ID 7. Commented out parts of the code from security audit partially resolved
This commit is contained in:
parent
bcba624dcb
commit
b212d0abc6
@ -257,8 +257,7 @@ void eap::method_tls::process_request_packet(
|
|||||||
// Is this a valid EAP-TLS packet?
|
// Is this a valid EAP-TLS packet?
|
||||||
if (dwReceivedPacketSize < 6)
|
if (dwReceivedPacketSize < 6)
|
||||||
throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, __FUNCTION__ " Packet is too small. EAP-%s packets should be at least 6B.");
|
throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, __FUNCTION__ " Packet is too small. EAP-%s packets should be at least 6B.");
|
||||||
//else if (pReceivedPacket->Data[0] != eap_type_tls) // Skip method check, to allow TTLS extension.
|
// Don't check packet method type, to allow TTLS extension.
|
||||||
// throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Packet is not EAP-TLS (expected: %u, received: %u).", eap_type_tls, pReceivedPacket->Data[0]));
|
|
||||||
|
|
||||||
if (!m_packet_req.append_frag((const EapPacket*)pReceivedPacket)) {
|
if (!m_packet_req.append_frag((const EapPacket*)pReceivedPacket)) {
|
||||||
// This was not the only/last fragment. Reply with ACK packet.
|
// This was not the only/last fragment. Reply with ACK packet.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user