File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / conf / plugins / eap-ttls.opt
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 09:46:43 2020 UTC (4 years, 10 months ago) by misho
Branches: strongswan, MAIN
CVS tags: v5_9_2p0, v5_8_4p7, HEAD
Strongswan

    1: charon.plugins.eap-ttls.fragment_size = 1024
    2: 	Maximum size of an EAP-TTLS packet.
    3: 
    4: charon.plugins.eap-ttls.max_message_count = 32
    5: 	Maximum number of processed EAP-TTLS packets (0 = no limit).
    6: 
    7: charon.plugins.eap-ttls.include_length = yes
    8: 	Include length in non-fragmented EAP-TTLS packets.
    9: 
   10: charon.plugins.eap-ttls.phase2_method = md5
   11: 	Phase2 EAP client authentication method.
   12: 
   13: charon.plugins.eap-ttls.phase2_piggyback = no
   14: 	Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
   15: 
   16: charon.plugins.eap-ttls.phase2_tnc = no
   17: 	Start phase2 EAP TNC protocol after successful client authentication.
   18: 
   19: charon.plugins.eap-ttls.phase2_tnc_method = pt
   20: 	Phase2 EAP TNC transport protocol (_pt_ as IETF standard or legacy _tnc_)
   21: 
   22: charon.plugins.eap-ttls.request_peer_auth = no
   23: 	Request peer authentication based on a client certificate.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>