RaiseException() local 290 if (phase1 != _URC_NO_REASON) in _Unwind_SjLj_RaiseException() 291 return phase1; in _Unwind_SjLj_RaiseException()
|
D | UnwindLevel1.c | 357 _Unwind_Reason_Code phase1 = unwind_phase1(&uc, exception_object); in _Unwind_RaiseException() local 358 if (phase1 != _URC_NO_REASON) in _Unwind_RaiseException() 359 return phase1; in _Unwind_RaiseException()
|
D | Unwind-EHABI.cpp | 715 _Unwind_Reason_Code phase1 = unwind_phase1(&uc, exception_object); in _Unwind_RaiseException() local 716 if (phase1 != _URC_NO_REASON) in _Unwind_RaiseException() 717 return phase1; in _Unwind_RaiseException()
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 42 You need to copy client/racoon.conf, client/phase1-up.sh and 43 client/phase1-down.sh to /etc/racoon, and you need to copy the
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 91 phase1="peaplabel=0" 166 phase1="peaplabel=0"
|
/external/ipsec-tools/ |
D | NEWS | 11 o Phase2 message identities are phase1 specific (Vista compatibility= 15 o Remove phase1 handler immediately if first exchange is bad
|
D | ChangeLog | 57 be unique wrt phase1, not globally. 449 * src/racoon/isakmp.c: Fixed the way phase1/2 messages are 621 * src/racoon/samples/roadwarrior/client/: phase1-down.sh, 622 phase1-up.sh: update the scripts for wrorking around routing
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.in | 49 phase1 30 sec;
|