From: Jouni Malinen Date: Sat, 29 Nov 2014 22:22:10 +0000 (+0200) Subject: EAP peer: Clean up TLS Session-Id derivation function X-Git-Tag: hostap_2_4~961 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d68f74c5ff681f8d3b0d7d0338857dec81ced106;p=thirdparty%2Fhostap.git EAP peer: Clean up TLS Session-Id derivation function The comment about library not supporting Session-Id derivation was not accurate and there is no need to check for master key that is not used as part of derivation. Signed-off-by: Jouni Malinen --- diff --git a/src/eap_peer/eap_tls_common.c b/src/eap_peer/eap_tls_common.c index 06fb10ee6..124177ba3 100644 --- a/src/eap_peer/eap_tls_common.c +++ b/src/eap_peer/eap_tls_common.c @@ -379,15 +379,10 @@ u8 * eap_peer_tls_derive_session_id(struct eap_sm *sm, struct tls_keys keys; u8 *out; - /* - * TLS library did not support session ID generation, - * so get the needed TLS session parameters - */ if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) return NULL; - if (keys.client_random == NULL || keys.server_random == NULL || - keys.master_key == NULL) + if (keys.client_random == NULL || keys.server_random == NULL) return NULL; *len = 1 + keys.client_random_len + keys.server_random_len; @@ -399,7 +394,7 @@ u8 * eap_peer_tls_derive_session_id(struct eap_sm *sm, out[0] = eap_type; os_memcpy(out + 1, keys.client_random, keys.client_random_len); os_memcpy(out + 1 + keys.client_random_len, keys.server_random, - keys.server_random_len); + keys.server_random_len); return out; }