ctx['sslctx'].set_cipher_list("ADH-AES128-SHA")
ctx['conn'] = OpenSSL.SSL.Connection(ctx['sslctx'], None)
ctx['conn'].set_accept_state()
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
ctx['conn'].bio_write(payload)
try:
ctx['conn'].do_handshake()
except OpenSSL.SSL.WantReadError:
pass
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
data = ctx['conn'].bio_read(4096)
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
return struct.pack(">BBHBB", EAP_CODE_REQUEST, ctx['id'],
4 + 1 + 1 + len(data),
EAP_TYPE_FAST, 0x01) + data
def process_clientkeyexchange(ctx, payload, appl_data):
logger.info("Process ClientKeyExchange")
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
ctx['conn'].bio_write(payload)
try:
ctx['conn'].do_handshake()
except OpenSSL.SSL.WantReadError:
pass
ctx['conn'].send(appl_data)
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
data = ctx['conn'].bio_read(4096)
- logger.info("State: " + ctx['conn'].state_string())
+ state = ctx['conn'].state_string()
+ if state:
+ logger.info("State: " + state)
return struct.pack(">BBHBB", EAP_CODE_REQUEST, ctx['id'],
4 + 1 + 1 + len(data),
EAP_TYPE_FAST, 0x01) + data