eap_config.h 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666
  1. /*
  2. * EAP peer configuration data
  3. * Copyright (c) 2003-2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef EAP_CONFIG_H
  9. #define EAP_CONFIG_H
  10. /**
  11. * struct eap_peer_config - EAP peer configuration/credentials
  12. */
  13. struct eap_peer_config {
  14. /**
  15. * identity - EAP Identity
  16. *
  17. * This field is used to set the real user identity or NAI (for
  18. * EAP-PSK/PAX/SAKE/GPSK).
  19. */
  20. u8 *identity;
  21. /**
  22. * identity_len - EAP Identity length
  23. */
  24. size_t identity_len;
  25. /**
  26. * anonymous_identity - Anonymous EAP Identity
  27. *
  28. * This field is used for unencrypted use with EAP types that support
  29. * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
  30. * real identity (identity field) only to the authentication server.
  31. *
  32. * If not set, the identity field will be used for both unencrypted and
  33. * protected fields.
  34. */
  35. u8 *anonymous_identity;
  36. /**
  37. * anonymous_identity_len - Length of anonymous_identity
  38. */
  39. size_t anonymous_identity_len;
  40. /**
  41. * password - Password string for EAP
  42. *
  43. * This field can include either the plaintext password (default
  44. * option) or a NtPasswordHash (16-byte MD4 hash of the unicode
  45. * presentation of the password) if flags field has
  46. * EAP_CONFIG_FLAGS_PASSWORD_NTHASH bit set to 1. NtPasswordHash can
  47. * only be used with authentication mechanism that use this hash as the
  48. * starting point for operation: MSCHAP and MSCHAPv2 (EAP-MSCHAPv2,
  49. * EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP).
  50. *
  51. * In addition, this field is used to configure a pre-shared key for
  52. * EAP-PSK/PAX/SAKE/GPSK. The length of the PSK must be 16 for EAP-PSK
  53. * and EAP-PAX and 32 for EAP-SAKE. EAP-GPSK can use a variable length
  54. * PSK.
  55. */
  56. u8 *password;
  57. /**
  58. * password_len - Length of password field
  59. */
  60. size_t password_len;
  61. /**
  62. * ca_cert - File path to CA certificate file (PEM/DER)
  63. *
  64. * This file can have one or more trusted CA certificates. If ca_cert
  65. * and ca_path are not included, server certificate will not be
  66. * verified. This is insecure and a trusted CA certificate should
  67. * always be configured when using EAP-TLS/TTLS/PEAP. Full path to the
  68. * file should be used since working directory may change when
  69. * wpa_supplicant is run in the background.
  70. *
  71. * Alternatively, a named configuration blob can be used by setting
  72. * this to blob://blob_name.
  73. *
  74. * Alternatively, this can be used to only perform matching of the
  75. * server certificate (SHA-256 hash of the DER encoded X.509
  76. * certificate). In this case, the possible CA certificates in the
  77. * server certificate chain are ignored and only the server certificate
  78. * is verified. This is configured with the following format:
  79. * hash:://server/sha256/cert_hash_in_hex
  80. * For example: "hash://server/sha256/
  81. * 5a1bc1296205e6fdbe3979728efe3920798885c1c4590b5f90f43222d239ca6a"
  82. *
  83. * On Windows, trusted CA certificates can be loaded from the system
  84. * certificate store by setting this to cert_store://name, e.g.,
  85. * ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
  86. * Note that when running wpa_supplicant as an application, the user
  87. * certificate store (My user account) is used, whereas computer store
  88. * (Computer account) is used when running wpasvc as a service.
  89. */
  90. u8 *ca_cert;
  91. /**
  92. * ca_path - Directory path for CA certificate files (PEM)
  93. *
  94. * This path may contain multiple CA certificates in OpenSSL format.
  95. * Common use for this is to point to system trusted CA list which is
  96. * often installed into directory like /etc/ssl/certs. If configured,
  97. * these certificates are added to the list of trusted CAs. ca_cert
  98. * may also be included in that case, but it is not required.
  99. */
  100. u8 *ca_path;
  101. /**
  102. * client_cert - File path to client certificate file (PEM/DER)
  103. *
  104. * This field is used with EAP method that use TLS authentication.
  105. * Usually, this is only configured for EAP-TLS, even though this could
  106. * in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the
  107. * file should be used since working directory may change when
  108. * wpa_supplicant is run in the background.
  109. *
  110. * Alternatively, a named configuration blob can be used by setting
  111. * this to blob://blob_name.
  112. */
  113. u8 *client_cert;
  114. /**
  115. * private_key - File path to client private key file (PEM/DER/PFX)
  116. *
  117. * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
  118. * commented out. Both the private key and certificate will be read
  119. * from the PKCS#12 file in this case. Full path to the file should be
  120. * used since working directory may change when wpa_supplicant is run
  121. * in the background.
  122. *
  123. * Windows certificate store can be used by leaving client_cert out and
  124. * configuring private_key in one of the following formats:
  125. *
  126. * cert://substring_to_match
  127. *
  128. * hash://certificate_thumbprint_in_hex
  129. *
  130. * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
  131. *
  132. * Note that when running wpa_supplicant as an application, the user
  133. * certificate store (My user account) is used, whereas computer store
  134. * (Computer account) is used when running wpasvc as a service.
  135. *
  136. * Alternatively, a named configuration blob can be used by setting
  137. * this to blob://blob_name.
  138. */
  139. u8 *private_key;
  140. /**
  141. * private_key_passwd - Password for private key file
  142. *
  143. * If left out, this will be asked through control interface.
  144. */
  145. u8 *private_key_passwd;
  146. /**
  147. * dh_file - File path to DH/DSA parameters file (in PEM format)
  148. *
  149. * This is an optional configuration file for setting parameters for an
  150. * ephemeral DH key exchange. In most cases, the default RSA
  151. * authentication does not use this configuration. However, it is
  152. * possible setup RSA to use ephemeral DH key exchange. In addition,
  153. * ciphers with DSA keys always use ephemeral DH keys. This can be used
  154. * to achieve forward secrecy. If the file is in DSA parameters format,
  155. * it will be automatically converted into DH params. Full path to the
  156. * file should be used since working directory may change when
  157. * wpa_supplicant is run in the background.
  158. *
  159. * Alternatively, a named configuration blob can be used by setting
  160. * this to blob://blob_name.
  161. */
  162. u8 *dh_file;
  163. /**
  164. * subject_match - Constraint for server certificate subject
  165. *
  166. * This substring is matched against the subject of the authentication
  167. * server certificate. If this string is set, the server sertificate is
  168. * only accepted if it contains this string in the subject. The subject
  169. * string is in following format:
  170. *
  171. * /C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@n.example.com
  172. */
  173. u8 *subject_match;
  174. /**
  175. * altsubject_match - Constraint for server certificate alt. subject
  176. *
  177. * Semicolon separated string of entries to be matched against the
  178. * alternative subject name of the authentication server certificate.
  179. * If this string is set, the server sertificate is only accepted if it
  180. * contains one of the entries in an alternative subject name
  181. * extension.
  182. *
  183. * altSubjectName string is in following format: TYPE:VALUE
  184. *
  185. * Example: EMAIL:server@example.com
  186. * Example: DNS:server.example.com;DNS:server2.example.com
  187. *
  188. * Following types are supported: EMAIL, DNS, URI
  189. */
  190. u8 *altsubject_match;
  191. /**
  192. * ca_cert2 - File path to CA certificate file (PEM/DER) (Phase 2)
  193. *
  194. * This file can have one or more trusted CA certificates. If ca_cert2
  195. * and ca_path2 are not included, server certificate will not be
  196. * verified. This is insecure and a trusted CA certificate should
  197. * always be configured. Full path to the file should be used since
  198. * working directory may change when wpa_supplicant is run in the
  199. * background.
  200. *
  201. * This field is like ca_cert, but used for phase 2 (inside
  202. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  203. *
  204. * Alternatively, a named configuration blob can be used by setting
  205. * this to blob://blob_name.
  206. */
  207. u8 *ca_cert2;
  208. /**
  209. * ca_path2 - Directory path for CA certificate files (PEM) (Phase 2)
  210. *
  211. * This path may contain multiple CA certificates in OpenSSL format.
  212. * Common use for this is to point to system trusted CA list which is
  213. * often installed into directory like /etc/ssl/certs. If configured,
  214. * these certificates are added to the list of trusted CAs. ca_cert
  215. * may also be included in that case, but it is not required.
  216. *
  217. * This field is like ca_path, but used for phase 2 (inside
  218. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  219. */
  220. u8 *ca_path2;
  221. /**
  222. * client_cert2 - File path to client certificate file
  223. *
  224. * This field is like client_cert, but used for phase 2 (inside
  225. * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
  226. * file should be used since working directory may change when
  227. * wpa_supplicant is run in the background.
  228. *
  229. * Alternatively, a named configuration blob can be used by setting
  230. * this to blob://blob_name.
  231. */
  232. u8 *client_cert2;
  233. /**
  234. * private_key2 - File path to client private key file
  235. *
  236. * This field is like private_key, but used for phase 2 (inside
  237. * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
  238. * file should be used since working directory may change when
  239. * wpa_supplicant is run in the background.
  240. *
  241. * Alternatively, a named configuration blob can be used by setting
  242. * this to blob://blob_name.
  243. */
  244. u8 *private_key2;
  245. /**
  246. * private_key2_passwd - Password for private key file
  247. *
  248. * This field is like private_key_passwd, but used for phase 2 (inside
  249. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  250. */
  251. u8 *private_key2_passwd;
  252. /**
  253. * dh_file2 - File path to DH/DSA parameters file (in PEM format)
  254. *
  255. * This field is like dh_file, but used for phase 2 (inside
  256. * EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the
  257. * file should be used since working directory may change when
  258. * wpa_supplicant is run in the background.
  259. *
  260. * Alternatively, a named configuration blob can be used by setting
  261. * this to blob://blob_name.
  262. */
  263. u8 *dh_file2;
  264. /**
  265. * subject_match2 - Constraint for server certificate subject
  266. *
  267. * This field is like subject_match, but used for phase 2 (inside
  268. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  269. */
  270. u8 *subject_match2;
  271. /**
  272. * altsubject_match2 - Constraint for server certificate alt. subject
  273. *
  274. * This field is like altsubject_match, but used for phase 2 (inside
  275. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  276. */
  277. u8 *altsubject_match2;
  278. /**
  279. * eap_methods - Allowed EAP methods
  280. *
  281. * (vendor=EAP_VENDOR_IETF,method=EAP_TYPE_NONE) terminated list of
  282. * allowed EAP methods or %NULL if all methods are accepted.
  283. */
  284. struct eap_method_type *eap_methods;
  285. /**
  286. * phase1 - Phase 1 (outer authentication) parameters
  287. *
  288. * String with field-value pairs, e.g., "peapver=0" or
  289. * "peapver=1 peaplabel=1".
  290. *
  291. * 'peapver' can be used to force which PEAP version (0 or 1) is used.
  292. *
  293. * 'peaplabel=1' can be used to force new label, "client PEAP
  294. * encryption", to be used during key derivation when PEAPv1 or newer.
  295. *
  296. * Most existing PEAPv1 implementation seem to be using the old label,
  297. * "client EAP encryption", and wpa_supplicant is now using that as the
  298. * default value.
  299. *
  300. * Some servers, e.g., Radiator, may require peaplabel=1 configuration
  301. * to interoperate with PEAPv1; see eap_testing.txt for more details.
  302. *
  303. * 'peap_outer_success=0' can be used to terminate PEAP authentication
  304. * on tunneled EAP-Success. This is required with some RADIUS servers
  305. * that implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
  306. * Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode).
  307. *
  308. * include_tls_length=1 can be used to force wpa_supplicant to include
  309. * TLS Message Length field in all TLS messages even if they are not
  310. * fragmented.
  311. *
  312. * sim_min_num_chal=3 can be used to configure EAP-SIM to require three
  313. * challenges (by default, it accepts 2 or 3).
  314. *
  315. * result_ind=1 can be used to enable EAP-SIM and EAP-AKA to use
  316. * protected result indication.
  317. *
  318. * fast_provisioning option can be used to enable in-line provisioning
  319. * of EAP-FAST credentials (PAC):
  320. * 0 = disabled,
  321. * 1 = allow unauthenticated provisioning,
  322. * 2 = allow authenticated provisioning,
  323. * 3 = allow both unauthenticated and authenticated provisioning
  324. *
  325. * fast_max_pac_list_len=num option can be used to set the maximum
  326. * number of PAC entries to store in a PAC list (default: 10).
  327. *
  328. * fast_pac_format=binary option can be used to select binary format
  329. * for storing PAC entries in order to save some space (the default
  330. * text format uses about 2.5 times the size of minimal binary format).
  331. *
  332. * crypto_binding option can be used to control PEAPv0 cryptobinding
  333. * behavior:
  334. * 0 = do not use cryptobinding (default)
  335. * 1 = use cryptobinding if server supports it
  336. * 2 = require cryptobinding
  337. *
  338. * EAP-WSC (WPS) uses following options: pin=Device_Password and
  339. * uuid=Device_UUID
  340. */
  341. char *phase1;
  342. /**
  343. * phase2 - Phase2 (inner authentication with TLS tunnel) parameters
  344. *
  345. * String with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
  346. * "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS.
  347. */
  348. char *phase2;
  349. /**
  350. * pcsc - Parameters for PC/SC smartcard interface for USIM and GSM SIM
  351. *
  352. * This field is used to configure PC/SC smartcard interface.
  353. * Currently, the only configuration is whether this field is %NULL (do
  354. * not use PC/SC) or non-NULL (e.g., "") to enable PC/SC.
  355. *
  356. * This field is used for EAP-SIM and EAP-AKA.
  357. */
  358. char *pcsc;
  359. /**
  360. * pin - PIN for USIM, GSM SIM, and smartcards
  361. *
  362. * This field is used to configure PIN for SIM and smartcards for
  363. * EAP-SIM and EAP-AKA. In addition, this is used with EAP-TLS if a
  364. * smartcard is used for private key operations.
  365. *
  366. * If left out, this will be asked through control interface.
  367. */
  368. char *pin;
  369. /**
  370. * engine - Enable OpenSSL engine (e.g., for smartcard access)
  371. *
  372. * This is used if private key operations for EAP-TLS are performed
  373. * using a smartcard.
  374. */
  375. int engine;
  376. /**
  377. * engine_id - Engine ID for OpenSSL engine
  378. *
  379. * "opensc" to select OpenSC engine or "pkcs11" to select PKCS#11
  380. * engine.
  381. *
  382. * This is used if private key operations for EAP-TLS are performed
  383. * using a smartcard.
  384. */
  385. char *engine_id;
  386. /**
  387. * engine2 - Enable OpenSSL engine (e.g., for smartcard) (Phase 2)
  388. *
  389. * This is used if private key operations for EAP-TLS are performed
  390. * using a smartcard.
  391. *
  392. * This field is like engine, but used for phase 2 (inside
  393. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  394. */
  395. int engine2;
  396. /**
  397. * pin2 - PIN for USIM, GSM SIM, and smartcards (Phase 2)
  398. *
  399. * This field is used to configure PIN for SIM and smartcards for
  400. * EAP-SIM and EAP-AKA. In addition, this is used with EAP-TLS if a
  401. * smartcard is used for private key operations.
  402. *
  403. * This field is like pin2, but used for phase 2 (inside
  404. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  405. *
  406. * If left out, this will be asked through control interface.
  407. */
  408. char *pin2;
  409. /**
  410. * engine2_id - Engine ID for OpenSSL engine (Phase 2)
  411. *
  412. * "opensc" to select OpenSC engine or "pkcs11" to select PKCS#11
  413. * engine.
  414. *
  415. * This is used if private key operations for EAP-TLS are performed
  416. * using a smartcard.
  417. *
  418. * This field is like engine_id, but used for phase 2 (inside
  419. * EAP-TTLS/PEAP/FAST tunnel) authentication.
  420. */
  421. char *engine2_id;
  422. /**
  423. * key_id - Key ID for OpenSSL engine
  424. *
  425. * This is used if private key operations for EAP-TLS are performed
  426. * using a smartcard.
  427. */
  428. char *key_id;
  429. /**
  430. * cert_id - Cert ID for OpenSSL engine
  431. *
  432. * This is used if the certificate operations for EAP-TLS are performed
  433. * using a smartcard.
  434. */
  435. char *cert_id;
  436. /**
  437. * ca_cert_id - CA Cert ID for OpenSSL engine
  438. *
  439. * This is used if the CA certificate for EAP-TLS is on a smartcard.
  440. */
  441. char *ca_cert_id;
  442. /**
  443. * key2_id - Key ID for OpenSSL engine (phase2)
  444. *
  445. * This is used if private key operations for EAP-TLS are performed
  446. * using a smartcard.
  447. */
  448. char *key2_id;
  449. /**
  450. * cert2_id - Cert ID for OpenSSL engine (phase2)
  451. *
  452. * This is used if the certificate operations for EAP-TLS are performed
  453. * using a smartcard.
  454. */
  455. char *cert2_id;
  456. /**
  457. * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)
  458. *
  459. * This is used if the CA certificate for EAP-TLS is on a smartcard.
  460. */
  461. char *ca_cert2_id;
  462. /**
  463. * otp - One-time-password
  464. *
  465. * This field should not be set in configuration step. It is only used
  466. * internally when OTP is entered through the control interface.
  467. */
  468. u8 *otp;
  469. /**
  470. * otp_len - Length of the otp field
  471. */
  472. size_t otp_len;
  473. /**
  474. * pending_req_identity - Whether there is a pending identity request
  475. *
  476. * This field should not be set in configuration step. It is only used
  477. * internally when control interface is used to request needed
  478. * information.
  479. */
  480. int pending_req_identity;
  481. /**
  482. * pending_req_password - Whether there is a pending password request
  483. *
  484. * This field should not be set in configuration step. It is only used
  485. * internally when control interface is used to request needed
  486. * information.
  487. */
  488. int pending_req_password;
  489. /**
  490. * pending_req_pin - Whether there is a pending PIN request
  491. *
  492. * This field should not be set in configuration step. It is only used
  493. * internally when control interface is used to request needed
  494. * information.
  495. */
  496. int pending_req_pin;
  497. /**
  498. * pending_req_new_password - Pending password update request
  499. *
  500. * This field should not be set in configuration step. It is only used
  501. * internally when control interface is used to request needed
  502. * information.
  503. */
  504. int pending_req_new_password;
  505. /**
  506. * pending_req_passphrase - Pending passphrase request
  507. *
  508. * This field should not be set in configuration step. It is only used
  509. * internally when control interface is used to request needed
  510. * information.
  511. */
  512. int pending_req_passphrase;
  513. /**
  514. * pending_req_otp - Whether there is a pending OTP request
  515. *
  516. * This field should not be set in configuration step. It is only used
  517. * internally when control interface is used to request needed
  518. * information.
  519. */
  520. char *pending_req_otp;
  521. /**
  522. * pending_req_otp_len - Length of the pending OTP request
  523. */
  524. size_t pending_req_otp_len;
  525. /**
  526. * pac_file - File path or blob name for the PAC entries (EAP-FAST)
  527. *
  528. * wpa_supplicant will need to be able to create this file and write
  529. * updates to it when PAC is being provisioned or refreshed. Full path
  530. * to the file should be used since working directory may change when
  531. * wpa_supplicant is run in the background.
  532. * Alternatively, a named configuration blob can be used by setting
  533. * this to blob://blob_name.
  534. */
  535. char *pac_file;
  536. /**
  537. * mschapv2_retry - MSCHAPv2 retry in progress
  538. *
  539. * This field is used internally by EAP-MSCHAPv2 and should not be set
  540. * as part of configuration.
  541. */
  542. int mschapv2_retry;
  543. /**
  544. * new_password - New password for password update
  545. *
  546. * This field is used during MSCHAPv2 password update. This is normally
  547. * requested from the user through the control interface and not set
  548. * from configuration.
  549. */
  550. u8 *new_password;
  551. /**
  552. * new_password_len - Length of new_password field
  553. */
  554. size_t new_password_len;
  555. /**
  556. * fragment_size - Maximum EAP fragment size in bytes (default 1398)
  557. *
  558. * This value limits the fragment size for EAP methods that support
  559. * fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
  560. * small enough to make the EAP messages fit in MTU of the network
  561. * interface used for EAPOL. The default value is suitable for most
  562. * cases.
  563. */
  564. int fragment_size;
  565. #define EAP_CONFIG_FLAGS_PASSWORD_NTHASH BIT(0)
  566. #define EAP_CONFIG_FLAGS_EXT_PASSWORD BIT(1)
  567. /**
  568. * flags - Network configuration flags (bitfield)
  569. *
  570. * This variable is used for internal flags to describe further details
  571. * for the network parameters.
  572. * bit 0 = password is represented as a 16-byte NtPasswordHash value
  573. * instead of plaintext password
  574. * bit 1 = password is stored in external storage; the value in the
  575. * password field is the name of that external entry
  576. */
  577. u32 flags;
  578. };
  579. /**
  580. * struct wpa_config_blob - Named configuration blob
  581. *
  582. * This data structure is used to provide storage for binary objects to store
  583. * abstract information like certificates and private keys inlined with the
  584. * configuration data.
  585. */
  586. struct wpa_config_blob {
  587. /**
  588. * name - Blob name
  589. */
  590. char *name;
  591. /**
  592. * data - Pointer to binary data
  593. */
  594. u8 *data;
  595. /**
  596. * len - Length of binary data
  597. */
  598. size_t len;
  599. /**
  600. * next - Pointer to next blob in the configuration
  601. */
  602. struct wpa_config_blob *next;
  603. };
  604. #endif /* EAP_CONFIG_H */