/external/wpa_supplicant_8/hostapd/ |
hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP, 48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require [all...] |
eap_testing.txt | 42 EAP-TTLS/CHAP + - + - + + 43 EAP-TTLS/MSCHAP + - + - + + 44 EAP-TTLS/MSCHAPv2 + + + - + + 45 EAP-TTLS/PAP + - + - + + 46 EAP-TTLS/EAP-MD5 + - - - - + 47 EAP-TTLS/EAP-GTC + + - - - 48 EAP-TTLS/EAP-MSCHAPv2 + + - - - 49 EAP-TTLS/EAP-TLS + F - - - 50 EAP-TTLS/EAP-SIM + + - - - 51 EAP-TTLS/EAP-AKA + + - - [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 27 /* Maximum supported TTLS version 29 * 1 = draft-funk-eap-ttls-v1-00.txt 89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) [all...] |
eap_tls_common.h | 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 27 /* Maximum supported TTLS version 29 * 1 = draft-funk-eap-ttls-v1-00.txt 89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eap_testing.txt | 79 EAP-TTLS/CHAP + - +2 + + + + + + - + - 80 EAP-TTLS/MSCHAP + - + + + + + + + - + - 81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 82 EAP-TTLS/PAP + - + + + + + + + - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 85 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 88 EAP-TTLS/EAP-SIM - - - - - - - - - - + [all...] |
todo.txt | 68 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 71 * could need to modify eap_{ttls,peap,fast}_decrypt to do same 87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
wpa_supplicant.conf.orig | 341 # with EAP-PEAP or EAP-TTLS) 343 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 345 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 347 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 350 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 359 # identity, e.g., EAP-TTLS) 364 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 372 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 79 EAP-TTLS/CHAP + - +2 + + + + + + - + - 80 EAP-TTLS/MSCHAP + - + + + + + + + - + - 81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 82 EAP-TTLS/PAP + - + + + + + + + - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 85 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 88 EAP-TTLS/EAP-SIM - - - - - - - - - - + [all...] |
todo.txt | 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same 80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
/external/wpa_supplicant/ |
eap_testing.txt | 67 EAP-TTLS/CHAP + - +2 + + + + + + - + - 68 EAP-TTLS/MSCHAP + - + + + + + + + - + - 69 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 70 EAP-TTLS/PAP + - + + + + + + + - + - 71 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 72 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 73 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 74 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 75 EAP-TTLS/EAP-TLS - - +2 + F + + + - - - - 113 - EAP-TTLS / EAP-MD5-Challeng [all...] |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (draft-ietf-pppext-eap-ttls-03.txt) 29 * 0 = draft-ietf-pppext-eap-ttls-03.txt / draft-funk-eap-ttls-v0-00.txt 30 * 1 = draft-funk-eap-ttls-v1-00.txt 94 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 117 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 147 wpa_printf(MSG_ERROR, "EAP-TTLS: " 179 wpa_printf(MSG_ERROR, "EAP-TTLS: No Phase2 EAP method [all...] |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (draft-ietf-pppext-eap-ttls-03.txt)
|
wpa_supplicant.conf.orig | 281 # with EAP-PEAP or EAP-TTLS) 283 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 285 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 287 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 290 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 297 # identity, e.g., EAP-TTLS) 303 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may 381 # "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS) 383 # authentication when using EAP-TTLS or EAP-PEAP [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
|
config_ssid.h | 219 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 268 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 300 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 402 * EAP-TTLS/PEAP/FAST tunnel) authentication. 419 * EAP-TTLS/PEAP/FAST tunnel) authentication. 427 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 440 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 453 * EAP-TTLS/PEAP/FAST tunnel) authentication. 461 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 474 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 29 /* Maximum supported TTLS version 31 * 1 = draft-funk-eap-ttls-v1-00.txt 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and " 270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 287 "ttls keying material", 290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key") [all...] |
eap_config.h | 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 122 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 224 * EAP-TTLS/PEAP/FAST tunnel) authentication. 241 * EAP-TTLS/PEAP/FAST tunnel) authentication. 249 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 262 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 275 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 29 /* Maximum supported TTLS version 31 * 1 = draft-funk-eap-ttls-v1-00.txt 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and " 270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 287 "ttls keying material", 290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key") [all...] |
eap_config.h | 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 113 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 215 * EAP-TTLS/PEAP/FAST tunnel) authentication. 232 * EAP-TTLS/PEAP/FAST tunnel) authentication. 240 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 253 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 266 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
/libcore/luni/src/main/java/java/net/ |
AddressCache.java | 50 * Unless we need to cope with DNS TTLs of 292 years, we don't need to worry about overflow. 126 long ttlS = Long.parseLong(ttlString); 128 if (ttlS == -1) { 130 } else if (ttlS == 0) { 133 return System.nanoTime() + ttlS * 1000000000L;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (RFC 5281)
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (RFC 5281)
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous 109 eap=TTLS 159 eap=TTLS PEAP TLS 204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
|