/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wpa2-eap-ccmp.conf | 1 # WPA2-EAP/CCMP using EAP-TLS 6 ssid="example wpa2-eap network" 7 key_mgmt=WPA-EAP 11 eap=TLS
|
openCryptoki.conf | 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and 24 key_mgmt=WPA-EAP 25 eap=TLS
|
/system/chre/apps/wifi_offload/include/chre/apps/wifi_offload/ |
preferred_network.h | 32 EAP = 0x1 << 3, 33 ALL_SECURITY_MODES_MASK = OPEN | WEP | PSK | EAP,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 2 * hostapd / EAP Full Authenticator state machine (RFC 4137) 24 #define STATE_MACHINE_DEBUG_PREFIX "EAP" 31 /* EAP state machines are described in RFC 4137 */ 151 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init() 154 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 157 * This function is used to fetch user information for EAP. The user will be 217 SM_STATE(EAP, DISABLED) 219 SM_ENTRY(EAP, DISABLED); 224 SM_STATE(EAP, INITIALIZE [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_proxy_qmi_oc.mak | 8 # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used).
|
wpa_supplicant.conf | 158 # its certificate chain are included in EAP peer certificate events. This is 162 # EAP fast re-authentication 163 # By default, fast re-authentication is enabled for all EAP methods that 193 # Dynamic EAP methods 194 # If EAP methods were built dynamically as shared object files, they need to be 195 # loaded here before being used in the network blocks. By default, EAP methods 542 # (EAP-TLS). Full path to the file should be used since working 596 # Consortium to match the network, the EAP parameters need to be 600 # eap: Pre-configured EAP metho [all...] |
eap_proxy_qmi_oc.mk | 24 # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used).
|
nmake.mak | 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to 86 $(OBJDIR)\eap.obj \
|
/external/scapy/scapy/layers/ |
eap.py | 7 Classes related to the EAP protocol. 49 0x0: "EAP-Packet", # "EAPOL-EAP" in 801.1X-2010 98 # EAP 104 # EAP methods types 105 # http://www.iana.org/assignments/eap-numbers/eap-numbers.xhtml#eap-numbers-4 123 13: "EAP-TLS", 125 15: "RSA Security SecurID EAP", [all...] |
radius.py | 21 from scapy.layers.eap import EAP 106 79: "EAP-Message", 129 102: "EAP-Key-Name", 190 163: "EAP-Lower-Layer", 202 175: "EAP-Peer-Id", 203 176: "EAP-Server-Id", 889 202: "Invalid EAP Packet (Ignored)", 995 Handles EAP-Message attribute value (the actual EAP packet) [all...] |
ppp.py | 17 from scapy.layers.eap import EAP 704 bind_layers( PPP, EAP, proto=0xc227)
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft 73 VALUE MS-Acct-Auth-Type EAP 5 75 # MS-Acct-EAP-Type Values 77 VALUE MS-Acct-EAP-Type MD5 4 78 VALUE MS-Acct-EAP-Type OTP 5 79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 80 VALUE MS-Acct-EAP-Type TLS 13
|
/tools/test/connectivity/acts/tests/google/wifi/ |
WifiEnterpriseRoamingTest.py | 28 # EAP Macros 29 EAP = WifiEnums.Eap 55 Ent.EAP: int(EAP.PEAP), 63 Ent.EAP: int(EAP.TLS), 71 Ent.EAP: int(EAP.TTLS), 79 Ent.EAP: int(EAP.SIM) [all...] |
WifiEnterpriseTest.py | 31 # EAP Macros 32 EAP = WifiEnums.Eap 61 # Default configs for EAP networks. 63 Ent.EAP: int(EAP.PEAP), 73 Ent.EAP: int(EAP.TLS), 81 Ent.EAP: int(EAP.TTLS) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 2 * EAP peer state machines (RFC 4137) 33 #define STATE_MACHINE_DEBUG_PREFIX "EAP" 91 wpa_printf(MSG_DEBUG, "EAP: Status notification: %s (param=%s)", 99 wpa_printf(MSG_DEBUG, "EAP: Error notification: %d", error_code); 121 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method " 130 * eap_config_allowed_method - Check whether EAP method is allowed 131 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init() 132 * @config: EAP configuration 134 * @method: EAP typ [all...] |
/external/autotest/client/site_tests/network_8021xEapDetection/ |
network_8021xEapDetection.py | 15 """The 802.1x EAP detection class. 18 Ensures that shill detects an EAP request frame sent by hostapd. 26 """Checks the interface for the EAP detection flag. 30 @return true if the "EAP detected" flag is set, false otherwise. 53 raise error.TestFail('EAP detection flag is already set.') 64 raise error.TestFail('EAP detection flag is not set.')
|
/hardware/interfaces/wifi/offload/1.0/ |
types.hal | 25 EAP = 0x1 << 4,
|
/device/google/wahoo/wifi_offload/ |
offload_utils.cpp | 88 if (hidlSecurityMode & android::hardware::wifi::offload::V1_0::SecurityMode::EAP) { 89 chreSecurityMode |= wifi_offload::SecurityMode::EAP; 105 if (chreSecurityMode & wifi_offload::SecurityMode::EAP) { 106 hidlSecurityMode |= android::hardware::wifi::offload::V1_0::SecurityMode::EAP;
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
WifiConfigurationHelper.java | 44 private static final int EAP = 3; 106 * Create a {@link WifiConfiguration} for an EAP secured network 110 * @param eapMethod The EAP method 160 * security being one of NONE, WEP, PSK, or EAP. If WEP, PSK, or EAP are selected, the field 161 * "password" must also be provided. If EAP is selected, then the fiels "eap", "phase2", 209 case EAP: 211 int eapMethod = getEapMethod(jsonConfig.getString("eap")); 279 if ("EAP".equalsIgnoreCase(security)) [all...] |
/system/chre/apps/wifi_offload/ |
scan_result.cc | 33 return SecurityMode::EAP;
|
/tools/test/connectivity/acts/framework/acts/test_utils/wifi/ |
wifi_test_utils.py | 93 # Start of Macros for EAP 94 # EAP types 95 class Eap(IntEnum): 106 # EAP Phase2 types 117 EAP = "eap" 135 # End of Macros for EAP [all...] |
/external/wpa_supplicant_8/hostapd/ |
Android.mk | 430 # Example EAP-SIM/AKA interface for GSM/UMTS authentication. This can be 583 # Basic EAP functionality is needed for EAPOL
|
/external/owasp/sanitizer/tools/findbugs/lib/ |
yjp-controller-api-redist.jar | |
/external/kotlinc/lib/ |
kotlin-compiler.jar | |
/prebuilts/tools/common/m2/repository/org/jetbrains/kotlin/kotlin-compiler-embeddable/1.2.20/ |
kotlin-compiler-embeddable-1.2.20.jar | |