Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 56) sorted by relevance

123

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1806 key_mgmt=WPA-EAP
1822 key_mgmt=WPA-EAP
1836 key_mgmt=WPA-EAP
1849 key_mgmt=WPA-EAP
1862 key_mgmt=WPA-EAP
1882 key_mgmt=WPA-PSK WPA-EAP
1899 key_mgmt=WPA-EAP
1909 key_mgmt=WPA-EAP
1945 key_mgmt=WPA-EAP
1954 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DChangeLog12 * EAP-pwd changes
24 * increased the maximum number of EAP message exchanges (mainly to
26 * fixed various issues in experimental support for EAP-TEAP peer
31 * fixed EAP-FAST peer with TLS GCM/CCM ciphers
50 * added EAP-TLS peer support for TLS 1.3 (disabled by default for now)
61 * EAP-pwd changes
66 * fixed FT-EAP initial mobility domain association using PMKSA caching
72 * extended EAP-SIM/AKA fast re-authentication to allow use with FILS
75 * added support for EAP-SIM/AKA using anonymous@realm identity
77 to ignore credentials without a specific EAP method
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
Dandroid.config71 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
75 # EAP-MD5
78 # EAP-MSCHAPv2
81 # EAP-TLS
88 # EAP-TTLS
91 # EAP-FAST
94 # EAP-GTC
97 # EAP-OTP
100 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
103 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
[all …]
Ddefconfig92 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method or
96 # EAP-MD5
99 # EAP-MSCHAPv2
102 # EAP-TLS
104 # Enable EAP-TLSv1.3 support by default (currently disabled unless explicitly
111 # EAP-TTLS
114 # EAP-FAST
117 # EAP-TEAP
118 # Note: The current EAP-TEAP implementation is experimental and should not be
119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
172 # This field is used with EAP-SIM/AKA/AKA' to encrypt the permanent
177 # This field is used to help the EAP-SIM/AKA/AKA' server to identify
206 # parameter. When using Home OIs to match the network, the EAP parameters
226 # Consortium to match the network, the EAP parameters need to be
245 # eap: Pre-configured EAP method
246 # This optional field can be used to specify which EAP method will be
247 # used with this credential. If not set, the EAP method is selected
418 > set_network 0 key_mgmt WPA-EAP
481 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config55 # Integrated EAP server
58 # EAP-MD5 for the integrated EAP server
61 # EAP-TLS for the integrated EAP server
64 # EAP-MSCHAPv2 for the integrated EAP server
67 # EAP-PEAP for the integrated EAP server
70 # EAP-GTC for the integrated EAP server
73 # EAP-TTLS for the integrated EAP server
76 # EAP-SIM for the integrated EAP server
79 # EAP-AKA for the integrated EAP server
82 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig53 # Integrated EAP server
56 # EAP Re-authentication Protocol (ERP) in integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
[all …]
DChangeLog13 * EAP-pwd changes
21 * fixed various issues in experimental support for EAP-TEAP server
23 increase the maximum number of EAP message exchanges (mainly to
24 support cases with very large certificates) for the EAP server
28 * fixed EAP-FAST server with TLS GCM/CCM ciphers
43 * added EAP-TLS server support for TLS 1.3 (disabled by default for now)
51 * EAP-pwd changes
55 * fixed FT-EAP initial mobility domain association using PMKSA caching
61 * added experimental support for EAP-TEAP server (RFC 7170)
62 * added experimental support for EAP-TLS server with TLS v1.3
[all …]
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
/external/tcpdump/tests/
Deapon1-nosmb.out14 14 15:17:35.622870 EAP packet (0) v1, len 5
18 18 15:17:36.158698 EAP packet (0) v1, len 5
19 19 15:17:37.766046 EAP packet (0) v1, len 45
20 20 15:17:37.790625 EAP packet (0) v1, len 20
21 21 15:17:37.830669 EAP packet (0) v1, len 76
22 22 15:17:37.848577 EAP packet (0) v1, len 80
23 23 15:17:38.661939 EAP packet (0) v1, len 28
24 24 15:17:38.685352 EAP packet (0) v1, len 4
31 31 15:18:08.696826 EAP packet (0) v1, len 5
32 32 15:18:08.713116 EAP packet (0) v1, len 45
[all …]
Deapon1.out14 14 15:17:35.622870 EAP packet (0) v1, len 5
18 18 15:17:36.158698 EAP packet (0) v1, len 5
19 19 15:17:37.766046 EAP packet (0) v1, len 45
20 20 15:17:37.790625 EAP packet (0) v1, len 20
21 21 15:17:37.830669 EAP packet (0) v1, len 76
22 22 15:17:37.848577 EAP packet (0) v1, len 80
23 23 15:17:38.661939 EAP packet (0) v1, len 28
24 24 15:17:38.685352 EAP packet (0) v1, len 4
31 31 15:18:08.696826 EAP packet (0) v1, len 5
32 32 15:18:08.713116 EAP packet (0) v1, len 45
[all …]
Deapon1-v-nosmb.out32 14 15:17:35.622870 EAP packet (0) v1, len 5, Request (1), id 1, len 5
65 18 15:17:36.158698 EAP packet (0) v1, len 5, Request (1), id 2, len 5
67 19 15:17:37.766046 EAP packet (0) v1, len 45, Response (2), id 2, len 45
69 20 15:17:37.790625 EAP packet (0) v1, len 20, Request (1), id 16, len 20
71 21 15:17:37.830669 EAP packet (0) v1, len 76, Response (2), id 16, len 76
73 22 15:17:37.848577 EAP packet (0) v1, len 80, Request (1), id 17, len 80
75 23 15:17:38.661939 EAP packet (0) v1, len 28, Response (2), id 17, len 28
77 24 15:17:38.685352 EAP packet (0) v1, len 4, Success (3), id 0, len 4
126 31 15:18:08.696826 EAP packet (0) v1, len 5, Request (1), id 3, len 5
128 32 15:18:08.713116 EAP packet (0) v1, len 45, Response (2), id 3, len 45
[all …]
Deapon1-v.out32 14 15:17:35.622870 EAP packet (0) v1, len 5, Request (1), id 1, len 5
65 18 15:17:36.158698 EAP packet (0) v1, len 5, Request (1), id 2, len 5
67 19 15:17:37.766046 EAP packet (0) v1, len 45, Response (2), id 2, len 45
69 20 15:17:37.790625 EAP packet (0) v1, len 20, Request (1), id 16, len 20
71 21 15:17:37.830669 EAP packet (0) v1, len 76, Response (2), id 16, len 76
73 22 15:17:37.848577 EAP packet (0) v1, len 80, Request (1), id 17, len 80
75 23 15:17:38.661939 EAP packet (0) v1, len 28, Response (2), id 17, len 28
77 24 15:17:38.685352 EAP packet (0) v1, len 4, Success (3), id 0, len 4
126 31 15:18:08.696826 EAP packet (0) v1, len 5, Request (1), id 3, len 5
128 32 15:18:08.713116 EAP packet (0) v1, len 45, Response (2), id 3, len 45
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
215 SM_ENTRY(EAP, DISABLED); in SM_STATE()
221 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
223 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
276 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
278 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
318 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
320 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/scapy/scapy/layers/
Deap.py188 class EAP(Packet): class
200 EAP.SUCCESS, EAP.FAILURE]),
202 lambda pkt:pkt.code == EAP.RESPONSE and pkt.type == 3),
205 … lambda pkt: pkt.code == EAP.RESPONSE and hasattr(pkt, 'type') and pkt.type == 1),
208 … lambda pkt: pkt.code == EAP.REQUEST and hasattr(pkt, 'type') and pkt.type == 1)
242 if isinstance(self, EAP):
244 elif issubclass(cls, EAP):
247 return super(EAP, self).haslayer(cls)
250 return super(EAP, self).getlayer(cls, nb=nb, _track=_track,
254 if isinstance(other, EAP):
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c216 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
218 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
279 SM_STATE(EAP, DISABLED) in SM_STATE() argument
281 SM_ENTRY(EAP, DISABLED); in SM_STATE()
298 SM_STATE(EAP, IDLE) in SM_STATE() argument
300 SM_ENTRY(EAP, IDLE); in SM_STATE()
308 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
312 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
328 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
334 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml49 EAP-TLS as work network.</para>
63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
67 key_mgmt=WPA-EAP
81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
90 key_mgmt=WPA-EAP
102 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
112 key_mgmt=WPA-EAP
126 (require both unicast and broadcast); use EAP-TLS for
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
206 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml60 Authenticator and EAP authentication with Authentication
104 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
105 completes EAP authentication with the
111 <para>If WPA-EAP: master key is received from the IEEE 802.1X
146 <para>WPA with EAP (e.g., with RADIUS authentication server)
152 <para>EAP-TLS</para>
158 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
163 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
167 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
171 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.microsoft36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13

123