path: root/wpa_supplicant/eapol_test.c
Commit message (Collapse)AuthorAgeFilesLines
* eapol_test: Show MNC length in debug outputJouni Malinen2012-01-221-0/+3
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* eapol_test: Add option for writing server certificate chain to a fileJouni Malinen2011-09-171-8/+44
| | | | | | eapol_test command line argument -o<file> can now be used to request the received server certificate chain to be written to the specified file. The certificates will be written in PEM format. [Bug 391]
* Move peer certificate wpa_msg() calls to notify.cJouni Malinen2011-07-051-1/+32
| | | | | This type of wpa_supplicant specific message construction does not need to be at the EAP implementation, so better move it up to notify.c.
* eapol_test: Unregister EAP server methods if CONFIG_AP=yJouni Malinen2010-11-071-0/+4
| | | | This fixes a memory leak in CONFIG_AP=y builds.
* eloop: Remove global user data pointerJouni Malinen2009-12-191-6/+5
| | | | | This is not really needed since all signal handlers can use a context pointer provided during signal handler registration.
* eapol_test: Fix build after RADIUS msg API changesJouni Malinen2009-12-191-8/+10
* Change radius_msg_free() to free the bufferJouni Malinen2009-12-191-10/+3
| | | | | Since all callers were freeing the buffer immediately anyway, move this operation into radius_msg_free() to reduce code size.
* Move EAP method registration away from src/eap_{peer,server}Jouni Malinen2009-12-061-1/+1
| | | | | | This makes it easier to make a library out of EAP methods without losing possiblity of binary size optimization by linker dropping unreferenced code.
* Remove unnecessary definesJouni Malinen2009-12-051-2/+0
| | | | | | | | | The following defines are not really needed in most places, so remove them to clean up source code and build scripts: EAP_TLS_FUNCS EAP_TLS_OPENSSL EAP_TLS_GNUTLS CONFIG_TLS_INTERNAL
* Remove src/rsn_supp from default header pathJouni Malinen2009-11-291-1/+1
* Merge wpa_supplicant and hostapd driver wrapper implementationsJouni Malinen2009-04-091-1/+1
| | | | | | | | This commit merges the driver_ops structures and implementations from hostapd/driver*.[ch] into src/drivers. This is only an initial step and there is room for number of cleanups to share code between the hostapd and wpa_supplicant parts of the wrappers to avoid unnecessary source code duplication.
* eapol_test: Allow generated RADIUS attributes to be replacedJouni Malinen2009-01-131-5/+23
| | | | | | | Do not add the automatically generated RADIUS attributes NAS-IP-Address, Calling-Station-Id, Framed-MTU, NAS-Port-Type, and Connect-Info if -N option is used with the same attribute type. This allows these attributes to be replaced without causing duplicate entries.
* Fixed eapol_test build after RADIUS API changes (const)Jouni Malinen2009-01-091-2/+3
* Fixed a typo in usage helpJouni Malinen2009-01-041-1/+1
* eapol_test: Add a universal way of adding extra RADIUS attributesTomasz Wolniewicz2009-01-041-30/+127
| | | | | | This change replaces -I and -i options (Chargeable-User-Identity) with a new -N option that can add any RADIUS attribute into the Access-Request messages without having to modify eapol_test for each new attribute.
* Cleaned up EAP-MSCHAPv2 key derivationJouni Malinen2008-12-141-0/+10
| | | | | | | | | | | | | Changed peer to derive the full key (both MS-MPPE-Recv-Key and MS-MPPE-Send-Key for total of 32 octets) to match with server implementation. Swapped the order of MPPE keys in MSK derivation since server MS-MPPE-Recv-Key | MS-MPPE-Send-Key matches with the order specified for EAP-TLS MSK derivation. This means that PEAPv0 cryptobinding is now using EAP-MSCHAPv2 MSK as-is for ISK while EAP-FAST will need to swap the order of the MPPE keys to get ISK in a way that interoperates with Cisco EAP-FAST implementation.
* Removed mac_addr from eapol_ctx to fix the eapol_test buildJouni Malinen2008-12-031-1/+0
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+1
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* eapol_test: Allow client IP address to be specifiedTomasz Wolniewicz2008-03-301-5/+23
| | | | | | | | | | | | | Allow the user to set the IP address of the eapol_test client. This if very useful when you have a machine with many interfaces and want to use a particular one for testing RADIUS connectivity. For instance when I run the national eduroam proxy I can only connect to other server from a particular address, an our machine happens to have several IPs. So if I want to run connectivity tests, I must make sure that my test uses a particular interface. The -A option allows one to set this). (jm: cleaned up to use radius configuration structure instead of global variable for the address and added IPv6 support)
* Chargeable-User-Identity (RFC 4372) in eapol_testTomasz Wolniewicz2008-03-301-3/+33
| | | | | | | Implements the Chargable-User-Identity (CUI), as defined in RFC 4372. Option "-i" causes the eapol_test to send a NUL CUI - which is a request to send a CUI back. Capital "-I" allows to specify the value of the CUI. This has been defined for cases where the client wants to reauthenticate.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+1043