Lines Matching refs:EAP
158 # its certificate chain are included in EAP peer certificate events. This is
162 # EAP fast re-authentication
163 # By default, fast re-authentication is enabled for all EAP methods that
193 # Dynamic EAP methods
194 # If EAP methods were built dynamically as shared object files, they need to be
195 # loaded here before being used in the network blocks. By default, EAP methods
642 # (EAP-TLS). Full path to the file should be used since working
695 # parameter. When using Home OIs to match the network, the EAP parameters
715 # Consortium to match the network, the EAP parameters need to be
734 # eap: Pre-configured EAP method
735 # This optional field can be used to specify which EAP method will be
736 # used with this credential. If not set, the EAP method is selected
740 # This optional field is used with like the 'eap' parameter.
743 # This optional field is used with like the 'eap' parameter.
827 # eap=TTLS
1010 # WPA-EAP = WPA using EAP authentication
1011 # IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
1017 # FT-EAP = Fast BSS Transition (IEEE 802.11r) with EAP authentication
1018 # FT-EAP-SHA384 = Fast BSS Transition (IEEE 802.11r) with EAP authentication
1021 # WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms
1026 # WPA-EAP-SUITE-B = Suite B 128-bit level
1027 # WPA-EAP-SUITE-B-192 = Suite B 192-bit level
1035 # If not set, this defaults to: WPA-PSK WPA-EAP
1043 # PMF enabled: ieee80211w=1 and key_mgmt=WPA-EAP WPA-EAP-SHA256
1044 # PMF required: ieee80211w=2 and key_mgmt=WPA-EAP-SHA256
1059 # LEAP = LEAP/Network EAP (only used with LEAP)
1061 # LEAP is allowed as one of the EAP methods).
1091 # This field is not needed, if WPA-EAP is used.
1188 # Whether FT-EAP PMKSA caching is allowed
1189 # 0 = do not try to use PMKSA caching with FT-EAP (default)
1190 # 1 = try to use PMKSA caching with FT-EAP
1191 # This controls whether to try to use PMKSA caching with FT-EAP for the
1206 # EAP reauthentications) with fast reconnects.
1218 # Following fields are only used with internal EAP implementation.
1219 # eap: space-separated list of accepted EAP methods
1220 # MD5 = EAP-MD5 (insecure and does not generate keying material ->
1222 # with EAP-PEAP or EAP-TTLS)
1223 # MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
1224 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
1225 # OTP = EAP-OTP (cannot be used separately with WPA; to be used
1226 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
1227 # GTC = EAP-GTC (cannot be used separately with WPA; to be used
1228 # as a Phase 2 method with EAP-PEAP or EAP-TTLS)
1229 # TLS = EAP-TLS (client and server certificate)
1230 # PEAP = EAP-PEAP (with tunnelled EAP authentication)
1231 # TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
1235 # identity: Identity string for EAP
1237 # EAP-PSK/PAX/SAKE/GPSK.
1238 # anonymous_identity: Anonymous identity string for EAP (to be used as the
1239 # unencrypted identity with EAP types that support different tunnelled
1240 # identity, e.g., EAP-TTLS). This field can also be used with
1241 # EAP-SIM/AKA/AKA' to store the pseudonym identity.
1242 # password: Password string for EAP. This field can include either the
1246 # MSCHAP (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
1247 # EAP-PSK (128-bit PSK), EAP-PAX (128-bit PSK), and EAP-SAKE (256-bit
1248 # PSK) is also configured using this field. For EAP-GPSK, this is a
1255 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
1360 # PEAPv1 implementation seem to be using the old label, "client EAP
1365 # tunneled EAP-Success. This is required with some RADIUS servers that
1366 # implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
1371 # sim_min_num_chal=3 can be used to configure EAP-SIM to require three
1373 # result_ind=1 can be used to enable EAP-SIM and EAP-AKA to use
1387 # EAP-WSC (WPS) uses following options: pin=<Device Password> or
1391 # used to configure a mode that allows EAP-Success (and EAP-Failure)
1400 # (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
1401 # "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS). "mschapv2_retry=0" can be
1406 # phase2 parameter when EAP-TLS is used within the inner tunnel):
1416 # Note: If not set, this is automatically set to 1 for EAP-TLS/PEAP/TTLS
1418 # EAP workarounds are disabled with eap_workaround=0.
1419 # For EAP-FAST, this must be set to 0 (or left unconfigured for the
1451 # authentication when using EAP-TTLS or EAP-PEAP.
1470 # Separate machine credentials can be configured for EAP-TEAP Phase 2 with
1475 # fragment_size: Maximum EAP fragment size in bytes (default 1398).
1476 # This value limits the fragment size for EAP methods that support
1477 # fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
1478 # small enough to make the EAP messages fit in MTU of the network
1493 # erp: Whether EAP Re-authentication Protocol (ERP) is enabled
1495 # EAP-FAST variables:
1503 # of EAP-FAST credentials (PAC):
1515 # wpa_supplicant supports number of "EAP workarounds" to work around
1518 # number of authentication servers. Strict EAP conformance mode can be
1805 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
1810 key_mgmt=WPA-EAP
1813 eap=TLS
1822 # EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
1826 key_mgmt=WPA-EAP
1827 eap=PEAP
1836 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
1840 key_mgmt=WPA-EAP
1841 eap=TTLS
1849 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
1853 key_mgmt=WPA-EAP
1854 eap=TTLS
1862 # WPA-EAP, EAP
1866 key_mgmt=WPA-EAP
1867 eap=TTLS
1880 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
1886 key_mgmt=WPA-PSK WPA-EAP
1892 # Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
1900 # EAP-SIM with a GSM SIM or USIM
1902 ssid="eap-sim-test"
1903 key_mgmt=WPA-EAP
1904 eap=SIM
1910 # EAP-PSK
1912 ssid="eap-psk-test"
1913 key_mgmt=WPA-EAP
1914 eap=PSK
1922 # EAP-TLS for authentication and key generation; require both unicast and
1927 eap=TLS
1941 eap=LEAP
1946 # EAP-IKEv2 using shared secrets for both server and peer authentication
1949 key_mgmt=WPA-EAP
1950 eap=IKEV2
1955 # EAP-FAST with WPA (WPA or WPA2)
1957 ssid="eap-fast-test"
1958 key_mgmt=WPA-EAP
1959 eap=FAST
1964 pac_file="/etc/wpa_supplicant.eap-fast-pac"
1968 ssid="eap-fast-test"
1969 key_mgmt=WPA-EAP
1970 eap=FAST
1975 pac_file="blob://eap-fast-pac"
2057 key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
2061 eap=TTLS PEAP TLS
2071 # Example of EAP-TLS with smartcard (openssl engine)
2074 key_mgmt=WPA-EAP
2075 eap=TLS
2095 key_mgmt=WPA-EAP
2096 eap=TTLS
2138 # Example configuration using EAP-TTLS for authentication and key
2142 eap=TTLS