Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 1098) sorted by relevance

12345678910>>...44

/dports/net/freeradius3/freeradius-server-3.0.25/share/
H A Ddictionary.freeradius.internal801 VALUE EAP-Type EAP-MD5 4
806 VALUE EAP-Type EAP-GTC 6
812 VALUE EAP-Type EAP-TLS 13
820 VALUE EAP-Type EAP-SIM 18
824 VALUE EAP-Type EAP-TTLS 21
827 VALUE EAP-Type EAP-AKA 23
836 VALUE EAP-Type Rob-EAP 31
837 VALUE EAP-Type SecurID-EAP 32
849 VALUE EAP-Type EAP-FAST 43
856 VALUE EAP-Type EAP-IKEv2 49
[all …]
/dports/net/wireshark-lite/wireshark-3.6.1/radius/
H A Ddictionary.freeradius.internal342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets
360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets
375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets
376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets
763 VALUE EAP-Type RSA-SecurID-EAP 15
764 VALUE EAP-Type Arcot-Systems-EAP 16
781 VALUE EAP-Type Rob-EAP 31
782 VALUE EAP-Type SecurID-EAP 32
787 VALUE EAP-Type AirFortress-EAP 37
790 VALUE EAP-Type SecuriSuite-EAP 39
[all …]
/dports/net/wireshark/wireshark-3.6.1/radius/
H A Ddictionary.freeradius.internal342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets
360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets
375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets
376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets
763 VALUE EAP-Type RSA-SecurID-EAP 15
764 VALUE EAP-Type Arcot-Systems-EAP 16
781 VALUE EAP-Type Rob-EAP 31
782 VALUE EAP-Type SecurID-EAP 32
787 VALUE EAP-Type AirFortress-EAP 37
790 VALUE EAP-Type SecuriSuite-EAP 39
[all …]
/dports/net/tshark/wireshark-3.6.1/radius/
H A Ddictionary.freeradius.internal342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets
360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets
375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets
376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets
763 VALUE EAP-Type RSA-SecurID-EAP 15
764 VALUE EAP-Type Arcot-Systems-EAP 16
781 VALUE EAP-Type Rob-EAP 31
782 VALUE EAP-Type SecurID-EAP 32
787 VALUE EAP-Type AirFortress-EAP 37
790 VALUE EAP-Type SecuriSuite-EAP 39
[all …]
/dports/net/tshark-lite/wireshark-3.6.1/radius/
H A Ddictionary.freeradius.internal342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets
360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets
375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets
376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets
763 VALUE EAP-Type RSA-SecurID-EAP 15
764 VALUE EAP-Type Arcot-Systems-EAP 16
781 VALUE EAP-Type Rob-EAP 31
782 VALUE EAP-Type SecurID-EAP 32
787 VALUE EAP-Type AirFortress-EAP 37
790 VALUE EAP-Type SecuriSuite-EAP 39
[all …]
/dports/net/freeradius3/freeradius-server-3.0.25/doc/modules/
H A Drlm_eap14 RADIUS attribute used for EAP is EAP-Message, 79(rfc2869). RADIUS
36 2. The supplicant specifies AP to use EAP by sending EAP-Start.
73 EAP CODE ORGANIZATION
122 Since the EAP requests may not contain a requested EAP type, the
130 EAP SIM server
157 EAP CLIENTS
266 of EAP proxying.
283 of EAP-START. It blindly responds with EAP-Identity request.
311 EAP-Type sent by the server then it sends EAP-Acknowledge with the
318 respond with EAP-Acknowledge(EAP-MD5). Server now responds with
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/doc/
H A Dwpa_supplicant.fig34 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
124 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
129 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
134 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
139 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
144 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
149 4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001
154 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
164 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
169 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
[all …]
H A Deap.doxygen2 \page eap_peer_module EAP peer implementation
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP peer implementation in wpa_supplicant.
21 \section adding_eap_methods Adding EAP methods
27 without modifying the core EAP state machine implementation.
30 (Makefile) and the EAP method registration list in the
48 When adding an EAP method that uses a vendor specific EAP type
62 an EAP server and an EAP peer entities and then runs through an
63 EAP-PEAP/MSCHAPv2 authentication.
68 EAP server and client parts to allow an EAP authentication to be
[all …]
H A Dhostapd.fig29 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
72 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
77 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
82 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
87 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
92 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
97 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
102 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
107 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
112 4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001
[all …]
H A Deap_server.doxygen2 \page eap_server_module EAP server implementation
4 Extensible Authentication Protocol (EAP) is an authentication framework
5 defined in RFC 3748. hostapd uses a separate code module for EAP server
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP server implementation in hostapd.
14 Some of the terminology used in EAP state machine is referring to
21 \section adding_eap_methods Adding EAP methods
27 without modifying the core EAP state machine implementation.
30 (Makefile) and the EAP method registration list in the
41 It is recommended that the EAP methods would use generic helper
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/doc/
H A Dwpa_supplicant.fig34 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
124 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
129 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
134 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
139 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
144 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
149 4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001
154 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
164 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
169 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
[all …]
H A Deap.doxygen2 \page eap_peer_module EAP peer implementation
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP peer implementation in wpa_supplicant.
21 \section adding_eap_methods Adding EAP methods
27 without modifying the core EAP state machine implementation.
30 (Makefile) and the EAP method registration list in the
48 When adding an EAP method that uses a vendor specific EAP type
62 an EAP server and an EAP peer entities and then runs through an
63 EAP-PEAP/MSCHAPv2 authentication.
68 EAP server and client parts to allow an EAP authentication to be
[all …]
H A Dhostapd.fig29 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
72 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
77 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
82 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
87 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
92 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
97 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
102 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
107 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
112 4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001
[all …]
H A Deap_server.doxygen2 \page eap_server_module EAP server implementation
4 Extensible Authentication Protocol (EAP) is an authentication framework
5 defined in RFC 3748. hostapd uses a separate code module for EAP server
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP server implementation in hostapd.
14 Some of the terminology used in EAP state machine is referring to
21 \section adding_eap_methods Adding EAP methods
27 without modifying the core EAP state machine implementation.
30 (Makefile) and the EAP method registration list in the
41 It is recommended that the EAP methods would use generic helper
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/
H A Dhostapd.eap_user1 # hostapd user database for integrated EAP server
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
46 # Tunneled EAP methods are configured with standard EAP method name and [2]
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
[all …]
/dports/net/hostapd/hostapd-2.9/hostapd/
H A Dhostapd.eap_user1 # hostapd user database for integrated EAP server
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
46 # Tunneled EAP methods are configured with standard EAP method name and [2]
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/
H A Dhostapd.eap_user1 # hostapd user database for integrated EAP server
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
46 # Tunneled EAP methods are configured with standard EAP method name and [2]
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users
[all …]
/dports/net/tcpdump/tcpdump-4.99.1/tests/
H A Deapon1-nosmb.out14 14 15:17:35.622870 EAP packet (0) v1, len 5
18 18 15:17:36.158698 EAP packet (0) v1, len 5
19 19 15:17:37.766046 EAP packet (0) v1, len 45
20 20 15:17:37.790625 EAP packet (0) v1, len 20
21 21 15:17:37.830669 EAP packet (0) v1, len 76
22 22 15:17:37.848577 EAP packet (0) v1, len 80
23 23 15:17:38.661939 EAP packet (0) v1, len 28
24 24 15:17:38.685352 EAP packet (0) v1, len 4
31 31 15:18:08.696826 EAP packet (0) v1, len 5
32 32 15:18:08.713116 EAP packet (0) v1, len 45
[all …]
H A Deapon1.out14 14 15:17:35.622870 EAP packet (0) v1, len 5
18 18 15:17:36.158698 EAP packet (0) v1, len 5
19 19 15:17:37.766046 EAP packet (0) v1, len 45
20 20 15:17:37.790625 EAP packet (0) v1, len 20
21 21 15:17:37.830669 EAP packet (0) v1, len 76
22 22 15:17:37.848577 EAP packet (0) v1, len 80
23 23 15:17:38.661939 EAP packet (0) v1, len 28
24 24 15:17:38.685352 EAP packet (0) v1, len 4
31 31 15:18:08.696826 EAP packet (0) v1, len 5
32 32 15:18:08.713116 EAP packet (0) v1, len 45
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/eap_example/
H A DREADME1 EAP peer/server library and example program
8 The interfaces of the EAP server/peer implementation are based on RFC
9 4137 (EAP State Machines). This RFC is coordinated with the state
12 interface between them and EAP. However, the EAP implementation can be
14 which maps the EAPOL<->EAP variables to another protocol.
16 This directory contains an example showing how EAP peer and server
18 example program initializes both an EAP server and an EAP peer
19 entities and then runs through an EAP-PEAP/MSCHAPv2 authentication.
22 control the EAP peer implementation. eap_example_server.c does the
24 EAP server and client parts to allow an EAP authentication to be
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/eap_example/
H A DREADME1 EAP peer/server library and example program
8 The interfaces of the EAP server/peer implementation are based on RFC
9 4137 (EAP State Machines). This RFC is coordinated with the state
12 interface between them and EAP. However, the EAP implementation can be
14 which maps the EAPOL<->EAP variables to another protocol.
16 This directory contains an example showing how EAP peer and server
18 example program initializes both an EAP server and an EAP peer
19 entities and then runs through an EAP-PEAP/MSCHAPv2 authentication.
22 control the EAP peer implementation. eap_example_server.c does the
24 EAP server and client parts to allow an EAP authentication to be
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
333 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
347 SM_STATE(EAP, DISCARD) in SM_STATE() argument
596 SM_STATE(EAP, NAK) in SM_STATE() argument
603 SM_ENTRY(EAP, NAK); in SM_STATE()
650 SM_STATE(EAP, FAILURE) in SM_STATE() argument
1007 SM_STATE(EAP, IDLE2) in SM_STATE() argument
1166 SM_STEP(EAP) in SM_STEP() argument
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
333 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
347 SM_STATE(EAP, DISCARD) in SM_STATE() argument
596 SM_STATE(EAP, NAK) in SM_STATE() argument
603 SM_ENTRY(EAP, NAK); in SM_STATE()
650 SM_STATE(EAP, FAILURE) in SM_STATE() argument
1007 SM_STATE(EAP, IDLE2) in SM_STATE() argument
1166 SM_STEP(EAP) in SM_STEP() argument
[all …]
/dports/net/hostapd/hostapd-2.9/src/eap_server/
H A Deap_server.c214 SM_STATE(EAP, DISABLED) in SM_STATE() argument
307 SM_STATE(EAP, IDLE) in SM_STATE() argument
309 SM_ENTRY(EAP, IDLE); in SM_STATE()
332 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
342 SM_STATE(EAP, DISCARD) in SM_STATE() argument
589 SM_STATE(EAP, NAK) in SM_STATE() argument
596 SM_ENTRY(EAP, NAK); in SM_STATE()
643 SM_STATE(EAP, FAILURE) in SM_STATE() argument
998 SM_STATE(EAP, IDLE2) in SM_STATE() argument
1157 SM_STEP(EAP) in SM_STEP() argument
[all …]
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/
H A Deap_server.c214 SM_STATE(EAP, DISABLED) in SM_STATE() argument
307 SM_STATE(EAP, IDLE) in SM_STATE() argument
309 SM_ENTRY(EAP, IDLE); in SM_STATE()
332 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
342 SM_STATE(EAP, DISCARD) in SM_STATE() argument
589 SM_STATE(EAP, NAK) in SM_STATE() argument
596 SM_ENTRY(EAP, NAK); in SM_STATE()
643 SM_STATE(EAP, FAILURE) in SM_STATE() argument
998 SM_STATE(EAP, IDLE2) in SM_STATE() argument
1157 SM_STEP(EAP) in SM_STEP() argument
[all …]

12345678910>>...44