/hostap-latest/tests/hwsim/ |
D | test_tnc.py | 23 phase1="peapver=0 tnc=soh cryptobinding=0", 31 phase1="peapver=0 tnc=soh1 cryptobinding=1", 39 phase1="peapver=0 tnc=soh2 cryptobinding=2", 57 phase1="peapver=0 tnc=soh cryptobinding=0", 68 phase1="peapver=0 tnc=soh cryptobinding=0", 190 phase1="fast_provisioning=2",
|
D | test_eap.py | 194 pac_file="blob://teap_pac", phase1="teap_test_outer_tlvs=1") 204 phase1="teap_provisioning=2", 219 phase1="teap_provisioning=2", 245 phase1="teap_provisioning=2", 383 phase1="teap_provisioning=2", 397 phase1="teap_provisioning=2 teap_max_pac_list_len=2 teap_pac_format=binary", 412 phase1="teap_provisioning=2", 427 phase1="teap_provisioning=1", 507 phase1="teap_pac_format=binary", 566 phase1="teap_provisioning=2", [all …]
|
D | test_ap_eap.py | 472 phase1="sim_min_num_chal=1", 482 phase1="sim_min_num_chal=4", 491 phase1="sim_min_num_chal=2") 2320 phase1="fast_provisioning=2", 2341 phase1="fast_provisioning=2", 2375 phase1="fast_provisioning=2", 2438 phase1="peapver=0 crypto_binding=2", 2445 phase1="peapver=0 crypto_binding=1", 2449 phase1="peapver=0 crypto_binding=0", 2460 phase1="peapver=0 crypto_binding=2", [all …]
|
D | test_suite_b.py | 435 phase1 = "tls_suiteb=1" 437 …phase1 += " tls_disable_tlsv1_0=1 tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=… 440 phase1=phase1, 495 phase1="tls_suiteb=1", 523 phase1="tls_suiteb=1", 570 phase1="tls_suiteb=1", 624 phase1="tls_suiteb=1", 841 phase1="tls_suiteb=1",
|
D | test_ieee8021x.py | 359 phase1 = "phase2_auth=2" if phase2_auth else "" 363 phase1=phase1, phase2="auth=MSCHAPV2",
|
D | test_eap_proto.py | 2863 def eap_eke_test_fail(dev, phase1=None, success=False): argument 2866 phase1=phase1, erp="1", wait_connect=False) 2924 for count, func, phase1 in tests: 2926 eap_eke_test_fail(dev[0], phase1) 2939 for count, func, phase1 in tests: 2941 eap_eke_test_fail(dev[0], phase1) 2946 for count, func, phase1 in tests: 2948 eap_eke_test_fail(dev[0], phase1, success=True) 5597 phase1="result_ind=1", 5612 phase1="result_ind=1", [all …]
|
D | test_erp.py | 296 phase1="fast_provisioning=2", 346 … phase1="tls_disable_tlsv1_0=1 tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=0")
|
/hostap-latest/src/eap_peer/ |
D | eap_wsc.c | 146 const char *phase1; in eap_wsc_init() local 184 phase1 = eap_get_config_phase1(sm); in eap_wsc_init() 185 if (phase1 == NULL) { in eap_wsc_init() 192 pos = os_strstr(phase1, "pin="); in eap_wsc_init() 206 pos = os_strstr(phase1, "pbc=1"); in eap_wsc_init() 211 pos = os_strstr(phase1, "dev_pw_id="); in eap_wsc_init() 227 pos = os_strstr(phase1, " pkhash="); in eap_wsc_init() 245 res = eap_wsc_new_ap_settings(&new_ap_settings, phase1); in eap_wsc_init() 258 pos = os_strstr(phase1, "multi_ap="); in eap_wsc_init()
|
D | eap_peap.c | 75 const char *phase1) in eap_peap_parse_phase1() argument 79 pos = os_strstr(phase1, "peapver="); in eap_peap_parse_phase1() 87 if (os_strstr(phase1, "peaplabel=1")) { in eap_peap_parse_phase1() 93 if (os_strstr(phase1, "peap_outer_success=0")) { in eap_peap_parse_phase1() 97 } else if (os_strstr(phase1, "peap_outer_success=1")) { in eap_peap_parse_phase1() 101 } else if (os_strstr(phase1, "peap_outer_success=2")) { in eap_peap_parse_phase1() 107 if (os_strstr(phase1, "crypto_binding=0")) { in eap_peap_parse_phase1() 110 } else if (os_strstr(phase1, "crypto_binding=1")) { in eap_peap_parse_phase1() 113 } else if (os_strstr(phase1, "crypto_binding=2")) { in eap_peap_parse_phase1() 118 if (os_strstr(phase1, "phase2_auth=0")) { in eap_peap_parse_phase1() [all …]
|
D | eap_eke.c | 73 const char *phase1; in eap_eke_init() local 96 phase1 = eap_get_config_phase1(sm); in eap_eke_init() 97 if (phase1) { in eap_eke_init() 100 pos = os_strstr(phase1, "dhgroup="); in eap_eke_init() 107 pos = os_strstr(phase1, "encr="); in eap_eke_init() 114 pos = os_strstr(phase1, "prf="); in eap_eke_init() 121 pos = os_strstr(phase1, "mac="); in eap_eke_init()
|
D | eap_gpsk.c | 84 const char *phase1; in eap_gpsk_init() local 107 phase1 = eap_get_config_phase1(sm); in eap_gpsk_init() 108 if (phase1) { in eap_gpsk_init() 111 pos = os_strstr(phase1, "cipher="); in eap_gpsk_init()
|
D | eap_config.h | 495 char *phase1; member
|
D | eap_teap.c | 120 const char *phase1) in eap_teap_parse_phase1() argument 124 pos = os_strstr(phase1, "teap_provisioning="); in eap_teap_parse_phase1() 132 pos = os_strstr(phase1, "teap_max_pac_list_len="); in eap_teap_parse_phase1() 141 if (os_strstr(phase1, "teap_pac_format=binary")) { in eap_teap_parse_phase1() 148 if (os_strstr(phase1, "teap_test_outer_tlvs=1")) in eap_teap_parse_phase1() 168 if (config->phase1) in eap_teap_init() 169 eap_teap_parse_phase1(data, config->phase1); in eap_teap_init()
|
D | eap_ttls.c | 74 const char *phase1) in eap_ttls_parse_phase1() argument 76 if (os_strstr(phase1, "phase2_auth=0")) { in eap_ttls_parse_phase1() 80 } else if (os_strstr(phase1, "phase2_auth=1")) { in eap_ttls_parse_phase1() 84 } else if (os_strstr(phase1, "phase2_auth=2")) { in eap_ttls_parse_phase1() 108 if (config && config->phase1) in eap_ttls_init() 109 eap_ttls_parse_phase1(data, config->phase1); in eap_ttls_init()
|
D | eap_fast.c | 117 const char *phase1) in eap_fast_parse_phase1() argument 121 pos = os_strstr(phase1, "fast_provisioning="); in eap_fast_parse_phase1() 128 pos = os_strstr(phase1, "fast_max_pac_list_len="); in eap_fast_parse_phase1() 137 pos = os_strstr(phase1, "fast_pac_format=binary"); in eap_fast_parse_phase1() 160 if (config->phase1) in eap_fast_init() 161 eap_fast_parse_phase1(data, config->phase1); in eap_fast_init()
|
D | eap_pwd.c | 99 const char *phase1; in eap_pwd_init() local 137 phase1 = eap_get_config_phase1(sm); in eap_pwd_init() 138 if (phase1) { in eap_pwd_init() 143 pos = os_strstr(phase1, "eap_pwd_groups="); in eap_pwd_init()
|
D | eap_tls_common.c | 144 eap_tls_params_flags(params, config->phase1); in eap_tls_params_from_conf1() 340 if (config->phase1 && in eap_peer_tls_ssl_init() 341 os_strstr(config->phase1, "include_tls_length=1")) { in eap_peer_tls_ssl_init()
|
D | eap.c | 1216 return config && config->phase1 && in eap_peer_sm_allow_canned() 1217 os_strstr(config->phase1, "allow_canned_success=1"); in eap_peer_sm_allow_canned() 2991 return config->phase1; in eap_get_config_phase1() 3248 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pbc=1") == NULL) in eap_is_wps_pbc_enrollee() 3261 if (conf->phase1 == NULL || os_strstr(conf->phase1, "pin=") == NULL) in eap_is_wps_pin_enrollee()
|
D | eap_sim.c | 127 if (config && config->phase1) { in eap_sim_init() 128 char *pos = os_strstr(config->phase1, "sim_min_num_chal="); in eap_sim_init() 147 data->result_ind = os_strstr(config->phase1, "result_ind=1") != in eap_sim_init()
|
D | eap_aka.c | 97 const char *phase1 = eap_get_config_phase1(sm); in eap_aka_init() local 131 data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL; in eap_aka_init()
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.conf | 1842 phase1="peaplabel=1" 1974 phase1="fast_provisioning=1" 1985 phase1="fast_provisioning=1" 2079 phase1="peaplabel=0"
|
D | eap_testing.txt | 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 126 (phase1="peap_outer_success=0 peaplabel=1") (in "IETF Draft 5" mode) 321 "IETF Draft 5" mode requires phase1="peap_outer_success=0 peaplabel=1" 322 'Cisco ACU 5.05' mode works without phase1 configuration 381 - phase1="peap_outer_success=0 peaplabel=1"
|
D | wps_supplicant.c | 455 os_free(ssid->eap.phase1); in wpa_supplicant_wps_cred() 456 ssid->eap.phase1 = NULL; in wpa_supplicant_wps_cred() 1168 char phase1[32]; in wpas_wps_start_pbc() local 1212 os_snprintf(phase1, sizeof(phase1), "pbc=1 multi_ap=%d", in wpas_wps_start_pbc() 1215 os_snprintf(phase1, sizeof(phase1), "pbc=1"); in wpas_wps_start_pbc() 1216 if (wpa_config_set_quoted(ssid, "phase1", phase1) < 0) in wpas_wps_start_pbc()
|
D | config.h | 344 char *phase1; member
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 95 phase1="peaplabel=0" 170 phase1="peaplabel=0"
|