Re: [openssl-dev] EAP-FAST and OpenSSL 1.1.x with new client TLS state machine

2015-12-04 Thread Matt Caswell
On 04/12/15 13:08, Jouni Malinen wrote: > On Fri, Dec 04, 2015 at 10:27:48AM +, Matt Caswell wrote: >> EAP-FAST is very strange. Normally you know whether you are resuming a >> session or not based on the session id returned from the server. However >> that's not the case with EAP-FAST - you

Re: [openssl-dev] EAP-FAST and OpenSSL 1.1.x with new client TLS state machine

2015-12-04 Thread Jouni Malinen
On Fri, Dec 04, 2015 at 10:27:48AM +, Matt Caswell wrote: > EAP-FAST is very strange. Normally you know whether you are resuming a > session or not based on the session id returned from the server. However > that's not the case with EAP-FAST - you have to wait to see what message > the server s

Re: [openssl-dev] EAP-FAST and OpenSSL 1.1.x with new client TLS state machine

2015-12-04 Thread Matt Caswell
On 03/12/15 23:09, Jouni Malinen wrote: > Any idea what happened with these OpenSSL client state machine changes > and how to get this fixed to restore EAP-FAST functionality? EAP-FAST is very strange. Normally you know whether you are resuming a session or not based on the session id returned f

[openssl-dev] EAP-FAST and OpenSSL 1.1.x with new client TLS state machine

2015-12-03 Thread Jouni Malinen
It looks like the new client TLS state machine breaks the EAP-FAST peer implementation in wpa_supplicant. Based on git bisect, the first commit where this happens was this one: commit 8723588e1b9a13511ffd7b806c73293120bc1f44 Implement Client TLS state machine This swaps the implementa