Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 57) sorted by relevance

123

/external/wpa_supplicant_6/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
DChangeLog42 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
47 * changed EAP-GPSK to use the IANA assigned EAP method type 51
55 * added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA
66 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
68 * updated OpenSSL code for EAP-FAST to use an updated version of the
93 * added support for EAP Sequences in EAP-FAST Phase 2
94 * added support for using TNC with EAP-FAST
97 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
99 * added fragmentation support for EAP-TNC
112 previously used for configuring user identity and key for EAP-PSK,
[all …]
Dwpa_supplicant.conf.orig107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
265 # WPA-EAP = WPA using EAP authentication
266 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
270 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms
271 # If not set, this defaults to: WPA-PSK WPA-EAP
276 # LEAP = LEAP/Network EAP (only used with LEAP)
[all …]
Dtodo.txt7 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
22 - EAP-PAX with PAX_SEC
23 - EAP (RFC 3748)
25 - test what happens if authenticator sends EAP-Success before real EAP
35 - EAP-POTP/RSA SecurID profile (RFC 4793)
41 - consider redesigning pending EAP requests (identity/password/otp from
42 ctrl_iface) by moving the retrying of the previous request into EAP
50 * EAP options (one page for each method)
56 this should likely happen before EAP is initialized for authentication;
57 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
Ddefconfig121 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
125 # EAP-MD5
128 # EAP-MSCHAPv2
131 # EAP-TLS
137 # EAP-TTLS
140 # EAP-FAST
142 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
147 # EAP-GTC
150 # EAP-OTP
153 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf.orig113 # EAP fast re-authentication
114 # By default, fast re-authentication is enabled for all EAP methods that
131 # Dynamic EAP methods
132 # If EAP methods were built dynamically as shared object files, they need to be
133 # loaded here before being used in the network blocks. By default, EAP methods
307 # WPA-EAP = WPA using EAP authentication
308 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
312 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms
313 # If not set, this defaults to: WPA-PSK WPA-EAP
318 # LEAP = LEAP/Network EAP (only used with LEAP)
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
19 - EAP-PAX with PAX_SEC
20 - EAP (RFC 3748)
22 - test what happens if authenticator sends EAP-Success before real EAP
32 - EAP-POTP/RSA SecurID profile (RFC 4793)
36 - consider redesigning pending EAP requests (identity/password/otp from
37 ctrl_iface) by moving the retrying of the previous request into EAP
45 * EAP options (one page for each method)
51 this should likely happen before EAP is initialized for authentication;
52 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DChangeLog8 automatic detection of EAP parameters
16 * EAP-TNC: add Flags field into fragment acknowledgement (needed to
141 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
146 * changed EAP-GPSK to use the IANA assigned EAP method type 51
154 * added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA
165 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
167 * updated OpenSSL code for EAP-FAST to use an updated version of the
192 * added support for EAP Sequences in EAP-FAST Phase 2
193 * added support for using TNC with EAP-FAST
196 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
[all …]
/external/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Deap.c105 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
107 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
148 SM_STATE(EAP, DISABLED) in SM_STATE() argument
150 SM_ENTRY(EAP, DISABLED); in SM_STATE()
160 SM_STATE(EAP, IDLE) in SM_STATE() argument
162 SM_ENTRY(EAP, IDLE); in SM_STATE()
170 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
175 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
187 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
192 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
DChangeLog23 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
34 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
43 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
44 attributes in EAP-SIM Start/Response when using fast reauthentication
54 * updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest
67 * fixed a potential EAP state machine loop when mloving from PSK to EAP
73 * updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest
76 * fixed EAP-TTLS implementation not to crash on use of freed memory
78 * fixed EAP-AKA Notification processing to allow Notification to be
82 * updated EAP-SAKE to RFC 4763 and the IANA-allocated EAP type 48
[all …]
Dwpa_supplicant.conf.orig107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
209 # WPA-EAP = WPA using EAP authentication (this can use an external
210 # program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
211 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
214 # If not set, this defaults to: WPA-PSK WPA-EAP
219 # LEAP = LEAP/Network EAP (only used with LEAP)
[all …]
Ddefconfig106 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
110 # EAP-MD5
113 # EAP-MSCHAPv2
116 # EAP-TLS
122 # EAP-TTLS
125 # EAP-FAST
127 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
132 # EAP-GTC
135 # EAP-OTP
138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
D.config57 # Integrated EAP server
60 # EAP-MD5 for the integrated EAP server
63 # EAP-TLS for the integrated EAP server
66 # EAP-MSCHAPv2 for the integrated EAP server
69 # EAP-PEAP for the integrated EAP server
72 # EAP-GTC for the integrated EAP server
75 # EAP-TTLS for the integrated EAP server
78 # EAP-SIM for the integrated EAP server
81 # EAP-AKA for the integrated EAP server
84 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig50 # Integrated EAP server
53 # EAP-MD5 for the integrated EAP server
56 # EAP-TLS for the integrated EAP server
59 # EAP-MSCHAPv2 for the integrated EAP server
62 # EAP-PEAP for the integrated EAP server
65 # EAP-GTC for the integrated EAP server
68 # EAP-TTLS for the integrated EAP server
71 # EAP-SIM for the integrated EAP server
74 # EAP-AKA for the integrated EAP server
77 # EAP-AKA' for the integrated EAP server
[all …]
DChangeLog9 * EAP-TNC: add Flags field into fragment acknowledgement (needed to
43 * EAP-FAST server: piggyback Phase 2 start with the end of Phase 1
67 * fixed EAPOL/EAP reauthentication when using an external RADIUS
69 * fixed TNC with EAP-TTLS
107 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
109 * changed EAP-GPSK to use the IANA assigned EAP method type 51
111 * fixed retransmission of EAP requests if no response is received
117 * updated OpenSSL code for EAP-FAST to use an updated version of the
127 * fixed EAP-TLS message processing for the last TLS message if it is
135 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c128 SM_STATE(EAP, DISABLED) in SM_STATE() argument
130 SM_ENTRY(EAP, DISABLED); in SM_STATE()
135 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
137 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
177 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
179 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
209 SM_STATE(EAP, IDLE) in SM_STATE() argument
211 SM_ENTRY(EAP, IDLE); in SM_STATE()
219 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
221 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap.c127 SM_STATE(EAP, DISABLED) in SM_STATE() argument
129 SM_ENTRY(EAP, DISABLED); in SM_STATE()
134 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
136 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
173 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
175 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
202 SM_STATE(EAP, IDLE) in SM_STATE() argument
204 SM_ENTRY(EAP, IDLE); in SM_STATE()
212 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
214 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/tcpdump/tests/
Deapon1.new14 EAP code=1 id=0 length=5
17 EAP code=1 id=1 length=0
18 EAP code=1 id=0 length=5
19 EAP code=1 id=0 length=45
20 EAP code=1 id=0 length=20
21 EAP code=1 id=0 length=76
22 EAP code=1 id=0 length=80
23 EAP code=1 id=0 length=28
24 EAP code=1 id=0 length=4
25 EAP code=1 id=3 length=57
[all …]
Deapon1.out14 EAP code=1 id=0 length=5
17 EAP code=1 id=1 length=0
18 EAP code=1 id=0 length=5
19 EAP code=1 id=0 length=45
20 EAP code=1 id=0 length=20
21 EAP code=1 id=0 length=76
22 EAP code=1 id=0 length=80
23 EAP code=1 id=0 length=28
24 EAP code=1 id=0 length=4
25 EAP code=1 id=3 length=57
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c134 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
136 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
179 SM_STATE(EAP, DISABLED) in SM_STATE() argument
181 SM_ENTRY(EAP, DISABLED); in SM_STATE()
191 SM_STATE(EAP, IDLE) in SM_STATE() argument
193 SM_ENTRY(EAP, IDLE); in SM_STATE()
201 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
205 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
217 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
222 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap.c133 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
135 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
178 SM_STATE(EAP, DISABLED) in SM_STATE() argument
180 SM_ENTRY(EAP, DISABLED); in SM_STATE()
190 SM_STATE(EAP, IDLE) in SM_STATE() argument
192 SM_ENTRY(EAP, IDLE); in SM_STATE()
200 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
204 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
216 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
221 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]

123