HomeSort by relevance Sort by last modified time
    Searched refs:EAP (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant_8/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf 113 # EAP fast re-authentication
114 # By default, fast re-authentication is enabled for all EAP methods that
131 # Dynamic EAP methods
132 # If EAP methods were built dynamically as shared object files, they need to be
133 # loaded here before being used in the network blocks. By default, EAP methods
362 # (EAP-TLS). Full path to the file should be used since working
407 # Consortium to match the network, the EAP parameters need to be
411 # eap: Pre-configured EAP method
412 # This optional field can be used to specify which EAP method will b
    [all...]
nmake.mak 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to
86 $(OBJDIR)\eap.obj \
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
23 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
30 /* EAP state machines are described in RFC 4137 */
82 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init()
85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
88 * This function is used to fetch user information for EAP. The user will be
122 SM_STATE(EAP, DISABLED)
124 SM_ENTRY(EAP, DISABLED);
129 SM_STATE(EAP, INITIALIZE
    [all...]
  /external/ppp/pppd/plugins/radius/etc/
dictionary.microsoft 36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
32 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
88 wpa_printf(MSG_DEBUG, "EAP: Status notification: %s (param=%s)",
103 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
112 * eap_allowed_method - Check whether EAP method is allowed
113 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
115 * @method: EAP type
116 * Returns: 1 = allowed EAP method, 0 = not allowed
142 SM_STATE(EAP, INITIALIZE
    [all...]
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 49 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert,
54 * The following is a sample configuration file for an access point using EAP-PEAP with MSCHAP2.
58 * <security>EAP</security>
59 * <eap>PEAP</eap>
75 static final int EAP = 3;
86 } else if (security.equalsIgnoreCase("EAP")) {
87 return EAP;
113 boolean eap = false;
139 if (tagName.equalsIgnoreCase("eap")) {
    [all...]
  /external/wpa_supplicant_8/hostapd/
Android.mk 329 # Example EAP-SIM/AKA interface for GSM/UMTS authentication. This can be
462 # Basic EAP functionality is needed for EAPOL

Completed in 136 milliseconds