Lines Matching refs:EAP
107 # EAP fast re-authentication
108 # By default, fast re-authentication is enabled for all EAP methods that
125 # Dynamic EAP methods
126 # If EAP methods were built dynamically as shared object files, they need to be
127 # loaded here before being used in the network blocks. By default, EAP methods
209 # WPA-EAP = WPA using EAP authentication (this can use an external
210 # program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
211 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
214 # If not set, this defaults to: WPA-PSK WPA-EAP
219 # LEAP = LEAP/Network EAP (only used with LEAP)
221 # LEAP is allowed as one of the EAP methods).
242 # This field is not needed, if WPA-EAP is used.
277 # Following fields are only used with internal EAP implementation.
278 # eap: space-separated list of accepted EAP methods
279 # MD5 = EAP-MD5 (unsecure and does not generate keying material ->
281 # with EAP-PEAP or EAP-TTLS)
282 # MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
283 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
284 # OTP = EAP-OTP (cannot be used separately with WPA; to be used
285 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
286 # GTC = EAP-GTC (cannot be used separately with WPA; to be used
287 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
288 # TLS = EAP-TLS (client and server certificate)
289 # PEAP = EAP-PEAP (with tunnelled EAP authentication)
290 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
294 # identity: Identity string for EAP
295 # anonymous_identity: Anonymous identity string for EAP (to be used as the
296 # unencrypted identity with EAP types that support different tunnelled
297 # identity, e.g., EAP-TTLS)
298 # password: Password string for EAP
303 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
366 # PEAPv1 implementation seem to be using the old label, "client EAP
371 # tunneled EAP-Success. This is required with some RADIUS servers that
377 # sim_min_num_chal=3 can be used to configure EAP-SIM to require three
380 # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
381 # "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
383 # authentication when using EAP-TTLS or EAP-PEAP.
398 # fragment_size: Maximum EAP fragment size in bytes (default 1398).
399 # This value limits the fragment size for EAP methods that support
400 # fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
401 # small enough to make the EAP messages fit in MTU of the network
405 # EAP-PSK variables:
409 # EAP-PAX variables:
412 # EAP-SAKE variables:
417 # EAP-GPSK variables:
421 # EAP-FAST variables:
428 # phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
431 # wpa_supplicant supports number of "EAP workarounds" to work around
434 # number of authentication servers. Strict EAP conformance mode can be
466 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
471 # key_mgmt=WPA-EAP
483 # EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
487 # key_mgmt=WPA-EAP
497 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
501 # key_mgmt=WPA-EAP
510 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
514 # key_mgmt=WPA-EAP
523 # WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
527 # key_mgmt=WPA-EAP
541 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
547 # key_mgmt=WPA-PSK WPA-EAP
553 # Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
561 # EAP-SIM with a GSM SIM or USIM
564 # key_mgmt=WPA-EAP
571 # EAP-PSK
574 # key_mgmt=WPA-EAP
583 # EAP-TLS for authentication and key generation; require both unicast and
607 # EAP-FAST with WPA (WPA or WPA2)
610 # key_mgmt=WPA-EAP
621 # key_mgmt=WPA-EAP
680 # key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
694 # Example of EAP-TLS with smartcard (openssl engine)
697 # key_mgmt=WPA-EAP
730 # key_mgmt=WPA-EAP