Home
last modified time | relevance | path

Searched refs:X (Results 1 – 25 of 32) sorted by relevance

12

/hostap-latest/hostapd/
DREADME1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
57 server for MAC address based access control, IEEE 802.1X Authenticator
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
98 IEEE 802.1X
101 IEEE Std 802.1X-2001 is a standard for port-based network access
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
108 IEEE 802.1X uses elements called Supplicant, Authenticator, Port
117 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
126 802.1X would also allow other mechanisms.
130 or coming from an unauthorized port. PAE allows IEEE 802.1X related
[all …]
Deap_testing.txt1 Interoperability testing of hostapd's IEEE 802.1X/EAPOL authentication
13 Mac OS X 10.4 ------------------. | | |
DChangeLog22 * support new AKM for 802.1X/EAP with SHA384
97 * added support for MACsec Key Agreement using IEEE 802.1X/PSK
270 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
441 - fix X.509 validation of PKCS#1 signature to check for extra data
708 - Add domainComponent parser for X.509 names
844 * added support for SHA-256 as X.509 certificate digest when using the
845 internal X.509/TLSv1 implementation
929 needed X.509/ASN.1/RSA/bignum processing (this can be enabled by
982 and IEEE 802.1X without WEP)
1165 with the new state machine changes from IEEE 802.1X draft)
[all …]
/hostap-latest/src/common/
Ddpp_pkex.c33 struct crypto_ec_point *Qi = NULL, *M = NULL, *X = NULL; in dpp_pkex_build_exchange_req() local
68 X = crypto_ec_key_get_public_key(pkex->x); in dpp_pkex_build_exchange_req()
70 if (!X || !M) in dpp_pkex_build_exchange_req()
72 crypto_ec_point_debug_print(ec, X, "DPP: X"); in dpp_pkex_build_exchange_req()
74 if (crypto_ec_point_add(ec, X, Qi, M)) in dpp_pkex_build_exchange_req()
154 crypto_ec_point_deinit(X, 1); in dpp_pkex_build_exchange_req()
354 struct crypto_ec_point *Qi = NULL, *Qr = NULL, *M = NULL, *X = NULL, in dpp_pkex_rx_exchange_req() local
449 X = crypto_ec_point_init(ec); in dpp_pkex_rx_exchange_req()
451 if (!X || !M || in dpp_pkex_rx_exchange_req()
455 crypto_ec_point_add(ec, M, Qi, X) || in dpp_pkex_rx_exchange_req()
[all …]
/hostap-latest/doc/
Dmainpage.doxygen27 802.1X/WPA component that is used in the client stations. It
41 EAPOL (IEEE 802.1X) state machines are implemented as a separate
64 association), IEEE 802.1X/WPA/WPA2 Authenticator, EAP server, and
79 EAPOL (IEEE 802.1X) state machines are implemented as a separate
82 Both IEEE 802.1X and RADIUS authentication server can use EAP server
Deap.doxygen15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
16 layer being IEEE 802.1X if EAP module is built for other programs than
76 uses IEEE 802.1X EAPOL state machines to control the transmission of
Deap_server.doxygen15 EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
16 layer being IEEE 802.1X if EAP module is built for other programs than
Dtesting_tools.doxygen20 802.1X/EAPOL Authenticator state machines. In other words, it
21 integrates IEEE 802.1X Authenticator (normally, an access point) and
22 IEEE 802.1X Supplicant (normally, a wireless client) together to
Ddirectories.doxygen11 This module includes IEEE 802.11, IEEE 802.1X, and WPA related
Dcode_structure.doxygen158 X.509v3 certificate parsing and processing
284 EAPOL supplicant state machine and IEEE 802.1X processing
/hostap-latest/eap_example/
DREADME10 machines defined in IEEE 802.1X-2004. hostapd and wpa_supplicant
11 include implementation of the IEEE 802.1X EAPOL state machines and the
32 uses IEEE 802.1X EAPOL state machines to control the transmission of
/hostap-latest/tests/hwsim/auth_serv/
Dserver-certpol2.key4 s/in0B6jMyZoQCATdAiH77Y68X8+9X+TRHQ3i8OJp7pfQjlKIiBAZsZvd89UPwVh
7 xUKBSGHMPAYXhWNuKMvXiNHOQMf/YVGsu7ojyUKnfScNHlOQzyI/V/X/GgUMnHob
/hostap-latest/src/tls/
Dlibtommath.c132 static int s_mp_exptmod(mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode);
179 static int mp_exptmod_fast (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode);
583 static int mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y) in mp_exptmod() argument
593 if (X->sign == MP_NEG) { in mp_exptmod()
615 if ((err = mp_abs(X, &tmpX)) != MP_OKAY) { in mp_exptmod()
635 return s_mp_exptmod(G, X, P, Y, 1); in mp_exptmod()
657 return mp_exptmod_fast (G, X, P, Y, dr); in mp_exptmod()
662 return s_mp_exptmod (G, X, P, Y, 0); in mp_exptmod()
1875 static int s_mp_exptmod (mp_int * G, mp_int * X, mp_int * P, mp_int * Y, int redmode) in s_mp_exptmod() argument
1883 x = mp_count_bits (X); in s_mp_exptmod()
[all …]
/hostap-latest/wpa_supplicant/
DREADME-HS20171 # imsi_privacy_cert: IMSI privacy certificate (PEM encoded X.509v3 certificate)
173 # identity (IMSI) to improve privacy. The X.509v3 certificate needs to
212 # (Hotspot 2.0 PerProviderSubscription/<X+>/HomeSP/HomeOIList/<X+>/HomeOI)
218 # (Hotspot 2.0 PerProviderSubscription/<X+>/HomeSP/HomeOIList/<X+>/HomeOIRequired)
243 # (Hotspot 2.0 PerProviderSubscription/<X+>/HomeSP/RoamingConsortiumOI)
281 # Minimum backhaul threshold (PPS/<X+>/Policy/MinBackhauldThreshold/*)
292 # (PPS/<X+>/Policy/MaximumBSSLoadValue)
299 # (PPS/<X+>/Policy/RequiredProtoPortTuple)
539 key_mgmt=WPA2/IEEE 802.1X/EAP
DREADME56 Following authentication methods are supported with an integrate IEEE 802.1X
85 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
102 - X.509 certificate processing
108 TLSv1/X.509/ASN.1/RSA/bignum parts are about 25 kB on x86)
131 used with IEEE 802.1X (i.e., not WPA) when using ap_scan=0 option in
177 needed to enable IEEE 802.1X/EAPOL and EAP methods. Note that EAP-MD5,
226 IEEE 802.1X is using or pre-shared keys without need for additional
274 - If WPA-EAP: integrated IEEE 802.1X Supplicant completes EAP
277 - If WPA-EAP: master key is received from the IEEE 802.1X Supplicant
304 802.1X/EAPOL and EAP state machines and all EAP methods. Including
[all …]
DChangeLog26 * support new AKM for 802.1X/EAP with SHA384
131 * fixed a regression in operation with drivers that offload 802.1X
192 * extended driver flags indication for separate 802.1X and PSK
398 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
700 - fix X.509 validation of PKCS#1 signature to check for extra data
727 * added MACsec/IEEE Std 802.1X-2010 PAE implementation (currently
1248 - Add domainComponent parser for X.509 names.
1253 * Solaris: Add support for wired 802.1X client.
1341 fix wired IEEE 802.1X authentication
1363 wireless device or IEEE 802.1X on wired is needed)
[all …]
Deap_testing.txt2 IEEE 802.1X/EAPOL authentication
5 - Linked some parts of IEEE 802.1X Authenticator implementation from
9 IEEE 802.1X authentication automatically without need for wireless
Dtodo.txt15 - IEEE 802.1X and key update with driver_ndis?? wpa_supplicant did not seem
DREADME-Windows.txt11 wpa_supplicant has support for being used as a WPA/WPA2/IEEE 802.1X
26 - IEEE 802.1X with dynamic WEP keys
/hostap-latest/wpa_supplicant/doc/docbook/
Deapol_test.sgml51 ways to IEEE 802.1X/EAPOL Authenticator state machines. In other
52 words, it integrates IEEE 802.1X Authenticator (normally, an
53 access point) and IEEE 802.1X Supplicant (normally, a wireless
Dwpa_supplicant.sgml14 <refpurpose>Wi-Fi Protected Access client and IEEE 802.1X supplicant</refpurpose>
46 secure. IEEE 802.1X authentication and frequently changed dynamic WEP keys
104 <para>If WPA-EAP: integrated IEEE 802.1X Supplicant
111 <para>If WPA-EAP: master key is received from the IEEE 802.1X
148 supported with an integrate IEEE 802.1X Supplicant:</para>
213 with WPA or IEEE 802.1X WEP keying)</para></listitem>
610 extensions can be used with IEEE 802.1X (i.e., not WPA) when
Dwpa_cli.sgml43 trigger events like reassociation and IEEE 802.1X
243 <para>IEEE 802.1X EAPOL state machine logoff</para>
250 <para>IEEE 802.1X EAPOL state machine logon</para>
Dwpa_supplicant.conf.sgml125 <para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys
214 <para>wpa_supplicant supports X.509 certificates in PEM and DER
Dwpa_background.sgml57 EAP just like IEEE 802.1X is using or pre-shared keys without need
/hostap-latest/src/crypto/
Dcrypto_mbedtls_alt.c1454 return mbedtls_mpi_write_binary(&ctx->MBEDTLS_PRIVATE(X), privkey, prime_len) ? -1 : 0; in crypto_mbedtls_dh_init_public()
1515 mbedtls_mpi_read_binary(&ctx.MBEDTLS_PRIVATE(X), privkey, privkey_len) || in crypto_dh_derive_secret()
1587 … && mbedtls_mpi_read_binary(&ctx->MBEDTLS_PRIVATE(X), wpabuf_head(priv), wpabuf_len(priv)) == 0) in dh5_init_fixed()
2170 mbedtls_mpi *px = &((mbedtls_ecp_point *)p)->MBEDTLS_PRIVATE(X); in crypto_ec_point_x()
2183 mbedtls_mpi *px = &((mbedtls_ecp_point *)point)->MBEDTLS_PRIVATE(X); in crypto_ec_point_to_bin()
2486 mbedtls_mpi *X = &ecp_kp_Q->MBEDTLS_PRIVATE(X); in crypto_mbedtls_pk_parse_subpubkey_compressed() local
2492 ret = mbedtls_mpi_read_binary(X, p + 1, len); in crypto_mbedtls_pk_parse_subpubkey_compressed()
2497 ret = mbedtls_mpi_copy(Y, X) /*(Y is used as input and output obj below)*/ in crypto_mbedtls_pk_parse_subpubkey_compressed()

12