/dports/lang/erlang-runtime21/otp-OTP-21.3.8.24/lib/diameter/examples/dict/ |
H A D | rfc4072_eap.dia | 41 EAP-Master-Session-Key 464 OctetString - 42 EAP-Key-Name 102 OctetString - 43 EAP-Payload 462 OctetString - 44 EAP-Reissued-Payload 463 OctetString - 59 { EAP-Payload } 70 [ EAP-Key-Name ] 102 [ EAP-Payload ] 103 [ EAP-Reissued-Payload ] 104 [ EAP-Master-Session-Key ] 105 [ EAP-Key-Name ] [all …]
|
/dports/lang/erlang-java/otp-OTP-24.1.7/lib/diameter/examples/dict/ |
H A D | rfc4072_eap.dia | 41 EAP-Master-Session-Key 464 OctetString - 42 EAP-Key-Name 102 OctetString - 43 EAP-Payload 462 OctetString - 44 EAP-Reissued-Payload 463 OctetString - 59 { EAP-Payload } 70 [ EAP-Key-Name ] 102 [ EAP-Payload ] 103 [ EAP-Reissued-Payload ] 104 [ EAP-Master-Session-Key ] 105 [ EAP-Key-Name ] [all …]
|
/dports/net/hostapd/hostapd-2.9/hostapd/ |
H A D | defconfig | 65 # EAP-MD5 for the integrated EAP server 68 # EAP-TLS for the integrated EAP server 74 # EAP-PEAP for the integrated EAP server 77 # EAP-GTC for the integrated EAP server 80 # EAP-TTLS for the integrated EAP server 83 # EAP-SIM for the integrated EAP server 86 # EAP-AKA for the integrated EAP server 89 # EAP-AKA' for the integrated EAP server 93 # EAP-PAX for the integrated EAP server 102 # EAP-SAKE for the integrated EAP server [all …]
|
H A D | ChangeLog | 8 * EAP-pwd changes 445 * EAP-pwd: 474 * EAP-SIM: use Notification round before EAP-Failure 793 * added support for EAP Sequences in EAP-FAST Phase 2 795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST 835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1) 868 * updated EAP-PSK to use the IANA-allocated EAP type 47 915 EAP-SIM/EAP-AKA 1046 * EAP-PAX is now registered as EAP type 46 1120 authentication (EAP-PEAP, EAP-TTLS) [all …]
|
/dports/net/freeradius3/freeradius-server-3.0.25/src/tests/eapsim-03/ |
H A D | eapsim-sanitize.sed | 6 s/\(EAP-Message = 0x..\)\(.*\)/\1XX/ 7 s/\(EAP-Id = \).*/\1YY/ 8 s/\(EAP-Type-MD5 = \).*/\1MD5/ 9 s/\(EAP-Type-SIM = 0x0b0000010d0000abcd1234abcd1234abcd1234abcd1234bcd1234abcd1234abcd1234abcd1234a… 10 s/\(EAP-Type-SIM = 0x0b0000010d0000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f… 11 s/\(EAP-Type-SIM = 0x0b0000010d00003000000000000000000000000000000031000000000000000000000000000000… 13 s/\(EAP-Sim-MAC = 0x\)..................................../\1YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY/
|
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/ |
H A D | defconfig | 59 # EAP-MD5 for the integrated EAP server 62 # EAP-TLS for the integrated EAP server 68 # EAP-PEAP for the integrated EAP server 71 # EAP-GTC for the integrated EAP server 74 # EAP-TTLS for the integrated EAP server 77 # EAP-SIM for the integrated EAP server 80 # EAP-AKA for the integrated EAP server 83 # EAP-AKA' for the integrated EAP server 87 # EAP-PAX for the integrated EAP server 96 # EAP-SAKE for the integrated EAP server [all …]
|
H A D | ChangeLog | 8 * EAP-pwd changes 445 * EAP-pwd: 474 * EAP-SIM: use Notification round before EAP-Failure 793 * added support for EAP Sequences in EAP-FAST Phase 2 795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST 835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1) 868 * updated EAP-PSK to use the IANA-allocated EAP type 47 915 EAP-SIM/EAP-AKA 1046 * EAP-PAX is now registered as EAP type 46 1120 authentication (EAP-PEAP, EAP-TTLS) [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/ |
H A D | defconfig | 59 # EAP-MD5 for the integrated EAP server 62 # EAP-TLS for the integrated EAP server 68 # EAP-PEAP for the integrated EAP server 71 # EAP-GTC for the integrated EAP server 74 # EAP-TTLS for the integrated EAP server 77 # EAP-SIM for the integrated EAP server 80 # EAP-AKA for the integrated EAP server 83 # EAP-AKA' for the integrated EAP server 87 # EAP-PAX for the integrated EAP server 96 # EAP-SAKE for the integrated EAP server [all …]
|
H A D | ChangeLog | 8 * EAP-pwd changes 445 * EAP-pwd: 474 * EAP-SIM: use Notification round before EAP-Failure 793 * added support for EAP Sequences in EAP-FAST Phase 2 795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST 835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1) 868 * updated EAP-PSK to use the IANA-allocated EAP type 47 915 EAP-SIM/EAP-AKA 1046 * EAP-PAX is now registered as EAP type 46 1120 authentication (EAP-PEAP, EAP-TTLS) [all …]
|
/dports/security/logcheck/logcheck/rulefiles/linux/ignore.d.workstation/ |
H A D | wpasupplicant | 8 …0-9]s[0-9]): )?CTRL-EVENT-EAP-(STARTED EAP authentication started|SUCCESS EAP authentication compl… 9 ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wpa_supplicant\[[0-9]+\]: EAP-MSCHAPV2: Authentication succeeded$ 10 ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wpa_supplicant\[[0-9]+\]: EAP-TLV: TLV Result - Success - EAP-TL… 14 …pher=(TKIP|CCMP)|group_cipher=(TKIP|CCMP)|key_mgmt=WPA2?(-PSK|/IEEE 802.1X/EAP)|wpa_state=COMPLETE… 17 …ICATED|suppPortStatus=Authorized|EAP state=SUCCESS|selectedMethod=25 \(EAP-PEAP\)|EAP TLS cipher=D…
|
/dports/devel/fossology-nomos-standalone/fossology-3.11.0/src/nomos/agent_tests/testdata/NomosTestfiles/BSD/ |
H A D | defconfig | 110 # EAP-MD5 116 # EAP-TLS 122 # EAP-TTLS 125 # EAP-FAST 132 # EAP-GTC 135 # EAP-OTP 138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) 144 # EAP-PAX 150 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) 153 # EAP-SAKE [all …]
|
/dports/devel/fossology-nomos-standalone/fossology-3.11.0/src/nomos/agent_tests/testdata/NomosTestfiles/LGPL/ |
H A D | defconfig | 110 # EAP-MD5 116 # EAP-TLS 122 # EAP-TTLS 125 # EAP-FAST 132 # EAP-GTC 135 # EAP-OTP 138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) 144 # EAP-PAX 150 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) 153 # EAP-SAKE [all …]
|
/dports/databases/mongodb36/mongodb-src-r3.6.23/src/mongo/gotools/src/github.com/mongodb/mongo-tools/vendor/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 71 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 94 func (e *EAP) CanDecode() gopacket.LayerClass { argument 99 func (e *EAP) NextLayerType() gopacket.LayerType { argument 104 e := &EAP{}
|
/dports/databases/mongodb42-tools/mongo-tools-r4.2.17/vendor/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 71 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 94 func (e *EAP) CanDecode() gopacket.LayerClass { argument 99 func (e *EAP) NextLayerType() gopacket.LayerType { argument 104 e := &EAP{}
|
/dports/net-mgmt/netdisco-mibs/netdisco-mibs-4.010/nortel/ |
H A D | OPSUBP-DEVICE-SIGNALING-MIB.mib | 89 acting as an EAP access point. This attribute is sent with the 98 "A string that can be used to identify the interface on the EAP 99 access point on which the EAP session was started/ended. The format for 111 "The name of the user initiating the EAP session e.g. ?Joe?. This 120 "The groups the user initiating the EAP session is associated with. 153 "This is a unique sequence identifier for a EAP session start or 167 Inform message sent for a EAP session started event. It can be used to 168 correlate the EAP session end event with the notification for the EAP 181 "The reason for the EAP user session end event. This is used for 218 "This notification signifies that an EAP session was started on the [all …]
|
/dports/net-mgmt/observium/observium/mibs/nortel/ |
H A D | OPSUBP-DEVICE-SIGNALING-MIB | 89 acting as an EAP access point. This attribute is sent with the 98 "A string that can be used to identify the interface on the EAP 99 access point on which the EAP session was started/ended. The format for 111 "The name of the user initiating the EAP session e.g. ?Joe?. This 120 "The groups the user initiating the EAP session is associated with. 153 "This is a unique sequence identifier for a EAP session start or 167 Inform message sent for a EAP session started event. It can be used to 168 correlate the EAP session end event with the notification for the EAP 181 "The reason for the EAP user session end event. This is used for 218 "This notification signifies that an EAP session was started on the [all …]
|
/dports/net/goreplay/goreplay-1.2.0/vendor/github.com/google/gopacket/gopacket-1.1.18/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/net/goreplay/goreplay-1.2.0/vendor/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/misc/fq/fq-0.0.2/vendor/github.com/google/gopacket/layers/ |
H A D | eap.go | 36 type EAP struct { struct 46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument 49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument 79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument 102 func (e *EAP) CanDecode() gopacket.LayerClass { argument 107 func (e *EAP) NextLayerType() gopacket.LayerType { argument 112 e := &EAP{}
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/test/data/network/ |
H A D | managed_toplevel_with_password_variable.onc | 9 "Security": "WPA-EAP", 11 "EAP": { 12 "Outer": "EAP-TLS", 38 "Security": "WPA-EAP", 40 "EAP": { 41 "Outer": "EAP-TTLS",
|
H A D | managed_toplevel_with_no_password_variable.onc | 9 "Security": "WPA-EAP", 11 "EAP": { 12 "Outer": "EAP-TLS", 38 "Security": "WPA-EAP", 40 "EAP": { 41 "Outer": "EAP-TTLS",
|
/dports/net/freeradius3/freeradius-server-3.0.25/raddb/mods-available/ |
H A D | eap | 18 # The incoming EAP messages DO NOT specify which EAP 70 # Supported EAP-types 74 # EAP-MD5 575 # name = "EAP module" 731 # EAP-TLS 791 # The tunneled EAP session needs a default EAP type 855 # Unlike EAP-TLS, EAP-TTLS does not require a client 872 # EAP-PEAP 904 # The tunneled EAP session needs a default EAP type 997 # EAP-MSCHAPv2 [all …]
|