/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | eap_user_db.c | 134 size_t identity_len, int phase2) 166 hapd->tmp_eap_user.phase2 = phase2; 180 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", 181 id_str, phase2); 189 if (user == NULL && !phase2) { 217 size_t identity_len, int phase2) 246 if (!phase2 && user->identity == NULL) { 251 if (user->phase2 == !!phase2 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 216 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | eap_user_db.c | 134 size_t identity_len, int phase2) 166 hapd->tmp_eap_user.phase2 = phase2; 180 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", 181 id_str, phase2); 189 if (user == NULL && !phase2) { 217 size_t identity_len, int phase2) 246 if (!phase2 && user->identity == NULL) { 251 if (user->phase2 == !!phase2 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 216 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2); 52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
H A D | eap_user_db.c | 134 size_t identity_len, int phase2) 166 hapd->tmp_eap_user.phase2 = phase2; 180 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", 181 id_str, phase2); 189 if (user == NULL && !phase2) { 217 size_t identity_len, int phase2) 246 if (!phase2 && user->identity == NULL) { 251 if (user->phase2 == !!phase2 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 216 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
H A D | eap_config.h | 398 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 403 char *phase2; member in struct:eap_peer_config 511 * key2_id - Key ID for OpenSSL engine (phase2) 519 * cert2_id - Cert ID for OpenSSL engine (phase2) 527 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
H A D | eap_tls_common.c | 122 eap_tls_params_flags(params, config->phase2); 129 struct eap_peer_config *config, int phase2) 144 if (phase2) { 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 247 data->phase2 = sm->init_phase2; 250 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 258 if (data->phase2) { 1016 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 1034 if (config == NULL || config->phase2 == NULL) 1037 start = buf = os_strdup(config->phase2); 126 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
H A D | eap.h | 33 int phase2; member in struct:eap_user 83 int phase2, struct eap_user *user);
|
H A D | eap_server.c | 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 94 int phase2) 110 identity_len, phase2, user) != 0) { 1113 if (sm->user->phase2) { 93 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
|
H A D | eap_server_eke.c | 33 int phase2; member in struct:eap_eke_data 95 data->phase2 = sm->init_phase2; 482 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
H A D | eap_config.h | 398 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters 403 char *phase2; member in struct:eap_peer_config 511 * key2_id - Key ID for OpenSSL engine (phase2) 519 * cert2_id - Cert ID for OpenSSL engine (phase2) 527 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
|
H A D | eap_tls_common.c | 122 eap_tls_params_flags(params, config->phase2); 129 struct eap_peer_config *config, int phase2) 144 if (phase2) { 145 wpa_printf(MSG_DEBUG, "TLS: using phase2 config options"); 247 data->phase2 = sm->init_phase2; 250 if (eap_tls_params_from_conf(sm, data, ¶ms, config, data->phase2) < 258 if (data->phase2) { 1016 * @prefix: 'phase2' configuration prefix, e.g., "auth=" 1034 if (config == NULL || config->phase2 == NULL) 1037 start = buf = os_strdup(config->phase2); 126 eap_tls_params_from_conf(struct eap_sm *sm, struct eap_ssl_data *data, struct tls_connection_params *params, struct eap_peer_config *config, int phase2) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
H A D | eap.h | 33 int phase2; member in struct:eap_user 83 int phase2, struct eap_user *user);
|
H A D | eap_server.c | 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 94 int phase2) 110 identity_len, phase2, user) != 0) { 1113 if (sm->user->phase2) { 93 eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, int phase2) argument
|
H A D | eap_server_eke.c | 33 int phase2; member in struct:eap_eke_data 95 data->phase2 = sm->init_phase2; 482 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.h | 52 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 54 int phase2; member in struct:eap_ssl_data
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_tls_common.h | 42 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 44 int phase2; member in struct:eap_ssl_data
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | link_test.c | 74 size_t identity_len, int phase2) 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
|
/external/chromium_org/third_party/WebKit/Source/platform/audio/ |
H A D | FFTFrame.cpp | 135 double phase2 = arg(c2); local 138 double deltaPhase2 = phase2 - lastPhase2; 140 lastPhase2 = phase2;
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1001 size_t identity_len, int phase2, 1008 identity_len, phase2, user); 1000 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|