/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/NetworkPkg/WifiConnectionManagerDxe/ |
H A D | WifiConnectionManagerDxe.inf | 10 # 3). EAP Networks (EAP-TLS, EAP-TTLS/MSCHAPv2 and PEAPv0/MSCHAPv2)
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/NetworkPkg/WifiConnectionManagerDxe/ |
H A D | WifiConnectionManagerDxe.inf | 10 # 3). EAP Networks (EAP-TLS, EAP-TTLS/MSCHAPv2 and PEAPv0/MSCHAPv2)
|
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/NetworkPkg/WifiConnectionManagerDxe/ |
H A D | WifiConnectionManagerDxe.inf | 10 # 3). EAP Networks (EAP-TLS, EAP-TTLS/MSCHAPv2 and PEAPv0/MSCHAPv2)
|
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/NetworkPkg/WifiConnectionManagerDxe/ |
H A D | WifiConnectionManagerDxe.inf | 10 # 3). EAP Networks (EAP-TLS, EAP-TTLS/MSCHAPv2 and PEAPv0/MSCHAPv2)
|
/dports/sysutils/edk2/edk2-edk2-stable202102/NetworkPkg/WifiConnectionManagerDxe/ |
H A D | WifiConnectionManagerDxe.inf | 10 # 3). EAP Networks (EAP-TLS, EAP-TTLS/MSCHAPv2 and PEAPv0/MSCHAPv2)
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/test/data/network/ |
H A D | managed_toplevel_wifi_peap.onc | 9 "EAP": { 19 "Security": "WPA-EAP"
|
H A D | toplevel_wifi_leap.onc | 9 "EAP": { 16 "Security": "WPA-EAP"
|
H A D | ethernet_with_eap_and_cert_pems.onc | 4 "EAP":{ 16 "Outer":"EAP-TLS",
|
H A D | ethernet_with_eap.onc | 4 "EAP":{ 16 "Outer":"EAP-TLS",
|
H A D | translation_of_shill_wifi_wep_8021x_clientcert.onc | 12 "EAP": { 16 "Outer": "EAP-TLS",
|
/dports/net-mgmt/wifimgr/wifimgr-1.19/po/ |
H A D | de.po | 43 msgid "WPA EAP" 47 msgid "RSN EAP" 86 msgid "Edit EAP Parameters" 87 msgstr "EAP Parameter editieren" 94 msgid "<b>EAP Parameter</b>" 106 msgid "EAP:" 194 msgid "User NAI for EAP PSK:" 195 msgstr "User NAI für EAP PSK:" 198 msgid "Server NAI for EAP PSK:" 199 msgstr "Server NAI für EAP PSK:" [all …]
|
H A D | ru.po | 41 msgid "WPA EAP" 45 msgid "RSN EAP" 84 msgid "Edit EAP Parameters" 85 msgstr "Редактировать параметры EAP" 92 msgid "<b>EAP Parameter</b>" 93 msgstr "<b>Параметр EAP</b>" 104 msgid "EAP:" 188 msgid "EAP PSK (16-byte hex value):" 192 msgid "User NAI for EAP PSK:" 196 msgid "Server NAI for EAP PSK:" [all …]
|
/dports/net/tcpdump/tcpdump-4.99.1/tests/ |
H A D | radius-v.out | 12 EAP-Message Attribute (79), length: 19, Value: Response (2), id 0, len 17 22 EAP-Message Attribute (79), length: 24, Value: Request (1), id 1, len 22 38 EAP-Message Attribute (79), length: 36, Value: Response (2), id 1, len 34 48 EAP-Message Attribute (79), length: 6, Value: Success (3), id 1, len 4
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/network/ |
H A D | client_cert_resolver_unittest.cc | 273 "Security": "WPA-EAP", in SetupPolicyMatchingIssuerCN() 275 "EAP": { in SetupPolicyMatchingIssuerCN() 276 "Outer": "EAP-TLS", in SetupPolicyMatchingIssuerCN() 299 "Security": "WPA-EAP", in SetupPolicyMatchingSubjectOrgForBadPrintableStringCert() 301 "EAP": { in SetupPolicyMatchingSubjectOrgForBadPrintableStringCert() 302 "Outer": "EAP-TLS", in SetupPolicyMatchingSubjectOrgForBadPrintableStringCert() 347 "Security": "WPA-EAP", in SetupPolicyMatchingIssuerPEM() 349 "EAP": { in SetupPolicyMatchingIssuerPEM() 351 "Outer": "EAP-TLS", in SetupPolicyMatchingIssuerPEM() 837 "EAP": { in TEST_F() [all …]
|
/dports/net-mgmt/librenms/librenms-21.5.1/mibs/ciena/ |
H A D | CIENA-CES-8021X-MIB | 214 "The password used with cienaCes8021xSuppUserName for EAP-MD5 authentication. 272 server by the supplicant. Applies to EAP-TLS." 286 Applies to EAP-TLS." 299 Applies to EAP-TLS." 312 doing mutual authentication. Applies to EAP-TLS." 326 Applies to EAP-TLS." 374 Applies to EAP-TLS." 384 Applies to EAP-TLS." 399 Applies to EAP-TLS." 413 Applies to EAP-TLS."
|
/dports/net-mgmt/observium/observium/mibs/ciena/ |
H A D | CIENA-CES-8021X-MIB | 214 "The password used with cienaCes8021xSuppUserName for EAP-MD5 authentication. 272 server by the supplicant. Applies to EAP-TLS." 286 Applies to EAP-TLS." 299 Applies to EAP-TLS." 312 doing mutual authentication. Applies to EAP-TLS." 326 Applies to EAP-TLS." 374 Applies to EAP-TLS." 384 Applies to EAP-TLS." 399 Applies to EAP-TLS." 413 Applies to EAP-TLS."
|
/dports/net/freeradius3/freeradius-server-3.0.25/raddb/sites-available/ |
H A D | default | 386 # This module takes care of EAP-MD5, EAP-TLS, and EAP-LEAP 571 # Allow EAP authentication. 866 # &WiMAX-MSK = "%{reply:EAP-MSK}" 919 # want to send it for all EAP sessions. Therefore, the EAP 924 # the EAP-Key-Name attribute 925 # if (&reply:EAP-Session-Id) { 927 # EAP-Key-Name := &reply:EAP-Session-Id 1015 # EAP negotiation. 1039 if (EAP-Key-Name && &reply:EAP-Session-Id) { 1041 &EAP-Key-Name := &reply:EAP-Session-Id [all …]
|
H A D | check-eap-tls | 1 # This virtual server allows EAP-TLS to reject access requests 21 # This virtual server is also useful when using EAP-TLS as it is 84 # EAP-TLS, as it will only be called once, after all certificates as 85 # part of the EAP-TLS challenge process have been verified. 116 # EAP-TLS, as it will only be called once, after the challenge-response
|
/dports/net/freeradius3/freeradius-server-3.0.25/share/ |
H A D | dictionary.microsoft | 49 ATTRIBUTE MS-Acct-EAP-Type 24 integer 133 VALUE MS-Acct-Auth-Type EAP 5 135 # MS-Acct-EAP-Type Values 137 VALUE MS-Acct-EAP-Type MD5 4 138 VALUE MS-Acct-EAP-Type OTP 5 139 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 140 VALUE MS-Acct-EAP-Type TLS 13
|
/dports/net/wireshark-lite/wireshark-3.6.1/radius/ |
H A D | dictionary.microsoft | 41 ATTRIBUTE MS-Acct-EAP-Type 24 integer 140 VALUE MS-Acct-Auth-Type EAP 5 142 # MS-Acct-EAP-Type Values 144 VALUE MS-Acct-EAP-Type MD5 4 145 VALUE MS-Acct-EAP-Type OTP 5 146 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 147 VALUE MS-Acct-EAP-Type TLS 13
|
/dports/net/wireshark/wireshark-3.6.1/radius/ |
H A D | dictionary.microsoft | 41 ATTRIBUTE MS-Acct-EAP-Type 24 integer 140 VALUE MS-Acct-Auth-Type EAP 5 142 # MS-Acct-EAP-Type Values 144 VALUE MS-Acct-EAP-Type MD5 4 145 VALUE MS-Acct-EAP-Type OTP 5 146 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 147 VALUE MS-Acct-EAP-Type TLS 13
|
/dports/net/tshark-lite/wireshark-3.6.1/radius/ |
H A D | dictionary.microsoft | 41 ATTRIBUTE MS-Acct-EAP-Type 24 integer 140 VALUE MS-Acct-Auth-Type EAP 5 142 # MS-Acct-EAP-Type Values 144 VALUE MS-Acct-EAP-Type MD5 4 145 VALUE MS-Acct-EAP-Type OTP 5 146 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 147 VALUE MS-Acct-EAP-Type TLS 13
|
/dports/net/tshark/wireshark-3.6.1/radius/ |
H A D | dictionary.microsoft | 41 ATTRIBUTE MS-Acct-EAP-Type 24 integer 140 VALUE MS-Acct-Auth-Type EAP 5 142 # MS-Acct-EAP-Type Values 144 VALUE MS-Acct-EAP-Type MD5 4 145 VALUE MS-Acct-EAP-Type OTP 5 146 VALUE MS-Acct-EAP-Type Generic-Token-Card 6 147 VALUE MS-Acct-EAP-Type TLS 13
|
/dports/net/openradius/openradius-0.9.12c/examples/ |
H A D | behaviour.sample-usersfile | 231 # you want to support EAP 233 # # The users file didn't specify a password or Auth-Type. Handle EAP if 236 # EAP-Message and ( 238 # # Join all EAP-Message attributes into one 240 # REP:EAP-Message = all EAP-Message, 241 # delall REQ:EAP-Message, 242 # moveall REP:EAP-Message, 244 # # Call EAP server, challenging NAS if required 248 # REP:EAP-Message exists or ( 249 # Log-Line := REP:Log-Line . ' - No EAP-Message from EAP server!', [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | multi-bss-iface.conf | 15 wpa_key_mgmt=WPA-EAP 33 wpa_key_mgmt=WPA-EAP
|