aboutsummaryrefslogtreecommitdiffstats
path: root/src/eapol_auth/eapol_auth_sm.c
Commit message (Collapse)AuthorAgeFilesLines
* Add server identity configuration for EAP serverJouni Malinen2013-07-071-0/+4
| | | | | | | | The new server_id parameter in hostapd.conf can now be used to specify which identity is delivered to the EAP peer with EAP methods that support authenticated server identity. Signed-hostap: Jouni Malinen <j@w1.fi>
* Initialize EAPOL auth identity/cui with STA entry dataMichael Braun2012-08-191-1/+11
| | | | | | | If RADIUS ACL was used for the STA, identity/cui may already be known at this point. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* Make sure that EAP callbacks are not done if state machine has been removedJouni Malinen2011-08-121-1/+1
| | | | | | | It is possible to get a response for a pending EAP callback after the EAP state machine has already completed its work or has timed out. For those cases, make sure that the callback function is not delivered since it could result in NULL pointer dereferences.
* WPS: Add a workaround for Windows 7 capability discovery for PBCJouni Malinen2011-05-171-0/+2
| | | | | | | | | | | | Windows 7 uses incorrect way of figuring out AP's WPS capabilities by acting as a Registrar and using M1 from the AP. The config methods attribute in that message is supposed to indicate only the configuration method supported by the AP in Enrollee role, i.e., to add an external Registrar. For that case, PBC shall not be used and as such, the PushButton config method is removed from M1 by default. If pbc_in_m1=1 is included in the configuration file, the PushButton config method is left in M1 (if included in config_methods parameter) to allow Windows 7 to use PBC instead of PIN (e.g., from a label in the AP).
* EAP-pwd: Add support for EAP-pwd server and peer functionalityDan Harkins2010-09-151-0/+2
| | | | | This adds an initial EAP-pwd (RFC 5931) implementation. For now, this requires OpenSSL.
* P2P: Use PSK format in WPS CredentialJouni Malinen2010-09-091-1/+3
|
* EAP server: Add support for configuring fragment sizeJouni Malinen2010-07-211-0/+2
|
* AP: Add wpa_msg() events for EAP server state machineGregory Detal2010-04-071-0/+2
|
* Make EAPOL Authenticator buildable with Microsoft compilerJouni Malinen2010-02-191-2/+2
|
* Move internal EAPOL authenticator defines into their own fileJouni Malinen2009-11-291-3/+5
| | | | | | | | This is an initial step in further cleaning up the EAPOL authenticator use to avoid requiring direct accesses to the internal data structures. For now, number of external files are still including the internal definitions from eapol_auth_sm_i.h, but eventually, these direct references should be removed.
* Make HOSTAPD_DUMP_STATE configurable with CONFIG_NO_DUMP_STATEJouni Malinen2009-11-291-214/+0
| | | | | | This removes the hardcoded definition from Makefile and cleans up source code by moving the mail HOSTAPD_DUMP_STATE blocks into separate files to avoid conditional compilation within files.
* Move EAPOL authenticator state machine into src/eapol_authJouni Malinen2009-11-291-0/+1349
This is now completely independent from hostapd-specific code, so it can be moved to be under the src tree.