Home | History | Annotate | Download | only in hostapd

Lines Matching full:authentication

2 	  Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
87 Any wired Ethernet driver for wired IEEE 802.1X authentication
111 minimal authentication mechanism for stations, whereas IEEE 802.1X
116 Access Entity, and Authentication Server. Supplicant is a component in
117 a station and it performs the authentication with the Authentication
119 between a Supplicant and an Authentication Server. In addition, it has a
124 IEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
126 (EAPOL) and the Authenticator relays these frames to the Authentication
127 Server (and similarly, relays the messages from the Authentication
128 Server to the Supplicant). The Authentication Server can be colocated with the
131 use an external Authentication Server and encapsulate EAP frame in the
147 Authentication Server. hostapd supports RADIUS encapsulation of EAP
148 packets, so the Authentication Server should be a RADIUS server, like
150 relays the frames between the Supplicant and the Authentication
156 will first perform IEEE 802.11 authentication. This is normally done
157 with open systems authentication, so there is no security. After
162 with the Authentication Server. After this is completed successfully,
181 used to test IEEE 802.1X authentication. However, it should not be
186 An external Authentication Server (RADIUS) is configured with
189 configuration, the co-located Authentication Server is not used and EAP
192 the Authentication Server. Other than this, the functionality is similar
193 to the case with the co-located Authentication Server.
195 Authentication Server and Supplicant
199 Authentication Server with hostapd Authenticator. FreeRADIUS
239 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
241 - RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication
270 protection, and non-keyed authentication does not protect against bit
278 keyed packet authentication mechanism (Michael MIC).
281 an external authentication server (e.g., RADIUS) and EAP just like
305 messages in initial key handshake, pre-authentication, and PMKSA caching).
323 # RADIUS authentication server must be configured, and WPA-EAP must be included
360 # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
362 # authentication and key handshake before actually associating with a new AP.
365 # Space separated list of interfaces from which pre-authentication frames are
370 # pre-authentication is only used with APs other than the currently associated