12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394 |
- #ifndef EAP_TLS_COMMON_H
- #define EAP_TLS_COMMON_H
- struct eap_ssl_data {
-
- struct tls_connection *conn;
-
- struct wpabuf *tls_out;
-
- size_t tls_out_pos;
-
- size_t tls_out_limit;
-
- struct wpabuf *tls_in;
-
- int phase2;
-
- struct eap_sm *eap;
- enum { MSG, FRAG_ACK, WAIT_FRAG_ACK } state;
- struct wpabuf tmpbuf;
- };
- #define EAP_TLS_FLAGS_LENGTH_INCLUDED 0x80
- #define EAP_TLS_FLAGS_MORE_FRAGMENTS 0x40
- #define EAP_TLS_FLAGS_START 0x20
- #define EAP_TLS_VERSION_MASK 0x07
-
- #define EAP_TLS_KEY_LEN 64
- #define EAP_UNAUTH_TLS_TYPE 255
- #define EAP_WFA_UNAUTH_TLS_TYPE 254
- struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len,
- u8 code, u8 identifier);
- int eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data,
- int verify_peer, int eap_type);
- void eap_server_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data);
- u8 * eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data,
- char *label, size_t len);
- u8 * eap_server_tls_derive_session_id(struct eap_sm *sm,
- struct eap_ssl_data *data, u8 eap_type,
- size_t *len);
- struct wpabuf * eap_server_tls_build_msg(struct eap_ssl_data *data,
- int eap_type, int version, u8 id);
- struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
- int eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data);
- struct wpabuf * eap_server_tls_encrypt(struct eap_sm *sm,
- struct eap_ssl_data *data,
- const struct wpabuf *plain);
- int eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data,
- struct wpabuf *respData, void *priv, int eap_type,
- int (*proc_version)(struct eap_sm *sm, void *priv,
- int peer_version),
- void (*proc_msg)(struct eap_sm *sm, void *priv,
- const struct wpabuf *respData));
- #endif
|