Add tls_session_reused=<0/1> into EAP peer TLS status
This can be used to determine whether the last TLS-based EAP authentication instance re-used a previous session (e.g., TLS session resumption or EAP-FAST session ticket). Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
bccbd51a80
commit
b90d064f1a
1 changed files with 4 additions and 1 deletions
|
@ -794,7 +794,10 @@ int eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data,
|
|||
if (tls_get_cipher(data->ssl_ctx, data->conn, name, sizeof(name)) == 0)
|
||||
{
|
||||
ret = os_snprintf(buf + len, buflen - len,
|
||||
"EAP TLS cipher=%s\n", name);
|
||||
"EAP TLS cipher=%s\n"
|
||||
"tls_session_reused=%d\n",
|
||||
name, tls_connection_resumed(data->ssl_ctx,
|
||||
data->conn));
|
||||
if (os_snprintf_error(buflen - len, ret))
|
||||
return len;
|
||||
len += ret;
|
||||
|
|
Loading…
Reference in a new issue