Searched refs:EAPOL (Results 1 – 17 of 17) sorted by relevance
/external/tcpdump/tests/ |
D | eapon1.out | 17 EAPOL start (1) v1, len 0 25 EAPOL key (3) v1, len 57 26 EAPOL key (3) v1, len 44 30 EAPOL start (1) v1, len 0 38 EAPOL key (3) v1, len 57 39 EAPOL key (3) v1, len 44 53 EAPOL start (1) v1, len 0 64 EAPOL key (3) v1, len 57 65 EAPOL key (3) v1, len 44 104 EAPOL start (1) v1, len 0 [all …]
|
/external/scapy/scapy/layers/ |
D | eap.py | 61 class EAPOL(Packet): class 87 if isinstance(other, EAPOL): 748 bind_layers( Ether, EAPOL, type=34958) 749 bind_layers( Ether, EAPOL, dst='01:80:c2:00:00:03', type=34958) 750 bind_layers( CookedLinux, EAPOL, proto=34958) 751 bind_layers( GRE, EAPOL, proto=34958) 752 bind_layers( EAPOL, EAP, type=0) 753 bind_layers( SNAP, EAPOL, code=34958) 754 bind_layers( EAPOL, MKAPDU, type=5)
|
/external/scapy/scapy/contrib/ |
D | wpa_eapol.py | 21 from scapy.layers.eap import EAPOL 47 bind_layers( EAPOL, WPA_key, type=3)
|
/external/scapy/scapy/modules/krack/ |
D | automaton.py | 18 from scapy.layers.eap import EAPOL 233 pkt = EAPOL(version="802.1X-2004", type="EAPOL-Key") 281 to_mic = raw(temp_mic[EAPOL]) 540 if EAPOL in pkt and pkt.addr1 == pkt.addr3 == self.mac and \ 541 pkt[EAPOL].load[1] == "\x01": 550 client_nonce = pkt[EAPOL].load[13:13 + 0x20] 557 client_mic = pkt[EAPOL].load[77:77 + 16] 558 client_data = raw(pkt[EAPOL]).replace(client_mic, "\x00" * len(client_mic)) 593 if EAPOL in pkt and pkt.addr1 == pkt.addr3 == self.mac and \ 594 pkt[EAPOL].load[1:3] == "\x03\x09": [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | todo.txt | 16 to see unencrypted EAPOL-Key frames at all.. 34 state machine so that EAPOL state machine is not needed for this 51 - try to work around race in receiving association event and first EAPOL
|
D | ChangeLog | 107 * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant 149 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 183 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case 247 * fixed EAPOL reauthentication after FT protocol run 296 unencrypted EAPOL frames 301 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set 397 * increase postponing of EAPOL-Start by one second with AP/GO that 406 EAPOL-Key descriptor version 3 when the station supports PMF even if 638 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM 976 * extend EAPOL frames processing workaround for roaming cases [all …]
|
D | README | 175 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP 177 needed to enable IEEE 802.1X/EAPOL and EAP methods. Note that EAP-MD5, 179 they should only be enabled if testing the EAPOL/EAP state 304 802.1X/EAPOL and EAP state machines and all EAP methods. Including 688 variables like EAPOL state machine parameters and trigger events like 748 status = get current WPA/EAPOL/EAP status 754 logoff = IEEE 802.1X EAPOL state machine logoff 755 logon = IEEE 802.1X EAPOL state machine logon
|
D | eap_testing.txt | 2 IEEE 802.1X/EAPOL authentication
|
D | android.config | 268 # in a bridge for EAPOL frames. This should be uncommented only if the kernel
|
D | defconfig | 308 # in a bridge for EAPOL frames. This should be uncommented only if the kernel
|
/external/wpa_supplicant_8/hostapd/ |
D | ChangeLog | 111 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection 120 * added option to configure EAPOL-Key retry limits 156 * fixed EAPOL reauthentication after FT protocol run 191 unencrypted EAPOL frames 263 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce 268 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled 439 use of the Secure bit in EAPOL-Key msg 3/4 459 having sent EAPOL-Key 3/4 to avoid issues with some supplicant 461 * added a workaround for EAPOL-Key 4/4 using incorrect type value in 512 * changed EAPOL transmission to use AC_VO if WMM is active [all …]
|
D | eap_testing.txt | 1 Interoperability testing of hostapd's IEEE 802.1X/EAPOL authentication
|
D | README | 119 (EAPOL) and the Authenticator relays these frames to the Authentication 135 receives 802.1X (EAPOL) frames from the Supplicant using the wlan#ap 183 frames will be relayed using EAPOL between the Supplicant and the
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_cli.sgml | 42 configure some variables like EAPOL state machine parameters and 201 <para>get current WPA/EAPOL/EAP status</para> 243 <para>IEEE 802.1X EAPOL state machine logoff</para> 250 <para>IEEE 802.1X EAPOL state machine logon</para>
|
D | eapol_test.sgml | 51 ways to IEEE 802.1X/EAPOL Authenticator state machines. In other
|
/external/scapy/test/ |
D | regression.uts | 546 pkt = Ether() / EAPOL() / EAP_MD5() 6349 + EAPOL class tests 6351 = EAPOL - Basic Instantiation 6352 raw(EAPOL()) == b'\x01\x00\x00\x00' 6354 = EAPOL - Instantiation with specific values 6355 raw(EAPOL(version = 3, type = 5)) == b'\x03\x05\x00\x00' 6357 = EAPOL - Dissection (1) 6359 eapol = EAPOL(s) 6364 = EAPOL - Dissection (2) 6366 eapol = EAPOL(s) [all …]
|
/external/cpuinfo/test/dmesg/ |
D | galaxy-s8-us.log | 5989 [ 27.910436] I[5:id.app.launcher: 4110] ETHER_TYPE_802_1X[wlan0] [RX]: EAPOL Packet, 4-way handsh… 5999 [ 27.959528] I[2: wpa_supplicant: 2123] ETHER_TYPE_802_1X[wlan0] [TX]: EAPOL Packet, 4-way handsh… 6004 [ 27.965796] I[5:com.sec.factory: 4089] ETHER_TYPE_802_1X[wlan0] [RX]: EAPOL Packet, 4-way handsh… 6006 [ 27.977727] I[3: wpa_supplicant: 2123] ETHER_TYPE_802_1X[wlan0] [TX]: EAPOL Packet, 4-way handsh…
|