*/
static int vp2eap(REQUEST *request, tls_session_t *tls_session, VALUE_PAIR *vp)
{
+ rad_assert(vp != NULL);
+
/*
* Skip the id, code, and length. Just write the EAP
* type & data to the client.
tls_session_t *tls_session = (tls_session_t *) data;
REQUEST *fake, *request = handler->request;
+ rad_assert(request != NULL);
RDEBUG2("Passing reply from proxy back into the tunnel.");
/*
*/
fake->options &= ~RAD_REQUEST_OPTION_PROXY_EAP;
RDEBUG2("Passing reply back for EAP-MS-CHAP-V2");
- rcode = module_post_proxy(0, fake);
+ module_post_proxy(0, fake);
/*
* FIXME: If rcode returns fail, do something
REQUEST *request = handler->request;
EAP_DS *eap_ds = handler->eap_ds;
+ rad_assert(request != NULL);
+
/*
* Just look at the buffer directly, without doing
* record_minus. This lets us avoid another data copy.