⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eap_config.h

📁 IEEE 802.11a/b/g 服务器端AP
💻 H
📖 第 1 页 / 共 2 页
字号:
	 * String with field-value pairs, e.g., "peapver=0" or	 * "peapver=1 peaplabel=1".	 *	 * 'peapver' can be used to force which PEAP version (0 or 1) is used.	 *	 * 'peaplabel=1' can be used to force new label, "client PEAP	 * encryption",	to be used during key derivation when PEAPv1 or newer.	 *	 * Most existing PEAPv1 implementation seem to be using the old label,	 * "client EAP encryption", and wpa_supplicant is now using that as the	 * default value.	 *	 * Some servers, e.g., Radiator, may require peaplabel=1 configuration	 * to interoperate with PEAPv1; see eap_testing.txt for more details.	 *	 * 'peap_outer_success=0' can be used to terminate PEAP authentication	 * on tunneled EAP-Success. This is required with some RADIUS servers	 * that implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,	 * Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode).	 *	 * include_tls_length=1 can be used to force wpa_supplicant to include	 * TLS Message Length field in all TLS messages even if they are not	 * fragmented.	 *	 * sim_min_num_chal=3 can be used to configure EAP-SIM to require three	 * challenges (by default, it accepts 2 or 3).	 *	 * result_ind=1 can be used to enable EAP-SIM and EAP-AKA to use	 * protected result indication.	 *	 * fast_provisioning option can be used to enable in-line provisioning	 * of EAP-FAST credentials (PAC):	 * 0 = disabled,	 * 1 = allow unauthenticated provisioning,	 * 2 = allow authenticated provisioning,	 * 3 = allow both unauthenticated and authenticated provisioning	 *	 * fast_max_pac_list_len=<num> option can be used to set the maximum	 * number of PAC entries to store in a PAC list (default: 10).	 *	 * fast_pac_format=binary option can be used to select binary format	 * for storing PAC entires in order to save some space (the default	 * text format uses about 2.5 times the size of minimal binary format).	 *	 * crypto_binding option can be used to control PEAPv0 cryptobinding	 * behavior:	 * 0 = do not use cryptobinding	 * 1 = use cryptobinding if server supports it (default)	 * 2 = require cryptobinding	 */	char *phase1;	/**	 * phase2 - Phase2 (inner authentication with TLS tunnel) parameters	 *	 * String with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or	 * "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS.	 */	char *phase2;	/**	 * pcsc - Parameters for PC/SC smartcard interface for USIM and GSM SIM	 *	 * This field is used to configure PC/SC smartcard interface.	 * Currently, the only configuration is whether this field is %NULL (do	 * not use PC/SC) or non-NULL (e.g., "") to enable PC/SC.	 *	 * This field is used for EAP-SIM and EAP-AKA.	 */	char *pcsc;	/**	 * pin - PIN for USIM, GSM SIM, and smartcards	 *	 * This field is used to configure PIN for SIM and smartcards for	 * EAP-SIM and EAP-AKA. In addition, this is used with EAP-TLS if a	 * smartcard is used for private key operations.	 *	 * If left out, this will be asked through control interface.	 */	char *pin;	/**	 * engine - Enable OpenSSL engine (e.g., for smartcard access)	 *	 * This is used if private key operations for EAP-TLS are performed	 * using a smartcard.	 */	int engine;	/**	 * engine_id - Engine ID for OpenSSL engine	 *	 * "opensc" to select OpenSC engine or "pkcs11" to select PKCS#11	 * engine.	 *	 * This is used if private key operations for EAP-TLS are performed	 * using a smartcard.	 */	char *engine_id;	/**	 * key_id - Key ID for OpenSSL engine	 *	 * This is used if private key operations for EAP-TLS are performed	 * using a smartcard.	 */	char *key_id;	/**	 * cert_id - Cert ID for OpenSSL engine	 *	 * This is used if the certificate operations for EAP-TLS are performed	 * using a smartcard.	 */	char *cert_id;	/**	 * ca_cert_id - CA Cert ID for OpenSSL engine	 *	 * This is used if the CA certificate for EAP-TLS is on a smartcard.	 */	char *ca_cert_id;	/**	 * key2_id - Key ID for OpenSSL engine (phase2)	 *	 * This is used if private key operations for EAP-TLS are performed	 * using a smartcard.	 */	char *key2_id;	/**	 * cert2_id - Cert ID for OpenSSL engine (phase2)	 *	 * This is used if the certificate operations for EAP-TLS are performed	 * using a smartcard.	 */	char *cert2_id;	/**	 * ca_cert2_id - CA Cert ID for OpenSSL engine (phase2)	 *	 * This is used if the CA certificate for EAP-TLS is on a smartcard.	 */	char *ca_cert2_id;	/**	 * otp - One-time-password	 *	 * This field should not be set in configuration step. It is only used	 * internally when OTP is entered through the control interface.	 */	u8 *otp;	/**	 * otp_len - Length of the otp field	 */	size_t otp_len;	/**	 * pending_req_identity - Whether there is a pending identity request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	int pending_req_identity;	/**	 * pending_req_password - Whether there is a pending password request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	int pending_req_password;	/**	 * pending_req_pin - Whether there is a pending PIN request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	int pending_req_pin;	/**	 * pending_req_new_password - Pending password update request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	int pending_req_new_password;	/**	 * pending_req_passphrase - Pending passphrase request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	int pending_req_passphrase;	/**	 * pending_req_otp - Whether there is a pending OTP request	 *	 * This field should not be set in configuration step. It is only used	 * internally when control interface is used to request needed	 * information.	 */	char *pending_req_otp;	/**	 * pending_req_otp_len - Length of the pending OTP request	 */	size_t pending_req_otp_len;	/**	 * pac_file - File path or blob name for the PAC entries (EAP-FAST)	 *	 * wpa_supplicant will need to be able to create this file and write	 * updates to it when PAC is being provisioned or refreshed. Full path	 * to the file should be used since working directory may change when	 * wpa_supplicant is run in the background.	 * Alternatively, a named configuration blob can be used by setting	 * this to blob://<blob name>.	 */	char *pac_file;	/**	 * mschapv2_retry - MSCHAPv2 retry in progress	 *	 * This field is used internally by EAP-MSCHAPv2 and should not be set	 * as part of configuration.	 */	int mschapv2_retry;	/**	 * new_password - New password for password update	 *	 * This field is used during MSCHAPv2 password update. This is normally	 * requested from the user through the control interface and not set	 * from configuration.	 */	u8 *new_password;	/**	 * new_password_len - Length of new_password field	 */	size_t new_password_len;	/**	 * fragment_size - Maximum EAP fragment size in bytes (default 1398)	 *	 * This value limits the fragment size for EAP methods that support	 * fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set	 * small enough to make the EAP messages fit in MTU of the network	 * interface used for EAPOL. The default value is suitable for most	 * cases.	 */	int fragment_size;#define EAP_CONFIG_FLAGS_PASSWORD_NTHASH BIT(0)	/**	 * flags - Network configuration flags (bitfield)	 *	 * This variable is used for internal flags to describe further details	 * for the network parameters.	 * bit 0 = password is represented as a 16-byte NtPasswordHash value	 *         instead of plaintext password	 */	u32 flags;};/** * struct wpa_config_blob - Named configuration blob * * This data structure is used to provide storage for binary objects to store * abstract information like certificates and private keys inlined with the * configuration data. */struct wpa_config_blob {	/**	 * name - Blob name	 */	char *name;	/**	 * data - Pointer to binary data	 */	u8 *data;	/**	 * len - Length of binary data	 */	size_t len;	/**	 * next - Pointer to next blob in the configuration	 */	struct wpa_config_blob *next;};#endif /* EAP_CONFIG_H */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -