/external/wpa_supplicant_8/hostapd/ |
hostapd.eap_user_sqlite | 13 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1); 14 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2','password',1); 16 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS');
|
hostapd.eap_user | 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use 23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration. 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 45 # EAP-TTLS supports both EAP and non-EAP authentication inside the tunnel. 47 # flag. Non-EAP methods can be enabled by following method names: TTLS-PAP, 48 # TTLS-CHAP, TTLS-MSCHAP, TTLS-MSCHAPV2. TTLS-PAP and TTLS-CHAP require [all...] |
eap_testing.txt | 42 EAP-TTLS/CHAP + - + - + + 43 EAP-TTLS/MSCHAP + - + - + + 44 EAP-TTLS/MSCHAPv2 + + + - + + 45 EAP-TTLS/PAP + - + - + + 46 EAP-TTLS/EAP-MD5 + - - - - + 47 EAP-TTLS/EAP-GTC + + - - - 48 EAP-TTLS/EAP-MSCHAPv2 + + - - - 49 EAP-TTLS/EAP-TLS + F - - - 50 EAP-TTLS/EAP-SIM + + - - - 51 EAP-TTLS/EAP-AKA + + - - [all...] |
ChangeLog | 88 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length 275 * fixed TNC with EAP-TTLS 370 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST 375 * added support for fragmenting EAP-TTLS/PEAP/FAST Phase 2 (tunneled) 397 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST} 411 * added support for configuring EAP-TTLS phase 2 non-EAP methods in 414 enabled with new method names TTLS-PAP, TTLS-CHAP, TTLS-MSCHAP, 415 TTLS-MSCHAPV [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
eap_testing.txt | 79 EAP-TTLS/CHAP + - +2 + + + + + + - + - 80 EAP-TTLS/MSCHAP + - + + + + + + + - + - 81 EAP-TTLS/MSCHAPv2 + - + + + + + + + - + - 82 EAP-TTLS/PAP + - + + + + + + + - + - 83 EAP-TTLS/EAP-MD5 + - +2 + + + + + + - + - 84 EAP-TTLS/EAP-GTC + - +2 ? + + + + - - + - 85 EAP-TTLS/EAP-OTP - - - - - + - - - - - - 86 EAP-TTLS/EAP-MSCHAPv2 + - +2 + + + + + + - + - 87 EAP-TTLS/EAP-TLS + - +2 + F + + + - - + - 88 EAP-TTLS/EAP-SIM - - - - - - - - - - + [all...] |
todo.txt | 66 created with EAP-TLS must not be allowed to do fast re-auth with EAP-TTLS 69 * could need to modify eap_{ttls,peap,fast}_decrypt to do same 80 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
|
README | 64 * EAP-TTLS/EAP-MD5-Challenge 65 * EAP-TTLS/EAP-GTC 66 * EAP-TTLS/EAP-OTP 67 * EAP-TTLS/EAP-MSCHAPv2 68 * EAP-TTLS/EAP-TLS 69 * EAP-TTLS/MSCHAPv2 70 * EAP-TTLS/MSCHAP 71 * EAP-TTLS/PAP 72 * EAP-TTLS/CHAP 165 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS [all...] |
wpa_supplicant.conf | 453 # eap=TTLS 645 # with EAP-PEAP or EAP-TTLS) 647 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 649 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 651 # as a Phase 2 method with EAP-PEAP or EAP-TTLS) 654 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 663 # identity, e.g., EAP-TTLS). This field can also be used with 669 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP) [all...] |
ChangeLog | 132 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2 142 (EAP-PEAP/TLS, EAP-TTLS/TLS, EAP-FAST/TLS) to support different CA 193 using EAP-TLS/PEAP/TTLS (i.e., only use it with EAP-FAST) [all...] |
README-HS20 | 220 # eap=TTLS 279 > set_network 0 eap TTLS 340 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 356 TTLS 381 <3>CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected 404 selectedMethod=21 (EAP-TTLS)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 2 * hostapd / EAP-TTLS (RFC 5281) 70 wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s", 167 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x " 171 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow " 177 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length " 185 wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP " 190 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d", 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 199 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message"); 203 wpa_printf(MSG_WARNING, "EAP-TTLS: [all...] |
eap_tls_common.h | 2 * EAP-TLS/PEAP/TTLS/FAST server common functions
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 2 * EAP peer method: EAP-TTLS (RFC 5281) 100 wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 type: %s", selected); 116 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL."); 218 "ttls keying material", 221 wpa_printf(MSG_INFO, "EAP-TTLS: Failed to derive key"); 225 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key", 233 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived Session-Id", 236 wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to derive Session-Id"); 246 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 263 wpa_printf(MSG_DEBUG, "EAP-TTLS: Selected [all...] |
eap_config.h | 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 58 * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). 78 * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the 119 * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the 221 * EAP-TTLS/PEAP/FAST tunnel) authentication. 238 * EAP-TTLS/PEAP/FAST tunnel) authentication. 246 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 259 * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the 272 * EAP-TTLS/PEAP/FAST tunnel) authentication [all...] |
eap_tls_common.h | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 73 * eap_type - EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST)
|
eap_tls_common.c | 2 * EAP peer: EAP-TLS/PEAP/TTLS/FAST common functions 125 * EAP-TTLS (EAP-FAST uses session ticket, so any server that 217 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 221 * EAP-PEAP, EAP-TTLS, and EAP-FAST. 350 * @eap_type: EAP method used in Phase 1 (EAP_TYPE_TLS/PEAP/TTLS/FAST) 554 * @peap_version: Version number for EAP-PEAP/TTLS 634 * @peap_version: Version number for EAP-PEAP/TTLS 734 * @peap_version: Version number for EAP-PEAP/TTLS 809 * EAP-TLS, EAP-PEAP, EAP-TTLS, and EAP-FAST methods are expected to use this 966 * @peap_version: Version number for EAP-PEAP/TTLS [all...] |
/frameworks/volley/tests/src/com/android/volley/utils/ |
CacheTestUtils.java | 14 * @param isExpired Whether the TTLs should be set such that this entry is expired 15 * @param needsRefresh Whether the TTLs should be set such that this entry needs refresh
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ttls.h | 2 * EAP server/peer: EAP-TTLS (RFC 5281)
|
/cts/tests/tests/net/src/android/net/wifi/cts/ |
WifiEnterpriseConfigTest.java | 57 config.setEapMethod(Eap.TTLS); 58 assertTrue(config.getEapMethod() == Eap.TTLS);
|
/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 44 if (os_strcmp(start, "TTLS-PAP") == 0) { 48 if (os_strcmp(start, "TTLS-CHAP") == 0) { 52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { 56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 98 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous 109 eap=TTLS 159 eap=TTLS PEAP TLS 204 certificates whereas EAP-PEAP and EAP-TTLS only require the server
|
wpa_supplicant.sgml | 174 <para>EAP-TTLS/EAP-MD5-Challenge</para> 178 <para>EAP-TTLS/EAP-GTC</para> 181 <listitem><para>EAP-TTLS/EAP-OTP</para></listitem> 183 <listitem><para>EAP-TTLS/EAP-MSCHAPv2</para></listitem> 185 <listitem><para>EAP-TTLS/EAP-TLS</para></listitem> 187 <listitem><para>EAP-TTLS/MSCHAPv2</para></listitem> 189 <listitem><para>EAP-TTLS/MSCHAP</para></listitem> 191 <listitem><para>EAP-TTLS/PAP</para></listitem> 193 <listitem><para>EAP-TTLS/CHAP</para></listitem>
|
/external/smack/src/org/xbill/DNS/ |
Options.java | 9 * bindttl - Print TTLs in BIND format<BR>
|
TTL.java | 31 * to MAX_VALUE. This should be donw for TTLs, but not other values which
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 94 value.equalsIgnoreCase("TTLS")) { 257 } else if (eapValue.equals("TTLS")) { 258 config.enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TTLS);
|