Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 45) sorted by relevance

12

/netbsd/external/bsd/wpa/dist/wpa_supplicant/
H A Deap_testing.txt151 - EAP-TTLS / EAP-GTC
153 - EAP-TTLS / EAP-TLS
209 - EAP-TTLS / EAP-TLS
230 - EAP-TTLS / EAP-GTC
271 - EAP-TTLS / EAP-GTC
272 - EAP-TTLS / EAP-OTP
274 - EAP-TTLS / EAP-TLS
300 - EAP-TTLS / EAP-GTC
302 - EAP-TTLS / EAP-TLS
329 - EAP-TTLS / EAP-GTC
[all …]
H A Dwpa_supplicant.conf1570 key_mgmt=WPA-EAP
1586 key_mgmt=WPA-EAP
1600 key_mgmt=WPA-EAP
1613 key_mgmt=WPA-EAP
1626 key_mgmt=WPA-EAP
1663 key_mgmt=WPA-EAP
1673 key_mgmt=WPA-EAP
1709 key_mgmt=WPA-EAP
1718 key_mgmt=WPA-EAP
1729 key_mgmt=WPA-EAP
[all …]
H A Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
50 could very well be done before EAP has been started
[all …]
H A DChangeLog8 * EAP-pwd changes
801 * EAP-AKA: keep pseudonym identity across EAP exchanges to match EAP-SIM
885 (EAP-PEAP/TLS, EAP-TTLS/TLS, EAP-FAST/TLS) to support different CA
1363 EAP-PAX, EAP-SAKE, and EAP-GPSK. 'identity' field is now used as the
1963 * EAP-PAX is now registered as EAP type 46
2070 EAP-PEAP and EAP-TTLS
2313 EAP-TTLS/EAP-OTP, EAP-PEAPv0/OTP, EAP-PEAPv1/OTP, EAP-OTP
2370 EAP-TTLS/EAP-MD5-Challenge
2371 EAP-TTLS/EAP-GTC
2372 EAP-TTLS/EAP-MSCHAPv2
[all …]
H A DREADME64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
67 * EAP-TTLS/EAP-MSCHAPv2
68 * EAP-TTLS/EAP-TLS
167 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS:
174 One of these libraries is needed when EAP-TLS, EAP-PEAP, EAP-TTLS, or
178 EAP-GTC, EAP-OTP, and EAP-MSCHAPV2 cannot be used alone with WPA, so
181 algorithms with EAP-PEAP and EAP-TTLS.
329 authentication algorithm (for EAP-SIM/EAP-AKA/EAP-AKA'). This requires pcsc-lite
[all …]
H A Ddefconfig96 # EAP-MD5
102 # EAP-TLS
108 # EAP-TTLS
111 # EAP-FAST
114 # EAP-TEAP
124 # EAP-GTC
127 # EAP-OTP
130 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
142 # EAP-PAX
182 # EAP-EKE
[all …]
H A Dandroid.config78 # EAP-MD5
84 # EAP-TLS
90 # EAP-TTLS
93 # EAP-FAST
96 # EAP-GTC
99 # EAP-OTP
102 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
111 # EAP-PAX
117 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used)
151 # EAP-EKE
[all …]
H A DREADME-HS20444 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
446 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
447 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
460 WPA-EAP
485 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
487 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
488 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
509 EAP state=SUCCESS
510 selectedMethod=21 (EAP-TTLS)
511 EAP TLS cipher=AES-128-SHA
[all …]
/netbsd/external/bsd/wpa/dist/hostapd/
H A Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
21 EAP-TLS + + +1 + +
46 EAP-TTLS/EAP-MD5 + - - - - +
47 EAP-TTLS/EAP-GTC + + - - -
48 EAP-TTLS/EAP-MSCHAPv2 + + - - -
49 EAP-TTLS/EAP-TLS + F - - -
50 EAP-TTLS/EAP-SIM + + - - -
51 EAP-TTLS/EAP-AKA + + - - -
53 EAP-SIM + + - - +
[all …]
H A Dhostapd.eap_user1 # hostapd user database for integrated EAP server
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
46 # Tunneled EAP methods are configured with standard EAP method name and [2]
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
[all …]
H A Dandroid.config59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
83 # EAP-AKA' for the integrated EAP server
87 # EAP-PAX for the integrated EAP server
93 # EAP-SAKE for the integrated EAP server
[all …]
H A Ddefconfig65 # EAP-MD5 for the integrated EAP server
68 # EAP-TLS for the integrated EAP server
74 # EAP-PEAP for the integrated EAP server
77 # EAP-GTC for the integrated EAP server
80 # EAP-TTLS for the integrated EAP server
83 # EAP-SIM for the integrated EAP server
86 # EAP-AKA for the integrated EAP server
89 # EAP-AKA' for the integrated EAP server
93 # EAP-PAX for the integrated EAP server
102 # EAP-SAKE for the integrated EAP server
[all …]
H A DChangeLog8 * EAP-pwd changes
445 * EAP-pwd:
474 * EAP-SIM: use Notification round before EAP-Failure
793 * added support for EAP Sequences in EAP-FAST Phase 2
795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1)
868 * updated EAP-PSK to use the IANA-allocated EAP type 47
915 EAP-SIM/EAP-AKA
1046 * EAP-PAX is now registered as EAP type 46
1120 authentication (EAP-PEAP, EAP-TTLS)
[all …]
H A Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
H A Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
H A DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
117 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
118 between a Supplicant and an Authenticator are sent using EAP over LAN
123 for EAP frame transmission. However, a more common configuration is to
124 use an external Authentication Server and encapsulate EAP frame in the
140 Authentication Server. hostapd supports RADIUS encapsulation of EAP
191 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
263 an external authentication server (e.g., RADIUS) and EAP just like
[all …]
/netbsd/external/bsd/tcpdump/dist/tests/
H A Deapon2.out4 EAP packet (0) v1, len 5
8 EAP packet (0) v1, len 5
9 EAP packet (0) v1, len 45
10 EAP packet (0) v1, len 20
11 EAP packet (0) v1, len 76
12 EAP packet (0) v1, len 80
13 EAP packet (0) v1, len 28
14 EAP packet (0) v1, len 4
21 EAP packet (0) v1, len 5
22 EAP packet (0) v1, len 45
[all …]
H A Deapon1.out14 EAP packet (0) v1, len 5
18 EAP packet (0) v1, len 5
19 EAP packet (0) v1, len 45
20 EAP packet (0) v1, len 20
21 EAP packet (0) v1, len 76
22 EAP packet (0) v1, len 80
23 EAP packet (0) v1, len 28
24 EAP packet (0) v1, len 4
31 EAP packet (0) v1, len 5
32 EAP packet (0) v1, len 45
[all …]
/netbsd/external/bsd/wpa/dist/src/eap_server/
H A Deap_server.c214 SM_STATE(EAP, DISABLED) in SM_STATE() argument
307 SM_STATE(EAP, IDLE) in SM_STATE() argument
309 SM_ENTRY(EAP, IDLE); in SM_STATE()
332 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
342 SM_STATE(EAP, DISCARD) in SM_STATE() argument
589 SM_STATE(EAP, NAK) in SM_STATE() argument
596 SM_ENTRY(EAP, NAK); in SM_STATE()
643 SM_STATE(EAP, FAILURE) in SM_STATE() argument
998 SM_STATE(EAP, IDLE2) in SM_STATE() argument
1157 SM_STEP(EAP) in SM_STEP() argument
[all …]
/netbsd/external/bsd/wpa/dist/src/eap_peer/
H A Deap.c275 SM_STATE(EAP, DISABLED) in SM_STATE() argument
293 SM_STATE(EAP, IDLE) in SM_STATE() argument
295 SM_ENTRY(EAP, IDLE); in SM_STATE()
303 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
870 SM_STATE(EAP, METHOD) in SM_STATE() argument
971 SM_STATE(EAP, DISCARD) in SM_STATE() argument
1034 SM_STATE(EAP, SUCCESS) in SM_STATE() argument
1072 SM_STATE(EAP, FAILURE) in SM_STATE() argument
1261 SM_ENTER(EAP, IDLE); in eap_peer_sm_step_local()
1320 SM_STEP(EAP) in SM_STEP() argument
[all …]
/netbsd/external/bsd/wpa/dist/wpa_supplicant/doc/docbook/
H A Dwpa_supplicant.conf.sgml45 EAP-TLS as work network.</para>
63 key_mgmt=WPA-EAP
77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
86 key_mgmt=WPA-EAP
98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
108 key_mgmt=WPA-EAP
122 (require both unicast and broadcast); use EAP-TLS for
155 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
202 <para>Some EAP authentication methods require use of
203 certificates. EAP-TLS uses both server side and client
[all …]
H A Dwpa_supplicant.sgml99 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
100 completes EAP authentication with the
147 <para>EAP-TLS</para>
174 <para>EAP-TTLS/EAP-MD5-Challenge</para>
178 <para>EAP-TTLS/EAP-GTC</para>
181 <listitem><para>EAP-TTLS/EAP-OTP</para></listitem>
183 <listitem><para>EAP-TTLS/EAP-MSCHAPv2</para></listitem>
185 <listitem><para>EAP-TTLS/EAP-TLS</para></listitem>
195 <listitem><para>EAP-SIM</para></listitem>
197 <listitem><para>EAP-AKA</para></listitem>
[all …]
H A Deapol_test.sgml11 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
43 <para>eapol_test is a program that links together the same EAP
51 test EAP methods without having to setup an access point and a
55 of EAP methods against RADIUS servers and in development testing
56 for new EAP methods. It can be easily used to automate EAP testing
59 from a RADIUS server. For example, the automated EAP tests described
71 <para>tries to complete EAP authentication based on the network
/netbsd/external/bsd/ppp/dist/
H A DREADME.eap-srp1 EAP with MD5-Challenge and SRP-SHA1 support
8 The Extensible Authentication Protocol (EAP; RFC 2284) is a
37 The EAP-SRP patch described here is integrated into this version
79 On the EAP SRP-SHA1 server side, a secret verifier is required.
98 For EAP MD5-Challenge, both client and server use the existing
103 There are two main options relating to EAP available for the
106 refuse-eap - refuse to authenticate with EAP
110 The second option stores a pseudonym, if offered by the EAP
121 There are two main options for EAP on the server:
123 require-eap - require client to use EAP
[all …]
H A DREADME.eap-tls1 EAP-TLS authentication support for PPP
6 The Extensible Authentication Protocol (EAP; RFC 3748) is a
15 EAP-TLS (RFC 2716) incapsulates the TLS messages in EAP packets,
16 allowing TLS mutual authentication to be used as a generic EAP
20 This patch provide EAP-TLS support to pppd.
26 To build pppd with EAP-TLS support, OpenSSL (http://www.openssl.org)
33 On the client side there are two ways to configure EAP-TLS:
38 Insert a line for each system with which you use EAP-TLS.
60 Insert a line for each system with which you use EAP-TLS.
161 If you're setting up a pppd server, edit the EAP-TLS configuration file
[all …]

12