3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-29 05:39:24 +01:00

peap: fix typo and add labels

This commit is contained in:
Tim Kourt 2018-09-07 10:25:18 -07:00 committed by Denis Kenzior
parent 2735e32b10
commit bb5997c4ea

View File

@ -554,7 +554,7 @@ static bool eap_peap_tunnel_init(struct eap_state *eap)
if (!l_tls_set_auth_data(peap->tunnel, peap->client_cert, if (!l_tls_set_auth_data(peap->tunnel, peap->client_cert,
peap->client_key, NULL)) { peap->client_key, NULL)) {
l_error("Failed to set authentication data."); l_error("PEAP: Failed to set authentication data.");
return false; return false;
} }
@ -592,21 +592,21 @@ static int eap_peap_init_request_assembly(struct eap_state *eap,
return -EINVAL; return -EINVAL;
/* /*
* Some of the PEAP server implementations brake the protocol and do not * Some of the PEAP server implementations break the protocol and do not
* set the M flag for the first packet during the fragmented * set the M flag for the first packet during the fragmented
* transmission. To stay compatible with such devices, we have relaxed * transmission. To stay compatible with such devices, we have relaxed
* this requirement in iwd. * this requirement in iwd.
*/ */
if (!(flags & PEAP_FLAG_M)) if (!(flags & PEAP_FLAG_M))
l_warn("Server has failed to set the M flag in the first packet" l_warn("PEAP: Server has failed to set the M flag in the first"
" of the fragmented transmission."); " packet of the fragmented transmission.");
peap->rx_pdu_buf_len = l_get_be32(pkt); peap->rx_pdu_buf_len = l_get_be32(pkt);
len -= 4; len -= 4;
if (!peap->rx_pdu_buf_len || peap->rx_pdu_buf_len > PEAP_PDU_MAX_LEN) { if (!peap->rx_pdu_buf_len || peap->rx_pdu_buf_len > PEAP_PDU_MAX_LEN) {
l_warn("Fragmented pkt size is outside of alowed boundaries " l_warn("PEAP: Fragmented pkt size is outside of alowed"
"[1, %u]", PEAP_PDU_MAX_LEN); " boundaries [1, %u]", PEAP_PDU_MAX_LEN);
return -EINVAL; return -EINVAL;
} }
@ -635,7 +635,7 @@ static int eap_peap_init_request_assembly(struct eap_state *eap,
} }
if (peap->rx_pdu_buf_len < len) { if (peap->rx_pdu_buf_len < len) {
l_warn("Fragmented pkt size is smaller than the received " l_warn("PEAP: Fragmented pkt size is smaller than the received "
"packet"); "packet");
return -EINVAL; return -EINVAL;
@ -717,7 +717,7 @@ static int eap_peap_handle_fragmented_request(struct eap_state *eap,
pdu_len = len - rx_header_offset; pdu_len = len - rx_header_offset;
if (peap->rx_pdu_buf_len < peap->rx_pdu_buf_offset + pdu_len) { if (peap->rx_pdu_buf_len < peap->rx_pdu_buf_offset + pdu_len) {
l_error("Request fragment pkt size mismatch"); l_error("PEAP: Request fragment pkt size mismatch");
return -EINVAL; return -EINVAL;
} }
@ -787,7 +787,7 @@ static void eap_peap_handle_request(struct eap_state *eap,
goto error; goto error;
if (peap->rx_pdu_buf_len != peap->rx_pdu_buf_offset) { if (peap->rx_pdu_buf_len != peap->rx_pdu_buf_offset) {
l_error("Request fragment pkt size mismatch"); l_error("PEAP: Request fragment pkt size mismatch");
goto error; goto error;
} }
@ -920,7 +920,7 @@ static int eap_peap_check_settings(struct l_settings *settings,
if (client_cert) { if (client_cert) {
cert = l_pem_load_certificate(client_cert, &size); cert = l_pem_load_certificate(client_cert, &size);
if (!cert) { if (!cert) {
l_error("Failed to load %s", client_cert); l_error("PEAP: Failed to load %s", client_cert);
return -EIO; return -EIO;
} }