EAP TLS - Hostapd

Michael Richardson mcr at sandelman.ca
Wed Apr 10 05:11:25 PDT 2024

Satya Prakash Prasad <satyaprakash.developer.unix at gmail.com> wrote:
    > After the EAP success case, how peer / server side will read / write
    > data - which APIs code implements the same - also how do we verify that
    > EAP authentication was successful before each write / data?

After the handshake, session keys are derived from the EAP session using the
MSK, and installed into the supplicant (and authenticator) kernel.

But, perhaps I mis-undertand your question, are you trying to send more
traffic within the EAP-TLS connection?

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 511 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/hostap/attachments/20240410/39bdf583/attachment.sig>

More information about the Hostap mailing list