diff options
author | Kai Shi <kaishi@google.com> | 2020-02-26 15:40:00 -0800 |
---|---|---|
committer | Kai Shi <kaishi@google.com> | 2020-02-26 15:40:00 -0800 |
commit | bca1f8f7152c67cb214e0dfeabbbb6fbe743cce9 (patch) | |
tree | 87448d5818a1f0ff37f28de2dd3aeef7adbc3475 /service | |
parent | b66edf6a39b0038c885b98134679d491ddfffd84 (diff) |
Add EAP methods in proto
To help find the root cause of high authentication failure rate in enterprise network, add EAP method and authentication phase2 method in connection event metrics.
WifiMetrics changes are being done in qt-qpr1-dev and will be automerged here. Proto change is needed due to the merge conflict caused by proto file location change in R.
Bug: 150237135
Test: atest com.android.server.wifi
Change-Id: I8326f75847b81bc128a2126881a3ea5628847210
Diffstat (limited to 'service')
-rw-r--r-- | service/proto/src/metrics.proto | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/service/proto/src/metrics.proto b/service/proto/src/metrics.proto index 10f61965f..011bd1708 100644 --- a/service/proto/src/metrics.proto +++ b/service/proto/src/metrics.proto @@ -648,6 +648,66 @@ message RouterFingerPrint { ROUTER_TECH_AX = 7; } + enum EapMethod { + + // No EAP method used + TYPE_EAP_UNKNOWN = 0; + + // EAP with Transport Layer Security + TYPE_EAP_TLS = 1; + + // EAP with Tunneled Transport Layer Security + TYPE_EAP_TTLS = 2; + + // EAP with Subscriber Identity Module [RFC-4186] + TYPE_EAP_SIM = 3; + + // EAP with Authentication and Key Agreement [RFC-4187] + TYPE_EAP_AKA = 4; + + // EAP with Authentication and Key Agreement Prime [RFC-5448] + TYPE_EAP_AKA_PRIME = 5; + + // Protected EAP + TYPE_EAP_PEAP = 6; + + // EAP for Hotspot 2.0 r2 OSEN + TYPE_EAP_UNAUTH_TLS = 7; + + // EAP with Password + TYPE_EAP_PWD = 8; + + // EAP with WAPI certifcate + TYPE_EAP_WAPI_CERT = 9; + } + + enum AuthPhase2Method { + + // No phase2 method + TYPE_PHASE2_NONE = 0; + + // Password Authentication Protocol + TYPE_PHASE2_PAP = 1; + + // Microsoft Challenge Handshake Authentication Protocol + TYPE_PHASE2_MSCHAP = 2; + + // Microsoft Challenge Handshake Authentication Protocol v2 + TYPE_PHASE2_MSCHAPV2 = 3; + + // Generic Token Card + TYPE_PHASE2_GTC = 4; + + // EAP-Subscriber Identity Module [RFC-4186] + TYPE_PHASE2_SIM = 5; + + // EAP-Authentication and Key Agreement [RFC-4187] + TYPE_PHASE2_AKA = 6; + + // EAP-Authentication and Key Agreement Prime [RFC-5448] + TYPE_PHASE2_AKA_PRIME = 7; + } + optional RoamType roam_type = 1; // Channel on which the connection takes place. @@ -670,6 +730,12 @@ message RouterFingerPrint { // If the router is a passpoint / hotspot 2.0 network optional bool passpoint = 8; + + // EAP method used by the enterprise network + optional EapMethod eap_method = 9; + + // Phase 2 authentication method after setting up a secure channel + optional AuthPhase2Method auth_phase2_method = 10; } message ConnectionEvent { |