HomeSort by relevance Sort by last modified time
    Searched full:ttls (Results 1 - 25 of 117) sorted by null

1 2 3 4 5

  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP,
48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require
    [all...]
eap_testing.txt 42 EAP-TTLS/CHAP + - + - + +
43 EAP-TTLS/MSCHAP + - + - + +
44 EAP-TTLS/MSCHAPv2 + + + - + +
45 EAP-TTLS/PAP + - + - + +
46 EAP-TTLS/EAP-MD5 + - - - - +
47 EAP-TTLS/EAP-GTC + + - - -
48 EAP-TTLS/EAP-MSCHAPv2 + + - - -
49 EAP-TTLS/EAP-TLS + F - - -
50 EAP-TTLS/EAP-SIM + + - - -
51 EAP-TTLS/EAP-AKA + + - -
    [all...]
ChangeLog 69 * fixed TNC with EAP-TTLS
164 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
169 * added support for fragmenting EAP-TTLS/PEAP/FAST Phase 2 (tunneled)
191 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST}
205 * added support for configuring EAP-TTLS phase 2 non-EAP methods in
208 enabled with new method names TTLS-PAP, TTLS-CHAP, TTLS-MSCHAP,
209 TTLS-MSCHAPV2
241 * fixed EAP-TTLS AVP parser processing for too short AVP length
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
27 /* Maximum supported TTLS version
29 * 1 = draft-funk-eap-ttls-v1-00.txt
89 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
185 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
189 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
195 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
203 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
208 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen)
    [all...]
eap_tls_common.h 2 * hostapd / EAP-TLS/PEAP/TTLS/FAST common functions
  /external/wpa_supplicant_6/wpa_supplicant/
eap_testing.txt 79 EAP-TTLS/CHAP + - +2 + + + + + + - + -
80 EAP-TTLS/MSCHAP + - + + + + + + + - + -
81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
82 EAP-TTLS/PAP + - + + + + + + + - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
85 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
88 EAP-TTLS/EAP-SIM - - - - - - - - - - +
    [all...]
todo.txt 68 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
71 * could need to modify eap_{ttls,peap,fast}_decrypt to do same
87 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
wpa_supplicant.conf.orig 341 # with EAP-PEAP or EAP-TTLS)
343 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
345 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
347 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
350 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
359 # identity, e.g., EAP-TTLS)
364 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
372 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma
    [all...]
README 79 * EAP-TTLS/EAP-MD5-Challenge
80 * EAP-TTLS/EAP-GTC
81 * EAP-TTLS/EAP-OTP
82 * EAP-TTLS/EAP-MSCHAPv2
83 * EAP-TTLS/EAP-TLS
84 * EAP-TTLS/MSCHAPv2
85 * EAP-TTLS/MSCHAP
86 * EAP-TTLS/PAP
87 * EAP-TTLS/CHAP
227 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 79 EAP-TTLS/CHAP + - +2 + + + + + + - + -
80 EAP-TTLS/MSCHAP + - + + + + + + + - + -
81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
82 EAP-TTLS/PAP + - + + + + + + + - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
85 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
88 EAP-TTLS/EAP-SIM - - - - - - - - - - +
    [all...]
todo.txt 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same
80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
wpa_supplicant.conf 412 # with EAP-PEAP or EAP-TTLS)
414 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
416 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
418 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
421 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
430 # identity, e.g., EAP-TTLS)
435 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
443 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory ma
    [all...]
README 64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
67 * EAP-TTLS/EAP-MSCHAPv2
68 * EAP-TTLS/EAP-TLS
69 * EAP-TTLS/MSCHAPv2
70 * EAP-TTLS/MSCHAP
71 * EAP-TTLS/PAP
72 * EAP-TTLS/CHAP
163 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
203 wpa_printf(MSG_WARNING, "EAP-TTLS:
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
98 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
114 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
215 "ttls keying material",
218 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
222 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
232 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len);
249 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected "
299 wpa_printf(MSG_DEBUG, "EAP-TTLS: Start TNC after completed "
307 wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected EAP
    [all...]
eap_config.h 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
55 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
75 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
116 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
218 * EAP-TTLS/PEAP/FAST tunnel) authentication.
235 * EAP-TTLS/PEAP/FAST tunnel) authentication.
243 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
256 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
269 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
29 /* Maximum supported TTLS version
31 * 1 = draft-funk-eap-ttls-v1-00.txt
104 wpa_printf(MSG_DEBUG, "EAP-TTLS: Forced TTLS version "
128 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
147 wpa_printf(MSG_INFO, "EAP-TTLS: Forced TTLSv%d and "
270 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Session keys for TLS/IA inner "
287 "ttls keying material",
290 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key")
    [all...]
eap_config.h 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
61 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
81 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
113 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
215 * EAP-TTLS/PEAP/FAST tunnel) authentication.
232 * EAP-TTLS/PEAP/FAST tunnel) authentication.
240 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
253 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
266 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
  /frameworks/support/volley/tests/src/com/android/volley/utils/
CacheTestUtils.java 14 * @param isExpired Whether the TTLs should be set such that this entry is expired
15 * @param needsRefresh Whether the TTLs should be set such that this entry needs refresh
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (RFC 5281)
  /external/wpa_supplicant_8/src/eap_common/
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (RFC 5281)
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
109 eap=TTLS
159 eap=TTLS PEAP TLS
204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
wpa_supplicant.sgml 174 <para>EAP-TTLS/EAP-MD5-Challenge</para>
178 <para>EAP-TTLS/EAP-GTC</para>
181 <listitem><para>EAP-TTLS/EAP-OTP</para></listitem>
183 <listitem><para>EAP-TTLS/EAP-MSCHAPv2</para></listitem>
185 <listitem><para>EAP-TTLS/EAP-TLS</para></listitem>
187 <listitem><para>EAP-TTLS/MSCHAPv2</para></listitem>
189 <listitem><para>EAP-TTLS/MSCHAP</para></listitem>
191 <listitem><para>EAP-TTLS/PAP</para></listitem>
193 <listitem><para>EAP-TTLS/CHAP</para></listitem>

Completed in 769 milliseconds

1 2 3 4 5