aboutsummaryrefslogtreecommitdiffstats
path: root/src/eap_server/eap_tls_common.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2009-12-20 19:11:43 +0200
committerJouni Malinen <j@w1.fi>2009-12-20 19:11:43 +0200
commit2574634b7f47ab584ce43f62f67a6fef06bd3b6b (patch)
tree624ce901b6a8ba91da08020d935f05c611cca0bc /src/eap_server/eap_tls_common.c
parent074be2332f6226b0dd1897b8bc4387fefd1bf063 (diff)
downloadexternal_wpa_supplicant_8_ti-2574634b7f47ab584ce43f62f67a6fef06bd3b6b.zip
external_wpa_supplicant_8_ti-2574634b7f47ab584ce43f62f67a6fef06bd3b6b.tar.gz
external_wpa_supplicant_8_ti-2574634b7f47ab584ce43f62f67a6fef06bd3b6b.tar.bz2
Check TLS status on EAP server during handshake
The new TLS wrapper use may end up returning alert data and we need to make sure here that it does not end up getting interpreted as success due to non-NULL response.
Diffstat (limited to 'src/eap_server/eap_tls_common.c')
-rw-r--r--src/eap_server/eap_tls_common.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/src/eap_server/eap_tls_common.c b/src/eap_server/eap_tls_common.c
index c4c7806..7a2c76a 100644
--- a/src/eap_server/eap_tls_common.c
+++ b/src/eap_server/eap_tls_common.c
@@ -254,6 +254,12 @@ int eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data)
wpa_printf(MSG_INFO, "SSL: TLS processing failed");
return -1;
}
+ if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) {
+ /* TLS processing has failed - return error */
+ wpa_printf(MSG_DEBUG, "SSL: Failed - out_buf available to "
+ "report error");
+ return -1;
+ }
return 0;
}