HomeSort by: relevance | last modified time | path
    Searched refs:EAP (Results 1 - 7 of 7) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 1 # WPA2-EAP/CCMP using EAP-TLS
6 ssid="example wpa2-eap network"
7 key_mgmt=WPA-EAP
11 eap=TLS
openCryptoki.conf 0 # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
24 key_mgmt=WPA-EAP
25 eap=TLS
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server.c 2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
24 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
26 /* EAP state machines are described in RFC 4137 */
147 * @sm: Pointer to EAP state machine allocated with eap_server_sm_init()
150 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
153 * This function is used to fetch user information for EAP. The user will be
213 SM_STATE(EAP, DISABLED)
215 SM_ENTRY(EAP, DISABLED);
221 SM_STATE(EAP, INITIALIZE
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 158 # its certificate chain are included in EAP peer certificate events. This is
162 # EAP fast re-authentication
163 # By default, fast re-authentication is enabled for all EAP methods that
193 # Dynamic EAP methods
194 # If EAP methods were built dynamically as shared object files, they need to be
195 # loaded here before being used in the network blocks. By default, EAP methods
642 # (EAP-TLS). Full path to the file should be used since working
695 # parameter. When using Home OIs to match the network, the EAP parameters
715 # Consortium to match the network, the EAP parameters need to be
734 # eap: Pre-configured EAP metho
    [all...]
nmake.mak 17 # Note: If EAP-FAST is included in the build, OpenSSL needs to be patched to
86 $(OBJDIR)\eap.obj \
  /src/external/bsd/wpa/dist/src/eap_peer/
eap.c 2 * EAP peer state machines (RFC 4137)
33 #define STATE_MACHINE_DEBUG_PREFIX "EAP"
92 wpa_printf(MSG_DEBUG, "EAP: Status notification: %s (param=%s)",
101 wpa_printf(MSG_DEBUG, "EAP: Error notification: %d", error_code);
124 wpa_printf(MSG_DEBUG, "EAP: deinitialize previously used EAP method "
133 * eap_config_allowed_method - Check whether EAP method is allowed
134 * @sm: Pointer to EAP state machine allocated with eap_peer_sm_init()
135 * @config: EAP configuration
137 * @method: EAP typ
    [all...]
  /src/external/bsd/wpa/dist/hostapd/
Android.mk 430 # Example EAP-SIM/AKA interface for GSM/UMTS authentication. This can be
620 # Basic EAP functionality is needed for EAPOL

Completed in 32 milliseconds