OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:EAP
(Results
1 - 9
of
9
) sorted by null
/external/wpa_supplicant_8/wpa_supplicant/examples/
wpa2-eap-ccmp.conf
1
# WPA2-
EAP
/CCMP using
EAP
-TLS
6
ssid="example wpa2-
eap
network"
7
key_mgmt=WPA-
EAP
11
eap
=TLS
openCryptoki.conf
0
#
EAP
-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24
key_mgmt=WPA-
EAP
25
eap
=TLS
/external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf
113
#
EAP
fast re-authentication
114
# By default, fast re-authentication is enabled for all
EAP
methods that
131
# Dynamic
EAP
methods
132
# If
EAP
methods were built dynamically as shared object files, they need to be
133
# loaded here before being used in the network blocks. By default,
EAP
methods
362
# (
EAP
-TLS). Full path to the file should be used since working
407
# Consortium to match the network, the
EAP
parameters need to be
411
#
eap
: Pre-configured
EAP
method
412
# This optional field can be used to specify which
EAP
method will b
[
all
...]
nmake.mak
17
# Note: If
EAP
-FAST is included in the build, OpenSSL needs to be patched to
86
$(OBJDIR)\
eap
.obj \
/external/wpa_supplicant_8/src/eap_server/
eap_server.c
2
* hostapd /
EAP
Full Authenticator state machine (RFC 4137)
23
#define STATE_MACHINE_DEBUG_PREFIX "
EAP
"
30
/*
EAP
state machines are described in RFC 4137 */
82
* @sm: Pointer to
EAP
state machine allocated with eap_server_sm_init()
85
* @phase2: 0 =
EAP
phase1 user, 1 =
EAP
phase2 (tunneled) user
88
* This function is used to fetch user information for
EAP
. The user will be
122
SM_STATE(
EAP
, DISABLED)
124
SM_ENTRY(
EAP
, DISABLED);
129
SM_STATE(
EAP
, INITIALIZE
[
all
...]
/external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft
36
ATTRIBUTE MS-Acct-
EAP
-Type 24 integer Microsoft
73
VALUE MS-Acct-Auth-Type
EAP
5
75
# MS-Acct-
EAP
-Type Values
77
VALUE MS-Acct-
EAP
-Type MD5 4
78
VALUE MS-Acct-
EAP
-Type OTP 5
79
VALUE MS-Acct-
EAP
-Type Generic-Token-Card 6
80
VALUE MS-Acct-
EAP
-Type TLS 13
/external/wpa_supplicant_8/src/eap_peer/
eap.c
2
*
EAP
peer state machines (RFC 4137)
32
#define STATE_MACHINE_DEBUG_PREFIX "
EAP
"
88
wpa_printf(MSG_DEBUG, "
EAP
: Status notification: %s (param=%s)",
103
wpa_printf(MSG_DEBUG, "
EAP
: deinitialize previously used
EAP
method "
112
* eap_allowed_method - Check whether
EAP
method is allowed
113
* @sm: Pointer to
EAP
state machine allocated with eap_peer_sm_init()
115
* @method:
EAP
type
116
* Returns: 1 = allowed
EAP
method, 0 = not allowed
142
SM_STATE(
EAP
, INITIALIZE
[
all
...]
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java
49
* security,
eap
, phase2, identity, password, anonymousidentity, cacert, usercert,
54
* The following is a sample configuration file for an access point using
EAP
-PEAP with MSCHAP2.
58
* <security>
EAP
</security>
59
* <
eap
>PEAP</
eap
>
75
static final int
EAP
= 3;
86
} else if (security.equalsIgnoreCase("
EAP
")) {
87
return
EAP
;
113
boolean
eap
= false;
139
if (tagName.equalsIgnoreCase("
eap
")) {
[
all
...]
/external/wpa_supplicant_8/hostapd/
Android.mk
329
# Example
EAP
-SIM/AKA interface for GSM/UMTS authentication. This can be
462
# Basic
EAP
functionality is needed for EAPOL
Completed in 136 milliseconds