/external/wpa_supplicant_8/hostapd/ |
hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP, 48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require [all...] |
eap_testing.txt | 42 EAP-TTLS/CHAP + - + - + + 43 EAP-TTLS/MSCHAP + - + - + + 44 EAP-TTLS/MSCHAPv2 + + + - + + 45 EAP-TTLS/PAP + - + - + + 46 EAP-TTLS/EAP-MD5 + - - - - + 47 EAP-TTLS/EAP-GTC + + - - - 48 EAP-TTLS/EAP-MSCHAPv2 + + - - - 49 EAP-TTLS/EAP-TLS + F - - - 50 EAP-TTLS/EAP-SIM + + - - - 51 EAP-TTLS/EAP-AKA + + - - [all...] |
ChangeLog | 69 * fixed TNC with EAP-TTLS 164 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST 169 * added support for fragmenting EAP-TTLS/PEAP/FAST Phase 2 (tunneled) 191 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST} 205 * added support for configuring EAP-TTLS phase 2 non-EAP methods in 208 enabled with new method names TTLS-PAP, TTLS-CHAP, TTLS-MSCHAP, 209 TTLS-MSCHAPV2 241 * fixed EAP-TTLS AVP parser processing for too short AVP length [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 27 /* Maximum supported TTLS version 29 * 1 = draft-funk-eap-ttls-v1-00.txt 89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen) [all...] |
eap_tls_common.h | 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions
|
/external/wpa_supplicant_6/wpa_supplicant/ |
eap_testing.txt | 79 EAP-TTLS/CHAP + - +2 + + + + + + - + - 80 EAP-TTLS/MSCHAP + - + + + + + + + - + - 81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 82 EAP-TTLS/PAP + - + + + + + + + - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 85 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 88 EAP-TTLS/EAP-SIM - - - - - - - - - - + [all...] |
todo.txt | 68 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 71 * could need to modify eap_{ttls,peap,fast}_decrypt to do same 87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
wpa_supplicant.conf.orig | 341 # with EAP-PEAP or EAP-TTLS) 343 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 345 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 347 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 350 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 359 # identity, e.g., EAP-TTLS) 364 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 372 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma [all...] |
README | 79 * EAP-TTLS/EAP-MD5-Challenge 80 * EAP-TTLS/EAP-GTC 81 * EAP-TTLS/EAP-OTP 82 * EAP-TTLS/EAP-MSCHAPv2 83 * EAP-TTLS/EAP-TLS 84 * EAP-TTLS/MSCHAPv2 85 * EAP-TTLS/MSCHAP 86 * EAP-TTLS/PAP 87 * EAP-TTLS/CHAP 227 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 79 EAP-TTLS/CHAP + - +2 + + + + + + - + - 80 EAP-TTLS/MSCHAP + - + + + + + + + - + - 81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 82 EAP-TTLS/PAP + - + + + + + + + - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 85 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 88 EAP-TTLS/EAP-SIM - - - - - - - - - - + [all...] |
todo.txt | 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same 80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
wpa_supplicant.conf | 412 # with EAP-PEAP or EAP-TTLS) 414 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 416 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 418 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 421 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 430 # identity, e.g., EAP-TTLS) 435 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 443 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma [all...] |
README | 64 * EAP-TTLS/EAP-MD5-Challenge 65 * EAP-TTLS/EAP-GTC 66 * EAP-TTLS/EAP-OTP 67 * EAP-TTLS/EAP-MSCHAPv2 68 * EAP-TTLS/EAP-TLS 69 * EAP-TTLS/MSCHAPv2 70 * EAP-TTLS/MSCHAP 71 * EAP-TTLS/PAP 72 * EAP-TTLS/CHAP 163 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 203 wpa_printf(MSG_WARNING, "EAP-TTLS: [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 98 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 114 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 215 "ttls keying material", 218 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 222 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 232 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 249 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected " 299 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed " 307 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP [all...] |
eap_config.h | 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 55 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 75 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 116 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 218 * EAP-TTLS/PEAP/FAST tunnel) authentication. 235 * EAP-TTLS/PEAP/FAST tunnel) authentication. 243 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 256 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 269 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 29 /* Maximum supported TTLS version 31 * 1 = draft-funk-eap-ttls-v1-00.txt 104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version " 128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and " 270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner " 287 "ttls keying material", 290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key") [all...] |
eap_config.h | 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 113 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 215 * EAP-TTLS/PEAP/FAST tunnel) authentication. 232 * EAP-TTLS/PEAP/FAST tunnel) authentication. 240 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 253 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 266 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
/frameworks/support/volley/tests/src/com/android/volley/utils/ |
CacheTestUtils.java | 14 * @param isExpired Whether the TTLs should be set such that this entry is expired 15 * @param needsRefresh Whether the TTLs should be set such that this entry needs refresh
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (RFC 5281)
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (RFC 5281)
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous 109 eap=TTLS 159 eap=TTLS PEAP TLS 204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
|
wpa_supplicant.sgml | 174 <para>EAP-TTLS/EAP-MD5-Challenge</para> 178 <para>EAP-TTLS/EAP-GTC</para> 181 <listitem><para>EAP-TTLS/EAP-OTP</para></listitem> 183 <listitem><para>EAP-TTLS/EAP-MSCHAPv2</para></listitem> 185 <listitem><para>EAP-TTLS/EAP-TLS</para></listitem> 187 <listitem><para>EAP-TTLS/MSCHAPv2</para></listitem> 189 <listitem><para>EAP-TTLS/MSCHAP</para></listitem> 191 <listitem><para>EAP-TTLS/PAP</para></listitem> 193 <listitem><para>EAP-TTLS/CHAP</para></listitem>
|