Home
last modified time | relevance | path

Searched refs:EAPOL (Results 1 – 17 of 17) sorted by relevance

/external/tcpdump/tests/
Deapon1.out17 EAPOL start (1) v1, len 0
25 EAPOL key (3) v1, len 57
26 EAPOL key (3) v1, len 44
30 EAPOL start (1) v1, len 0
38 EAPOL key (3) v1, len 57
39 EAPOL key (3) v1, len 44
53 EAPOL start (1) v1, len 0
64 EAPOL key (3) v1, len 57
65 EAPOL key (3) v1, len 44
104 EAPOL start (1) v1, len 0
[all …]
/external/scapy/scapy/layers/
Deap.py61 class EAPOL(Packet): class
87 if isinstance(other, EAPOL):
748 bind_layers( Ether, EAPOL, type=34958)
749 bind_layers( Ether, EAPOL, dst='01:80:c2:00:00:03', type=34958)
750 bind_layers( CookedLinux, EAPOL, proto=34958)
751 bind_layers( GRE, EAPOL, proto=34958)
752 bind_layers( EAPOL, EAP, type=0)
753 bind_layers( SNAP, EAPOL, code=34958)
754 bind_layers( EAPOL, MKAPDU, type=5)
/external/scapy/scapy/contrib/
Dwpa_eapol.py21 from scapy.layers.eap import EAPOL
47 bind_layers( EAPOL, WPA_key, type=3)
/external/scapy/scapy/modules/krack/
Dautomaton.py18 from scapy.layers.eap import EAPOL
233 pkt = EAPOL(version="802.1X-2004", type="EAPOL-Key")
281 to_mic = raw(temp_mic[EAPOL])
540 if EAPOL in pkt and pkt.addr1 == pkt.addr3 == self.mac and \
541 pkt[EAPOL].load[1] == "\x01":
550 client_nonce = pkt[EAPOL].load[13:13 + 0x20]
557 client_mic = pkt[EAPOL].load[77:77 + 16]
558 client_data = raw(pkt[EAPOL]).replace(client_mic, "\x00" * len(client_mic))
593 if EAPOL in pkt and pkt.addr1 == pkt.addr3 == self.mac and \
594 pkt[EAPOL].load[1:3] == "\x03\x09":
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dtodo.txt16 to see unencrypted EAPOL-Key frames at all..
34 state machine so that EAPOL state machine is not needed for this
51 - try to work around race in receiving association event and first EAPOL
DChangeLog107 * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
149 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
183 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
247 * fixed EAPOL reauthentication after FT protocol run
296 unencrypted EAPOL frames
301 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
397 * increase postponing of EAPOL-Start by one second with AP/GO that
406 EAPOL-Key descriptor version 3 when the station supports PMF even if
638 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM
976 * extend EAPOL frames processing workaround for roaming cases
[all …]
DREADME175 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
177 needed to enable IEEE 802.1X/EAPOL and EAP methods. Note that EAP-MD5,
179 they should only be enabled if testing the EAPOL/EAP state
304 802.1X/EAPOL and EAP state machines and all EAP methods. Including
688 variables like EAPOL state machine parameters and trigger events like
748 status = get current WPA/EAPOL/EAP status
754 logoff = IEEE 802.1X EAPOL state machine logoff
755 logon = IEEE 802.1X EAPOL state machine logon
Deap_testing.txt2 IEEE 802.1X/EAPOL authentication
Dandroid.config268 # in a bridge for EAPOL frames. This should be uncommented only if the kernel
Ddefconfig308 # in a bridge for EAPOL frames. This should be uncommented only if the kernel
/external/wpa_supplicant_8/hostapd/
DChangeLog111 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
120 * added option to configure EAPOL-Key retry limits
156 * fixed EAPOL reauthentication after FT protocol run
191 unencrypted EAPOL frames
263 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce
268 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
439 use of the Secure bit in EAPOL-Key msg 3/4
459 having sent EAPOL-Key 3/4 to avoid issues with some supplicant
461 * added a workaround for EAPOL-Key 4/4 using incorrect type value in
512 * changed EAPOL transmission to use AC_VO if WMM is active
[all …]
Deap_testing.txt1 Interoperability testing of hostapd's IEEE 802.1X/EAPOL authentication
DREADME119 (EAPOL) and the Authenticator relays these frames to the Authentication
135 receives 802.1X (EAPOL) frames from the Supplicant using the wlan#ap
183 frames will be relayed using EAPOL between the Supplicant and the
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_cli.sgml42 configure some variables like EAPOL state machine parameters and
201 <para>get current WPA/EAPOL/EAP status</para>
243 <para>IEEE 802.1X EAPOL state machine logoff</para>
250 <para>IEEE 802.1X EAPOL state machine logon</para>
Deapol_test.sgml51 ways to IEEE 802.1X/EAPOL Authenticator state machines. In other
/external/scapy/test/
Dregression.uts546 pkt = Ether() / EAPOL() / EAP_MD5()
6349 + EAPOL class tests
6351 = EAPOL - Basic Instantiation
6352 raw(EAPOL()) == b'\x01\x00\x00\x00'
6354 = EAPOL - Instantiation with specific values
6355 raw(EAPOL(version = 3, type = 5)) == b'\x03\x05\x00\x00'
6357 = EAPOL - Dissection (1)
6359 eapol = EAPOL(s)
6364 = EAPOL - Dissection (2)
6366 eapol = EAPOL(s)
[all …]
/external/cpuinfo/test/dmesg/
Dgalaxy-s8-us.log5989 [ 27.910436] I[5:id.app.launcher: 4110] ETHER_TYPE_802_1X[wlan0] [RX]: EAPOL Packet, 4-way handsh…
5999 [ 27.959528] I[2: wpa_supplicant: 2123] ETHER_TYPE_802_1X[wlan0] [TX]: EAPOL Packet, 4-way handsh…
6004 [ 27.965796] I[5:com.sec.factory: 4089] ETHER_TYPE_802_1X[wlan0] [RX]: EAPOL Packet, 4-way handsh…
6006 [ 27.977727] I[3: wpa_supplicant: 2123] ETHER_TYPE_802_1X[wlan0] [TX]: EAPOL Packet, 4-way handsh…