Home
last modified time | relevance | path

Searched refs:RADIUS (Results 1 – 25 of 38) sorted by relevance

12

/external/ppp/pppd/plugins/radius/etc/
Dradiusclient.conf.in5 # if you specify "radius,local" then the RADIUS server is asked
27 # RADIUS settings
29 # RADIUS server to use for authentication requests. this config
34 # RADIUS listens separated by a colon from the hostname. if
39 # RADIUS server to use for accouting requests. All that I
45 # between the RADIUS client and server
49 # just like in the normal RADIUS distributions
52 # program to call for a RADIUS authenticated login
57 # RADIUS server
69 # time to wait for a reply from the RADIUS server
[all …]
Ddictionary.compat40 # For compatibility with ESVA RADIUS, Old Cistron RADIUS
Dport-id-map5 # is reported as part of a RADIUS authentication or accouting request.
Drealms3 # Handle realm @netservers.co.uk on an internal RADIUS server
Ddictionary176 VALUE Acct-Authentic RADIUS 1
183 VALUE Termination-Action RADIUS-Request 1
/external/wpa_supplicant_8/hostapd/
Dhostapd.radius_clients1 # RADIUS client configuration for the RADIUS server
DChangeLog67 * fixed EAPOL/EAP reauthentication when using an external RADIUS
140 (accept_mac_file) as an alternative for RADIUS server-based
147 * added new "driver wrapper" for RADIUS-only configuration
177 * copy optional Proxy-State attributes into RADIUS response when acting
178 as a RADIUS authentication server
180 received from the RADIUS authentication server; previous version
242 * fixed IPv6 connection to RADIUS accounting server
256 * RADIUS server: added support for processing duplicate messages
257 (retransmissions from RADIUS client) by replying with the previous
267 for each STA based on RADIUS Access-Accept attributes); this requires
[all …]
D.config39 # Driver interface for no driver (e.g., RADIUS server only)
126 # RADIUS authentication server. This provides access to the integrated EAP
127 # server from external hosts using RADIUS.
130 # Build IPv6 support for RADIUS operations
151 # Remove support for RADIUS accounting
154 # Remove support for RADIUS
DREADME2 Authenticator and RADIUS authentication server
71 included in the kernel driver: using external RADIUS authentication
73 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
78 an external RADIUS authentication server), and RADIUS authentication
147 frames used by that server. RADIUS is suitable for this, but IEEE
162 Authentication Server. hostapd supports RADIUS encapsulation of EAP
163 packets, so the Authentication Server should be a RADIUS server, like
201 An external Authentication Server (RADIUS) is configured with
206 Authenticator and RADIUS encapsulation between the Authenticator and
213 Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
[all …]
Ddefconfig32 # Driver interface for no driver (e.g., RADIUS server only)
119 # RADIUS authentication server. This provides access to the integrated EAP
120 # server from external hosts using RADIUS.
123 # Build IPv6 support for RADIUS operations
145 # Remove support for RADIUS accounting
148 # Remove support for RADIUS
/external/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
16 I'm more than willing to add new RADIUS authentication servers to make
18 seen as automatic regression/interoperability testing for the RADIUS
40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
DREADME70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
287 an external authentication server (e.g., RADIUS) and EAP just like
608 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
/external/wpa_supplicant_6/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
16 I'm more than willing to add new RADIUS authentication servers to make
18 seen as automatic regression/interoperability testing for the RADIUS
40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
DREADME70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
291 an external authentication server (e.g., RADIUS) and EAP just like
614 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt6 hostapd (RADIUS client and RADIUS processing, EAP<->RADIUS
16 I'm more than willing to add new RADIUS authentication servers to make
18 seen as automatic regression/interoperability testing for the RADIUS
40 Cisco Aironet 1200 AP (local RADIUS server) ----------------. | |
DREADME70 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
275 an external authentication server (e.g., RADIUS) and EAP just like
592 2) WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old peaplabel
/external/ipsec-tools/src/racoon/samples/roadwarrior/
DREADME21 The second setup, server/racoon.conf-radius, uses a RADIUS server for
23 to be used for the RADIUS server are configured in /etc/radius.conf,
/external/collada/include/1.4/dom/
DdomSphere.h40 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
DdomCylinder.h102 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
DdomCapsule.h102 virtual COLLADA_TYPE::TypeEnum getElementType() const { return COLLADA_TYPE::RADIUS; } in getElementType()
/external/ipsec-tools/src/racoon/doc/
DFAQ58 Enable the use of RADIUS with hybrid authentication on the
59 server side. RADIUS is used for authentication, configuration
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml77 <para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that
Dwpa_background.sgml52 either use an external authentication server (e.g., RADIUS) and
/external/bison/tests/
Dexisting.at1014 %token RADIUS
1132 %left HEIGHT RADIUS WIDTH DIAMETER FROM TO AT THICKNESS
1298 | object_spec RADIUS expr
/external/ipsec-tools/
DNEWS75 RADIUS supoort. This is interoperable with the Cisco VPN client.

12