return false;
/* We assume libradsec validated this for us */
- assert(pairfind(m_vps, PW_MESSAGE_AUTHENTICATOR) != NULL);
+ GSSEAP_ASSERT(pairfind(m_vps, PW_MESSAGE_AUTHENTICATOR) != NULL);
m_authenticated = true;
}
}
bool bInternalAttribute = false;
/* should have been filtered */
- assert(!isSecretAttributeP(attrid, vendor));
+ GSSEAP_ASSERT(!isSecretAttributeP(attrid, vendor));
switch (vendor) {
case VENDORPEC_UKERNA:
duplicateBuffer(valueBuf, value);
}
- if (display_value != GSS_C_NO_BUFFER) {
+ if (display_value != GSS_C_NO_BUFFER &&
+ vp->type != PW_TYPE_OCTETS) {
char displayString[MAX_STRING_LEN];
gss_buffer_desc displayBuf;
bool
gss_eap_radius_attr_provider::init(void)
{
- struct rs_context *radContext;
-
gss_eap_attr_ctx::registerProvider(ATTR_TYPE_RADIUS, createAttrContext);
-#if 1
+#ifdef GSSEAP_ENABLE_REAUTH
+ struct rs_context *radContext;
+
/*
* This hack is necessary in order to force the loading of the global
* dictionary, otherwise accepting reauthentication tokens fails unless
{
JSONObject obj;
- assert(vp->length <= MAX_STRING_LEN);
+ GSSEAP_ASSERT(vp->length <= MAX_STRING_LEN);
switch (vp->type) {
case PW_TYPE_INTEGER:
{
int code;
- assert(err != NULL);
+ GSSEAP_ASSERT(err != NULL);
code = rs_err_code(err, 0);