Check TLS status on EAP server during handshake
The new TLS wrapper use may end up returning alert data and we need to make sure here that it does not end up getting interpreted as success due to non-NULL response.
This commit is contained in:
parent
074be2332f
commit
2574634b7f
1 changed files with 6 additions and 0 deletions
|
@ -254,6 +254,12 @@ int eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data)
|
||||||
wpa_printf(MSG_INFO, "SSL: TLS processing failed");
|
wpa_printf(MSG_INFO, "SSL: TLS processing failed");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) {
|
||||||
|
/* TLS processing has failed - return error */
|
||||||
|
wpa_printf(MSG_DEBUG, "SSL: Failed - out_buf available to "
|
||||||
|
"report error");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue