ID 7. Commented out parts of the code from security audit partially resolved

This commit is contained in:
Simon Rozman 2016-10-03 13:00:34 +02:00
parent bcba624dcb
commit b212d0abc6

View File

@ -257,8 +257,7 @@ void eap::method_tls::process_request_packet(
// Is this a valid EAP-TLS packet? // Is this a valid EAP-TLS packet?
if (dwReceivedPacketSize < 6) if (dwReceivedPacketSize < 6)
throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, __FUNCTION__ " Packet is too small. EAP-%s packets should be at least 6B."); throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, __FUNCTION__ " Packet is too small. EAP-%s packets should be at least 6B.");
//else if (pReceivedPacket->Data[0] != eap_type_tls) // Skip method check, to allow TTLS extension. // Don't check packet method type, to allow TTLS extension.
// throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Packet is not EAP-TLS (expected: %u, received: %u).", eap_type_tls, pReceivedPacket->Data[0]));
if (!m_packet_req.append_frag((const EapPacket*)pReceivedPacket)) { if (!m_packet_req.append_frag((const EapPacket*)pReceivedPacket)) {
// This was not the only/last fragment. Reply with ACK packet. // This was not the only/last fragment. Reply with ACK packet.