Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 58) sorted by relevance

123

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1724 key_mgmt=WPA-EAP
1740 key_mgmt=WPA-EAP
1754 key_mgmt=WPA-EAP
1767 key_mgmt=WPA-EAP
1780 key_mgmt=WPA-EAP
1800 key_mgmt=WPA-PSK WPA-EAP
1817 key_mgmt=WPA-EAP
1827 key_mgmt=WPA-EAP
1863 key_mgmt=WPA-EAP
1872 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
DChangeLog8 * EAP-pwd changes
13 * fixed FT-EAP initial mobility domain association using PMKSA caching
19 * extended EAP-SIM/AKA fast re-authentication to allow use with FILS
22 * added support for EAP-SIM/AKA using anonymous@realm identity
24 to ignore credentials without a specific EAP method
25 * added experimental support for EAP-TEAP peer (RFC 7170)
26 * added experimental support for EAP-TLS peer with TLS v1.3
50 * EAP-pwd changes
78 * started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
81 SAE, FT-SAE, FT-EAP-SHA384
[all …]
Dandroid.config71 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
75 # EAP-MD5
78 # EAP-MSCHAPv2
81 # EAP-TLS
87 # EAP-TTLS
90 # EAP-FAST
93 # EAP-GTC
96 # EAP-OTP
99 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
102 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
[all …]
Ddefconfig92 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method or
96 # EAP-MD5
99 # EAP-MSCHAPv2
102 # EAP-TLS
108 # EAP-TTLS
111 # EAP-FAST
114 # EAP-TEAP
115 # Note: The current EAP-TEAP implementation is experimental and should not be
116 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
124 # EAP-GTC
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
196 # Consortium to match the network, the EAP parameters need to be
214 # eap: Pre-configured EAP method
215 # This optional field can be used to specify which EAP method will be
216 # used with this credential. If not set, the EAP method is selected
381 > set_network 0 key_mgmt WPA-EAP
444 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
445 <3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
446 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
447 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config51 # Integrated EAP server
54 # EAP-MD5 for the integrated EAP server
57 # EAP-TLS for the integrated EAP server
60 # EAP-MSCHAPv2 for the integrated EAP server
63 # EAP-PEAP for the integrated EAP server
66 # EAP-GTC for the integrated EAP server
69 # EAP-TTLS for the integrated EAP server
72 # EAP-SIM for the integrated EAP server
75 # EAP-AKA for the integrated EAP server
78 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig53 # Integrated EAP server
56 # EAP Re-authentication Protocol (ERP) in integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
[all …]
DChangeLog8 * EAP-pwd changes
12 * fixed FT-EAP initial mobility domain association using PMKSA caching
18 * added experimental support for EAP-TEAP server (RFC 7170)
19 * added experimental support for EAP-TLS server with TLS v1.3
23 * added eap_sim_id parameter to allow EAP-SIM/AKA server pseudonym and
45 * EAP-pwd changes
79 automatically without matching EAP database entry
135 * added EAP-pwd server support for salted passwords
138 * fixed EAP-pwd last fragment validation
154 * EAP-pwd: added support for Brainpool Elliptic Curves
[all …]
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
/external/tcpdump/tests/
Deapon1.out14 EAP packet (0) v1, len 5
18 EAP packet (0) v1, len 5
19 EAP packet (0) v1, len 45
20 EAP packet (0) v1, len 20
21 EAP packet (0) v1, len 76
22 EAP packet (0) v1, len 80
23 EAP packet (0) v1, len 28
24 EAP packet (0) v1, len 4
31 EAP packet (0) v1, len 5
32 EAP packet (0) v1, len 45
[all …]
Deap_extract_read2_asan.out1 EAP packet (0) v155, len 0
2 [|EAP]
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
215 SM_ENTRY(EAP, DISABLED); in SM_STATE()
221 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
223 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
276 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
278 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
318 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
320 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/scapy/scapy/layers/
Deap.py188 class EAP(Packet): class
200 EAP.SUCCESS, EAP.FAILURE]),
202 lambda pkt:pkt.code == EAP.RESPONSE and pkt.type == 3),
205 … lambda pkt: pkt.code == EAP.RESPONSE and hasattr(pkt, 'type') and pkt.type == 1),
208 … lambda pkt: pkt.code == EAP.REQUEST and hasattr(pkt, 'type') and pkt.type == 1)
242 if isinstance(self, EAP):
244 elif issubclass(cls, EAP):
247 return super(EAP, self).haslayer(cls)
250 return super(EAP, self).getlayer(cls, nb=nb, _track=_track,
254 if isinstance(other, EAP):
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c216 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
218 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
278 SM_STATE(EAP, DISABLED) in SM_STATE() argument
280 SM_ENTRY(EAP, DISABLED); in SM_STATE()
297 SM_STATE(EAP, IDLE) in SM_STATE() argument
299 SM_ENTRY(EAP, IDLE); in SM_STATE()
307 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
311 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
327 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
333 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml49 EAP-TLS as work network.</para>
63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
67 key_mgmt=WPA-EAP
81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
90 key_mgmt=WPA-EAP
102 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
112 key_mgmt=WPA-EAP
126 (require both unicast and broadcast); use EAP-TLS for
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
206 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml59 Authenticator and EAP authentication with Authentication
103 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
104 completes EAP authentication with the
110 <para>If WPA-EAP: master key is received from the IEEE 802.1X
145 <para>WPA with EAP (e.g., with RADIUS authentication server)
151 <para>EAP-TLS</para>
157 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
162 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
166 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
170 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
Deapol_test.sgml15 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
47 <para>eapol_test is a program that links together the same EAP
55 test EAP methods without having to setup an access point and a
59 of EAP methods against RADIUS servers and in development testing
60 for new EAP methods. It can be easily used to automate EAP testing
63 from a RADIUS server. For example, the automated EAP tests described
75 <para>tries to complete EAP authentication based on the network
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.microsoft36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
/external/autotest/server/site_tests/network_WiFi_RoamFT/
Dcontrol.EAP7 NAME = 'network_WiFi_RoamFT.EAP'
13 This test attempts to verify that we can roam between two APs using the FT-EAP
14 key management suite (i.e. WPA-EAP with Fast BSS Transition) in full view of the

123