Does WPA_supplicant or hostapd support the SESSION-ID derivation

Hasan Chowdhury shemonc
Wed Mar 3 12:37:43 PST 2010

Hi Jouni,
Yup , it is rfc5247

I would say whoever is using/implemented  IEEE 802.1X-REV or the macsec
would need this value; don't know who is using it at this point :-)

I saw the Eap-Key-Name attribute in the latest radius dictionary.xxxrfc but
haven't seen any code that would actually generate session id or server id.


On Wed, Mar 3, 2010 at 4:15 PM, Jouni Malinen <j at> wrote:

> On Wed, Mar 03, 2010 at 03:21:12PM -0400, Hasan Chowdhury wrote:
> > Any one know does the latest WPA_supplicant or hostapd support
> > derivation as per rfc 5347.
> I would assume you are referring to the Session-Id defined in RFC 5247.
> Neither wpa_supplicant (EAP peer) nor hostapd (EAP server) currently
> support this. I have considered adding an interface for the EAP methods
> to export Peer-Id, Server-Id, and Session-Id, but have not yet done so
> since there has not been any identified users for this information. Do
> you have something that would actually use these values?
> > Also  any idea on ,
> > does the freeradius support and implements   EAP-Key-Name attribute as
> per
> > rfc 4072  4.1.4. EAP-Key-Name AVP
> That would be a question for a FreeRADIUS mailing list..
> --
> Jouni Malinen                                            PGP id EFC895FA
> _______________________________________________
> HostAP mailing list
> HostAP at
-------------- next part --------------
An HTML attachment was scrubbed...

More information about the Hostap mailing list