From b212d0abc69b7a85851c33fbdebfea6b3e594296 Mon Sep 17 00:00:00 2001 From: Simon Rozman Date: Mon, 3 Oct 2016 13:00:34 +0200 Subject: [PATCH] ID 7. Commented out parts of the code from security audit partially resolved --- lib/TLS/src/Method.cpp | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/lib/TLS/src/Method.cpp b/lib/TLS/src/Method.cpp index d339a93..5dcd2e1 100644 --- a/lib/TLS/src/Method.cpp +++ b/lib/TLS/src/Method.cpp @@ -257,8 +257,7 @@ void eap::method_tls::process_request_packet( // Is this a valid EAP-TLS packet? if (dwReceivedPacketSize < 6) throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, __FUNCTION__ " Packet is too small. EAP-%s packets should be at least 6B."); - //else if (pReceivedPacket->Data[0] != eap_type_tls) // Skip method check, to allow TTLS extension. - // throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Packet is not EAP-TLS (expected: %u, received: %u).", eap_type_tls, pReceivedPacket->Data[0])); + // Don't check packet method type, to allow TTLS extension. if (!m_packet_req.append_frag((const EapPacket*)pReceivedPacket)) { // This was not the only/last fragment. Reply with ACK packet.