Does WPA_supplicant or hostapd support the SESSION-ID derivation
Wed Mar 3 12:37:43 PST 2010
Yup , it is rfc5247
I would say whoever is using/implemented IEEE 802.1X-REV or the macsec
would need this value; don't know who is using it at this point :-)
I saw the Eap-Key-Name attribute in the latest radius dictionary.xxxrfc but
haven't seen any code that would actually generate session id or server id.
On Wed, Mar 3, 2010 at 4:15 PM, Jouni Malinen <j at w1.fi> wrote:
> On Wed, Mar 03, 2010 at 03:21:12PM -0400, Hasan Chowdhury wrote:
> > Any one know does the latest WPA_supplicant or hostapd support
> > derivation as per rfc 5347.
> I would assume you are referring to the Session-Id defined in RFC 5247.
> Neither wpa_supplicant (EAP peer) nor hostapd (EAP server) currently
> support this. I have considered adding an interface for the EAP methods
> to export Peer-Id, Server-Id, and Session-Id, but have not yet done so
> since there has not been any identified users for this information. Do
> you have something that would actually use these values?
> > Also any idea on ,
> > does the freeradius support and implements EAP-Key-Name attribute as
> > rfc 4072 4.1.4. EAP-Key-Name AVP
> That would be a question for a FreeRADIUS mailing list..
> Jouni Malinen PGP id EFC895FA
> HostAP mailing list
> HostAP at lists.shmoo.com
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Hostap