|
@@ -247,12 +247,10 @@ static int tls_write_server_key_exchange(struct tlsv1_server *conn,
|
|
|
{
|
|
|
tls_key_exchange keyx;
|
|
|
const struct tls_cipher_suite *suite;
|
|
|
-#ifdef EAP_SERVER_FAST
|
|
|
u8 *pos, *rhdr, *hs_start, *hs_length;
|
|
|
size_t rlen;
|
|
|
u8 *dh_ys;
|
|
|
size_t dh_ys_len;
|
|
|
-#endif /* EAP_SERVER_FAST */
|
|
|
|
|
|
suite = tls_get_cipher_suite(conn->rl.cipher_suite);
|
|
|
if (suite == NULL)
|
|
@@ -272,7 +270,6 @@ static int tls_write_server_key_exchange(struct tlsv1_server *conn,
|
|
|
return -1;
|
|
|
}
|
|
|
|
|
|
-#ifdef EAP_SERVER_FAST
|
|
|
if (conn->cred == NULL || conn->cred->dh_p == NULL ||
|
|
|
conn->cred->dh_g == NULL) {
|
|
|
wpa_printf(MSG_DEBUG, "TLSv1: No DH parameters available for "
|
|
@@ -433,9 +430,6 @@ static int tls_write_server_key_exchange(struct tlsv1_server *conn,
|
|
|
*msgpos = pos;
|
|
|
|
|
|
return 0;
|
|
|
-#else /* EAP_SERVER_FAST */
|
|
|
- return -1;
|
|
|
-#endif /* EAP_SERVER_FAST */
|
|
|
}
|
|
|
|
|
|
|