-- SAML
-- encoders
-- OID encoders
-- gss_internal_release_oid
+- hook up SAML library
+- hook up RADIUS
+- export/import sec context
+- export/import composite (with attrs) name
int code;
struct wpabuf respData;
static struct eapol_callbacks cb = { serverGetEapUser, serverGetEapReqIdText };
-
if (ctx->acceptorCtx.eap == NULL) {
struct eap_config eapConfig;
if (GSS_ERROR(major))
goto cleanup;
- resp = eap_sm_buildIdentity(ctx->initiatorCtx.eap, 0, 1);
+ /* Use this to emit an empty token*/
+ wpabuf_set(&ctx->initiatorCtx.reqData, "", 0);
+ resp = &ctx->initiatorCtx.reqData;
major = GSS_S_CONTINUE_NEEDED;
goto cleanup;
} else {
&innerOutputToken);
if (GSS_ERROR(major))
goto cleanup;
- } while (major == GSS_S_CONTINUE_NEEDED && innerOutputToken.length == 0);
+ } while (major == GSS_S_CONTINUE_NEEDED && innerOutputToken.value == NULL);
if (actual_mech_type != NULL) {
if (!gssEapInternalizeOid(ctx->mechanismUsed, actual_mech_type))
duplicateOid(&tmpMinor, ctx->mechanismUsed, actual_mech_type);
}
- if (innerOutputToken.length != 0) {
+ if (innerOutputToken.value != NULL) {
tmpMajor = gssEapMakeToken(&tmpMinor, ctx, &innerOutputToken,
sm->outputTokenType, output_token);
if (GSS_ERROR(tmpMajor)) {
}
OM_uint32
+samlImportAssertion(OM_uint32 *minor,
+ gss_buffer_t buffer,
+ struct eap_gss_saml_assertion *pAssertion)
+{
+ GSSEAP_NOT_IMPLEMENTED;
+}
+
+OM_uint32
samlExportAssertion(OM_uint32 *minor,
struct eap_gss_saml_assertion *assertion,
gss_buffer_t buffer)
struct eap_gss_saml_assertion **out);
OM_uint32
+samlImportAssertion(OM_uint32 *minor,
+ gss_buffer_t buffer,
+ struct eap_gss_saml_assertion *pAssertion);
+
+OM_uint32
samlExportAssertion(OM_uint32 *minor,
struct eap_gss_saml_assertion *assertion,
gss_buffer_t buffer);