Home | History | Annotate | Download | only in radius

Lines Matching defs:eap

18 #include "eap_server/eap.h"
74 struct eap_sm *eap;
148 * eap_sim_db_priv - EAP-SIM/AKA database context
150 * This is passed to the EAP-SIM/AKA server implementation as a
158 * This is passed to the EAP server implementation as a callback
164 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST
166 * This parameter is used to set a key for EAP-FAST to encrypt the
167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If
173 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
175 * If EAP-FAST is not used, this can be set to %NULL. In theory, this
189 * eap_fast_a_id_info - EAP-FAST authority identifier information
193 * human-readable format. This field is encoded as UTF-8. If EAP-FAST
199 * eap_fast_prov - EAP-FAST provisioning modes
208 * pac_key_lifetime - EAP-FAST PAC-Key lifetime in seconds
216 * pac_key_refresh_time - EAP-FAST PAC-Key refresh time in seconds
225 * eap_sim_aka_result_ind - EAP-SIM/AKA protected success indication
228 * (AT_RESULT_IND) is used with EAP-SIM and EAP-AKA.
236 * peer is allowed to connect. Note: This is only used with EAP-TTLS
237 * and EAP-FAST. If any other EAP method is enabled, the peer will be
243 * pwd_group - The D-H group assigned for EAP-pwd
245 * If EAP-pwd is not used it can be set to zero.
281 * get_eap_user - Callback for fetching EAP user information
290 * will fill in information about allowed EAP methods and the user
298 * eap_req_id_text - Optional data for EAP-Request/Identity
301 * will be sent in EAP-Request/Identity. This string can contain an
453 eap_server_sm_deinit(sess->eap);
677 sess->eap = eap_server_sm_init(sess, &radius_server_eapol_cb,
679 if (sess->eap == NULL) {
680 RADIUS_DEBUG("Failed to initialize EAP state machine for the "
685 sess->eap_if = eap_get_interface(sess->eap);
733 RADIUS_DEBUG("Failed to add EAP-Message attribute");
935 RADIUS_DEBUG("Failed to add EAP-Message attribute");
977 struct wpabuf *eap = NULL;
1043 eap = radius_msg_get_eap(msg);
1044 if (eap == NULL && sess->macacl) {
1050 if (eap == NULL) {
1051 RADIUS_DEBUG("No EAP-Message in RADIUS packet from %s",
1058 RADIUS_DUMP("Received EAP data", wpabuf_head(eap), wpabuf_len(eap));
1062 * Include EAP-Response/Nak with no preferred method if
1065 * Or is this already done by the EAP state machine? */
1068 sess->eap_if->eapRespData = eap;
1070 eap_server_sm_step(sess->eap);
1074 RADIUS_DUMP("EAP data from the state machine",
1078 RADIUS_DEBUG("No EAP data from the state machine, but eapFail "
1080 } else if (eap_sm_method_pending(sess->eap)) {
1090 RADIUS_DEBUG("No EAP data from the state machine - ignore this"
1101 srv_log(sess, "EAP authentication failed");
1103 srv_log(sess, "EAP authentication succeeded");
2016 srv_log(sess, "EAP: %s", msg);
2029 * radius_server_eap_pending_cb - Pending EAP data notification
2031 * @ctx: Pending EAP context pointer
2033 * This function is used to notify EAP server module that a pending operation
2034 * has been completed and processing of the EAP session can proceed.
2047 if (s->eap == ctx && s->last_msg) {
2063 eap_sm_pending_cb(sess->eap);