Home
last modified time | relevance | path

Searched refs:FAST (Results 1 – 25 of 41) sorted by relevance

12

/src/contrib/wpa/hostapd/
H A Deap_testing.txt58 EAP-FAST/MSCHAPv2(prov) + - F - F
59 EAP-FAST/GTC(auth) + - + - +
60 EAP-FAST/MSCHAPv2(aprov)+ - F - F
61 EAP-FAST/GTC(aprov) + - F - F
62 EAP-FAST/MD5(aprov) + - - - -
63 EAP-FAST/TLS(aprov) + - - - -
64 EAP-FAST/SIM(aprov) + - - - -
65 EAP-FAST/AKA(aprov) + - - - -
66 EAP-FAST/MSCHAPv2(auth) + - + - +
67 EAP-FAST/MD5(auth) + - + - -
[all …]
H A Dandroid.config95 # EAP-FAST for the integrated EAP server
97 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
H A Dhostapd.eap_user19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use
23 # EAP-PEAP, EAP-TTLS, and EAP-FAST require Phase 2 configuration.
H A DChangeLog65 * fixed EAP-FAST server with TLS GCM/CCM ciphers
593 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
754 * EAP-FAST server: piggyback Phase 2 start with the end of Phase 1
828 * updated OpenSSL code for EAP-FAST to use an updated version of the
846 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
849 by EAP-FAST server)
862 * changed EAP-FAST configuration to use separate fields for A-ID and
871 * added peer identity into EAP-FAST PAC-Opaque and skip Phase 2
873 * added support for EAP Sequences in EAP-FAST Phase 2
875 (this version implements the EAP-TNC method and EAP-TTLS/EAP-FAST
[all …]
/src/contrib/pam-krb5/tests/data/scripts/fast/
H A Danonymous-debug1 # Test FAST with an existing ticket cache, with debug. -*- conf -*-
18 DEBUG (user %u) anonymous authentication for FAST succeeded
19 DEBUG /^\(user %u\) setting FAST credential cache to MEMORY:/
H A Dccache-debug1 # Test FAST with an existing ticket cache, with debug. -*- conf -*-
18 DEBUG (user %u) setting FAST credential cache to %0
H A Dno-ccache-debug1 # Test FAST with an existing ticket cache, with debug. -*- conf -*-
18 DEBUG /^\(user %u\) failed to get principal from FAST ccache %0BAD: /
H A Danonymous1 # Test anonymous FAST. -*- conf -*-
H A Dno-ccache1 # Test FAST with an existing ticket cache. -*- conf -*-
H A Dccache1 # Test FAST with an existing ticket cache. -*- conf -*-
/src/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt102 EAP-FAST/MSCHAPv2(prov) - - - + - + - - - + + +
103 EAP-FAST/GTC(auth) - - - + - + - - - + + +
104 EAP-FAST/MSCHAPv2(aprov)- - - - - + - - - - + +
105 EAP-FAST/GTC(aprov) - - - - - + - - - - + +
106 EAP-FAST/MD5(aprov) - - - - - + - - - - + -
107 EAP-FAST/TLS(aprov) - - - - - - - - - - + +
108 EAP-FAST/SIM(aprov) - - - - - - - - - - + -
109 EAP-FAST/AKA(aprov) - - - - - - - - - - + -
110 EAP-FAST/MSCHAPv2(auth) - - - - - + - - - - + +
111 EAP-FAST/MD5(auth) - - - - - + - - - - + -
[all …]
H A Dwpa_supplicant.conf1959 eap=FAST
1970 eap=FAST
H A Dtodo.txt73 - cleanup TLS/PEAP/TTLS/FAST fragmentation: both the handshake and Appl. Data
77 - test EAP-FAST peer with OpenSSL and verify that fallback to full handshake
H A DChangeLog81 * fixed EAP-FAST peer with TLS GCM/CCM ciphers
988 (EAP-PEAP/TLS, EAP-TTLS/TLS, EAP-FAST/TLS) to support different CA
1039 using EAP-TLS/PEAP/TTLS (i.e., only use it with EAP-FAST)
1421 * updated OpenSSL code for EAP-FAST to use an updated version of the
1446 * added support for EAP Sequences in EAP-FAST Phase 2
1447 * added support for using TNC with EAP-FAST
1450 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
1536 full handshake when using EAP-FAST (e.g., due to an expired
1567 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
1572 of EAP-PEAP/TTLS/FAST
[all …]
H A DREADME-Windows.txt66 installed following instructions in INSTALL.W32. Note that if EAP-FAST
73 If you do not need EAP-FAST support, you may also be able to use Win32
/src/sys/contrib/device-tree/Bindings/bus/
H A Dqcom,ebi2.txt37 this is something just used on the FAST chip selects and that the SLOW
41 FIXME: The chipselects have SLOW and FAST configuration registers. It's a bit
43 together, or if some chip selects are hardwired to be FAST and others are SLOW
95 Optional properties arrays for FAST chip selects:
/src/crypto/openssl/doc/man3/
H A DSSL_set_session_secret_cb.pod25 EAP-FAST (RFC4851). The presence of the callback also modifies the internal
28 EAP-FAST.
/src/crypto/krb5/src/lib/krb5/error_tables/
H A Dkv5m_err.et90 error_code KV5M_FAST_REQ, "Bad magic number for FAST request"
91 error_code KV5M_FAST_RESPONSE, "Bad magic number for FAST response"
/src/sys/contrib/device-tree/Bindings/power/supply/
H A Dcharger-manager.txt13 SDP, DCP, CDP, ACA, FAST-CHARGER, SLOW-CHARGER, WPT,
/src/contrib/pam-krb5/docs/
H A Dpam_krb5.pod354 [4.6] Attempt to use Flexible Authentication Secure Tunneling (FAST) by
356 its credentials as the FAST armor. This requires anonymous PKINIT be
358 system, and that the Kerberos library support FAST and anonymous PKINIT.
360 FAST is a mechanism to protect Kerberos against password guessing attacks
361 and provide other security improvements. To work, FAST requires that a
366 If anonymous PKINIT is not available or fails, FAST will not be used and
369 To instead use an existing ticket cache for the FAST credentials, use
386 rather than anonymous PKINIT. This allows use of FAST with a realm that
392 by the authenticating process and has tickets then FAST will be attempted.
399 does not exist or is not readable, FAST will not used and authentication
[all …]
/src/sys/dev/iicbus/
H A Diicbus_if.m140 # 100KHz. The UNKNOWN, FAST, and FASTEST rates all map to the
/src/contrib/pam-krb5/tests/config/
H A DREADME31 to test FAST support with a ticket cache.
/src/crypto/heimdal/lib/asn1/
H A Dkrb5.asn1164 KRB5-PADATA-FX-FAST(136), -- krb-wg-preauth-framework
791 PA-FX-FAST-REQUEST ::= CHOICE {
818 PA-FX-FAST-REPLY ::= CHOICE {
/src/contrib/pam-krb5/
H A DREADME22 Kerberos and Heimdal and FAST is supported with recent MIT Kerberos.
33 PKINIT and FAST to the extent that the underlying Kerberos libraries
62 For FAST (Flexible Authentication Secure Tunneling) support, MIT
63 Kerberos 1.7 or higher is required. For anonymous FAST support,
544 Thanks to Sam Hartman for the FAST support implementation.
H A DREADME.md26 Heimdal and FAST is supported with recent MIT Kerberos.
36 such as OpenSSH and xdm. It supports both PKINIT and FAST to the extent
64 For FAST (Flexible Authentication Secure Tunneling) support, MIT Kerberos
65 1.7 or higher is required. For anonymous FAST support, anonymous
577 Thanks to Sam Hartman for the FAST support implementation.

12