From 59d343858d881d80d604e5f251b46cfc4b3b8759 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 24 Nov 2013 18:08:45 +0200 Subject: [PATCH] EAP server: Initialize TLS context based on private_key It is possible for the authentication server to be configured with a PKCS #12 file that includes a private key, a server certificate, and a CA certificate. This combination could result in server_cert and ca_cert parameters not being present and that should still result in TLS context getting initialized. Signed-hostap: Jouni Malinen --- src/ap/authsrv.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/ap/authsrv.c b/src/ap/authsrv.c index 68ad4dc50..8bb58a6f6 100644 --- a/src/ap/authsrv.c +++ b/src/ap/authsrv.c @@ -133,7 +133,7 @@ int authsrv_init(struct hostapd_data *hapd) #ifdef EAP_TLS_FUNCS if (hapd->conf->eap_server && (hapd->conf->ca_cert || hapd->conf->server_cert || - hapd->conf->dh_file)) { + hapd->conf->private_key || hapd->conf->dh_file)) { struct tls_connection_params params; hapd->ssl_ctx = tls_init(NULL);