Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 37) sorted by relevance

12

/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
H A Dwpa_supplicant.conf1810 key_mgmt=WPA-EAP
1826 key_mgmt=WPA-EAP
1840 key_mgmt=WPA-EAP
1853 key_mgmt=WPA-EAP
1866 key_mgmt=WPA-EAP
1886 key_mgmt=WPA-PSK WPA-EAP
1903 key_mgmt=WPA-EAP
1913 key_mgmt=WPA-EAP
1949 key_mgmt=WPA-EAP
1958 key_mgmt=WPA-EAP
[all …]
H A Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
H A DChangeLog9 - remove incorrect EAP Session-Id length constraint
17 * improve EAP-TLS support for TLSv1.3
18 * EAP-SIM/AKA: support IMSI privacy
26 * support new AKM for 802.1X/EAP with SHA384
32 * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
36 caching with FT-EAP was, and still is, disabled by default
39 * EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)
62 * EAP-pwd changes
74 * increased the maximum number of EAP message exchanges (mainly to
76 * fixed various issues in experimental support for EAP-TEAP peer
[all …]
H A DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
H A Ddefconfig92 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method or
96 # EAP-MD5
99 # EAP-MSCHAPv2
102 # EAP-TLS
104 # Enable EAP-TLSv1.3 support by default (currently disabled unless explicitly
111 # EAP-TTLS
114 # EAP-FAST
117 # EAP-TEAP
118 # Note: The current EAP-TEAP implementation is experimental and should not be
119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
[all …]
H A Dandroid.config74 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
78 # EAP-MD5
81 # EAP-MSCHAPv2
84 # EAP-TLS
90 # EAP-TTLS
93 # EAP-FAST
96 # EAP-GTC
99 # EAP-OTP
102 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
105 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
[all …]
H A DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
172 # This field is used with EAP-SIM/AKA/AKA' to encrypt the permanent
177 # This field is used to help the EAP-SIM/AKA/AKA' server to identify
206 # parameter. When using Home OIs to match the network, the EAP parameters
226 # Consortium to match the network, the EAP parameters need to be
245 # eap: Pre-configured EAP method
246 # This optional field can be used to specify which EAP method will be
247 # used with this credential. If not set, the EAP method is selected
418 > set_network 0 key_mgmt WPA-EAP
481 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
[all …]
/freebsd/contrib/wpa/hostapd/
H A Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
H A Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
H A Dandroid.config50 # Integrated EAP server
53 # EAP-MD5 for the integrated EAP server
56 # EAP-TLS for the integrated EAP server
59 # EAP-MSCHAPv2 for the integrated EAP server
62 # EAP-PEAP for the integrated EAP server
65 # EAP-GTC for the integrated EAP server
68 # EAP-TTLS for the integrated EAP server
71 # EAP-SIM for the integrated EAP server
74 # EAP-AKA for the integrated EAP server
77 # EAP-AKA' for the integrated EAP server
[all …]
H A Ddefconfig53 # Integrated EAP server
56 # EAP Re-authentication Protocol (ERP) in integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
[all …]
H A DChangeLog16 * EAP-SIM/AKA: support IMSI privacy
22 * support new AKM for 802.1X/EAP with SHA384
24 * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
50 * EAP-pwd changes
58 * fixed various issues in experimental support for EAP-TEAP server
60 increase the maximum number of EAP message exchanges (mainly to
61 support cases with very large certificates) for the EAP server
65 * fixed EAP-FAST server with TLS GCM/CCM ciphers
80 * added EAP-TLS server support for TLS 1.3 (disabled by default for now)
88 * EAP-pwd changes
[all …]
H A Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
H A Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
14 # and as such, is suitable for EAP-AKA' test.
H A DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
117 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
118 between a Supplicant and an Authenticator are sent using EAP over LAN
123 for EAP frame transmission. However, a more common configuration is to
124 use an external Authentication Server and encapsulate EAP frame in the
140 Authentication Server. hostapd supports RADIUS encapsulation of EAP
182 configuration, the co-located Authentication Server is not used and EAP
191 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
[all …]
H A Dhostapd.sim_db1 # Example GSM authentication triplet file for EAP-SIM authenticator
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
215 SM_ENTRY(EAP, DISABLED); in SM_STATE()
221 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
223 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
276 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
278 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
318 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
320 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap.c216 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
218 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
279 SM_STATE(EAP, DISABLED) in SM_STATE() argument
281 SM_ENTRY(EAP, DISABLED); in SM_STATE()
298 SM_STATE(EAP, IDLE) in SM_STATE() argument
300 SM_ENTRY(EAP, IDLE); in SM_STATE()
308 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
312 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
328 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
334 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/freebsd/tools/build/options/
H A DWITHOUT_WPA_SUPPLICANT_EAPOL4 support for EAP-PEAP, EAP-TLS, EAP-LEAP, and EAP-TTLS
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_supplicant.conf.sgml49 EAP-TLS as work network.</para>
63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
67 key_mgmt=WPA-EAP
81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
90 key_mgmt=WPA-EAP
102 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
112 key_mgmt=WPA-EAP
126 (require both unicast and broadcast); use EAP-TLS for
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
206 <para>Some EAP authentication methods require use of
[all …]
H A Dwpa_supplicant.sgml60 Authenticator and EAP authentication with Authentication
104 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
105 completes EAP authentication with the
111 <para>If WPA-EAP: master key is received from the IEEE 802.1X
146 <para>WPA with EAP (e.g., with RADIUS authentication server)
152 <para>EAP-TLS</para>
158 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
163 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
167 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
171 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
H A Deapol_test.sgml15 <refpurpose>EAP peer and RADIUS client testing</refpurpose>
47 <para>eapol_test is a program that links together the same EAP
55 test EAP methods without having to setup an access point and a
59 of EAP methods against RADIUS servers and in development testing
60 for new EAP methods. It can be easily used to automate EAP testing
63 from a RADIUS server. For example, the automated EAP tests described
75 <para>tries to complete EAP authentication based on the network
/freebsd/contrib/wpa/wpa_supplicant/examples/
H A Dwpa2-eap-ccmp.conf7 key_mgmt=WPA-EAP
H A DopenCryptoki.conf24 key_mgmt=WPA-EAP

12