ATTRIBUTE OTP-Challenge 1145 string
ATTRIBUTE EAP-Session-Id 1146 octets
+
+# For EAP channel binding
+
+ATTRIBUTE Chbind-Response-Code 1147 integer
+
+VALUE Chbind-Response-Code success 2
+VALUE Chbind-Response-Code failure 3
+
+ ATTRIBUTE Acct-Input-Octets64 1148 integer64
+ ATTRIBUTE Acct-Output-Octets64 1149 integer64
+
#
# Range: 1200-1279
# EAP-SIM (and other EAP type) weirdness.
ATTRIBUTE TLS-Client-Cert-Filename 1925 string
ATTRIBUTE TLS-Client-Cert-Subject-Alt-Name-Email 1926 string
ATTRIBUTE TLS-Client-Cert-X509v3-Extended-Key-Usage 1927 string
- ATTRIBUTE TLS-Client-Cert-X509v3-Subject-Key-Identifier 1928 string
- ATTRIBUTE TLS-Client-Cert-X509v3-Authority-Key-Identifier 1929 string
- ATTRIBUTE TLS-Client-Cert-X509v3-Basic-Constraints 1930 string
+ ATTRIBUTE TLS-Client-Cert-X509v3-Subject-Key-Identifier 1928 string
+ ATTRIBUTE TLS-Client-Cert-X509v3-Authority-Key-Identifier 1929 string
+ ATTRIBUTE TLS-Client-Cert-X509v3-Basic-Constraints 1930 string
+ATTRIBUTE TLS-PSK-Identity 1931 string
-# 1931 - 1939: reserved for future cert attributes
+# 1932 - 1939: reserved for future cert attributes
#
# Range: 1940-2099
# $Id$
#
- VENDOR UKERNA 25622
+ VENDOR UKERNA 25622
- BEGIN-VENDOR UKERNA
+ BEGIN-VENDOR UKERNA
-ATTRIBUTE SAML-AAA-Assertion 132 string
+ATTRIBUTE UKERNA-GSS-Acceptor-Service-Name 128 string
+ATTRIBUTE UKERNA-GSS-Acceptor-Host-Name 129 string
+ATTRIBUTE UKERNA-GSS-Acceptor-Service-Specific 130 string
+ATTRIBUTE Ukerna-GSS-Acceptor-Realm-Name 131 string
+ATTRIBUTE SAML-AAA-Assertion 132 string
+ATTRIBUTE EAP-Channel-Binding-Message 135 octets
END-VENDOR UKERNA
return 0;
}
- psk_len = strlen(conf->psk_password);
+ psk_len = strlen(conf->psk_password);
if (psk_len > (2 * max_psk_len)) return 0;
- return fr_hex2bin(conf->psk_password, psk, psk_len);
+ return fr_hex2bin(psk, conf->psk_password, psk_len);
}
static unsigned int psk_client_callback(SSL *ssl, UNUSED char const *hint,
TARGET := libfreeradius-eap.a
- SOURCES := eapcommon.c eapcrypto.c eap_chbind.c eapsimlib.c fips186prf.c
-SOURCES := eapcommon.c eapcrypto.c eapsimlib.c fips186prf.c comp128.c
++SOURCES := eapcommon.c eapcrypto.c eap_chbind.c eapsimlib.c fips186prf.c comp128.c
ifneq (${OPENSSL_LIBS},)
SOURCES += eap_tls.c mppe_keys.c
endif
REQUEST *fake;
VALUE_PAIR *vp;
ttls_tunnel_t *t;
- const uint8_t *data;
+ uint8_t const *data;
size_t data_len;
REQUEST *request = handler->request;
+ eap_chbind_packet_t *chbind_packet;
+ size_t chbind_len;
rad_assert(request != NULL);
typedef struct realm_config_t {
int format;
- char *formatstring;
- char *delim;
+ char *formatstring;
+ char *delim;
- int ignore_default;
- int ignore_null;
+ bool ignore_default;
+ bool ignore_null;
+ char *default_community;
+ char *rp_realm;
+ char *trust_router;
} realm_config_t;
static CONF_PARSER module_config[] = {