Home
last modified time | relevance | path

Searched refs:EAP (Results 51 – 75 of 1098) sorted by relevance

12345678910>>...44

/dports/lang/erlang-runtime21/otp-OTP-21.3.8.24/lib/diameter/examples/dict/
H A Drfc4072_eap.dia41 EAP-Master-Session-Key 464 OctetString -
42 EAP-Key-Name 102 OctetString -
43 EAP-Payload 462 OctetString -
44 EAP-Reissued-Payload 463 OctetString -
59 { EAP-Payload }
70 [ EAP-Key-Name ]
102 [ EAP-Payload ]
103 [ EAP-Reissued-Payload ]
104 [ EAP-Master-Session-Key ]
105 [ EAP-Key-Name ]
[all …]
/dports/lang/erlang-java/otp-OTP-24.1.7/lib/diameter/examples/dict/
H A Drfc4072_eap.dia41 EAP-Master-Session-Key 464 OctetString -
42 EAP-Key-Name 102 OctetString -
43 EAP-Payload 462 OctetString -
44 EAP-Reissued-Payload 463 OctetString -
59 { EAP-Payload }
70 [ EAP-Key-Name ]
102 [ EAP-Payload ]
103 [ EAP-Reissued-Payload ]
104 [ EAP-Master-Session-Key ]
105 [ EAP-Key-Name ]
[all …]
/dports/net/hostapd/hostapd-2.9/hostapd/
H A Ddefconfig65 # EAP-MD5 for the integrated EAP server
68 # EAP-TLS for the integrated EAP server
74 # EAP-PEAP for the integrated EAP server
77 # EAP-GTC for the integrated EAP server
80 # EAP-TTLS for the integrated EAP server
83 # EAP-SIM for the integrated EAP server
86 # EAP-AKA for the integrated EAP server
89 # EAP-AKA' for the integrated EAP server
93 # EAP-PAX for the integrated EAP server
102 # EAP-SAKE for the integrated EAP server
[all …]
H A DChangeLog8 * EAP-pwd changes
445 * EAP-pwd:
474 * EAP-SIM: use Notification round before EAP-Failure
793 * added support for EAP Sequences in EAP-FAST Phase 2
795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1)
868 * updated EAP-PSK to use the IANA-allocated EAP type 47
915 EAP-SIM/EAP-AKA
1046 * EAP-PAX is now registered as EAP type 46
1120 authentication (EAP-PEAP, EAP-TTLS)
[all …]
/dports/net/freeradius3/freeradius-server-3.0.25/src/tests/eapsim-03/
H A Deapsim-sanitize.sed6 s/\(EAP-Message = 0x..\)\(.*\)/\1XX/
7 s/\(EAP-Id = \).*/\1YY/
8 s/\(EAP-Type-MD5 = \).*/\1MD5/
9 s/\(EAP-Type-SIM = 0x0b0000010d0000abcd1234abcd1234abcd1234abcd1234bcd1234abcd1234abcd1234abcd1234a…
10 s/\(EAP-Type-SIM = 0x0b0000010d0000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f…
11 s/\(EAP-Type-SIM = 0x0b0000010d00003000000000000000000000000000000031000000000000000000000000000000…
13 s/\(EAP-Sim-MAC = 0x\)..................................../\1YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY/
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/
H A Ddefconfig59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
83 # EAP-AKA' for the integrated EAP server
87 # EAP-PAX for the integrated EAP server
96 # EAP-SAKE for the integrated EAP server
[all …]
H A DChangeLog8 * EAP-pwd changes
445 * EAP-pwd:
474 * EAP-SIM: use Notification round before EAP-Failure
793 * added support for EAP Sequences in EAP-FAST Phase 2
795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1)
868 * updated EAP-PSK to use the IANA-allocated EAP type 47
915 EAP-SIM/EAP-AKA
1046 * EAP-PAX is now registered as EAP type 46
1120 authentication (EAP-PEAP, EAP-TTLS)
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/
H A Ddefconfig59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
83 # EAP-AKA' for the integrated EAP server
87 # EAP-PAX for the integrated EAP server
96 # EAP-SAKE for the integrated EAP server
[all …]
H A DChangeLog8 * EAP-pwd changes
445 * EAP-pwd:
474 * EAP-SIM: use Notification round before EAP-Failure
793 * added support for EAP Sequences in EAP-FAST Phase 2
795 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
835 EAP-SIM and EAP-AKA (eap_sim_aka_result_ind=1)
868 * updated EAP-PSK to use the IANA-allocated EAP type 47
915 EAP-SIM/EAP-AKA
1046 * EAP-PAX is now registered as EAP type 46
1120 authentication (EAP-PEAP, EAP-TTLS)
[all …]
/dports/security/logcheck/logcheck/rulefiles/linux/ignore.d.workstation/
H A Dwpasupplicant8 …0-9]s[0-9]): )?CTRL-EVENT-EAP-(STARTED EAP authentication started|SUCCESS EAP authentication compl…
9 ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wpa_supplicant\[[0-9]+\]: EAP-MSCHAPV2: Authentication succeeded$
10 ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wpa_supplicant\[[0-9]+\]: EAP-TLV: TLV Result - Success - EAP-TL…
14 …pher=(TKIP|CCMP)|group_cipher=(TKIP|CCMP)|key_mgmt=WPA2?(-PSK|/IEEE 802.1X/EAP)|wpa_state=COMPLETE…
17 …ICATED|suppPortStatus=Authorized|EAP state=SUCCESS|selectedMethod=25 \(EAP-PEAP\)|EAP TLS cipher=D…
/dports/devel/fossology-nomos-standalone/fossology-3.11.0/src/nomos/agent_tests/testdata/NomosTestfiles/BSD/
H A Ddefconfig110 # EAP-MD5
116 # EAP-TLS
122 # EAP-TTLS
125 # EAP-FAST
132 # EAP-GTC
135 # EAP-OTP
138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
144 # EAP-PAX
150 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used)
153 # EAP-SAKE
[all …]
/dports/devel/fossology-nomos-standalone/fossology-3.11.0/src/nomos/agent_tests/testdata/NomosTestfiles/LGPL/
H A Ddefconfig110 # EAP-MD5
116 # EAP-TLS
122 # EAP-TTLS
125 # EAP-FAST
132 # EAP-GTC
135 # EAP-OTP
138 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
144 # EAP-PAX
150 # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used)
153 # EAP-SAKE
[all …]
/dports/databases/mongodb36/mongodb-src-r3.6.23/src/mongo/gotools/src/github.com/mongodb/mongo-tools/vendor/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
71 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
94 func (e *EAP) CanDecode() gopacket.LayerClass { argument
99 func (e *EAP) NextLayerType() gopacket.LayerType { argument
104 e := &EAP{}
/dports/databases/mongodb42-tools/mongo-tools-r4.2.17/vendor/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
71 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
94 func (e *EAP) CanDecode() gopacket.LayerClass { argument
99 func (e *EAP) NextLayerType() gopacket.LayerType { argument
104 e := &EAP{}
/dports/net-mgmt/netdisco-mibs/netdisco-mibs-4.010/nortel/
H A DOPSUBP-DEVICE-SIGNALING-MIB.mib89 acting as an EAP access point. This attribute is sent with the
98 "A string that can be used to identify the interface on the EAP
99 access point on which the EAP session was started/ended. The format for
111 "The name of the user initiating the EAP session e.g. ?Joe?. This
120 "The groups the user initiating the EAP session is associated with.
153 "This is a unique sequence identifier for a EAP session start or
167 Inform message sent for a EAP session started event. It can be used to
168 correlate the EAP session end event with the notification for the EAP
181 "The reason for the EAP user session end event. This is used for
218 "This notification signifies that an EAP session was started on the
[all …]
/dports/net-mgmt/observium/observium/mibs/nortel/
H A DOPSUBP-DEVICE-SIGNALING-MIB89 acting as an EAP access point. This attribute is sent with the
98 "A string that can be used to identify the interface on the EAP
99 access point on which the EAP session was started/ended. The format for
111 "The name of the user initiating the EAP session e.g. ?Joe?. This
120 "The groups the user initiating the EAP session is associated with.
153 "This is a unique sequence identifier for a EAP session start or
167 Inform message sent for a EAP session started event. It can be used to
168 correlate the EAP session end event with the notification for the EAP
181 "The reason for the EAP user session end event. This is used for
218 "This notification signifies that an EAP session was started on the
[all …]
/dports/net/goreplay/goreplay-1.2.0/vendor/github.com/google/gopacket/gopacket-1.1.18/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/net/goreplay/goreplay-1.2.0/vendor/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/misc/fq/fq-0.0.2/vendor/github.com/google/gopacket/layers/
H A Deap.go36 type EAP struct { struct
46 func (e *EAP) LayerType() gopacket.LayerType { return LayerTypeEAP } argument
49 func (e *EAP) DecodeFromBytes(data []byte, df gopacket.DecodeFeedback) error { argument
79 func (e *EAP) SerializeTo(b gopacket.SerializeBuffer, opts gopacket.SerializeOptions) error { argument
102 func (e *EAP) CanDecode() gopacket.LayerClass { argument
107 func (e *EAP) NextLayerType() gopacket.LayerType { argument
112 e := &EAP{}
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/test/data/network/
H A Dmanaged_toplevel_with_password_variable.onc9 "Security": "WPA-EAP",
11 "EAP": {
12 "Outer": "EAP-TLS",
38 "Security": "WPA-EAP",
40 "EAP": {
41 "Outer": "EAP-TTLS",
H A Dmanaged_toplevel_with_no_password_variable.onc9 "Security": "WPA-EAP",
11 "EAP": {
12 "Outer": "EAP-TLS",
38 "Security": "WPA-EAP",
40 "EAP": {
41 "Outer": "EAP-TTLS",
/dports/net/freeradius3/freeradius-server-3.0.25/raddb/mods-available/
H A Deap18 # The incoming EAP messages DO NOT specify which EAP
70 # Supported EAP-types
74 # EAP-MD5
575 # name = "EAP module"
731 # EAP-TLS
791 # The tunneled EAP session needs a default EAP type
855 # Unlike EAP-TLS, EAP-TTLS does not require a client
872 # EAP-PEAP
904 # The tunneled EAP session needs a default EAP type
997 # EAP-MSCHAPv2
[all …]

12345678910>>...44