*
*/
+#include <freeradius-devel/autoconf.h>
+#include <assert.h>
#include "eap_tls.h"
/*
* MUST have TLS type octet, followed by flags, followed
* by data.
*/
- rad_assert(eap_ds->response->length > 2);
+ assert(eap_ds->response->length > 2);
tlspacket = eaptls_alloc();
if (tlspacket == NULL) return NULL;
#include <freeradius-devel/radiusd.h>
#include <freeradius-devel/modules.h>
-#include <freeradius-devel/rad_assert.h>
-
#define PW_EAP_REQUEST 1
#define PW_EAP_RESPONSE 2
#define PW_EAP_SUCCESS 3
#include "eap_sim.h"
#include <freeradius-devel/sha1.h>
-#include <freeradius-devel/rad_assert.h>
-
void eapsim_calculate_keys(struct eapsim_keys *ek)
{
SHA1_CTX context;
#include <inttypes.h>
#endif
-#include <freeradius-devel/rad_assert.h>
-
#include <freeradius-devel/sha1.h>
/*