"Flags 0x%02x", (unsigned long) wpabuf_len(respData),
flags);
- if (eap_fast_process_version(data, flags & EAP_PEAP_VERSION_MASK))
+ if (eap_fast_process_version(data, flags & EAP_TLS_VERSION_MASK))
return;
ret = eap_server_tls_reassemble(&data->ssl, flags, &pos, &left);
wpa_printf(MSG_DEBUG, "EAP-PEAP: Received packet(len=%lu) - "
"Flags 0x%02x", (unsigned long) wpabuf_len(respData),
flags);
- data->recv_version = peer_version = flags & EAP_PEAP_VERSION_MASK;
+ data->recv_version = peer_version = flags & EAP_TLS_VERSION_MASK;
if (data->force_version >= 0 && peer_version != data->force_version) {
wpa_printf(MSG_INFO, "EAP-PEAP: peer did not select the forced"
" version (forced=%d peer=%d) - reject",
struct wpabuf * eap_server_tls_build_msg(struct eap_ssl_data *data,
- int eap_type, int peap_version, u8 id)
+ int eap_type, int version, u8 id)
{
struct wpabuf *req;
u8 flags;
wpa_printf(MSG_DEBUG, "SSL: Generating Request");
- flags = peap_version;
+ flags = version;
send_len = wpabuf_len(data->out_buf) - data->out_used;
if (1 + send_len > data->tls_out_limit) {
send_len = data->tls_out_limit - 1;
}
-struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int peap_version)
+struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version)
{
struct wpabuf *req;
if (req == NULL)
return NULL;
wpa_printf(MSG_DEBUG, "SSL: Building ACK");
- wpabuf_put_u8(req, peap_version); /* Flags */
+ wpabuf_put_u8(req, version); /* Flags */
return req;
}
#define EAP_TLS_FLAGS_LENGTH_INCLUDED 0x80
#define EAP_TLS_FLAGS_MORE_FRAGMENTS 0x40
#define EAP_TLS_FLAGS_START 0x20
-#define EAP_PEAP_VERSION_MASK 0x07
+#define EAP_TLS_VERSION_MASK 0x07
/* could be up to 128 bytes, but only the first 64 bytes are used */
#define EAP_TLS_KEY_LEN 64
u8 * eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data,
char *label, size_t len);
struct wpabuf * eap_server_tls_build_msg(struct eap_ssl_data *data,
- int eap_type, int peap_version,
- u8 id);
-struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type,
- int peap_version);
+ int eap_type, int version, u8 id);
+struct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
int eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data);
int eap_server_tls_reassemble(struct eap_ssl_data *data, u8 flags,
const u8 **pos, size_t *left);
"Flags 0x%02x", (unsigned long) wpabuf_len(respData),
flags);
- eap_ttls_process_version(sm, data, flags & EAP_PEAP_VERSION_MASK);
+ eap_ttls_process_version(sm, data, flags & EAP_TLS_VERSION_MASK);
ret = eap_server_tls_reassemble(&data->ssl, flags, &pos, &left);
if (ret < 0) {