EAP peer: Clean up TLS Session-Id derivation function
The comment about library not supporting Session-Id derivation was not accurate and there is no need to check for master key that is not used as part of derivation. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
6ef319f4ea
commit
d68f74c5ff
1 changed files with 2 additions and 7 deletions
|
@ -379,15 +379,10 @@ u8 * eap_peer_tls_derive_session_id(struct eap_sm *sm,
|
||||||
struct tls_keys keys;
|
struct tls_keys keys;
|
||||||
u8 *out;
|
u8 *out;
|
||||||
|
|
||||||
/*
|
|
||||||
* TLS library did not support session ID generation,
|
|
||||||
* so get the needed TLS session parameters
|
|
||||||
*/
|
|
||||||
if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys))
|
if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys))
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
if (keys.client_random == NULL || keys.server_random == NULL ||
|
if (keys.client_random == NULL || keys.server_random == NULL)
|
||||||
keys.master_key == NULL)
|
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
*len = 1 + keys.client_random_len + keys.server_random_len;
|
*len = 1 + keys.client_random_len + keys.server_random_len;
|
||||||
|
|
Loading…
Reference in a new issue