Lines Matching refs:EAP

1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
62 EAP server (i.e., allow full authentication without requiring
64 server for EAP authentication.
118 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
119 between a Supplicant and an Authenticator are sent using EAP over LAN
124 for EAP frame transmission. However, a more common configuration is to
125 use an external Authentication Server and encapsulate EAP frame in the
141 Authentication Server. hostapd supports RADIUS encapsulation of EAP
183 configuration, the co-located Authentication Server is not used and EAP
192 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
196 XP Supplicants. EAP/TLS was used with Xsupplicant and
197 EAP/MD5-Challenge with Windows XP.
200 about using EAP/TLS with FreeRADIUS and Xsupplicant (just replace
202 card ;-). http://www.freeradius.org/doc/EAP-MD5.html has information
203 about using EAP/MD5 with FreeRADIUS, including instructions for WinXP
205 EAP/TLS use with WinXP Supplicant.
210 EAP/TLS generates a session key that can be used to send WEP keys from
233 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
275 an external authentication server (e.g., RADIUS) and EAP just like
314 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
316 # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
317 # RADIUS authentication server must be configured, and WPA-EAP must be included
332 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
334 #wpa_key_mgmt=WPA-PSK WPA-EAP
355 # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN