Searched refs:RADIUS (Results 1 – 25 of 38) sorted by relevance
12
/external/ppp/pppd/plugins/radius/etc/ |
D | radiusclient.conf.in | 5 # if you specify "radius,local" then the RADIUS server is asked 27 # RADIUS settings 29 # RADIUS server to use for authentication requests. this config 34 # RADIUS listens separated by a colon from the hostname. if 39 # RADIUS server to use for accouting requests. All that I 45 # between the RADIUS client and server 49 # just like in the normal RADIUS distributions 52 # program to call for a RADIUS authenticated login 57 # RADIUS server 69 # time to wait for a reply from the RADIUS server [all …]
|
D | dictionary.compat | 40 # For compatibility with ESVA RADIUS, Old Cistron RADIUS
|
D | port-id-map | 5 # is reported as part of a RADIUS authentication or accouting request.
|
D | realms | 3 # Handle realm @netservers.co.uk on an internal RADIUS server
|
D | dictionary | 176 VALUE Acct-Authentic RADIUS 1 183 VALUE Termination-Action RADIUS-Request 1
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.radius_clients | 1 # RADIUS client configuration for the RADIUS server
|
D | ChangeLog | 67 * fixed EAPOL/EAP reauthentication when using an external RADIUS 140 (accept_mac_file) as an alternative for RADIUS server-based 147 * added new "driver wrapper" for RADIUS-only configuration 177 * copy optional Proxy-State attributes into RADIUS response when acting 178 as a RADIUS authentication server 180 received from the RADIUS authentication server; previous version 242 * fixed IPv6 connection to RADIUS accounting server 256 * RADIUS server: added support for processing duplicate messages 257 (retransmissions from RADIUS client) by replying with the previous 267 for each STA based on RADIUS Access-Accept attributes); this requires [all …]
|
D | .config | 39 # Driver interface for no driver (e.g., RADIUS server only) 126 # RADIUS authentication server. This provides access to the integrated EAP 127 # server from external hosts using RADIUS. 130 # Build IPv6 support for RADIUS operations 151 # Remove support for RADIUS accounting 154 # Remove support for RADIUS
|
D | README | 2 Authenticator and RADIUS authentication server 71 included in the kernel driver: using external RADIUS authentication 73 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN) 78 an external RADIUS authentication server), and RADIUS authentication 147 frames used by that server. RADIUS is suitable for this, but IEEE 162 Authentication Server. hostapd supports RADIUS encapsulation of EAP 163 packets, so the Authentication Server should be a RADIUS server, like 201 An external Authentication Server (RADIUS) is configured with 206 Authenticator and RADIUS encapsulation between the Authenticator and 213 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X [all …]
|
D | defconfig | 32 # Driver interface for no driver (e.g., RADIUS server only) 119 # RADIUS authentication server. This provides access to the integrated EAP 120 # server from external hosts using RADIUS. 123 # Build IPv6 support for RADIUS operations 145 # Remove support for RADIUS accounting 148 # Remove support for RADIUS
|
/external/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 16 I'm more than willing to add new RADIUS authentication servers to make 18 seen as automatic regression/interoperability testing for the RADIUS 40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
|
D | README | 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 287 an external authentication server (e.g., RADIUS) and EAP just like 608 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 16 I'm more than willing to add new RADIUS authentication servers to make 18 seen as automatic regression/interoperability testing for the RADIUS 40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
|
D | README | 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 291 an external authentication server (e.g., RADIUS) and EAP just like 614 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS 16 I'm more than willing to add new RADIUS authentication servers to make 18 seen as automatic regression/interoperability testing for the RADIUS 40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
|
D | README | 70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 275 an external authentication server (e.g., RADIUS) and EAP just like 592 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/ |
D | README | 21 The second setup, server/racoon.conf-radius, uses a RADIUS server for 23 to be used for the RADIUS server are configured in /etc/radius.conf,
|
/external/collada/include/1.4/dom/ |
D | domSphere.h | 40 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
|
D | domCylinder.h | 102 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
|
D | domCapsule.h | 102 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
|
/external/ipsec-tools/src/racoon/doc/ |
D | FAQ | 58 Enable the use of RADIUS with hybrid authentication on the 59 server side. RADIUS is used for authentication, configuration
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
|
D | wpa_background.sgml | 52 either use an external authentication server (e.g., RADIUS) and
|
/external/bison/tests/ |
D | existing.at | 1014 %token RADIUS 1132 %left HEIGHT RADIUS WIDTH DIAMETER FROM TO AT THICKNESS 1298 | object_spec RADIUS expr
|
/external/ipsec-tools/ |
D | NEWS | 75 RADIUS supoort. This is interoperable with the Cisco VPN client.
|
12