* request vps so that autz's work
* correctly
*/
- radlog(L_INFO, "rlm_eap: Broken NAS did not set User-Name, setting from EAP Identity");
+ DEBUG2("rlm_eap: Broken NAS did not set User-Name, setting from EAP Identity");
vp = pairmake("User-Name", handler->identity, T_OP_EQ);
if (vp == NULL) {
radlog(L_ERR, "rlm_eap: out of memory");
* request vps so that autz's work
* correctly
*/
- radlog(L_INFO, "rlm_eap: WARNING NAS did not set User-Name. Setting it locally from EAP Identity");
+ DEBUG2("rlm_eap: WARNING NAS did not set User-Name. Setting it locally from EAP Identity");
vp = pairmake("User-Name", handler->identity, T_OP_EQ);
if (vp == NULL) {
radlog(L_ERR, "rlm_eap: out of memory");
for (i = 0; i < reply->value_size; i++) {
reply->value[i] = fr_rand();
}
- radlog(L_INFO, "rlm_eap_md5: Issuing Challenge");
+ DEBUG2("rlm_eap_md5: Issuing Challenge");
/*
* Keep track of the challenge.
password = pairfind(handler->request->config_items, PW_CLEARTEXT_PASSWORD);
if (password == NULL) {
- radlog(L_INFO, "rlm_eap_md5: Cleartext-Password is required for EAP-MD5 authentication");
+ DEBUG2("rlm_eap_md5: Cleartext-Password is required for EAP-MD5 authentication");
return 0;
}
dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
BIO_free(bio);
if (!dh) {
- radlog(L_INFO, "WARNING: rlm_eap_tls: Unable to set DH parameters. DH cipher suites may not work!");
+ DEBUG2("WARNING: rlm_eap_tls: Unable to set DH parameters. DH cipher suites may not work!");
DEBUG2("WARNING: Fix this by running the OpenSSL command listed in eap.conf");
return 0;
}
} /* depth == 0 */
if (debug_flag > 0) {
- radlog(L_INFO, "chain-depth=%d, ", depth);
- radlog(L_INFO, "error=%d", err);
-
- radlog(L_INFO, "--> User-Name = %s", handler->identity);
- radlog(L_INFO, "--> BUF-Name = %s", common_name);
- radlog(L_INFO, "--> subject = %s", subject);
- radlog(L_INFO, "--> issuer = %s", issuer);
- radlog(L_INFO, "--> verify return:%d", my_ok);
+ DEBUG2("chain-depth=%d, ", depth);
+ DEBUG2("error=%d", err);
+
+ DEBUG2("--> User-Name = %s", handler->identity);
+ DEBUG2("--> BUF-Name = %s", common_name);
+ DEBUG2("--> subject = %s", subject);
+ DEBUG2("--> issuer = %s", issuer);
+ DEBUG2("--> verify return:%d", my_ok);
}
return my_ok;
}
* openSSL.org
*/
if (type == SSL_FILETYPE_PEM) {
- radlog(L_INFO, "rlm_eap_tls: Loading the certificate file as a chain");
+ DEBUG2("rlm_eap_tls: Loading the certificate file as a chain");
if (!(SSL_CTX_use_certificate_chain_file(ctx, conf->certificate_file))) {
radlog(L_ERR, "rlm_eap: SSL error %s", ERR_error_string(ERR_get_error(), NULL));
radlog(L_ERR, "rlm_eap_tls: Error reading certificate file %s", conf->certificate_file);