/external/wpa_supplicant_6/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 11 - For EAP methods that generate keying material, the key derived by the 52 EAP-MD5 + - - + + + + + - - + + 53 EAP-GTC + - - ? + + + + - - + - 54 EAP-OTP - - - - - + - - - - - - 55 EAP-MSCHAPv2 + - - + + + + + - - + - 56 EAP-TLS + + + + + + + + - - + + 57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + + 58 EAP-PEAPv0/GTC + - + - + + + + - - + + 59 EAP-PEAPv0/OTP - - - - - + - - - - - - [all …]
|
D | ChangeLog | 42 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf) 47 * changed EAP-GPSK to use the IANA assigned EAP method type 51 55 * added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA 66 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits, 68 * updated OpenSSL code for EAP-FAST to use an updated version of the 93 * added support for EAP Sequences in EAP-FAST Phase 2 94 * added support for using TNC with EAP-FAST 97 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to 99 * added fragmentation support for EAP-TNC 112 previously used for configuring user identity and key for EAP-PSK, [all …]
|
D | wpa_supplicant.conf.orig | 107 # EAP fast re-authentication 108 # By default, fast re-authentication is enabled for all EAP methods that 125 # Dynamic EAP methods 126 # If EAP methods were built dynamically as shared object files, they need to be 127 # loaded here before being used in the network blocks. By default, EAP methods 265 # WPA-EAP = WPA using EAP authentication 266 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 270 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms 271 # If not set, this defaults to: WPA-PSK WPA-EAP 276 # LEAP = LEAP/Network EAP (only used with LEAP) [all …]
|
D | todo.txt | 7 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA 22 - EAP-PAX with PAX_SEC 23 - EAP (RFC 3748) 25 - test what happens if authenticator sends EAP-Success before real EAP 35 - EAP-POTP/RSA SecurID profile (RFC 4793) 41 - consider redesigning pending EAP requests (identity/password/otp from 42 ctrl_iface) by moving the retrying of the previous request into EAP 50 * EAP options (one page for each method) 56 this should likely happen before EAP is initialized for authentication; 57 now IMSI is read only after receiving EAP-Identity/Request, but since it is [all …]
|
D | defconfig | 121 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is 125 # EAP-MD5 128 # EAP-MSCHAPv2 131 # EAP-TLS 137 # EAP-TTLS 140 # EAP-FAST 142 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL, 147 # EAP-GTC 150 # EAP-OTP 153 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 11 - For EAP methods that generate keying material, the key derived by the 52 EAP-MD5 + - - + + + + + - - + + 53 EAP-GTC + - - ? + + + + - - + - 54 EAP-OTP - - - - - + - - - - - - 55 EAP-MSCHAPv2 + - - + + + + + - - + - 56 EAP-TLS + + + + + + + + - - + + 57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + + 58 EAP-PEAPv0/GTC + - + - + + + + - - + + 59 EAP-PEAPv0/OTP - - - - - + - - - - - - [all …]
|
D | wpa_supplicant.conf.orig | 113 # EAP fast re-authentication 114 # By default, fast re-authentication is enabled for all EAP methods that 131 # Dynamic EAP methods 132 # If EAP methods were built dynamically as shared object files, they need to be 133 # loaded here before being used in the network blocks. By default, EAP methods 307 # WPA-EAP = WPA using EAP authentication 308 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 312 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms 313 # If not set, this defaults to: WPA-PSK WPA-EAP 318 # LEAP = LEAP/Network EAP (only used with LEAP) [all …]
|
D | todo.txt | 4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA 19 - EAP-PAX with PAX_SEC 20 - EAP (RFC 3748) 22 - test what happens if authenticator sends EAP-Success before real EAP 32 - EAP-POTP/RSA SecurID profile (RFC 4793) 36 - consider redesigning pending EAP requests (identity/password/otp from 37 ctrl_iface) by moving the retrying of the previous request into EAP 45 * EAP options (one page for each method) 51 this should likely happen before EAP is initialized for authentication; 52 now IMSI is read only after receiving EAP-Identity/Request, but since it is [all …]
|
D | ChangeLog | 8 automatic detection of EAP parameters 16 * EAP-TNC: add Flags field into fragment acknowledgement (needed to 141 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf) 146 * changed EAP-GPSK to use the IANA assigned EAP method type 51 154 * added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA 165 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits, 167 * updated OpenSSL code for EAP-FAST to use an updated version of the 192 * added support for EAP Sequences in EAP-FAST Phase 2 193 * added support for using TNC with EAP-FAST 196 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to [all …]
|
/external/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 11 - For EAP methods that generate keying material, the key derived by the 52 EAP-MD5 + - - + + + + + - - + + 53 EAP-GTC + - - ? + + + + - - + - 54 EAP-OTP - - - - - + - - - - - - 55 EAP-MSCHAPv2 + - - + + + + + - - + - 56 EAP-TLS + + + + + + + + - - + + 57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + + 58 EAP-PEAPv0/GTC + - + - + + + + - - + + 59 EAP-PEAPv0/OTP - - - - - + - - - - - - [all …]
|
D | eap.c | 105 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument 107 SM_ENTRY(EAP, INITIALIZE); in SM_STATE() 148 SM_STATE(EAP, DISABLED) in SM_STATE() argument 150 SM_ENTRY(EAP, DISABLED); in SM_STATE() 160 SM_STATE(EAP, IDLE) in SM_STATE() argument 162 SM_ENTRY(EAP, IDLE); in SM_STATE() 170 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 175 SM_ENTRY(EAP, RECEIVED); in SM_STATE() 187 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument 192 SM_ENTRY(EAP, GET_METHOD); in SM_STATE() [all …]
|
D | ChangeLog | 23 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits, 34 * fixed EAP-SIM and EAP-AKA message parser to validate attribute 43 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION 44 attributes in EAP-SIM Start/Response when using fast reauthentication 54 * updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest 67 * fixed a potential EAP state machine loop when mloving from PSK to EAP 73 * updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest 76 * fixed EAP-TTLS implementation not to crash on use of freed memory 78 * fixed EAP-AKA Notification processing to allow Notification to be 82 * updated EAP-SAKE to RFC 4763 and the IANA-allocated EAP type 48 [all …]
|
D | wpa_supplicant.conf.orig | 107 # EAP fast re-authentication 108 # By default, fast re-authentication is enabled for all EAP methods that 125 # Dynamic EAP methods 126 # If EAP methods were built dynamically as shared object files, they need to be 127 # loaded here before being used in the network blocks. By default, EAP methods 209 # WPA-EAP = WPA using EAP authentication (this can use an external 210 # program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication 211 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 214 # If not set, this defaults to: WPA-PSK WPA-EAP 219 # LEAP = LEAP/Network EAP (only used with LEAP) [all …]
|
D | defconfig | 106 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is 110 # EAP-MD5 113 # EAP-MSCHAPv2 116 # EAP-TLS 122 # EAP-TTLS 125 # EAP-FAST 127 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL, 132 # EAP-GTC 135 # EAP-OTP 138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | eap_testing.txt | 18 EAP-MD5 + - ? ? - 19 EAP-GTC + - ? - - 20 EAP-MSCHAPv2 + - ? - - 21 EAP-TLS + + +1 + + 22 EAP-PEAPv0/MSCHAPv2 + + + + + + 23 EAP-PEAPv0/GTC + + + - + 24 EAP-PEAPv0/MD5 + - + - - 25 EAP-PEAPv0/TLS + F - + + 26 EAP-PEAPv0/SIM + + - - - 27 EAP-PEAPv0/AKA + + - - - [all …]
|
D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 3 # Each line must contain an identity, EAP method(s), and an optional password 13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 27 # avoid having to configure every certificate for EAP-TLS authentication. The 32 # main purpose for this is to be able to avoid EAP method negotiation when the 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This [all …]
|
D | .config | 57 # Integrated EAP server 60 # EAP-MD5 for the integrated EAP server 63 # EAP-TLS for the integrated EAP server 66 # EAP-MSCHAPv2 for the integrated EAP server 69 # EAP-PEAP for the integrated EAP server 72 # EAP-GTC for the integrated EAP server 75 # EAP-TTLS for the integrated EAP server 78 # EAP-SIM for the integrated EAP server 81 # EAP-AKA for the integrated EAP server 84 # EAP-AKA' for the integrated EAP server [all …]
|
D | defconfig | 50 # Integrated EAP server 53 # EAP-MD5 for the integrated EAP server 56 # EAP-TLS for the integrated EAP server 59 # EAP-MSCHAPv2 for the integrated EAP server 62 # EAP-PEAP for the integrated EAP server 65 # EAP-GTC for the integrated EAP server 68 # EAP-TTLS for the integrated EAP server 71 # EAP-SIM for the integrated EAP server 74 # EAP-AKA for the integrated EAP server 77 # EAP-AKA' for the integrated EAP server [all …]
|
D | ChangeLog | 9 * EAP-TNC: add Flags field into fragment acknowledgement (needed to 43 * EAP-FAST server: piggyback Phase 2 start with the end of Phase 1 67 * fixed EAPOL/EAP reauthentication when using an external RADIUS 69 * fixed TNC with EAP-TTLS 107 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf) 109 * changed EAP-GPSK to use the IANA assigned EAP method type 51 111 * fixed retransmission of EAP requests if no response is received 117 * updated OpenSSL code for EAP-FAST to use an updated version of the 127 * fixed EAP-TLS message processing for the last TLS message if it is 135 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server.c | 128 SM_STATE(EAP, DISABLED) in SM_STATE() argument 130 SM_ENTRY(EAP, DISABLED); in SM_STATE() 135 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument 137 SM_ENTRY(EAP, INITIALIZE); in SM_STATE() 177 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument 179 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE() 209 SM_STATE(EAP, IDLE) in SM_STATE() argument 211 SM_ENTRY(EAP, IDLE); in SM_STATE() 219 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument 221 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap.c | 127 SM_STATE(EAP, DISABLED) in SM_STATE() argument 129 SM_ENTRY(EAP, DISABLED); in SM_STATE() 134 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument 136 SM_ENTRY(EAP, INITIALIZE); in SM_STATE() 173 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument 175 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE() 202 SM_STATE(EAP, IDLE) in SM_STATE() argument 204 SM_ENTRY(EAP, IDLE); in SM_STATE() 212 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument 214 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE() [all …]
|
/external/tcpdump/tests/ |
D | eapon1.new | 14 EAP code=1 id=0 length=5 17 EAP code=1 id=1 length=0 18 EAP code=1 id=0 length=5 19 EAP code=1 id=0 length=45 20 EAP code=1 id=0 length=20 21 EAP code=1 id=0 length=76 22 EAP code=1 id=0 length=80 23 EAP code=1 id=0 length=28 24 EAP code=1 id=0 length=4 25 EAP code=1 id=3 length=57 [all …]
|
D | eapon1.out | 14 EAP code=1 id=0 length=5 17 EAP code=1 id=1 length=0 18 EAP code=1 id=0 length=5 19 EAP code=1 id=0 length=45 20 EAP code=1 id=0 length=20 21 EAP code=1 id=0 length=76 22 EAP code=1 id=0 length=80 23 EAP code=1 id=0 length=28 24 EAP code=1 id=0 length=4 25 EAP code=1 id=3 length=57 [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 134 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument 136 SM_ENTRY(EAP, INITIALIZE); in SM_STATE() 179 SM_STATE(EAP, DISABLED) in SM_STATE() argument 181 SM_ENTRY(EAP, DISABLED); in SM_STATE() 191 SM_STATE(EAP, IDLE) in SM_STATE() argument 193 SM_ENTRY(EAP, IDLE); in SM_STATE() 201 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 205 SM_ENTRY(EAP, RECEIVED); in SM_STATE() 217 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument 222 SM_ENTRY(EAP, GET_METHOD); in SM_STATE() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap.c | 133 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument 135 SM_ENTRY(EAP, INITIALIZE); in SM_STATE() 178 SM_STATE(EAP, DISABLED) in SM_STATE() argument 180 SM_ENTRY(EAP, DISABLED); in SM_STATE() 190 SM_STATE(EAP, IDLE) in SM_STATE() argument 192 SM_ENTRY(EAP, IDLE); in SM_STATE() 200 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 204 SM_ENTRY(EAP, RECEIVED); in SM_STATE() 216 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument 221 SM_ENTRY(EAP, GET_METHOD); in SM_STATE() [all …]
|