Home
last modified time | relevance | path

Searched refs:EAP (Results 1 – 25 of 50) sorted by relevance

12

/hostap-latest/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
11 - For EAP methods that generate keying material, the key derived by the
52 EAP-MD5 + - - + + + + + - - + +
53 EAP-GTC + - - ? + + + + - - + -
54 EAP-OTP - - - - - + - - - - - -
55 EAP-MSCHAPv2 + - - + + + + + - - + -
56 EAP-TLS + + + + + + + + - - + +
57 EAP-PEAPv0/MSCHAPv2 + + + + + + + + + - + +
58 EAP-PEAPv0/GTC + - + - + + + + - - + +
59 EAP-PEAPv0/OTP - - - - - + - - - - - -
[all …]
Dwpa_supplicant.conf1821 key_mgmt=WPA-EAP
1837 key_mgmt=WPA-EAP
1851 key_mgmt=WPA-EAP
1864 key_mgmt=WPA-EAP
1877 key_mgmt=WPA-EAP
1897 key_mgmt=WPA-PSK WPA-EAP
1914 key_mgmt=WPA-EAP
1924 key_mgmt=WPA-EAP
1960 key_mgmt=WPA-EAP
1969 key_mgmt=WPA-EAP
[all …]
Dtodo.txt4 - consider closing smart card / PCSC connection when EAP-SIM/EAP-AKA
17 - EAP-PAX with PAX_SEC
18 - EAP (RFC 3748)
20 - test what happens if authenticator sends EAP-Success before real EAP
29 - EAP-POTP/RSA SecurID profile (RFC 4793)
32 - consider redesigning pending EAP requests (identity/password/otp from
33 ctrl_iface) by moving the retrying of the previous request into EAP
41 * EAP options (one page for each method)
47 this should likely happen before EAP is initialized for authentication;
48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
[all …]
DChangeLog9 - remove incorrect EAP Session-Id length constraint
17 * improve EAP-TLS support for TLSv1.3
18 * EAP-SIM/AKA: support IMSI privacy
26 * support new AKM for 802.1X/EAP with SHA384
32 * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
36 caching with FT-EAP was, and still is, disabled by default
39 * EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)
62 * EAP-pwd changes
74 * increased the maximum number of EAP message exchanges (mainly to
76 * fixed various issues in experimental support for EAP-TEAP peer
[all …]
DREADME55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
[all …]
Dandroid.config74 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method is
78 # EAP-MD5
81 # EAP-MSCHAPv2
84 # EAP-TLS
90 # EAP-TTLS
93 # EAP-FAST
96 # EAP-GTC
99 # EAP-OTP
102 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
105 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
[all …]
Ddefconfig92 # Enable IEEE 802.1X Supplicant (automatically included if any EAP method or
96 # EAP-MD5
99 # EAP-MSCHAPv2
102 # EAP-TLS
104 # Enable EAP-TLSv1.3 support by default (currently disabled unless explicitly
111 # EAP-TTLS
114 # EAP-FAST
117 # EAP-TEAP
118 # Note: The current EAP-TEAP implementation is experimental and should not be
119 # enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number
[all …]
DREADME-HS20135 # (EAP-TLS). Full path to the file should be used since working
172 # This field is used with EAP-SIM/AKA/AKA' to encrypt the permanent
177 # This field is used to help the EAP-SIM/AKA/AKA' server to identify
206 # parameter. When using Home OIs to match the network, the EAP parameters
226 # Consortium to match the network, the EAP parameters need to be
245 # eap: Pre-configured EAP method
246 # This optional field can be used to specify which EAP method will be
247 # used with this credential. If not set, the EAP method is selected
418 > set_network 0 key_mgmt WPA-EAP
481 <3>CTRL-EVENT-EAP-STARTED EAP authentication started
[all …]
/hostap-latest/hostapd/
Deap_testing.txt18 EAP-MD5 + - ? ? -
19 EAP-GTC + - ? - -
20 EAP-MSCHAPv2 + - ? - -
21 EAP-TLS + + +1 + +
22 EAP-PEAPv0/MSCHAPv2 + + + + + +
23 EAP-PEAPv0/GTC + + + - +
24 EAP-PEAPv0/MD5 + - + - -
25 EAP-PEAPv0/TLS + F - + +
26 EAP-PEAPv0/SIM + + - - -
27 EAP-PEAPv0/AKA + + - - -
[all …]
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
3 # Each line must contain an identity, EAP method(s), and an optional password
13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous
19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
21 # EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
27 # avoid having to configure every certificate for EAP-TLS authentication. The
32 # main purpose for this is to be able to avoid EAP method negotiation when the
33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This
[all …]
Dandroid.config50 # Integrated EAP server
53 # EAP-MD5 for the integrated EAP server
56 # EAP-TLS for the integrated EAP server
59 # EAP-MSCHAPv2 for the integrated EAP server
62 # EAP-PEAP for the integrated EAP server
65 # EAP-GTC for the integrated EAP server
68 # EAP-TTLS for the integrated EAP server
71 # EAP-SIM for the integrated EAP server
74 # EAP-AKA for the integrated EAP server
77 # EAP-AKA' for the integrated EAP server
[all …]
Ddefconfig53 # Integrated EAP server
56 # EAP Re-authentication Protocol (ERP) in integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
80 # EAP-AKA for the integrated EAP server
[all …]
DChangeLog16 * EAP-SIM/AKA: support IMSI privacy
22 * support new AKM for 802.1X/EAP with SHA384
24 * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
50 * EAP-pwd changes
58 * fixed various issues in experimental support for EAP-TEAP server
60 increase the maximum number of EAP message exchanges (mainly to
61 support cases with very large certificates) for the EAP server
65 * fixed EAP-FAST server with TLS GCM/CCM ciphers
80 * added EAP-TLS server support for TLS 1.3 (disabled by default for now)
88 * EAP-pwd changes
[all …]
Dhlr_auc_gw.txt1 HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3 hlr_auc_gw is an example implementation of the EAP-SIM/AKA/AKA'
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
66 hostapd (EAP server) can also be configured to store the EAP-SIM/AKA
79 authentication server for EAP-SIM/AKA/AKA':
/hostap-latest/doc/
Deap.doxygen2 \page eap_peer_module EAP peer implementation
4 Extensible Authentication Protocol (EAP) is an authentication framework
5 defined in RFC 3748. wpa_supplicant uses a separate code module for EAP
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP peer implementation in wpa_supplicant.
14 Some of the terminology used in EAP state machine is referring to
16 layer being IEEE 802.1X if EAP module is built for other programs than
21 \section adding_eap_methods Adding EAP methods
23 Each EAP method is implemented as a separate module, usually as one C
24 file named eap_<name of the method>.c, e.g., \ref eap_md5.c. All EAP
[all …]
Dwpa_supplicant.fig34 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
124 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
129 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
134 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
139 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
144 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
149 4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001
154 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
164 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
169 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
[all …]
Deap_server.doxygen2 \page eap_server_module EAP server implementation
4 Extensible Authentication Protocol (EAP) is an authentication framework
5 defined in RFC 3748. hostapd uses a separate code module for EAP server
8 it to be usable in other programs. The design of the EAP
12 understanding the EAP server implementation in hostapd.
14 Some of the terminology used in EAP state machine is referring to
16 layer being IEEE 802.1X if EAP module is built for other programs than
21 \section adding_eap_methods Adding EAP methods
23 Each EAP method is implemented as a separate module, usually as one C
24 file named eap_server_<name of the method>.c, e.g., \ref eap_server_md5.c. All EAP
[all …]
Dhostapd.fig29 4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
72 4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
77 4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
82 4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
87 4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
92 4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
97 4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
102 4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
107 4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
112 4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001
[all …]
Dcode_structure.doxygen11 \ref eap_peer "EAP peer" |
20 state machine, and EAP state machine and methods. In addition, there
23 Both WPA and EAPOL/EAP state machines can be used separately in other
99 T-PRF (for EAP-FAST)
239 \section eap_peer EAP peer
241 \ref eap_peer_module "EAP peer implementation" is a separate module that
245 EAP state machine and method interface
248 Common EAP definitions
251 Internal definitions for EAP state machine and EAP methods; not to be
255 Common code for EAP-SIM and EAP-AKA
[all …]
/hostap-latest/src/eap_server/
Deap_server.c213 SM_STATE(EAP, DISABLED) in SM_STATE() argument
215 SM_ENTRY(EAP, DISABLED); in SM_STATE()
221 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
223 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
276 SM_STATE(EAP, PICK_UP_METHOD) in SM_STATE() argument
278 SM_ENTRY(EAP, PICK_UP_METHOD); in SM_STATE()
308 SM_STATE(EAP, IDLE) in SM_STATE() argument
310 SM_ENTRY(EAP, IDLE); in SM_STATE()
318 SM_STATE(EAP, RETRANSMIT) in SM_STATE() argument
320 SM_ENTRY(EAP, RETRANSMIT); in SM_STATE()
[all …]
/hostap-latest/eap_example/
DREADME1 EAP peer/server library and example program
8 The interfaces of the EAP server/peer implementation are based on RFC
9 4137 (EAP State Machines). This RFC is coordinated with the state
12 interface between them and EAP. However, the EAP implementation can be
14 which maps the EAPOL<->EAP variables to another protocol.
16 This directory contains an example showing how EAP peer and server
18 example program initializes both an EAP server and an EAP peer
19 entities and then runs through an EAP-PEAP/MSCHAPv2 authentication.
22 control the EAP peer implementation. eap_example_server.c does the
23 same for EAP server. eap_example.c is an example that ties in both the
[all …]
/hostap-latest/src/eap_peer/
Deap.c216 SM_STATE(EAP, INITIALIZE) in SM_STATE() argument
218 SM_ENTRY(EAP, INITIALIZE); in SM_STATE()
279 SM_STATE(EAP, DISABLED) in SM_STATE() argument
281 SM_ENTRY(EAP, DISABLED); in SM_STATE()
298 SM_STATE(EAP, IDLE) in SM_STATE() argument
300 SM_ENTRY(EAP, IDLE); in SM_STATE()
308 SM_STATE(EAP, RECEIVED) in SM_STATE() argument
312 SM_ENTRY(EAP, RECEIVED); in SM_STATE()
328 SM_STATE(EAP, GET_METHOD) in SM_STATE() argument
334 SM_ENTRY(EAP, GET_METHOD); in SM_STATE()
[all …]
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml49 EAP-TLS as work network.</para>
63 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
67 key_mgmt=WPA-EAP
81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
90 key_mgmt=WPA-EAP
102 <para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous
112 key_mgmt=WPA-EAP
126 (require both unicast and broadcast); use EAP-TLS for
159 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
206 <para>Some EAP authentication methods require use of
[all …]
Dwpa_supplicant.sgml60 Authenticator and EAP authentication with Authentication
104 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
105 completes EAP authentication with the
111 <para>If WPA-EAP: master key is received from the IEEE 802.1X
146 <para>WPA with EAP (e.g., with RADIUS authentication server)
152 <para>EAP-TLS</para>
158 <para>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</para>
163 <para>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</para>
167 <para>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</para>
171 <para>EAP-PEAP/OTP (both PEAPv0 and PEAPv1)</para>
[all …]
/hostap-latest/tests/hwsim/auth_serv/
Dhlr_auc_gw.milenage_db4 # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
5 # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
15 # and as such, is suitable for EAP-AKA' test.

12