• Home
  • Raw
  • Download

Lines Matching refs:EAP

55 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
58 * EAP-TLS
59 * EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
60 * EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
61 * EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
62 * EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
63 * EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
64 * EAP-TTLS/EAP-MD5-Challenge
65 * EAP-TTLS/EAP-GTC
66 * EAP-TTLS/EAP-OTP
67 * EAP-TTLS/EAP-MSCHAPv2
68 * EAP-TTLS/EAP-TLS
69 * EAP-TTLS/MSCHAPv2
70 * EAP-TTLS/MSCHAP
71 * EAP-TTLS/PAP
72 * EAP-TTLS/CHAP
73 * EAP-SIM
74 * EAP-AKA
75 * EAP-AKA'
76 * EAP-PSK
77 * EAP-PAX
78 * EAP-SAKE
79 * EAP-IKEv2
80 * EAP-GPSK
81 * EAP-pwd
86 * EAP-MD5-Challenge
87 * EAP-MSCHAPv2
88 * EAP-GTC
89 * EAP-OTP
167 Optional libraries for EAP-TLS, EAP-PEAP, and EAP-TTLS:
174 One of these libraries is needed when EAP-TLS, EAP-PEAP, EAP-TTLS, or
175 EAP-FAST support is enabled. WPA-PSK mode does not require this or EAPOL/EAP
177 needed to enable IEEE 802.1X/EAPOL and EAP methods. Note that EAP-MD5,
178 EAP-GTC, EAP-OTP, and EAP-MSCHAPV2 cannot be used alone with WPA, so
179 they should only be enabled if testing the EAPOL/EAP state
181 algorithms with EAP-PEAP and EAP-TTLS.
225 an external authentication server (e.g., RADIUS) and EAP just like
259 negotiation with a WPA Authenticator and EAP authentication with
274 - If WPA-EAP: integrated IEEE 802.1X Supplicant completes EAP
277 - If WPA-EAP: master key is received from the IEEE 802.1X Supplicant
301 methods (e.g., EAP-TLS, EAP-PEAP, ..) are included.
304 802.1X/EAPOL and EAP state machines and all EAP methods. Including
329 authentication algorithm (for EAP-SIM/EAP-AKA/EAP-AKA'). This requires pcsc-lite
367 EAP-PEAP and EAP-TTLS will automatically include configured EAP
523 1) WPA-Personal (PSK) as home network and WPA-Enterprise with EAP-TLS as work
538 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
542 key_mgmt=WPA-EAP
554 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
562 key_mgmt=WPA-EAP
572 3) EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
580 key_mgmt=WPA-EAP
591 broadcast); use EAP-TLS for authentication
619 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
657 Some EAP authentication methods require use of certificates. EAP-TLS
658 uses both server side and client certificates whereas EAP-PEAP and
659 EAP-TTLS only require the server side certificate. When client
748 status = get current WPA/EAPOL/EAP status
921 rest of the code (e.g., EAP authentication and WPA handshakes) into an