HomeSort by relevance Sort by last modified time
    Searched refs:EAP (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf 107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
265 # WPA-EAP = WPA using EAP authentication
266 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
270 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithm
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.c 2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
28 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
35 /* EAP state machines are described in RFC 4137 */
87 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init()
90 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
93 * This function is used to fetch user information for EAP. The user will be
127 SM_STATE(EAP, DISABLED)
129 SM_ENTRY(EAP, DISABLED);
134 SM_STATE(EAP, INITIALIZE
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
37 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
94 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
103 * eap_allowed_method - Check whether EAP method is allowed
104 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
106 * @method: EAP type
107 * Returns: 1 = allowed EAP method, 0 = not allowed
133 SM_STATE(EAP, INITIALIZE)
135 SM_ENTRY(EAP, INITIALIZE)
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
  /external/wpa_supplicant/
eap.c 2 * EAP peer state machines (RFC 4137)
36 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
92 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
105 SM_STATE(EAP, INITIALIZE)
107 SM_ENTRY(EAP, INITIALIZE);
110 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for "
128 * the first EAP-Packet */
148 SM_STATE(EAP, DISABLED
    [all...]

Completed in 905 milliseconds