HomeSort by relevance Sort by last modified time
    Searched full:ttls (Results 1 - 25 of 197) sorted by null

1 2 3 4 5 6 7 8

  /external/wpa_supplicant_8/hostapd/
hostapd.eap_user_sqlite 13 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
14 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2','password',1);
16 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS');
hostapd.eap_user 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel.
47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP,
48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require
    [all...]
eap_testing.txt 42 EAP-TTLS/CHAP + - + - + +
43 EAP-TTLS/MSCHAP + - + - + +
44 EAP-TTLS/MSCHAPv2 + + + - + +
45 EAP-TTLS/PAP + - + - + +
46 EAP-TTLS/EAP-MD5 + - - - - +
47 EAP-TTLS/EAP-GTC + + - - -
48 EAP-TTLS/EAP-MSCHAPv2 + + - - -
49 EAP-TTLS/EAP-TLS + F - - -
50 EAP-TTLS/EAP-SIM + + - - -
51 EAP-TTLS/EAP-AKA + + - -
    [all...]
ChangeLog 88 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
275 * fixed TNC with EAP-TTLS
370 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
375 * added support for fragmenting EAP-TTLS/PEAP/FAST Phase 2 (tunneled)
397 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST}
411 * added support for configuring EAP-TTLS phase 2 non-EAP methods in
414 enabled with new method names TTLS-PAP, TTLS-CHAP, TTLS-MSCHAP,
415 TTLS-MSCHAPV
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
eap_testing.txt 79 EAP-TTLS/CHAP + - +2 + + + + + + - + -
80 EAP-TTLS/MSCHAP + - + + + + + + + - + -
81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + -
82 EAP-TTLS/PAP + - + + + + + + + - + -
83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + -
84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + -
85 EAP-TTLS/EAP-OTP - - - - - + - - - - - -
86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + -
87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + -
88 EAP-TTLS/EAP-SIM - - - - - - - - - - +
    [all...]
todo.txt 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS
69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same
80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
README 64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
67 * EAP-TTLS/EAP-MSCHAPv2
68 * EAP-TTLS/EAP-TLS
69 * EAP-TTLS/MSCHAPv2
70 * EAP-TTLS/MSCHAP
71 * EAP-TTLS/PAP
72 * EAP-TTLS/CHAP
165 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS
    [all...]
wpa_supplicant.conf 453 # eap=TTLS
645 # with EAP-PEAP or EAP-TTLS)
647 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
649 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
651 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
654 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
663 # identity, e.g., EAP-TTLS). This field can also be used with
669 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP)
    [all...]
ChangeLog 132 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2
142 (EAP-PEAP/TLS, EAP-TTLS/TLS, EAP-FAST/TLS) to support different CA
193 using EAP-TLS/PEAP/TTLS (i.e., only use it with EAP-FAST)
    [all...]
README-HS20 220 # eap=TTLS
279 > set_network 0 eap TTLS
340 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
356 TTLS
381 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
404 selectedMethod=21 (EAP-TTLS)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 2 * hostapd / EAP-TTLS (RFC 5281)
70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
203 wpa_printf(MSG_WARNING, "EAP-TTLS:
    [all...]
eap_tls_common.h 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 2 * EAP peer method: EAP-TTLS (RFC 5281)
100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected);
116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
218 "ttls keying material",
221 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key");
225 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
233 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id",
236 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id");
246 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len);
263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected
    [all...]
eap_config.h 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
58 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
78 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
119 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
221 * EAP-TTLS/PEAP/FAST tunnel) authentication.
238 * EAP-TTLS/PEAP/FAST tunnel) authentication.
246 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
259 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
272 * EAP-TTLS/PEAP/FAST tunnel) authentication
    [all...]
eap_tls_common.h 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
eap_tls_common.c 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions
125 * EAP-TTLS (EAP-FAST uses session ticket, so any server that
217 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
221 * EAP-PEAP, EAP-TTLS, and EAP-FAST.
350 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
554 * @peap_version: Version number for EAP-PEAP/TTLS
634 * @peap_version: Version number for EAP-PEAP/TTLS
734 * @peap_version: Version number for EAP-PEAP/TTLS
809 * EAP-TLS, EAP-PEAP, EAP-TTLS, and EAP-FAST methods are expected to use this
966 * @peap_version: Version number for EAP-PEAP/TTLS
    [all...]
  /frameworks/volley/tests/src/com/android/volley/utils/
CacheTestUtils.java 14 * @param isExpired Whether the TTLs should be set such that this entry is expired
15 * @param needsRefresh Whether the TTLs should be set such that this entry needs refresh
  /external/wpa_supplicant_8/src/eap_common/
eap_ttls.h 2 * EAP server/peer: EAP-TTLS (RFC 5281)
  /cts/tests/tests/net/src/android/net/wifi/cts/
WifiEnterpriseConfigTest.java 57 config.setEapMethod(Eap.TTLS);
58 assertTrue(config.getEapMethod() == Eap.TTLS);
  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 44 if (os_strcmp(start, "TTLS-PAP") == 0) {
48 if (os_strcmp(start, "TTLS-CHAP") == 0) {
52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) {
56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) {
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_supplicant.conf.sgml 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
109 eap=TTLS
159 eap=TTLS PEAP TLS
204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
wpa_supplicant.sgml 174 <para>EAP-TTLS/EAP-MD5-Challenge</para>
178 <para>EAP-TTLS/EAP-GTC</para>
181 <listitem><para>EAP-TTLS/EAP-OTP</para></listitem>
183 <listitem><para>EAP-TTLS/EAP-MSCHAPv2</para></listitem>
185 <listitem><para>EAP-TTLS/EAP-TLS</para></listitem>
187 <listitem><para>EAP-TTLS/MSCHAPv2</para></listitem>
189 <listitem><para>EAP-TTLS/MSCHAP</para></listitem>
191 <listitem><para>EAP-TTLS/PAP</para></listitem>
193 <listitem><para>EAP-TTLS/CHAP</para></listitem>
  /external/smack/src/org/xbill/DNS/
Options.java 9 * bindttl - Print TTLs in BIND format<BR>
TTL.java 31 * to MAX_VALUE. This should be donw for TTLs, but not other values which
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 94 value.equalsIgnoreCase("TTLS")) {
257 } else if (eapValue.equals("TTLS")) {
258 config.enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TTLS);

Completed in 459 milliseconds

1 2 3 4 5 6 7 8