we had several hunks left over from merges with upstream that are no longer needed.
Clean up the upstream diff.
+++ /dev/null
-server chbind{
- authorize {
- if (GSS-Acceptor-Service-Name && outer.request:GSS-Acceptor-Service-Name != GSS-Acceptor-Service-Name ) {
- reject
- }
- update reply {
- GSS-Acceptor-Service-NAME == "%{GSS-ACCEPTOR-SERVICE-Name}"
- GSS-ACCEPTOR-Host-Name == "%{GSS-Acceptor-Host-Name}"
- GSS-Acceptor-Realm-Name == "%{GSS-Acceptor-Realm-Name}"
- }
- if (GSS-Acceptor-Service-Name || GSS-Acceptor-Realm-Name || GSS-Acceptor-Host-Name) {
- update control {
- Chbind-Response-Code := success
- }
- }
- handled
- }
-}
-
+++ /dev/null
-# -*- text -*-
-# Copyright (C) 2011 The FreeRADIUS Server project and contributors
-
-# Attributes defined in approved draft-ietf-abfab-gss-eap
-ATTRIBUTE GSS-Acceptor-Service-Name 164 string
-ATTRIBUTE GSS-Acceptor-Host-Name 165 string
-ATTRIBUTE GSS-Acceptor-Service-Specifics 166 string
-ATTRIBUTE GSS-Acceptor-Realm-Name 167 string
VALUE Chbind-Response-Code success 2
VALUE Chbind-Response-Code failure 3
-# For EAP channel binding
-
-ATTRIBUTE Chbind-Response-Code 1147 integer
-
-VALUE Chbind-Response-Code success 2
-VALUE Chbind-Response-Code failure 3
-
ATTRIBUTE Acct-Input-Octets64 1148 integer64
ATTRIBUTE Acct-Output-Octets64 1149 integer64
*/
#include <freeradius-devel/attributes.h>
-#define PW_CHBIND_RESPONSE_CODE 1147
/*
* Integer Translations
*/
return 0;
}
- psk_len = strlen(conf->psk_password);
+ psk_len = strlen(conf->psk_password);
if (psk_len > (2 * max_psk_len)) return 0;
return fr_hex2bin(psk, max_psk_len, conf->psk_password, psk_len);