mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-02-22 11:53:06 -05:00
PAE: Remove OpenSSL header dependency
Instead of requiring OpenSSL headers to be available just for the SSL3_RANDOM_SIZE definition, replace that macro with a fixed length (32) to simplify dependencies. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
04b1bcc5f3
commit
9596a75652
@ -5,7 +5,7 @@
|
|||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
* See README for more details.
|
* See README for more details.
|
||||||
*/
|
*/
|
||||||
#include <openssl/ssl.h>
|
|
||||||
#include "utils/includes.h"
|
#include "utils/includes.h"
|
||||||
|
|
||||||
#include "utils/common.h"
|
#include "utils/common.h"
|
||||||
@ -268,7 +268,7 @@ static int ieee802_1x_auth_get_session_id(struct wpa_supplicant *wpa_s,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
need_len = 1 + 2 * SSL3_RANDOM_SIZE;
|
need_len = 1 + 2 * 32 /* random size */;
|
||||||
if (need_len > id_len) {
|
if (need_len > id_len) {
|
||||||
wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
|
wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
|
||||||
return -1;
|
return -1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user