Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 38) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1184 key_mgmt=WPA-EAP
1200 key_mgmt=WPA-EAP
1214 key_mgmt=WPA-EAP
1227 key_mgmt=WPA-EAP
1240 key_mgmt=WPA-EAP
1260 key_mgmt=WPA-PSK WPA-EAP
1277 key_mgmt=WPA-EAP
1287 key_mgmt=WPA-EAP
1323 key_mgmt=WPA-EAP
1332 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
DChangeLog4 * allow OpenSSL cipher configuration to be set for internal EAP server
46 * add support for EAP Re-Authentication Protocol (ERP)
47 * fixed EAP-IKEv2 fragmentation reassembly
56 * include peer certificate in EAP events even without a separate probe
58 * add peer ceritficate alt subject name to EAP events
59 (CTRL-EVENT-EAP-PEER-ALT)
98 * fixed EAP-AKA' message parser with multiple AT_KDF attributes
119 * removed EAP-TTLS/MSCHAPv2 interoperability workaround so that
122 * modified EAP fast session resumption to allow results to be used only
160 three-byte encoding EAP methods that use NtPasswordHash
[all …]
Dandroid.config71 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
75 # EAP-MD5
78 # EAP-MSCHAPv2
81 # EAP-TLS
87 # EAP-TTLS
90 # EAP-FAST
92 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
97 # EAP-GTC
100 # EAP-OTP
103 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
Ddefconfig83 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
87 # EAP-MD5
90 # EAP-MSCHAPv2
93 # EAP-TLS
99 # EAP-TTLS
102 # EAP-FAST
104 # for EAP-FAST support. Older OpenSSL releases would need to be patched, e.g.,
108 # EAP-GTC
111 # EAP-OTP
114 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
196 # Consortium to match the network, the EAP parameters need to be
200 # eap: Pre-configured EAP method
201 # This optional field can be used to specify which EAP method will be
202 # used with this credential. If not set, the EAP method is selected
366 > set_network 0 key_mgmt WPA-EAP
429 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
430 <3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
431 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
432 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config53 # Integrated EAP server
56 # EAP-MD5 for the integrated EAP server
59 # EAP-TLS for the integrated EAP server
62 # EAP-MSCHAPv2 for the integrated EAP server
65 # EAP-PEAP for the integrated EAP server
68 # EAP-GTC for the integrated EAP server
71 # EAP-TTLS for the integrated EAP server
74 # EAP-SIM for the integrated EAP server
77 # EAP-AKA for the integrated EAP server
80 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig56 # Integrated EAP server
59 # EAP Re-authentication Protocol (ERP) in integrated EAP server
62 # EAP-MD5 for the integrated EAP server
65 # EAP-TLS for the integrated EAP server
68 # EAP-MSCHAPv2 for the integrated EAP server
71 # EAP-PEAP for the integrated EAP server
74 # EAP-GTC for the integrated EAP server
77 # EAP-TTLS for the integrated EAP server
80 # EAP-SIM for the integrated EAP server
83 # EAP-AKA for the integrated EAP server
[all …]
DChangeLog4 * allow OpenSSL cipher configuration to be set for internal EAP server
24 * add support for EAP Re-Authentication Protocol (ERP)
83 three-byte encoding EAP methods that use NtPasswordHash
90 * enforce full EAP authentication after RADIUS Disconnect-Request by
123 - added option for TLS protocol testing of an EAP peer by simulating
139 * EAP-pwd fixes
140 - fix possible segmentation fault on EAP method deinit if an invalid
150 - this could result in deinial of service in some EAP server cases
170 * added EAP-EKE server
202 * EAP-pwd:
[all …]
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
118 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
119 between a Supplicant and an Authenticator are sent using EAP over LAN
124 for EAP frame transmission. However, a more common configuration is to
125 use an external Authentication Server and encapsulate EAP frame in the
141 Authentication Server. hostapd supports RADIUS encapsulation of EAP
183 configuration, the co-located Authentication Server is not used and EAP
192 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
[all …]
/external/tcpdump/tests/
Deapon1.out14 EAP packet (0) v1, len 5
18 EAP packet (0) v1, len 5
19 EAP packet (0) v1, len 45
20 EAP packet (0) v1, len 20
21 EAP packet (0) v1, len 76
22 EAP packet (0) v1, len 80
23 EAP packet (0) v1, len 28
24 EAP packet (0) v1, len 4
31 EAP packet (0) v1, len 5
32 EAP packet (0) v1, len 45
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c216 SM_STATE(EAP, DISABLED) in SM_STATE() argument
218 SM_ENTRY(EAP, DISABLED); in SM_STATE()
223 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
225 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
277 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
279 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
309 SM_STATE(EAP, IDLE) in SM_STATE() argument
311 SM_ENTRY(EAP, IDLE); in SM_STATE()
319 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
321 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c152 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
154 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
204 SM_STATE(EAP, DISABLED) in SM_STATE() argument
206 SM_ENTRY(EAP, DISABLED); in SM_STATE()
222 SM_STATE(EAP, IDLE) in SM_STATE() argument
224 SM_ENTRY(EAP, IDLE); in SM_STATE()
232 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
236 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
248 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
254 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
63 key_mgmt=WPA-EAP
77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
86 key_mgmt=WPA-EAP
98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
108 key_mgmt=WPA-EAP
122 (require both unicast and broadcast); use EAP-TLS for
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
202 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml55 Authenticator and EAP authentication with Authentication
99 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
100 completes EAP authentication with the
106 <para>If WPA-EAP: master key is received from the IEEE 802.1X
141 <para>WPA with EAP (e.g., with RADIUS authentication server)
147 <para>EAP-TLS</para>
153 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
158 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
162 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
166 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
Deapol_test.sgml11 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
43 <para>eapol_test is a program that links together the same EAP
51 test EAP methods without having to setup an access point and a
55 of EAP methods against RADIUS servers and in development testing
56 for new EAP methods. It can be easily used to automate EAP testing
59 from a RADIUS server. For example, the automated EAP tests described
71 <para>tries to complete EAP authentication based on the network
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.microsoft36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui85 <string>WPA-Enterprise (EAP)</string>
95 <string>WPA2-Enterprise (EAP)</string>
157 <string>EAP method</string>
181 <string>Username/Identity for EAP methods</string>
198 <string>Password for EAP methods</string>
/external/wpa_supplicant_8/wpa_supplicant/examples/
Dwpa2-eap-ccmp.conf7 key_mgmt=WPA-EAP

12