EAP TLS - Hostapd

Satya Prakash Prasad satyaprakash.developer.unix at gmail.com
Wed Apr 10 09:11:18 PDT 2024


Hi,

Many thanks for the information as provided. Yes we are trying data
in-between server and peer after the secure connection is
established..

In the same reference, what are the EAP Peer APIs used for sending and
reading data in between EAP peer <-> Server after a successful secured
connection and how do they verify an active connection (other end is
available)? How do we know the connection is over / closed at peer
side? How is data extracted from EAP TLS secure connection messages?

Thanks in advance.

Regards,
Prakash

On Wed, Apr 10, 2024 at 5:41 PM Michael Richardson <mcr at sandelman.ca> wrote:
>
>
> Satya Prakash Prasad <satyaprakash.developer.unix at gmail.com> wrote:
>     > After the EAP success case, how peer / server side will read / write
>     > data - which APIs code implements the same - also how do we verify that
>     > EAP authentication was successful before each write / data?
>
> After the handshake, session keys are derived from the EAP session using the
> MSK, and installed into the supplicant (and authenticator) kernel.
>
> But, perhaps I mis-undertand your question, are you trying to send more
> traffic within the EAP-TLS connection?
>
>



More information about the Hostap mailing list