X-Git-Url: https://git.ozlabs.org/?a=blobdiff_plain;f=pppd%2Feap-tls.h;h=2777d81f5c9b399fc02536bbf2de11e60552a079;hb=607d8eadccfd62c1fa84a36bd1440bd48b4e55ca;hp=d0c80b6030ff240b82c1467b73795d2a5975393a;hpb=ab4d4992050ec171e1c72d661a3457efc8e7c141;p=ppp.git diff --git a/pppd/eap-tls.h b/pppd/eap-tls.h index d0c80b6..2777d81 100644 --- a/pppd/eap-tls.h +++ b/pppd/eap-tls.h @@ -30,11 +30,10 @@ * */ -#include "pppdconf.h" - -#ifndef __EAP_TLS_H__ -#define __EAP_TLS_H__ +#ifndef PPP_EAP_TLS_H +#define PPP_EAP_TLS_H +#include "pppdconf.h" #include "eap.h" #include @@ -46,6 +45,8 @@ #define EAP_TLS_MAX_LEN 65536 /* max eap tls packet size */ +struct tls_info; + struct eaptls_session { u_char *data; /* buffered data */ @@ -58,7 +59,6 @@ struct eaptls_session SSL *ssl; /* ssl connection */ BIO *from_ssl; BIO *into_ssl; - char peer[MAXWORDLEN]; /* peer name */ char peercertfile[MAXWORDLEN]; bool alert_sent; u_char alert_sent_desc; @@ -67,12 +67,12 @@ struct eaptls_session char rtx[EAP_TLS_MAX_LEN]; /* retransmission buffer */ int rtx_len; int mtu; /* unit mtu */ - bool client; + struct tls_info *info; }; SSL_CTX *eaptls_init_ssl(int init_server, char *cacertfile, char *capath, - char *certfile, char *peer_certfile, char *privkeyfile, char *pkcs12); + char *certfile, char *privkeyfile, char *pkcs12); int eaptls_init_ssl_server(eap_state * esp); int eaptls_init_ssl_client(eap_state * esp); void eaptls_free_session(struct eaptls_session *ets); @@ -87,7 +87,7 @@ int get_eaptls_secret(int unit, char *client, char *server, char *clicertfile, char *servcertfile, char *cacertfile, char *capath, char *pkfile, char *pkcs12, int am_server); -#ifdef MPPE +#ifdef PPP_WITH_MPPE void eaptls_gen_mppe_keys(struct eaptls_session *ets, int client); #endif