Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 53) sorted by relevance

123

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1088 key_mgmt=WPA-EAP
1104 key_mgmt=WPA-EAP
1118 key_mgmt=WPA-EAP
1131 key_mgmt=WPA-EAP
1144 key_mgmt=WPA-EAP
1164 key_mgmt=WPA-PSK WPA-EAP
1181 key_mgmt=WPA-EAP
1191 key_mgmt=WPA-EAP
1227 key_mgmt=WPA-EAP
1236 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
19 - EAP-PAX with PAX_SEC
20 - EAP (RFC 3748)
22 - test what happens if authenticator sends EAP-Success before real EAP
32 - EAP-POTP/RSA SecurID profile (RFC 4793)
36 - consider redesigning pending EAP requests (identity/password/otp from
37 ctrl_iface) by moving the retrying of the previous request into EAP
45 * EAP options (one page for each method)
51 this should likely happen before EAP is initialized for authentication;
52 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
Dandroid.config74 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
78 # EAP-MD5
81 # EAP-MSCHAPv2
84 # EAP-TLS
90 # EAP-TTLS
93 # EAP-FAST
95 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
100 # EAP-GTC
103 # EAP-OTP
106 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
DChangeLog20 * fixed EAP-AKA' message parser with multiple AT_KDF attributes
41 * removed EAP-TTLS/MSCHAPv2 interoperability workaround so that
44 * modified EAP fast session resumption to allow results to be used only
82 three-byte encoding EAP methods that use NtPasswordHash
123 * slow down automatic connection attempts on EAP failure to meet
166 * EAP-pwd fixes
169 - fix possible segmentation fault on EAP method deinit if an invalid
173 * fixed EAP-SIM counter-too-small message
228 * added Session-Id derivation for EAP peer methods
250 * added EAP-EKE peer
[all …]
Ddefconfig86 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
90 # EAP-MD5
93 # EAP-MSCHAPv2
96 # EAP-TLS
102 # EAP-TTLS
105 # EAP-FAST
107 # for EAP-FAST support. Older OpenSSL releases would need to be patched, e.g.,
111 # EAP-GTC
114 # EAP-OTP
117 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
196 # Consortium to match the network, the EAP parameters need to be
200 # eap: Pre-configured EAP method
201 # This optional field can be used to specify which EAP method will be
202 # used with this credential. If not set, the EAP method is selected
366 > set_network 0 key_mgmt WPA-EAP
429 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
430 <3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
431 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
432 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config57 # Integrated EAP server
60 # EAP-MD5 for the integrated EAP server
63 # EAP-TLS for the integrated EAP server
66 # EAP-MSCHAPv2 for the integrated EAP server
69 # EAP-PEAP for the integrated EAP server
72 # EAP-GTC for the integrated EAP server
75 # EAP-TTLS for the integrated EAP server
78 # EAP-SIM for the integrated EAP server
81 # EAP-AKA for the integrated EAP server
84 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig60 # Integrated EAP server
63 # EAP-MD5 for the integrated EAP server
66 # EAP-TLS for the integrated EAP server
69 # EAP-MSCHAPv2 for the integrated EAP server
72 # EAP-PEAP for the integrated EAP server
75 # EAP-GTC for the integrated EAP server
78 # EAP-TTLS for the integrated EAP server
81 # EAP-SIM for the integrated EAP server
84 # EAP-AKA for the integrated EAP server
87 # EAP-AKA' for the integrated EAP server
[all …]
DChangeLog39 three-byte encoding EAP methods that use NtPasswordHash
46 * enforce full EAP authentication after RADIUS Disconnect-Request by
79 - added option for TLS protocol testing of an EAP peer by simulating
95 * EAP-pwd fixes
96 - fix possible segmentation fault on EAP method deinit if an invalid
106 - this could result in deinial of service in some EAP server cases
126 * added EAP-EKE server
158 * EAP-pwd:
173 implementations that can change SNonce for each EAP-Key 2/4
186 * EAP-SIM: fixed re-authentication not to update pseudonym
[all …]
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
12 # and as such, is suitable for EAP-AKA' test.
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
124 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
125 between a Supplicant and an Authenticator are sent using EAP over LAN
130 for EAP frame transmission. However, a more common configuration is to
131 use an external Authentication Server and encapsulate EAP frame in the
147 Authentication Server. hostapd supports RADIUS encapsulation of EAP
189 configuration, the co-located Authentication Server is not used and EAP
198 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c148 SM_STATE(EAP, DISABLED) in SM_STATE() argument
150 SM_ENTRY(EAP, DISABLED); in SM_STATE()
155 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
157 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
205 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
207 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
237 SM_STATE(EAP, IDLE) in SM_STATE() argument
239 SM_ENTRY(EAP, IDLE); in SM_STATE()
247 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
249 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/tcpdump/tests/
Deapon1.out14 EAP packet (0) v1, len 5
18 EAP packet (0) v1, len 5
19 EAP packet (0) v1, len 45
20 EAP packet (0) v1, len 20
21 EAP packet (0) v1, len 76
22 EAP packet (0) v1, len 80
23 EAP packet (0) v1, len 28
24 EAP packet (0) v1, len 4
31 EAP packet (0) v1, len 5
32 EAP packet (0) v1, len 45
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c151 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
153 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
201 SM_STATE(EAP, DISABLED) in SM_STATE() argument
203 SM_ENTRY(EAP, DISABLED); in SM_STATE()
219 SM_STATE(EAP, IDLE) in SM_STATE() argument
221 SM_ENTRY(EAP, IDLE); in SM_STATE()
229 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
233 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
245 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
251 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
63 key_mgmt=WPA-EAP
77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
86 key_mgmt=WPA-EAP
98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
108 key_mgmt=WPA-EAP
122 (require both unicast and broadcast); use EAP-TLS for
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
202 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml55 Authenticator and EAP authentication with Authentication
99 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
100 completes EAP authentication with the
106 <para>If WPA-EAP: master key is received from the IEEE 802.1X
141 <para>WPA with EAP (e.g., with RADIUS authentication server)
147 <para>EAP-TLS</para>
153 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
158 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
162 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
166 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.microsoft36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
/external/chromium_org/chromeos/test/data/network/
Dvalid_wifi_clientref.onc7 "Security": "WPA-EAP",
9 "EAP": {
10 "Outer": "EAP-TLS",
Dwifi_clientcert_with_cert_pems.onc7 "Security": "WPA-EAP",
9 "EAP": {
10 "Outer": "EAP-TLS",
Dtoplevel_wifi_eap_clientcert_with_cert_pems.onc10 "Security": "WPA-EAP",
12 "EAP": {
13 "Outer": "EAP-TLS",

123