PAE: Remove OpenSSL header dependency
Instead of requiring OpenSSL headers to be available just for the SSL3_RANDOM_SIZE definition, replace that macro with a fixed length (32) to simplify dependencies. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
04b1bcc5f3
commit
9596a75652
1 changed files with 2 additions and 2 deletions
|
@ -5,7 +5,7 @@
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
* See README for more details.
|
* See README for more details.
|
||||||
*/
|
*/
|
||||||
#include <openssl/ssl.h>
|
|
||||||
#include "utils/includes.h"
|
#include "utils/includes.h"
|
||||||
|
|
||||||
#include "utils/common.h"
|
#include "utils/common.h"
|
||||||
|
@ -268,7 +268,7 @@ static int ieee802_1x_auth_get_session_id(struct wpa_supplicant *wpa_s,
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
need_len = 1 + 2 * SSL3_RANDOM_SIZE;
|
need_len = 1 + 2 * 32 /* random size */;
|
||||||
if (need_len > id_len) {
|
if (need_len > id_len) {
|
||||||
wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
|
wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
|
||||||
return -1;
|
return -1;
|
||||||
|
|
Loading…
Reference in a new issue