HomeSort by relevance Sort by last modified time
    Searched full:ttls (Results 1 - 25 of 131) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP,
48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require
    [all...]
eap_testing.txt 42 EAP-TTLS/CHAP + - + - + +
43 EAP-TTLS/MSCHAP + - + - + +
44 EAP-TTLS/MSCHAPv2 + + + - + +
45 EAP-TTLS/PAP + - + - + +
46 EAP-TTLS/EAP-MD5 + - - - - +
47 EAP-TTLS/EAP-GTC + + - - -
48 EAP-TTLS/EAP-MSCHAPv2 + + - - -
49 EAP-TTLS/EAP-TLS + F - - -
50 EAP-TTLS/EAP-SIM + + - - -
51 EAP-TTLS/EAP-AKA + + - -
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
27 /* Maximum supported TTLS version
29 * 1 = draft-funk-eap-ttls-v1-00.txt
89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen)
    [all...]
eap_tls_common.h 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
27 /* Maximum supported TTLS version
29 * 1 = draft-funk-eap-ttls-v1-00.txt
89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen)
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
  /external/wpa_supplicant_6/wpa_supplicant/
eap_testing.txt 79 EAP-TTLS/CHAP + - +2 + + + + + + - + -
80 EAP-TTLS/MSCHAP + - + + + + + + + - + -
81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
82 EAP-TTLS/PAP + - + + + + + + + - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
85 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
88 EAP-TTLS/EAP-SIM - - - - - - - - - - +
    [all...]
todo.txt 68 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
71 * could need to modify eap_{ttls,peap,fast}_decrypt to do same
87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
wpa_supplicant.conf.orig 341 # with EAP-PEAP or EAP-TTLS)
343 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
345 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
347 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
350 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
359 # identity, e.g., EAP-TTLS)
364 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
372 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 79 EAP-TTLS/CHAP + - +2 + + + + + + - + -
80 EAP-TTLS/MSCHAP + - + + + + + + + - + -
81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
82 EAP-TTLS/PAP + - + + + + + + + - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
85 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
88 EAP-TTLS/EAP-SIM - - - - - - - - - - +
    [all...]
todo.txt 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same
80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
  /external/wpa_supplicant/
eap_testing.txt 67 EAP-TTLS/CHAP + - +2 + + + + + + - + -
68 EAP-TTLS/MSCHAP + - + + + + + + + - + -
69 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
70 EAP-TTLS/PAP + - + + + + + + + - + -
71 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
72 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
73 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
74 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
75 EAP-TTLS/EAP-TLS - - +2 + F + + + - - - -
113 - EAP-TTLS / EAP-MD5-Challeng
    [all...]
eap_ttls.c 2 * EAP peer method: EAP-TTLS (draft-ietf-pppext-eap-ttls-03.txt)
29 * 0 = draft-ietf-pppext-eap-ttls-03.txt / draft-funk-eap-ttls-v0-00.txt
30 * 1 = draft-funk-eap-ttls-v1-00.txt
94 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
117 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
147 wpa_printf(MSG_ERROR, "EAP-TTLS: "
179 wpa_printf(MSG_ERROR, "EAP-TTLS: No Phase2 EAP method
    [all...]
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (draft-ietf-pppext-eap-ttls-03.txt)
wpa_supplicant.conf.orig 281 # with EAP-PEAP or EAP-TTLS)
283 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
285 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
287 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
290 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
297 # identity, e.g., EAP-TTLS)
303 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
381 # "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
383 # authentication when using EAP-TTLS or EAP-PEAP
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
config_ssid.h 219 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
268 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
300 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
402 * EAP-TTLS/PEAP/FAST tunnel) authentication.
419 * EAP-TTLS/PEAP/FAST tunnel) authentication.
427 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
440 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
453 * EAP-TTLS/PEAP/FAST tunnel) authentication.
461 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
474 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
29 /* Maximum supported TTLS version
31 * 1 = draft-funk-eap-ttls-v1-00.txt
104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and "
270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
287 "ttls keying material",
290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key")
    [all...]
eap_config.h 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
122 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
224 * EAP-TTLS/PEAP/FAST tunnel) authentication.
241 * EAP-TTLS/PEAP/FAST tunnel) authentication.
249 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
262 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
275 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
29 /* Maximum supported TTLS version
31 * 1 = draft-funk-eap-ttls-v1-00.txt
104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and "
270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
287 "ttls keying material",
290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key")
    [all...]
eap_config.h 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
113 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
215 * EAP-TTLS/PEAP/FAST tunnel) authentication.
232 * EAP-TTLS/PEAP/FAST tunnel) authentication.
240 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
253 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
266 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
  /libcore/luni/src/main/java/java/net/
AddressCache.java 50 * Unless we need to cope with DNS TTLs of 292 years, we don't need to worry about overflow.
126 long ttlS = Long.parseLong(ttlString);
128 if (ttlS == -1) {
130 } else if (ttlS == 0) {
133 return System.nanoTime() + ttlS * 1000000000L;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (RFC 5281)
  /external/wpa_supplicant_8/src/eap_common/
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (RFC 5281)
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
109 eap=TTLS
159 eap=TTLS PEAP TLS
204 certificates whereas EAP-PEAP and EAP-TTLS only require the server

Completed in 1049 milliseconds

1 2 3 4 5 6