>Michael Griego <[EMAIL PROTECTED]> wrote: >> Question: >> Looking through the code, the fragment member of tls_session_t is a flag >> that is either set to 0 or 1 in various places (depending on whether or >> not there are more fragments to send). In this case, won't the above >> always match? (ie tls_session->fragment will always be 0 or greater >> than 0: 1) > > Good point. We can then delete that check. > > I'm prepared to add the patch, I just haven't had the time to check >if it breaks EAP-TLS, EAP-TTLS, or PEAP. If you have time to check >those, then go ahead and commit the change. > > Alan DeKok.
So will it be: case handshake: if (tls_session->info.handshake_type == finished) { DEBUG2(" rlm_eap_tls: ack handshake is finished"); return EAPTLS_SUCCESS; } DEBUG2(" rlm_eap_tls: ack handshake fragment handler"); /* Fragmentation handler, send next fragment */ return EAPTLS_REQUEST; default: DEBUG2(" rlm_eap_tls: ack default"); radlog(L_ERR, "rlm_eap_tls: Invalid ACK received: %d", tls_session->info.content_type); return EAPTLS_FAIL; or will it be: case handshake: if (tls_session->info.handshake_type == finished) { DEBUG2(" rlm_eap_tls: ack handshake is finished"); return EAPTLS_SUCCESS; } default: DEBUG2(" rlm_eap_tls: ack default"); radlog(L_ERR, "rlm_eap_tls: Invalid ACK received: %d", tls_session->info.content_type); return EAPTLS_FAIL; } Joey _____________________________________________________________ GRATIS LEUK EMAILADRES! http://www.apennootje.nl - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html