OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:EAP
(Results
1 - 8
of
8
) sorted by null
/external/wpa_supplicant/examples/
wpa2-eap-ccmp.conf
1
# WPA2-
EAP
/CCMP using
EAP
-TLS
6
ssid="example wpa2-
eap
network"
7
key_mgmt=WPA-
EAP
11
eap
=TLS
/external/wpa_supplicant_6/wpa_supplicant/examples/
wpa2-eap-ccmp.conf
1
# WPA2-
EAP
/CCMP using
EAP
-TLS
6
ssid="example wpa2-
eap
network"
7
key_mgmt=WPA-
EAP
11
eap
=TLS
openCryptoki.conf
0
#
EAP
-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24
key_mgmt=WPA-
EAP
25
eap
=TLS
/external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf
107
#
EAP
fast re-authentication
108
# By default, fast re-authentication is enabled for all
EAP
methods that
125
# Dynamic
EAP
methods
126
# If
EAP
methods were built dynamically as shared object files, they need to be
127
# loaded here before being used in the network blocks. By default,
EAP
methods
265
# WPA-
EAP
= WPA using
EAP
authentication
266
# IEEE8021X = IEEE 802.1X using
EAP
authentication and (optionally) dynamically
270
# WPA-
EAP
-SHA256 = Like WPA-
EAP
but using stronger SHA256-based algorithm
[
all
...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.c
2
* hostapd /
EAP
Full Authenticator state machine (RFC 4137)
28
#define STATE_MACHINE_DEBUG_PREFIX "
EAP
"
35
/*
EAP
state machines are described in RFC 4137 */
87
* @sm: Pointer to
EAP
state machine allocated with eap_server_sm_init()
90
* @phase2: 0 =
EAP
phase1 user, 1 =
EAP
phase2 (tunneled) user
93
* This function is used to fetch user information for
EAP
. The user will be
127
SM_STATE(
EAP
, DISABLED)
129
SM_ENTRY(
EAP
, DISABLED);
134
SM_STATE(
EAP
, INITIALIZE
[
all
...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap.c
2
*
EAP
peer state machines (RFC 4137)
37
#define STATE_MACHINE_DEBUG_PREFIX "
EAP
"
94
wpa_printf(MSG_DEBUG, "
EAP
: deinitialize previously used
EAP
method "
103
* eap_allowed_method - Check whether
EAP
method is allowed
104
* @sm: Pointer to
EAP
state machine allocated with eap_peer_sm_init()
106
* @method:
EAP
type
107
* Returns: 1 = allowed
EAP
method, 0 = not allowed
133
SM_STATE(
EAP
, INITIALIZE)
135
SM_ENTRY(
EAP
, INITIALIZE)
[
all
...]
/external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft
36
ATTRIBUTE MS-Acct-
EAP
-Type 24 integer Microsoft
73
VALUE MS-Acct-Auth-Type
EAP
5
75
# MS-Acct-
EAP
-Type Values
77
VALUE MS-Acct-
EAP
-Type MD5 4
78
VALUE MS-Acct-
EAP
-Type OTP 5
79
VALUE MS-Acct-
EAP
-Type Generic-Token-Card 6
80
VALUE MS-Acct-
EAP
-Type TLS 13
/external/wpa_supplicant/
eap.c
2
*
EAP
peer state machines (RFC 4137)
36
#define STATE_MACHINE_DEBUG_PREFIX "
EAP
"
92
wpa_printf(MSG_DEBUG, "
EAP
: deinitialize previously used
EAP
method "
105
SM_STATE(
EAP
, INITIALIZE)
107
SM_ENTRY(
EAP
, INITIALIZE);
110
wpa_printf(MSG_DEBUG, "
EAP
: maintaining
EAP
method data for "
128
* the first
EAP
-Packet */
148
SM_STATE(
EAP
, DISABLED
[
all
...]
Completed in 905 milliseconds