/dports/net/freeradius3/freeradius-server-3.0.25/share/ |
H A D | dictionary.freeradius.internal | 801 VALUE EAP-Type EAP-MD5 4 806 VALUE EAP-Type EAP-GTC 6 812 VALUE EAP-Type EAP-TLS 13 820 VALUE EAP-Type EAP-SIM 18 824 VALUE EAP-Type EAP-TTLS 21 827 VALUE EAP-Type EAP-AKA 23 836 VALUE EAP-Type Rob-EAP 31 837 VALUE EAP-Type SecurID-EAP 32 849 VALUE EAP-Type EAP-FAST 43 856 VALUE EAP-Type EAP-IKEv2 49 [all …]
|
/dports/net/wireshark-lite/wireshark-3.6.1/radius/ |
H A D | dictionary.freeradius.internal | 342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets 360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets 375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets 376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets 763 VALUE EAP-Type RSA-SecurID-EAP 15 764 VALUE EAP-Type Arcot-Systems-EAP 16 781 VALUE EAP-Type Rob-EAP 31 782 VALUE EAP-Type SecurID-EAP 32 787 VALUE EAP-Type AirFortress-EAP 37 790 VALUE EAP-Type SecuriSuite-EAP 39 [all …]
|
/dports/net/wireshark/wireshark-3.6.1/radius/ |
H A D | dictionary.freeradius.internal | 342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets 360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets 375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets 376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets 763 VALUE EAP-Type RSA-SecurID-EAP 15 764 VALUE EAP-Type Arcot-Systems-EAP 16 781 VALUE EAP-Type Rob-EAP 31 782 VALUE EAP-Type SecurID-EAP 32 787 VALUE EAP-Type AirFortress-EAP 37 790 VALUE EAP-Type SecuriSuite-EAP 39 [all …]
|
/dports/net/tshark/wireshark-3.6.1/radius/ |
H A D | dictionary.freeradius.internal | 342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets 360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets 375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets 376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets 763 VALUE EAP-Type RSA-SecurID-EAP 15 764 VALUE EAP-Type Arcot-Systems-EAP 16 781 VALUE EAP-Type Rob-EAP 31 782 VALUE EAP-Type SecurID-EAP 32 787 VALUE EAP-Type AirFortress-EAP 37 790 VALUE EAP-Type SecuriSuite-EAP 39 [all …]
|
/dports/net/tshark-lite/wireshark-3.6.1/radius/ |
H A D | dictionary.freeradius.internal | 342 ATTRIBUTE EAP-Type-EAP-TLS 1293 octets 360 ATTRIBUTE EAP-Type-Rob-EAP 1311 octets 375 ATTRIBUTE EAP-Type-EAP-PAX 1326 octets 376 ATTRIBUTE EAP-Type-EAP-PSK 1327 octets 763 VALUE EAP-Type RSA-SecurID-EAP 15 764 VALUE EAP-Type Arcot-Systems-EAP 16 781 VALUE EAP-Type Rob-EAP 31 782 VALUE EAP-Type SecurID-EAP 32 787 VALUE EAP-Type AirFortress-EAP 37 790 VALUE EAP-Type SecuriSuite-EAP 39 [all …]
|
/dports/net/freeradius3/freeradius-server-3.0.25/doc/modules/ |
H A D | rlm_eap | 14 RADIUS attribute used for EAP is EAP-Message, 79(rfc2869). RADIUS 36 2. The supplicant specifies AP to use EAP by sending EAP-Start. 73 EAP CODE ORGANIZATION 122 Since the EAP requests may not contain a requested EAP type, the 130 EAP SIM server 157 EAP CLIENTS 266 of EAP proxying. 283 of EAP-START. It blindly responds with EAP-Identity request. 311 EAP-Type sent by the server then it sends EAP-Acknowledge with the 318 respond with EAP-Acknowledge(EAP-MD5). Server now responds with [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/doc/ |
H A D | wpa_supplicant.fig | 34 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001 124 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001 129 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001 134 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001 139 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001 144 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001 149 4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001 154 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001 164 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001 169 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001 [all …]
|
H A D | eap.doxygen | 2 \page eap_peer_module EAP peer implementation 8 it to be usable in other programs. The design of the EAP 12 understanding the EAP peer implementation in wpa_supplicant. 21 \section adding_eap_methods Adding EAP methods 27 without modifying the core EAP state machine implementation. 30 (Makefile) and the EAP method registration list in the 48 When adding an EAP method that uses a vendor specific EAP type 62 an EAP server and an EAP peer entities and then runs through an 63 EAP-PEAP/MSCHAPv2 authentication. 68 EAP server and client parts to allow an EAP authentication to be [all …]
|
H A D | hostapd.fig | 29 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001 72 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001 77 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001 82 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001 87 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001 92 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001 97 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001 102 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001 107 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001 112 4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001 [all …]
|
H A D | eap_server.doxygen | 2 \page eap_server_module EAP server implementation 4 Extensible Authentication Protocol (EAP) is an authentication framework 5 defined in RFC 3748. hostapd uses a separate code module for EAP server 8 it to be usable in other programs. The design of the EAP 12 understanding the EAP server implementation in hostapd. 14 Some of the terminology used in EAP state machine is referring to 21 \section adding_eap_methods Adding EAP methods 27 without modifying the core EAP state machine implementation. 30 (Makefile) and the EAP method registration list in the 41 It is recommended that the EAP methods would use generic helper [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/doc/ |
H A D | wpa_supplicant.fig | 34 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001 124 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001 129 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001 134 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001 139 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001 144 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001 149 4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001 154 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001 164 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001 169 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001 [all …]
|
H A D | eap.doxygen | 2 \page eap_peer_module EAP peer implementation 8 it to be usable in other programs. The design of the EAP 12 understanding the EAP peer implementation in wpa_supplicant. 21 \section adding_eap_methods Adding EAP methods 27 without modifying the core EAP state machine implementation. 30 (Makefile) and the EAP method registration list in the 48 When adding an EAP method that uses a vendor specific EAP type 62 an EAP server and an EAP peer entities and then runs through an 63 EAP-PEAP/MSCHAPv2 authentication. 68 EAP server and client parts to allow an EAP authentication to be [all …]
|
H A D | hostapd.fig | 29 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001 72 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001 77 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001 82 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001 87 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001 92 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001 97 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001 102 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001 107 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001 112 4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001 [all …]
|
H A D | eap_server.doxygen | 2 \page eap_server_module EAP server implementation 4 Extensible Authentication Protocol (EAP) is an authentication framework 5 defined in RFC 3748. hostapd uses a separate code module for EAP server 8 it to be usable in other programs. The design of the EAP 12 understanding the EAP server implementation in hostapd. 14 Some of the terminology used in EAP state machine is referring to 21 \section adding_eap_methods Adding EAP methods 27 without modifying the core EAP state machine implementation. 30 (Makefile) and the EAP method registration list in the 41 It is recommended that the EAP methods would use generic helper [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/hostapd/ |
H A D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 46 # Tunneled EAP methods are configured with standard EAP method name and [2] 71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes 85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users [all …]
|
/dports/net/hostapd/hostapd-2.9/hostapd/ |
H A D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 46 # Tunneled EAP methods are configured with standard EAP method name and [2] 71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes 85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/hostapd/ |
H A D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 46 # Tunneled EAP methods are configured with standard EAP method name and [2] 71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes 85 # Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users [all …]
|
/dports/net/tcpdump/tcpdump-4.99.1/tests/ |
H A D | eapon1-nosmb.out | 14 14 15:17:35.622870 EAP packet (0) v1, len 5 18 18 15:17:36.158698 EAP packet (0) v1, len 5 19 19 15:17:37.766046 EAP packet (0) v1, len 45 20 20 15:17:37.790625 EAP packet (0) v1, len 20 21 21 15:17:37.830669 EAP packet (0) v1, len 76 22 22 15:17:37.848577 EAP packet (0) v1, len 80 23 23 15:17:38.661939 EAP packet (0) v1, len 28 24 24 15:17:38.685352 EAP packet (0) v1, len 4 31 31 15:18:08.696826 EAP packet (0) v1, len 5 32 32 15:18:08.713116 EAP packet (0) v1, len 45 [all …]
|
H A D | eapon1.out | 14 14 15:17:35.622870 EAP packet (0) v1, len 5 18 18 15:17:36.158698 EAP packet (0) v1, len 5 19 19 15:17:37.766046 EAP packet (0) v1, len 45 20 20 15:17:37.790625 EAP packet (0) v1, len 20 21 21 15:17:37.830669 EAP packet (0) v1, len 76 22 22 15:17:37.848577 EAP packet (0) v1, len 80 23 23 15:17:38.661939 EAP packet (0) v1, len 28 24 24 15:17:38.685352 EAP packet (0) v1, len 4 31 31 15:18:08.696826 EAP packet (0) v1, len 5 32 32 15:18:08.713116 EAP packet (0) v1, len 45 [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/eap_example/ |
H A D | README | 1 EAP peer/server library and example program 8 The interfaces of the EAP server/peer implementation are based on RFC 9 4137 (EAP State Machines). This RFC is coordinated with the state 12 interface between them and EAP. However, the EAP implementation can be 14 which maps the EAPOL<->EAP variables to another protocol. 16 This directory contains an example showing how EAP peer and server 18 example program initializes both an EAP server and an EAP peer 19 entities and then runs through an EAP-PEAP/MSCHAPv2 authentication. 22 control the EAP peer implementation. eap_example_server.c does the 24 EAP server and client parts to allow an EAP authentication to be [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/eap_example/ |
H A D | README | 1 EAP peer/server library and example program 8 The interfaces of the EAP server/peer implementation are based on RFC 9 4137 (EAP State Machines). This RFC is coordinated with the state 12 interface between them and EAP. However, the EAP implementation can be 14 which maps the EAPOL<->EAP variables to another protocol. 16 This directory contains an example showing how EAP peer and server 18 example program initializes both an EAP server and an EAP peer 19 entities and then runs through an EAP-PEAP/MSCHAPv2 authentication. 22 control the EAP peer implementation. eap_example_server.c does the 24 EAP server and client parts to allow an EAP authentication to be [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server.c | 213 SM_STATE(EAP, DISABLED) in SM_STATE() argument 308 SM_STATE(EAP, IDLE) in SM_STATE() argument 310 SM_ENTRY(EAP, IDLE); in SM_STATE() 333 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 347 SM_STATE(EAP, DISCARD) in SM_STATE() argument 596 SM_STATE(EAP, NAK) in SM_STATE() argument 603 SM_ENTRY(EAP, NAK); in SM_STATE() 650 SM_STATE(EAP, FAILURE) in SM_STATE() argument 1007 SM_STATE(EAP, IDLE2) in SM_STATE() argument 1166 SM_STEP(EAP) in SM_STEP() argument [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server.c | 213 SM_STATE(EAP, DISABLED) in SM_STATE() argument 308 SM_STATE(EAP, IDLE) in SM_STATE() argument 310 SM_ENTRY(EAP, IDLE); in SM_STATE() 333 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 347 SM_STATE(EAP, DISCARD) in SM_STATE() argument 596 SM_STATE(EAP, NAK) in SM_STATE() argument 603 SM_ENTRY(EAP, NAK); in SM_STATE() 650 SM_STATE(EAP, FAILURE) in SM_STATE() argument 1007 SM_STATE(EAP, IDLE2) in SM_STATE() argument 1166 SM_STEP(EAP) in SM_STEP() argument [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server.c | 214 SM_STATE(EAP, DISABLED) in SM_STATE() argument 307 SM_STATE(EAP, IDLE) in SM_STATE() argument 309 SM_ENTRY(EAP, IDLE); in SM_STATE() 332 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 342 SM_STATE(EAP, DISCARD) in SM_STATE() argument 589 SM_STATE(EAP, NAK) in SM_STATE() argument 596 SM_ENTRY(EAP, NAK); in SM_STATE() 643 SM_STATE(EAP, FAILURE) in SM_STATE() argument 998 SM_STATE(EAP, IDLE2) in SM_STATE() argument 1157 SM_STEP(EAP) in SM_STEP() argument [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 214 SM_STATE(EAP, DISABLED) in SM_STATE() argument 307 SM_STATE(EAP, IDLE) in SM_STATE() argument 309 SM_ENTRY(EAP, IDLE); in SM_STATE() 332 SM_STATE(EAP, RECEIVED) in SM_STATE() argument 342 SM_STATE(EAP, DISCARD) in SM_STATE() argument 589 SM_STATE(EAP, NAK) in SM_STATE() argument 596 SM_ENTRY(EAP, NAK); in SM_STATE() 643 SM_STATE(EAP, FAILURE) in SM_STATE() argument 998 SM_STATE(EAP, IDLE2) in SM_STATE() argument 1157 SM_STEP(EAP) in SM_STEP() argument [all …]
|