| /src/external/lgpl2/userspace-rcu/dist/tests/benchmark/ |
| runpaul-phase5.sh | 7 sh runpaul-phase1.sh 8 mkdir runpaul-phase1 9 mv *.log runpaul-phase1/
|
| runpaul-phase6.sh | 5 sh runpaul-phase1.sh 6 mkdir runpaul-phase1 7 mv *.log runpaul-phase1/
|
| /src/share/examples/racoon/roadwarrior/client/ |
| Makefile | 8 FILES= phase1-down.sh phase1-up.sh racoon.conf
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_supplicant.conf | 739 # phase1: Pre-configure Phase 1 (outer authentication) parameters 1354 # phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters 1405 # (these are normally in the phase1 parameter, but can be used also in the 1502 # phase1: fast_provisioning option can be used to enable in-line provisioning 1831 phase1="peaplabel=1" 1868 # Phase1 / outer authentication 1963 phase1="fast_provisioning=1" 1974 phase1="fast_provisioning=1" 2068 phase1="peaplabel=0 [all...] |
| wps_supplicant.c | 455 os_free(ssid->eap.phase1); 456 ssid->eap.phase1 = NULL; 1168 char phase1[32]; local 1212 os_snprintf(phase1, sizeof(phase1), "pbc=1 multi_ap=%d", 1215 os_snprintf(phase1, sizeof(phase1), "pbc=1"); 1216 if (wpa_config_set_quoted(ssid, "phase1", phase1) < 0) 1320 if (wpa_config_set(ssid, "phase1", val, 0) < 0) [all...] |
| config.h | 340 * phase1 - Phase 1 (outer authentication) parameters 344 char *phase1; member in struct:wpa_cred
|
| config_file.c | 736 STR(phase1); 946 if (cred->phase1) 947 fprintf(f, "\tphase1=\"%s\"\n", cred->phase1);
|
| config.c | 2577 { STRe(phase1, phase1) }, 2900 os_free(eap->phase1); 2988 os_free(cred->phase1); 3909 if (os_strcmp(var, "phase1") == 0) { 3910 os_free(cred->phase1); 3911 cred->phase1 = val; 4287 if (os_strcmp(var, "phase1") == 0) 4288 return alloc_strdup(cred->phase1);
|
| config_winreg.c | 920 STR(phase1);
|
| interworking.c | 1597 if (cred->phase1) { 1598 os_free(ssid->eap.phase1); 1599 ssid->eap.phase1 = os_strdup(cred->phase1); 1923 if (wpa_config_set(ssid, "phase1", "\"fast_provisioning=2\"",
|
| scan.c | 64 if (ssid->eap.phase1 && os_strstr(ssid->eap.phase1, "pbc=1"))
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_config.h | 422 * phase1 - Phase 1 (outer authentication) parameters 495 char *phase1; member in struct:eap_peer_config
|
| eap_wsc.c | 146 const char *phase1; local 184 phase1 = eap_get_config_phase1(sm); 185 if (phase1 == NULL) { 186 wpa_printf(MSG_INFO, "EAP-WSC: phase1 configuration data not " 192 pos = os_strstr(phase1, "pin="); 206 pos = os_strstr(phase1, "pbc=1"); 211 pos = os_strstr(phase1, "dev_pw_id="); 221 wpa_printf(MSG_INFO, "EAP-WSC: PIN or PBC not set in phase1 " 227 pos = os_strstr(phase1, " pkhash="); 245 res = eap_wsc_new_ap_settings(&new_ap_settings, phase1); [all...] |
| eap_peap.c | 75 const char *phase1) 79 pos = os_strstr(phase1, "peapver="); 87 if (os_strstr(phase1, "peaplabel=1")) { 93 if (os_strstr(phase1, "peap_outer_success=0")) { 97 } else if (os_strstr(phase1, "peap_outer_success=1")) { 101 } else if (os_strstr(phase1, "peap_outer_success=2")) { 107 if (os_strstr(phase1, "crypto_binding=0")) { 110 } else if (os_strstr(phase1, "crypto_binding=1")) { 113 } else if (os_strstr(phase1, "crypto_binding=2")) { 118 if (os_strstr(phase1, "phase2_auth=0")) [all...] |
| eap_eke.c | 73 const char *phase1; local 96 phase1 = eap_get_config_phase1(sm); 97 if (phase1) { 100 pos = os_strstr(phase1, "dhgroup="); 107 pos = os_strstr(phase1, "encr="); 114 pos = os_strstr(phase1, "prf="); 121 pos = os_strstr(phase1, "mac=");
|
| eap_gpsk.c | 84 const char *phase1; local 107 phase1 = eap_get_config_phase1(sm); 108 if (phase1) { 111 pos = os_strstr(phase1, "cipher=");
|
| eap_pwd.c | 99 const char *phase1; local 137 phase1 = eap_get_config_phase1(sm); 138 if (phase1) { 143 pos = os_strstr(phase1, "eap_pwd_groups=");
|
| eap_teap.c | 120 const char *phase1) 124 pos = os_strstr(phase1, "teap_provisioning="); 132 pos = os_strstr(phase1, "teap_max_pac_list_len="); 141 if (os_strstr(phase1, "teap_pac_format=binary")) { 148 if (os_strstr(phase1, "teap_test_outer_tlvs=1")) 168 if (config->phase1) 169 eap_teap_parse_phase1(data, config->phase1);
|
| eap_fast.c | 117 const char *phase1) 121 pos = os_strstr(phase1, "fast_provisioning="); 128 pos = os_strstr(phase1, "fast_max_pac_list_len="); 137 pos = os_strstr(phase1, "fast_pac_format=binary"); 160 if (config->phase1) 161 eap_fast_parse_phase1(data, config->phase1);
|
| eap_ttls.c | 74 const char *phase1) 76 if (os_strstr(phase1, "phase2_auth=0")) { 80 } else if (os_strstr(phase1, "phase2_auth=1")) { 84 } else if (os_strstr(phase1, "phase2_auth=2")) { 108 if (config && config->phase1) 109 eap_ttls_parse_phase1(data, config->phase1);
|
| eap_tls_common.c | 144 eap_tls_params_flags(params, config->phase1); 219 wpa_printf(MSG_DEBUG, "TLS: using phase1 config options"); 340 if (config->phase1 && 341 os_strstr(config->phase1, "include_tls_length=1")) {
|
| eap.c | 1216 return config && config->phase1 && 1217 os_strstr(config->phase1, "allow_canned_success=1"); 2183 "TLS handshake failed due to the server not supporting safe renegotiation (RFC 5746); phase1 parameter allow_unsafe_renegotiation=1 can be used to work around this"); 2982 * eap_get_config_phase1 - Get phase1 data from the network configuration 2984 * Returns: Pointer to the phase1 data or %NULL if not found 2991 return config->phase1; 2998 * Returns: Pointer to the phase1 data or %NULL if not found 3248 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pbc=1") == NULL) 3261 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL [all...] |
| eap_sim.c | 127 if (config && config->phase1) { 128 char *pos = os_strstr(config->phase1, "sim_min_num_chal="); 147 data->result_ind = os_strstr(config->phase1, "result_ind=1") !=
|
| eap_aka.c | 97 const char *phase1 = eap_get_config_phase1(sm); local 131 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL;
|
| /src/sys/lib/libunwind/ |
| libunwind.cxx | 203 _Unwind_Reason_Code phase1 = unwind_phase1(cursor1, exc); local 204 if (phase1 != _URC_NO_REASON) 205 return phase1;
|