Searched refs:servers (Results 1 – 9 of 9) sorted by relevance
562 static void hostapd_config_free_radius(struct hostapd_radius_server *servers, in hostapd_config_free_radius() argument568 os_free(servers[i].shared_secret); in hostapd_config_free_radius()569 os_free(servers[i].ca_cert); in hostapd_config_free_radius()570 os_free(servers[i].client_cert); in hostapd_config_free_radius()571 os_free(servers[i].private_key); in hostapd_config_free_radius()572 os_free(servers[i].private_key_passwd); in hostapd_config_free_radius()574 os_free(servers); in hostapd_config_free_radius()
58 for additional servers. Wi-Fi calls these "WPA-Enterprise" and
59 of EAP methods against RADIUS servers and in development testing
81 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
27 methods against RADIUS servers and in development testing for new EAP
16 I'm more than willing to add new RADIUS authentication servers to make
513 servers with phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1"660 to allow workarounds with misbehaving AAA servers1035 - a workaround for servers that do not support TLS extensions that2133 interoperate with some authentication servers2167 authentication servers2305 interoperate with most RADIUS servers that implements PEAPv12309 (some RADIUS servers require this whereas others require a tunneled2377 * added a workaround for EAP servers that incorrectly use same Id for
227 servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",556 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
265 servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",