Home
last modified time | relevance | path

Searched refs:server (Results 1 – 25 of 91) sorted by relevance

1234

/hostap-latest/tests/hwsim/auth_serv/
Dica-generate.sh13 mkdir -p iCA-server/certs iCA-server/crl iCA-server/newcerts iCA-server/private
14 touch iCA-server/index.txt
15 …cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-server/private/cakey.pem -out iCA-server/c…
16 …l -out iCA-server/cacert.pem -days 3652 -batch -keyfile ca-key.pem -cert ca.pem -extensions v3_ca …
17 cat iCA-server/cacert.pem ca.pem > iCA-server/ca-and-root.pem
44 …cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-server/server.key -out iCA-server/server.r…
45 …atch -keyfile iCA-server/private/cakey.pem -cert iCA-server/cacert.pem -create_serial -in iCA-serv…
46 cat iCA-server/cacert.pem iCA-server/server.pem > iCA-server/server_and_ica.pem
58 …tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-server/server-revoked.key -out iCA-server/serv…
59 … -keyfile iCA-server/private/cakey.pem -cert iCA-server/cacert.pem -create_serial -in iCA-server/s…
[all …]
Dupdate.sh56 if [ ! -r server.csr ]; then
57 …nfig openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr -outfo…
59 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in server.csr -out server.pem -extensions ext_serv…
61 $OPENSSL pkcs12 -export -out server.pkcs12 -in server.pem -inkey server.key -passout pass:
62 …cs12 -export -out server-extra.pkcs12 -in server.pem -inkey server.key -descert -certfile user.pem…
67 if [ ! -r server-no-dnsname.csr ]; then
68 …openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout server-no-dnsname.key -out server-no-d…
70 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in server-no-dnsname.csr -out server-no-dnsname.pe…
75 if [ ! -r server-expired.csr ]; then
76 … openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout server-expired.key -out server-expire…
[all …]
Das.conf12 server_cert=auth_serv/server.pem
13 private_key=auth_serv/server.key
14 ocsp_stapling_response=LOGDIR/ocsp-server-cache.der
15 ocsp_stapling_response_multi=auth_serv/ocsp-multi-server-cache.der
16 server_id=server.w1.fi
21 eap_fast_a_id_info=test server
Dsha512-generate.sh28 …sl.cnf.tmp -batch -new -newkey rsa:3500 -nodes -keyout sha512-server.key -out sha512-server.req -o…
29 …e sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-server.req -out sha512-server.pem -e…
40 …sl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-server.key -out sha384-server.req -o…
41 …e sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.pem -e…
72 $OPENSSL verify -CAfile sha512-ca.pem sha512-server.pem
73 $OPENSSL verify -CAfile sha512-ca.pem sha384-server.pem
Dec-generate.sh30 $OPENSSL ecparam -out ec-server.key -name $CURVE -genkey
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-server.key -out ec-server.req…
32 …-batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-server.req -out ec-server.pem -ext…
52 $OPENSSL verify -CAfile ec-ca.pem ec-server.pem
Dopenssl2.cnf75 commonName = Common Name (e.g. server FQDN or YOUR name)
82 ##0.subjectAltName = dNSName:server.w1.fi
93 authorityInfoAccess = OCSP;URI:http://server.w1.fi:8888/
123 authorityInfoAccess = OCSP;URI:http://server.w1.fi:8888/
133 authorityInfoAccess = OCSP;URI:http://server.w1.fi:8888/
144 authorityInfoAccess = OCSP;URI:http://server.w1.fi:8888/
Das2.conf12 server_cert=auth_serv/server.pem
13 private_key=auth_serv/server.key
14 ocsp_stapling_response=LOGDIR/ocsp-server-cache.der
15 ocsp_stapling_response_multi=auth_serv/ocsp-multi-server-cache.der
Dec2-generate.sh30 $OPENSSL ecparam -out ec2-server.key -name $CURVE -genkey
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-server.key -out ec2-server.r…
32 …ch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-server.req -out ec2-server.pem -ext…
65 $OPENSSL verify -CAfile ec2-ca.pem ec2-server.pem
Drsa3072-generate.sh41 if [ ! -r rsa3072-server.req ]; then
42 ….cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa3072-server.key -out rsa3072-server.req -o…
44 …a3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-server.req -out rsa3072-server.pem -e…
81 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-server.pem
/hostap-latest/hs20/server/
Dhs20-osu-server.txt1 Hotspot 2.0 OSU server
5 16.04 server (64-bit) distribution is used and the web server is
12 secure to be installed in a publicly available Internet server without
19 Ubuntu 16.04 server
41 assumes /home/user/hs20-server to be used, but this can be changed by
44 sudo mkdir -p /home/user/hs20-server
45 sudo chown $USER /home/user/hs20-server
46 mkdir -p /home/user/hs20-server/spp
47 mkdir -p /home/user/hs20-server/AS
53 # hostapd as RADIUS server
[all …]
Dsql-example.txt3 …ld,value) VALUES('example.com','spp_http_auth_url','https://subscription-server.osu.example.com/hs…
4 …alm,field,value) VALUES('example.com','trust_root_cert_url','https://osu-server.osu.example.com/hs…
6 …field,value) VALUES('example.com','aaa_trust_root_cert_url','https://osu-server.osu.example.com/hs…
9 …alm,field,value) VALUES('example.com','policy_url','https://subscription-server.osu.example.com/hs…
10 …ield,value) VALUES('example.com','remediation_url','https://subscription-server.osu.example.com/hs…
11 …value) VALUES('example.com','free_remediation_url','https://subscription-server.osu.example.com/hs…
12 …alm,field,value) VALUES('example.com','signup_url','https://subscription-server.osu.example.com/hs…
/hostap-latest/src/crypto/
Dtls_internal.c23 int server; member
35 struct tlsv1_server *server; member
104 if (!global->server) { in tls_connection_init()
115 if (global->server) { in tls_connection_init()
116 conn->server = tlsv1_server_init(global->server_cred); in tls_connection_init()
117 if (conn->server == NULL) { in tls_connection_init()
132 if (conn->server) in tls_connection_set_test_flags()
133 tlsv1_server_set_test_flags(conn->server, flags); in tls_connection_set_test_flags()
144 if (conn->server) in tls_connection_set_log_cb()
145 tlsv1_server_set_log_cb(conn->server, log_cb, ctx); in tls_connection_set_log_cb()
[all …]
/hostap-latest/tests/hwsim/auth_serv/test-ca/
Dindex.txt1 V 181001144953Z D8D3E3A6CBE3CCEF unknown /C=FI/O=w1.fi/CN=server.w1.fi
2 V 181001145631Z D8D3E3A6CBE3CCF1 unknown /C=FI/O=w1.fi/CN=server.w1.fi
3 V 181001145633Z D8D3E3A6CBE3CCF2 unknown /C=FI/O=w1.fi/CN=server.w1.fi
4 V 181001145742Z D8D3E3A6CBE3CCF3 unknown /C=FI/O=w1.fi/CN=server.w1.fi
6 V 181001150518Z D8D3E3A6CBE3CCF5 unknown /C=FI/O=w1.fi/CN=server.w1.fi
8 V 181001151024Z D8D3E3A6CBE3CCF7 unknown /C=FI/O=w1.fi/CN=server.w1.fi
10 V 181001151254Z D8D3E3A6CBE3CCF9 unknown /C=FI/O=w1.fi/CN=server.w1.fi
15 V 181001152159Z D8D3E3A6CBE3CCFE unknown /C=FI/O=w1.fi/CN=server.w1.fi
20 V 181001152221Z D8D3E3A6CBE3CD03 unknown /C=FI/O=w1.fi/CN=server.w1.fi
25 V 181001152519Z D8D3E3A6CBE3CD08 unknown /C=FI/O=w1.fi/CN=server.w1.fi
[all …]
/hostap-latest/hs20/server/ca/
Dsetup.sh151 …WD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revo…
152 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-revoked.csr -out server-revok…
153 $OPENSSL ca -revoke server-revoked.pem -key $PASS
161 …WD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-client.csr -keyout server-clien…
162 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server-client.csr -out server-client…
186 …penssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -req…
187 …penssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -req…
188 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PAS…
191 $OPENSSL x509 -in server.pem -out server.der -outform DER
192 openssl asn1parse -in server.der -inform DER | grep HEX | tail -1 | sed 's/.*://' | xxd -r -p > log…
Dclean.sh3 for i in server-client server server-revoked user ocsp; do
11 rm -f ca.pem logo.asn1 logo.der server.der ocsp-server-cache.der
/hostap-latest/hostapd/
Dandroid.config41 # Driver interface for no driver (e.g., RADIUS server only)
50 # Integrated EAP server
53 # EAP-MD5 for the integrated EAP server
56 # EAP-TLS for the integrated EAP server
59 # EAP-MSCHAPv2 for the integrated EAP server
62 # EAP-PEAP for the integrated EAP server
65 # EAP-GTC for the integrated EAP server
68 # EAP-TTLS for the integrated EAP server
71 # EAP-SIM for the integrated EAP server
74 # EAP-AKA for the integrated EAP server
[all …]
Ddefconfig44 # Driver interface for no driver (e.g., RADIUS server only)
53 # Integrated EAP server
56 # EAP Re-authentication Protocol (ERP) in integrated EAP server
59 # EAP-MD5 for the integrated EAP server
62 # EAP-TLS for the integrated EAP server
65 # EAP-MSCHAPv2 for the integrated EAP server
68 # EAP-PEAP for the integrated EAP server
71 # EAP-GTC for the integrated EAP server
74 # EAP-TTLS for the integrated EAP server
77 # EAP-SIM for the integrated EAP server
[all …]
/hostap-latest/eap_example/
DREADME1 EAP peer/server library and example program
8 The interfaces of the EAP server/peer implementation are based on RFC
16 This directory contains an example showing how EAP peer and server
18 example program initializes both an EAP server and an EAP peer
23 same for EAP server. eap_example.c is an example that ties in both the
24 EAP server and client parts to allow an EAP authentication to be
27 In this example, the EAP messages are passed between the server and
29 In practice, server and peer functionalities would likely reside in
/hostap-latest/tests/fuzzing/tls-server/
DMakefile1 ALL=tls-server
17 OBJS += tls-server.o
28 tls-server: $(OBJS) $(LIBS)
32 rm -f tls-server *~ *.o *.d ../*~ ../*.o ../*.d
/hostap-latest/tests/
DREADME79 mkdir tls-server-examples
80 ./test-tls server write tls-server-examples/server.msg
81 afl-fuzz -i tls-server-examples -o tls-server-findings -- $PWD/test-tls server read @@
83 ##### TLS server
/hostap-latest/tests/remote/
Drutils.py461 def iperf_run(server, client, server_ip, client_res, server_res, argument
496 flush_arp_cache(server)
499 server_thread = server.thread_run(iperf_server, server_res)
505 def iperf_wait(server, client, server_thread, client_thread, timeout=None, iperf="iperf"): argument
510 server.thread_wait(server_thread, 5)
512 server.execute(["killall", "-s", "INT", iperf])
515 server.thread_wait(server_thread, 5)
521 def run_tp_test(server, client, l3="ipv4", iperf="iperf", l4="tcp", test_time="10", parallel="5", argument
526 server_ip = get_ip(server, l3)
528 server_thread, client_thread = iperf_run(server, client, server_ip, client_res, server_res,
[all …]
/hostap-latest/wpa_supplicant/doc/docbook/
Deapol_test.sgml23 <arg>-a<replaceable>server IP address</replaceable></arg>
63 from a RADIUS server. For example, the automated EAP tests described
66 test suite for a RADIUS authentication server.</para>
76 configuration from test.conf against the RADIUS server running
96 <listitem><para>IP address of the authentication server. The
110 <listitem><para>UDP port of the authentication server. The
117 <listitem><para>Shared secret with the authentication server.
151 <listitem><para>Location to write out server certificate.
/hostap-latest/doc/
Dmainpage.doxygen64 association), IEEE 802.1X/WPA/WPA2 Authenticator, EAP server, and
65 RADIUS authentication server functionality. It can be build with
67 solution or a RADIUS authentication server with support for number of
80 module that interacts with \ref eap_server_module "EAP server implementation".
81 Similarly, RADIUS authentication server is in its own separate module.
82 Both IEEE 802.1X and RADIUS authentication server can use EAP server
Deap_server.doxygen2 \page eap_server_module EAP server implementation
5 defined in RFC 3748. hostapd uses a separate code module for EAP server
10 defined in this RFC and so is the interface between the server state
12 understanding the EAP server implementation in hostapd.
25 methods use the same interface between the server state machine and
/hostap-latest/wpa_supplicant/
Deap_testing.txt19 server, too.
21 In order for me to be able to use a new authentication server, the
22 server need to be available from Internet (at least from one static IP
25 would be to get an evaluation version of the server so that I can
27 either server access or evaluation version, please contact me
35 -) server did not support
40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
123 2) used FreeRADIUS as inner auth server
132 though server reported v0 as the highest supported version)
135 10) worked only with special compatibility code to match the IKEv2 server
[all …]

1234