*/
int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers)
{
-#ifdef EAP_FAST
size_t count;
u16 *suites;
}
return 0;
-#else /* EAP_FAST */
- return -1;
-#endif /* EAP_FAST */
}
static int tlsv1_key_x_anon_dh(struct tlsv1_client *conn, u8 **pos, u8 *end)
{
-#ifdef EAP_FAST
/* ClientDiffieHellmanPublic */
u8 *csecret, *csecret_start, *dh_yc, *shared;
size_t csecret_len, dh_yc_len, shared_len;
os_free(shared);
tlsv1_client_free_dh(conn);
return 0;
-#else /* EAP_FAST */
- tls_alert(conn, TLS_ALERT_LEVEL_FATAL, TLS_ALERT_INTERNAL_ERROR);
- return -1;
-#endif /* EAP_FAST */
}
*/
int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers)
{
-#ifdef EAP_SERVER_FAST
size_t count;
u16 *suites;
}
return 0;
-#else /* EAP_SERVER_FAST */
- return -1;
-#endif /* EAP_SERVER_FAST */
}
static int tls_process_client_key_exchange_dh_anon(
struct tlsv1_server *conn, const u8 *pos, const u8 *end)
{
-#ifdef EAP_SERVER_FAST
const u8 *dh_yc;
u16 dh_yc_len;
u8 *shared;
}
return 0;
-#else /* EAP_SERVER_FAST */
- return -1;
-#endif /* EAP_SERVER_FAST */
}
{
tls_key_exchange keyx;
const struct tls_cipher_suite *suite;
-#ifdef EAP_SERVER_FAST
u8 *pos, *rhdr, *hs_start, *hs_length;
size_t rlen;
u8 *dh_ys;
size_t dh_ys_len;
-#endif /* EAP_SERVER_FAST */
suite = tls_get_cipher_suite(conn->rl.cipher_suite);
if (suite == NULL)
return -1;
}
-#ifdef EAP_SERVER_FAST
if (conn->cred == NULL || conn->cred->dh_p == NULL ||
conn->cred->dh_g == NULL) {
wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available for "
*msgpos = pos;
return 0;
-#else /* EAP_SERVER_FAST */
- return -1;
-#endif /* EAP_SERVER_FAST */
}