Home
last modified time | relevance | path

Searched refs:servers (Results 1 – 9 of 9) sorted by relevance

/hostap-latest/src/ap/
Dap_config.c562 static void hostapd_config_free_radius(struct hostapd_radius_server *servers, in hostapd_config_free_radius() argument
568 os_free(servers[i].shared_secret); in hostapd_config_free_radius()
569 os_free(servers[i].ca_cert); in hostapd_config_free_radius()
570 os_free(servers[i].client_cert); in hostapd_config_free_radius()
571 os_free(servers[i].private_key); in hostapd_config_free_radius()
572 os_free(servers[i].private_key_passwd); in hostapd_config_free_radius()
574 os_free(servers); in hostapd_config_free_radius()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml58 for additional servers. Wi-Fi calls these "WPA-Enterprise" and
Deapol_test.sgml59 of EAP methods against RADIUS servers and in development testing
Dwpa_supplicant.conf.sgml81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
/hostap-latest/doc/
Dtesting_tools.doxygen27 methods against RADIUS servers and in development testing for new EAP
/hostap-latest/wpa_supplicant/
Deap_testing.txt16 I'm more than willing to add new RADIUS authentication servers to make
DChangeLog513 servers with phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1"
660 to allow workarounds with misbehaving AAA servers
1035 - a workaround for servers that do not support TLS extensions that
2133 interoperate with some authentication servers
2167 authentication servers
2305 interoperate with most RADIUS servers that implements PEAPv1
2309 (some RADIUS servers require this whereas others require a tunneled
2377 * added a workaround for EAP servers that incorrectly use same Id for
DREADME227 servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",
556 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
/hostap-latest/hostapd/
DREADME265 servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",