aboutsummaryrefslogtreecommitdiffstats
path: root/src/radius/radius_server.h
Commit message (Collapse)AuthorAgeFilesLines
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add MSK dump mechanism into hostapd RADIUS server for testingJouni Malinen2011-12-091-1/+5
| | | | | | | | | | | | | | Testing code can now be enabled in the hostapd RADIUS server to dump each derived MSK into a text file (e.g., to be used as an input to wlantest). This functionality is not included in the default build and can be enabled by adding the following line to hostapd/.config: CFLAGS += -DCONFIG_RADIUS_TEST The MSK dump file is specified with dump_msk_file parameter in hostapd.conf (path to the dump file). If this variable is not set, MSK dump mechanism is not enabled at run time. Signed-hostap: Jouni Malinen <j@w1.fi>
* EAP-pwd: Add support for EAP-pwd server and peer functionalityDan Harkins2010-09-141-0/+7
| | | | | This adds an initial EAP-pwd (RFC 5931) implementation. For now, this requires OpenSSL.
* AP: Add wpa_msg() events for EAP server state machineGregory Detal2010-04-071-0/+5
|
* Remove conditional no-RADIUS build from src/radiusJouni Malinen2009-12-061-27/+0
| | | | | Make it responsibility of the src/radius user to handle conditional build rules.
* Add more Doxygen documentation for RADIUS server implementationJouni Malinen2009-12-021-2/+152
|
* Add RADIUS server support for identity selection hint (RFC 4284)Jouni Malinen2008-12-261-0/+2
| | | | | | | | | | | Previously, only the delivery option 1 from RFC 4284 (EAP-Request/Identity from the AP) was supported. Now option 3 (subsequent EAP-Request/Identity from RADIUS server) can also be used when hostapd is used as a RADIUS server. The eap_user file will need to have a Phase 1 user entry pointing to Identity method in order for this to happen (e.g., "* Identity" in the end of the file). The identity hint is configured in the same was as for AP/Authenticator case (eap_message in hostapd.conf).
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+1
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* EAP-FAST: Allow A-ID and A-ID-Info to be configured separatelyJouni Malinen2008-10-191-1/+3
| | | | | | | Changed EAP-FAST configuration to use separate fields for A-ID and A-ID-Info (eap_fast_a_id_info) to allow A-ID to be set to a fixed 16-octet len binary value for better interoperability with some peer implementations; eap_fast_a_id is now configured as a hex string.
* EAP-FAST: Make PAC-Key lifetime values configurableJouni Malinen2008-10-081-0/+2
| | | | | The hardcoded values in eap_fast.c were replaced with values read from hostapd.conf.
* EAP-FAST: Added support for disabling anonymous/authenticated provisioningJouni Malinen2008-10-081-0/+1
| | | | | | | | | eap_fast_prov config parameter can now be used to enable/disable different EAP-FAST provisioning modes: 0 = provisioning disabled 1 = only anonymous provisioning allowed 2 = only authenticated provisioning allowed 3 = both provisioning modes allowed
* TNC: Provide 'tnc' configuration option for EAP server and methodsJouni Malinen2008-03-091-0/+1
|
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-271-0/+73