EAP-TLS: Update specification references to RFC 5216 and 9190

The previously used references were pointing to an obsoleted RFC and
draft versions. Replace these with current versions.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
This commit is contained in:
Jouni Malinen 2022-04-05 22:56:13 +03:00 committed by Jouni Malinen
parent 74ae4cf757
commit 63f311b107
5 changed files with 7 additions and 7 deletions

View file

@ -72,7 +72,7 @@ enum eap_type {
EAP_TYPE_MD5 = 4, /* RFC 3748 */
EAP_TYPE_OTP = 5 /* RFC 3748 */,
EAP_TYPE_GTC = 6, /* RFC 3748 */
EAP_TYPE_TLS = 13 /* RFC 2716 */,
EAP_TYPE_TLS = 13 /* RFC 5216 */,
EAP_TYPE_LEAP = 17 /* Cisco proprietary */,
EAP_TYPE_SIM = 18 /* RFC 4186 */,
EAP_TYPE_TTLS = 21 /* RFC 5281 */,

View file

@ -1,5 +1,5 @@
/*
* EAP peer method: EAP-TLS (RFC 2716)
* EAP peer method: EAP-TLS (RFC 5216, RFC 9190)
* Copyright (c) 2004-2008, 2012-2019, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.
@ -302,7 +302,7 @@ static struct wpabuf * eap_tls_process(struct eap_sm *sm, void *priv,
return NULL;
}
/* draft-ietf-emu-eap-tls13-13 Section 2.5 */
/* RFC 9190 Section 2.5 */
if (res == 2 && data->ssl.tls_v13 && wpabuf_len(resp) == 1 &&
*wpabuf_head_u8(resp) == 0) {
wpa_printf(MSG_DEBUG, "EAP-TLS: ACKing Commitment Message");

View file

@ -1473,7 +1473,7 @@ start:
goto start;
}
/* draft-ietf-emu-eap-tls13-13 Section 2.5 */
/* RFC 9190 Section 2.5 */
if (data->ssl.tls_v13 && wpabuf_len(in_decrypted) == 1 &&
*wpabuf_head_u8(in_decrypted) == 0) {
wpa_printf(MSG_DEBUG,

View file

@ -1,5 +1,5 @@
/*
* hostapd / EAP-TLS (RFC 2716)
* hostapd / EAP-TLS (RFC 5216, RFC 9190)
* Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.

View file

@ -367,14 +367,14 @@ int eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data)
sm->cfg->ssl_ctx, data->conn);
/*
* https://tools.ietf.org/html/draft-ietf-emu-eap-tls13#section-2.5
* RFC 9190 Section 2.5
*
* We need to signal the other end that TLS negotiation is done. We
* can't send a zero-length application data message, so we send
* application data which is one byte of zero.
*
* Note this is only done for when there is no application data to be
* sent. So this is done always for EAP-TLS but notibly not for PEAP
* sent. So this is done always for EAP-TLS but notably not for PEAP
* even on resumption.
*/
if (data->tls_v13 &&