HomeSort by: relevance | last modified time | path
    Searched refs:phase1 (Results 1 - 25 of 25) sorted by relevancy

  /src/external/lgpl2/userspace-rcu/dist/tests/benchmark/
runpaul-phase5.sh 7 sh runpaul-phase1.sh
8 mkdir runpaul-phase1
9 mv *.log runpaul-phase1/
runpaul-phase6.sh 5 sh runpaul-phase1.sh
6 mkdir runpaul-phase1
7 mv *.log runpaul-phase1/
  /src/share/examples/racoon/roadwarrior/client/
Makefile 8 FILES= phase1-down.sh phase1-up.sh racoon.conf
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 739 # phase1: Pre-configure Phase 1 (outer authentication) parameters
1354 # phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
1405 # (these are normally in the phase1 parameter, but can be used also in the
1502 # phase1: fast_provisioning option can be used to enable in-line provisioning
1831 phase1="peaplabel=1"
1868 # Phase1 / outer authentication
1963 phase1="fast_provisioning=1"
1974 phase1="fast_provisioning=1"
2068 phase1="peaplabel=0
    [all...]
wps_supplicant.c 455 os_free(ssid->eap.phase1);
456 ssid->eap.phase1 = NULL;
1168 char phase1[32]; local
1212 os_snprintf(phase1, sizeof(phase1), "pbc=1 multi_ap=%d",
1215 os_snprintf(phase1, sizeof(phase1), "pbc=1");
1216 if (wpa_config_set_quoted(ssid, "phase1", phase1) < 0)
1320 if (wpa_config_set(ssid, "phase1", val, 0) < 0)
    [all...]
config.h 340 * phase1 - Phase 1 (outer authentication) parameters
344 char *phase1; member in struct:wpa_cred
config_file.c 736 STR(phase1);
946 if (cred->phase1)
947 fprintf(f, "\tphase1=\"%s\"\n", cred->phase1);
config.c 2577 { STRe(phase1, phase1) },
2900 os_free(eap->phase1);
2988 os_free(cred->phase1);
3909 if (os_strcmp(var, "phase1") == 0) {
3910 os_free(cred->phase1);
3911 cred->phase1 = val;
4287 if (os_strcmp(var, "phase1") == 0)
4288 return alloc_strdup(cred->phase1);
config_winreg.c 920 STR(phase1);
interworking.c 1597 if (cred->phase1) {
1598 os_free(ssid->eap.phase1);
1599 ssid->eap.phase1 = os_strdup(cred->phase1);
1923 if (wpa_config_set(ssid, "phase1", "\"fast_provisioning=2\"",
scan.c 64 if (ssid->eap.phase1 && os_strstr(ssid->eap.phase1, "pbc=1"))
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 422 * phase1 - Phase 1 (outer authentication) parameters
495 char *phase1; member in struct:eap_peer_config
eap_wsc.c 146 const char *phase1; local
184 phase1 = eap_get_config_phase1(sm);
185 if (phase1 == NULL) {
186 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not "
192 pos = os_strstr(phase1, "pin=");
206 pos = os_strstr(phase1, "pbc=1");
211 pos = os_strstr(phase1, "dev_pw_id=");
221 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1 "
227 pos = os_strstr(phase1, " pkhash=");
245 res = eap_wsc_new_ap_settings(&new_ap_settings, phase1);
    [all...]
eap_peap.c 75 const char *phase1)
79 pos = os_strstr(phase1, "peapver=");
87 if (os_strstr(phase1, "peaplabel=1")) {
93 if (os_strstr(phase1, "peap_outer_success=0")) {
97 } else if (os_strstr(phase1, "peap_outer_success=1")) {
101 } else if (os_strstr(phase1, "peap_outer_success=2")) {
107 if (os_strstr(phase1, "crypto_binding=0")) {
110 } else if (os_strstr(phase1, "crypto_binding=1")) {
113 } else if (os_strstr(phase1, "crypto_binding=2")) {
118 if (os_strstr(phase1, "phase2_auth=0"))
    [all...]
eap_eke.c 73 const char *phase1; local
96 phase1 = eap_get_config_phase1(sm);
97 if (phase1) {
100 pos = os_strstr(phase1, "dhgroup=");
107 pos = os_strstr(phase1, "encr=");
114 pos = os_strstr(phase1, "prf=");
121 pos = os_strstr(phase1, "mac=");
eap_gpsk.c 84 const char *phase1; local
107 phase1 = eap_get_config_phase1(sm);
108 if (phase1) {
111 pos = os_strstr(phase1, "cipher=");
eap_pwd.c 99 const char *phase1; local
137 phase1 = eap_get_config_phase1(sm);
138 if (phase1) {
143 pos = os_strstr(phase1, "eap_pwd_groups=");
eap_teap.c 120 const char *phase1)
124 pos = os_strstr(phase1, "teap_provisioning=");
132 pos = os_strstr(phase1, "teap_max_pac_list_len=");
141 if (os_strstr(phase1, "teap_pac_format=binary")) {
148 if (os_strstr(phase1, "teap_test_outer_tlvs=1"))
168 if (config->phase1)
169 eap_teap_parse_phase1(data, config->phase1);
eap_fast.c 117 const char *phase1)
121 pos = os_strstr(phase1, "fast_provisioning=");
128 pos = os_strstr(phase1, "fast_max_pac_list_len=");
137 pos = os_strstr(phase1, "fast_pac_format=binary");
160 if (config->phase1)
161 eap_fast_parse_phase1(data, config->phase1);
eap_ttls.c 74 const char *phase1)
76 if (os_strstr(phase1, "phase2_auth=0")) {
80 } else if (os_strstr(phase1, "phase2_auth=1")) {
84 } else if (os_strstr(phase1, "phase2_auth=2")) {
108 if (config && config->phase1)
109 eap_ttls_parse_phase1(data, config->phase1);
eap_tls_common.c 144 eap_tls_params_flags(params, config->phase1);
219 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options");
340 if (config->phase1 &&
341 os_strstr(config->phase1, "include_tls_length=1")) {
eap.c 1216 return config && config->phase1 &&
1217 os_strstr(config->phase1, "allow_canned_success=1");
2183 "TLS handshake failed due to the server not supporting safe renegotiation (RFC 5746); phase1 parameter allow_unsafe_renegotiation=1 can be used to work around this");
2982 * eap_get_config_phase1 - Get phase1 data from the network configuration
2984 * Returns: Pointer to the phase1 data or %NULL if not found
2991 return config->phase1;
2998 * Returns: Pointer to the phase1 data or %NULL if not found
3248 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pbc=1") == NULL)
3261 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL
    [all...]
eap_sim.c 127 if (config && config->phase1) {
128 char *pos = os_strstr(config->phase1, "sim_min_num_chal=");
147 data->result_ind = os_strstr(config->phase1, "result_ind=1") !=
eap_aka.c 97 const char *phase1 = eap_get_config_phase1(sm); local
131 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL;
  /src/sys/lib/libunwind/
libunwind.cxx 203 _Unwind_Reason_Code phase1 = unwind_phase1(cursor1, exc); local
204 if (phase1 != _URC_NO_REASON)
205 return phase1;

Completed in 63 milliseconds