Send an "EAP" signal via the new DBus interface under various
conditions during EAP authentication:
- During method selection (ACK and NAK)
- During certificate verification
- While sending and receiving TLS alert messages
- EAP success and failure messages
This provides DBus callers a number of new tools:
- The ability to probe an AP for available EAP methods
(given an identity).
- The ability to identify why the remote certificate was
not verified.
- The ability to identify why the remote peer refused
a TLS connection.
Signed-hostap: Paul Stewart <pstew@chromium.org>
|
||
|---|---|---|
| .. | ||
| .gitignore | ||
| dbus-wpa_supplicant.conf | ||
| dbus_common.c | ||
| dbus_common.h | ||
| dbus_common_i.h | ||
| dbus_dict_helpers.c | ||
| dbus_dict_helpers.h | ||
| dbus_new.c | ||
| dbus_new.h | ||
| dbus_new_handlers.c | ||
| dbus_new_handlers.h | ||
| dbus_new_handlers_p2p.c | ||
| dbus_new_handlers_p2p.h | ||
| dbus_new_handlers_wps.c | ||
| dbus_new_helpers.c | ||
| dbus_new_helpers.h | ||
| dbus_new_introspect.c | ||
| dbus_old.c | ||
| dbus_old.h | ||
| dbus_old_handlers.c | ||
| dbus_old_handlers.h | ||
| dbus_old_handlers_wps.c | ||
| fi.epitest.hostap.WPASupplicant.service.in | ||
| fi.w1.wpa_supplicant1.service.in | ||
| Makefile | ||