From b90d064f1abef59ad82487fd1ac646fa7e83cb18 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Tue, 9 Dec 2014 23:41:09 +0200 Subject: [PATCH] Add tls_session_reused=<0/1> into EAP peer TLS status This can be used to determine whether the last TLS-based EAP authentication instance re-used a previous session (e.g., TLS session resumption or EAP-FAST session ticket). Signed-off-by: Jouni Malinen --- src/eap_peer/eap_tls_common.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/eap_peer/eap_tls_common.c b/src/eap_peer/eap_tls_common.c index 934ab34b3..3641a2c83 100644 --- a/src/eap_peer/eap_tls_common.c +++ b/src/eap_peer/eap_tls_common.c @@ -794,7 +794,10 @@ int eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, if (tls_get_cipher(data->ssl_ctx, data->conn, name, sizeof(name)) == 0) { ret = os_snprintf(buf + len, buflen - len, - "EAP TLS cipher=%s\n", name); + "EAP TLS cipher=%s\n" + "tls_session_reused=%d\n", + name, tls_connection_resumed(data->ssl_ctx, + data->conn)); if (os_snprintf_error(buflen - len, ret)) return len; len += ret;