}
eaptls_gen_eap_key(tls_session->ssl->session,
- handler->eap_type, request);
+ handler->eap_type, &request->reply->vps);
return 1;
}
void eaptls_gen_mppe_keys(VALUE_PAIR **reply_vps, SSL *s,
const char *prf_label);
void eapttls_gen_challenge(SSL *s, uint8_t *buffer, size_t size);
-void eaptls_gen_eap_key(SSL *s, uint32_t header, REQUEST *request);
+void eaptls_gen_eap_key(SSL *s, uint32_t header, VALUE_PAIR **vps);
#define BUFFER_SIZE 1024
* Actually generates EAP-Session-Id, which is an internal server
* attribute. Not all systems want to send EAP-Key-Nam
*/
-void eaptls_gen_eap_key(SSL *s, uint32_t header, REQUEST *request)
+void eaptls_gen_eap_key(SSL *s, uint32_t header, VALUE_PAIR **vps)
{
VALUE_PAIR *vp;
- vp = radius_paircreate(request, &request->reply->vps,
- PW_EAP_SESSION_ID, PW_TYPE_OCTETS);
+ vp = paircreate(PW_EAP_SESSION_ID, PW_TYPE_OCTETS);
if (!vp) return;
vp->vp_octets[0] = header & 0xff;
memcpy(vp->vp_octets + 1, s->s3->client_random, SSL3_RANDOM_SIZE);
memcpy(vp->vp_octets + 1 + SSL3_RANDOM_SIZE,
s->s3->server_random, SSL3_RANDOM_SIZE);
+ pairadd(vps, vp);
}