path: root/wpa_supplicant/config.c
diff options
authorJouni Malinen <j@w1.fi>2015-01-14 10:14:31 (GMT)
committerJouni Malinen <j@w1.fi>2015-01-14 10:24:52 (GMT)
commit483dd6a5e0069d0646505c26a5194eda15472858 (patch)
tree01d05439b22e050c2b1a145e90c975c385ebeac4 /wpa_supplicant/config.c
parentdd5f9025841f3492b14e9898042c5cab1e270e9c (diff)
Include peer certificate always in EAP events
This makes it easier for upper layer applications to get information regarding the server certificate without having to use a special certificate probing connection. This provides both the SHA256 hash of the certificate (to be used with ca_cert="hash://server/sha256/<hash>", if desired) and the full DER encoded X.509 certificate so that upper layer applications can parse and display the certificate easily or extract fields from it for purposes like configuring an altsubject_match or domain_suffix_match. The old behavior can be configured by adding cert_in_cb=0 to wpa_supplicant configuration file. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'wpa_supplicant/config.c')
1 files changed, 1 insertions, 0 deletions
diff --git a/wpa_supplicant/config.c b/wpa_supplicant/config.c
index a810632..389ad65 100644
--- a/wpa_supplicant/config.c
+++ b/wpa_supplicant/config.c
@@ -3490,6 +3490,7 @@ struct wpa_config * wpa_config_alloc_empty(const char *ctrl_interface,
config->p2p_search_delay = DEFAULT_P2P_SEARCH_DELAY;
config->rand_addr_lifetime = DEFAULT_RAND_ADDR_LIFETIME;
config->key_mgmt_offload = DEFAULT_KEY_MGMT_OFFLOAD;
+ config->cert_in_cb = DEFAULT_CERT_IN_CB;
if (ctrl_interface)
config->ctrl_interface = os_strdup(ctrl_interface);