public void init() throws RadiusException { super.init(); tunnelAuth = new EAPMSCHAPv2Authenticator(true); }
public void setupRequest(RadiusClient c, RadiusPacket p) throws RadiusException, NoSuchAlgorithmException { super.setupRequest(c, p); init(); }
protected boolean doTunnelAuthentication(byte id, byte[] in) throws RadiusException, SSLException, NoSuchAlgorithmException { byte []out; if (in != null && in.length > 0) { out = tunnelAuth.doEAP(in); } else { out = tunnelAuth.eapResponse(EAP_IDENTITY, (byte)0, getUsername()); } putAppBuffer(out); return true; } }
public void init() throws RadiusException { super.init(); tunnelAuth = RadiusClient.getAuthProtocol(getInnerProtocol()); if (tunnelAuth == null || tunnelAuth instanceof MSCHAPv2Authenticator || tunnelAuth instanceof MSCHAPv1Authenticator || tunnelAuth instanceof CHAPAuthenticator) { throw new RadiusException("You can not currently use " + tunnelAuth.getAuthName() +" within a TLS Tunnel because of limitations in Java 1.5."); } }
/** * Negotiates the EAP Authentication Protocol to use * @param id The EAP ID * @param eapType The wanted EAP Protocol Type * @return Returns the EAP-Message */ protected byte[] negotiateEAPType(byte id, byte eapType) { return eapResponse(EAP_NAK, id, new byte[] { eapType }); }
public EAPTLSAuthenticator() { setEAPType(EAP_TLS); keyFileType = "pkcs12"; keyPassword = ""; caFileType = "pkcs12"; caPassword = ""; }
public EAPTTLSAuthenticator() { setEAPType(EAP_TTLS); }
public EAPMSCHAPv2Authenticator(boolean peap) { setEAPType(EAP_MSCHAPV2); this.peap = peap; }
protected boolean doTunnelAuthentication(byte id, byte[] in) throws RadiusException, SSLException, NoSuchAlgorithmException { byte []out; if (in != null && in.length > 0) { out = tunnelAuth.doEAP(in); } else { out = tunnelAuth.eapResponse(EAP_IDENTITY, (byte)0, getUsername()); } putAppBuffer(out); return true; } }
public void init() throws RadiusException { super.init(); tunnelAuth = RadiusClient.getAuthProtocol(getInnerProtocol()); if (tunnelAuth == null || tunnelAuth instanceof MSCHAPv2Authenticator || tunnelAuth instanceof MSCHAPv1Authenticator || tunnelAuth instanceof CHAPAuthenticator) { throw new RadiusException("You can not currently use " + tunnelAuth.getAuthName() +" within a TLS Tunnel because of limitations in Java 1.5."); } }
public void init() throws RadiusException { super.init(); tunnelAuth = new EAPMSCHAPv2Authenticator(true); }
public void setupRequest(RadiusClient c, RadiusPacket p) throws RadiusException, NoSuchAlgorithmException { super.setupRequest(c, p); init(); }
public byte[] tlvSuccess(byte id) { byte[] b = new byte[6]; b[0] = (byte)0x80; b[1] = (byte)0x03; b[2] = (byte)0x00; b[3] = (byte)0x02; b[4] = (byte)0x00; b[5] = (byte)0x01; return eapResponse(EAP_TLV, id, b); }
public EAPTLSAuthenticator() { setEAPType(EAP_TLS); keyFileType = "pkcs12"; keyPassword = ""; caFileType = "pkcs12"; caPassword = ""; }
public EAPMSCHAPv2Authenticator(boolean peap) { setEAPType(EAP_MSCHAPV2); this.peap = peap; }
public void init() throws RadiusException { super.init(); tunnelAuth = new EAPMSCHAPv2Authenticator(true); }
public void setupRequest(RadiusClient c, RadiusPacket p) throws RadiusException, NoSuchAlgorithmException { super.setupRequest(c, p); init(); }
/** * Negotiates the EAP Authentication Protocol to use * @param id The EAP ID * @param eapType The wanted EAP Protocol Type * @return Returns the EAP-Message */ protected byte[] negotiateEAPType(byte id, byte eapType) { return eapResponse(EAP_NAK, id, new byte[] { eapType }); }
public EAPTLSAuthenticator() { setEAPType(EAP_TLS); keyFileType = "pkcs12"; keyPassword = ""; caFileType = "pkcs12"; caPassword = ""; }
public byte[] tlvSuccess(byte id) { byte[] b = new byte[6]; b[0] = (byte)0x80; b[1] = (byte)0x03; b[2] = (byte)0x00; b[3] = (byte)0x02; b[4] = (byte)0x00; b[5] = (byte)0x01; return eapResponse(EAP_TLV, id, b); }