aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/ieee802_11_auth.h
diff options
context:
space:
mode:
authorMichael Braun <michael-dev@fami-braun.de>2011-12-11 13:01:57 +0200
committerJouni Malinen <j@w1.fi>2011-12-11 13:01:57 +0200
commit05ab9712b9977192b713f01f07c3b14ca4d1ba78 (patch)
tree1e97b6daa1f6f5053e97b58be2955bd65a30c696 /src/ap/ieee802_11_auth.h
parentc3daaf3325563ccbe0d8c3a8c8b729683a9d68c2 (diff)
downloadexternal_wpa_supplicant_8_ti-05ab9712b9977192b713f01f07c3b14ca4d1ba78.zip
external_wpa_supplicant_8_ti-05ab9712b9977192b713f01f07c3b14ca4d1ba78.tar.gz
external_wpa_supplicant_8_ti-05ab9712b9977192b713f01f07c3b14ca4d1ba78.tar.bz2
Allow WPA passphrase to be fetched with RADIUS Tunnel-Password attribute
This allows per-device PSK to be configured for WPA-Personal using a RADIUS authentication server. This uses RADIUS-based MAC address ACL (macaddr_acl=2), i.e., Access-Request uses the MAC address of the station as the User-Name and User-Password. The WPA passphrase is returned in Tunnel-Password attribute in Access-Accept. This functionality can be enabled with the new hostapd.conf parameter, wpa_psk_radius. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
Diffstat (limited to 'src/ap/ieee802_11_auth.h')
-rw-r--r--src/ap/ieee802_11_auth.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/ap/ieee802_11_auth.h b/src/ap/ieee802_11_auth.h
index b2971e5..a90571f 100644
--- a/src/ap/ieee802_11_auth.h
+++ b/src/ap/ieee802_11_auth.h
@@ -24,7 +24,8 @@ enum {
int hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr,
const u8 *msg, size_t len, u32 *session_timeout,
- u32 *acct_interim_interval, int *vlan_id);
+ u32 *acct_interim_interval, int *vlan_id,
+ u8 *psk, int *has_psk);
int hostapd_acl_init(struct hostapd_data *hapd);
void hostapd_acl_deinit(struct hostapd_data *hapd);