fragattacks/tests/hwsim/auth_serv/eap_user.conf
Jouni Malinen 5b3c40a65b tests: Verify that wpa_supplicant clears keys from memory
Check that PMK and PTK and not left in memory (heap or stack)
unnecessarily after they are not needed anymore.

Signed-off-by: Jouni Malinen <j@w1.fi>
2014-12-30 10:37:02 +02:00

98 lines
3.2 KiB
Plaintext

"pwd user" PWD "secret password"
"pwd.user@test123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.example.com" PWD "secret password"
"gpsk user" GPSK "abcdefghijklmnop0123456789abcdef"
"sake user" SAKE 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
"eke user" EKE "hello"
"ikev2 user" IKEV2 "ike password"
"pax.user@example.com" PAX 0123456789abcdef0123456789abcdef
"psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
"vendor-test" VENDOR-TEST "foo"
"osen@example.com" WFA-UNAUTH-TLS
"unauth-tls" UNAUTH-TLS
"erp-fast@example.com" FAST
"erp-fast@example.com" GTC "password" [2]
"erp-gpsk@example.com" GPSK "abcdefghijklmnop0123456789abcdef"
"erp-eke@example.com" EKE "hello"
"erp-pax@example.com" PAX 0123456789abcdef0123456789abcdef
"erp-peap@example.com" PEAP
"erp-peap@example.com" MSCHAPV2 "password" [2]
"erp-psk@example.com" PSK 0123456789abcdef0123456789abcdef
"erp-pwd@example.com" PWD "secret password"
"erp-sake@example.com" SAKE 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
"erp-tls@example.com" TLS
"erp-ttls@example.com" TTLS
"erp-ttls@example.com" TTLS-PAP "password" [2]
"erp-ikev2@example.com" IKEV2 "password"
"vlan1" PAX 0123456789abcdef0123456789abcdef
radius_accept_attr=64:d:13
radius_accept_attr=65:d:6
radius_accept_attr=81:s:1
"vlan2" PAX 0123456789abcdef0123456789abcdef
radius_accept_attr=64:d:13
radius_accept_attr=65:d:6
radius_accept_attr=81:s:2
"test-class" PAX 0123456789abcdef0123456789abcdef
radius_accept_attr=25:x:00112233445566778899
"gpsk-cui" GPSK "abcdefghijklmnop0123456789abcdef"
radius_accept_attr=89:s:gpsk-chargeable-user-identity
radius_accept_attr=25:x:00112233445566778899aa
"gpsk-user-session-timeout" GPSK "abcdefghijklmnop0123456789abcdef"
radius_accept_attr=27:d:3
"020000000000" MACACL "020000000000"
"0232010000000000@ttls" TTLS,AKA
"0232010000000000@peap" PEAP,AKA
"0232010000000000@fast" FAST,AKA
"6555444333222111@both" AKA',AKA
"0"* AKA
"1"* SIM
"2"* AKA
"3"* SIM
"4"* AKA
"5"* SIM
"6"* AKA'
"7"* AKA'
"8"* AKA'
* TTLS,TLS,PEAP,FAST,SIM,AKA',AKA
"0"* AKA [2]
"1"* SIM [2]
"2"* AKA [2]
"3"* SIM [2]
"4"* AKA [2]
"5"* SIM [2]
"6"* AKA' [2]
"7"* AKA' [2]
"8"* AKA' [2]
"pap user" TTLS-PAP "password" [2]
"pap-secret" TTLS-PAP "63d2d21ac3c09ed567ee004a34490f1d16e7fa5835edf17ddba70a63f1a90a25" [2]
"pap-secret@example.com" TTLS-PAP "63d2d21ac3c09ed567ee004a34490f1d16e7fa5835edf17ddba70a63f1a90a25" [2]
"chap user" TTLS-CHAP "password" [2]
"mschap user" TTLS-MSCHAP "password" [2]
"DOMAIN\mschapv2 user" TTLS-MSCHAPV2 hash:8846f7eaee8fb117ad06bdd830b7586c [2]
"hs20-test" TTLS-MSCHAPV2 "password" [2]
"utf8-user" TTLS-MSCHAPV2 "secret-åäö-€-password" [2]
"utf8-user-hash" TTLS-MSCHAPV2 hash:bd5844fad2489992da7fe8c5a01559cf [2]
"user" MSCHAPV2,MD5,GTC "password" [2]
"cert user" TLS [2]
"hs20-deauth-test" TTLS-MSCHAPV2 "password" [2]
radius_accept_attr=26:x:00009f680405016400
"hs20-subrem-test" TTLS-MSCHAPV2 "password" [2]
radius_accept_attr=26:x:00009f6801170168747470733a2f2f6578616d706c652e636f6d2f
"hs20-session-info-test" TTLS-MSCHAPV2 "password" [2]
radius_accept_attr=27:d:63
radius_accept_attr=26:x:00009f6805170168747470733a2f2f6578616d706c652e636f6d2f