# MacSEC requires the use of EAP-Key-Name. However, we don't
# want to send it for all EAP sessions. Therefore, the EAP
# modules put required data into the EAP-Session-Id attribute.
- # This attribute is never put into a packet.
+ # This attribute is never put into a request or reply packet.
#
# Uncomment the next few lines to copy the required data into
# the EAP-Key-Name attribute
-# update reply {
-# EAP-Key-Name := "%{reply:EAP-Session-Id}"
+# if (reply:EAP-Session-Id) {
+# update reply {
+# EAP-Key-Name := "%{reply:EAP-Session-Id}"
+# }
# }
# If the WiMAX module did it's work, you may want to do more
RDEBUG("WARNING: Not adding MPPE keys because there is no PRF label");
}
- eaptls_gen_eap_key(tls_session->ssl->session,
- handler->eap_type, &request->reply->vps);
+ eaptls_gen_eap_key(tls_session->ssl,
+ handler->eap_type, &handler->request->reply->vps);
return 1;
}
size_t prf_size;
if (!s->s3) {
- radlog(L_ERR, "ERROR: OpenSSL build / link incompatibility detected");
+ DEBUG("ERROR: No SSLv3 information");
return;
}
uint8_t *p = seed;
if (!s->s3) {
- radlog(L_ERR, "ERROR: OpenSSL build / link incompatibility detected");
+ DEBUG("ERROR: No SSLv3 information");
return;
}
{
VALUE_PAIR *vp;
+ if (!s->s3) {
+ DEBUG("ERROR: No SSLv3 information");
+ return;
+ }
+
vp = paircreate(PW_EAP_SESSION_ID, PW_TYPE_OCTETS);
if (!vp) return;
memcpy(vp->vp_octets + 1, s->s3->client_random, SSL3_RANDOM_SIZE);
memcpy(vp->vp_octets + 1 + SSL3_RANDOM_SIZE,
s->s3->server_random, SSL3_RANDOM_SIZE);
+ vp->length = 1 + 2 * SSL3_RANDOM_SIZE;
pairadd(vps, vp);
}