Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 43) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1381 key_mgmt=WPA-EAP
1397 key_mgmt=WPA-EAP
1411 key_mgmt=WPA-EAP
1424 key_mgmt=WPA-EAP
1437 key_mgmt=WPA-EAP
1457 key_mgmt=WPA-PSK WPA-EAP
1474 key_mgmt=WPA-EAP
1484 key_mgmt=WPA-EAP
1520 key_mgmt=WPA-EAP
1529 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DChangeLog6 * fixed EAP-pwd last fragment validation
8 * fixed EAP-pwd unexpected Confirm message processing
77 * EAP-pwd: added support for Brainpool Elliptic Curves
117 * EAP-PEAP: fixed interoperability issue with Windows 2012r2 server
119 * EAP-TTLS: fixed success after fragmented final Phase 2 message
127 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
132 * Interworking: add credential realm to EAP-TLS identity
154 * fixed EAP-pwd peer missing payload length validation
170 * added support for hashed password (NtHash) in EAP-pwd peer
189 * added EAP-EKE peer support for deriving Session-Id
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
Ddefconfig86 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
90 # EAP-MD5
93 # EAP-MSCHAPv2
96 # EAP-TLS
102 # EAP-TTLS
105 # EAP-FAST
107 # for EAP-FAST support. Older OpenSSL releases would need to be patched, e.g.,
111 # EAP-GTC
114 # EAP-OTP
117 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
Dandroid.config74 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
78 # EAP-MD5
81 # EAP-MSCHAPv2
84 # EAP-TLS
90 # EAP-TTLS
93 # EAP-FAST
95 # for EAP-FAST support. Older OpenSSL releases would need to be patched, e.g.,
99 # EAP-GTC
102 # EAP-OTP
105 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
196 # Consortium to match the network, the EAP parameters need to be
200 # eap: Pre-configured EAP method
201 # This optional field can be used to specify which EAP method will be
202 # used with this credential. If not set, the EAP method is selected
366 > set_network 0 key_mgmt WPA-EAP
429 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
430 <3>CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
431 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
432 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
[all …]
/external/wpa_supplicant_8/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config56 # Integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
83 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig59 # Integrated EAP server
62 # EAP Re-authentication Protocol (ERP) in integrated EAP server
65 # EAP-MD5 for the integrated EAP server
68 # EAP-TLS for the integrated EAP server
71 # EAP-MSCHAPv2 for the integrated EAP server
74 # EAP-PEAP for the integrated EAP server
77 # EAP-GTC for the integrated EAP server
80 # EAP-TTLS for the integrated EAP server
83 # EAP-SIM for the integrated EAP server
86 # EAP-AKA for the integrated EAP server
[all …]
DChangeLog4 * fixed EAP-pwd last fragment validation
20 * EAP-pwd: added support for Brainpool Elliptic Curves
35 * EAP-PEAP: support fast-connect crypto binding
56 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
81 * fixed EAP-pwd server missing payload length validation
91 * added support for hashed password (NtHash) in EAP-pwd server
93 * added EAP-EKE server support for deriving Session-Id
105 * added EAP server support for TLS session resumption
113 * allow OpenSSL cipher configuration to be set for internal EAP server
133 * add support for EAP Re-Authentication Protocol (ERP)
[all …]
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
118 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
119 between a Supplicant and an Authenticator are sent using EAP over LAN
124 for EAP frame transmission. However, a more common configuration is to
125 use an external Authentication Server and encapsulate EAP frame in the
141 Authentication Server. hostapd supports RADIUS encapsulation of EAP
183 configuration, the co-located Authentication Server is not used and EAP
192 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
[all …]
/external/tcpdump/tests/
Deapon1.out14 EAP packet (0) v1, len 5
18 EAP packet (0) v1, len 5
19 EAP packet (0) v1, len 45
20 EAP packet (0) v1, len 20
21 EAP packet (0) v1, len 76
22 EAP packet (0) v1, len 80
23 EAP packet (0) v1, len 28
24 EAP packet (0) v1, len 4
31 EAP packet (0) v1, len 5
32 EAP packet (0) v1, len 45
[all …]
Dradius-v.out12 EAP-Message Attribute (79), length: 19, Value: .
21 EAP-Message Attribute (79), length: 24, Value: ..
36 EAP-Message Attribute (79), length: 36, Value: ..
45 EAP-Message Attribute (79), length: 6, Value: ..
/external/wpa_supplicant_8/src/eap_server/
Deap_server.c217 SM_STATE(EAP, DISABLED) in SM_STATE() argument
219 SM_ENTRY(EAP, DISABLED); in SM_STATE()
224 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
226 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
278 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
280 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
310 SM_STATE(EAP, IDLE) in SM_STATE() argument
312 SM_ENTRY(EAP, IDLE); in SM_STATE()
320 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
322 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap.c154 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
156 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
214 SM_STATE(EAP, DISABLED) in SM_STATE() argument
216 SM_ENTRY(EAP, DISABLED); in SM_STATE()
232 SM_STATE(EAP, IDLE) in SM_STATE() argument
234 SM_ENTRY(EAP, IDLE); in SM_STATE()
242 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
246 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
258 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
264 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
59 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
63 key_mgmt=WPA-EAP
77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
86 key_mgmt=WPA-EAP
98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
108 key_mgmt=WPA-EAP
122 (require both unicast and broadcast); use EAP-TLS for
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
202 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml55 Authenticator and EAP authentication with Authentication
99 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
100 completes EAP authentication with the
106 <para>If WPA-EAP: master key is received from the IEEE 802.1X
141 <para>WPA with EAP (e.g., with RADIUS authentication server)
147 <para>EAP-TLS</para>
153 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
158 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
162 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
166 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
Deapol_test.sgml11 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
43 <para>eapol_test is a program that links together the same EAP
51 test EAP methods without having to setup an access point and a
55 of EAP methods against RADIUS servers and in development testing
56 for new EAP methods. It can be easily used to automate EAP testing
59 from a RADIUS server. For example, the automated EAP tests described
71 <para>tries to complete EAP authentication based on the network
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.microsoft36 ATTRIBUTE MS-Acct-EAP-Type 24 integer Microsoft
73 VALUE MS-Acct-Auth-Type EAP 5
75 # MS-Acct-EAP-Type Values
77 VALUE MS-Acct-EAP-Type MD5 4
78 VALUE MS-Acct-EAP-Type OTP 5
79 VALUE MS-Acct-EAP-Type Generic-Token-Card 6
80 VALUE MS-Acct-EAP-Type TLS 13
/external/autotest/client/site_tests/network_8021xEapDetection/
Dcontrol7 PURPOSE = "Verify shill correctly detects EAP requests on a wired interface"
10 device after EAP traffic is sent to that interface.
18 Tests that we can detect EAP traffic on an interface.

12