mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-29 05:39:24 +01:00
peap: fix typo and add labels
This commit is contained in:
parent
2735e32b10
commit
bb5997c4ea
@ -554,7 +554,7 @@ static bool eap_peap_tunnel_init(struct eap_state *eap)
|
|||||||
|
|
||||||
if (!l_tls_set_auth_data(peap->tunnel, peap->client_cert,
|
if (!l_tls_set_auth_data(peap->tunnel, peap->client_cert,
|
||||||
peap->client_key, NULL)) {
|
peap->client_key, NULL)) {
|
||||||
l_error("Failed to set authentication data.");
|
l_error("PEAP: Failed to set authentication data.");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -592,21 +592,21 @@ static int eap_peap_init_request_assembly(struct eap_state *eap,
|
|||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Some of the PEAP server implementations brake the protocol and do not
|
* Some of the PEAP server implementations break the protocol and do not
|
||||||
* set the M flag for the first packet during the fragmented
|
* set the M flag for the first packet during the fragmented
|
||||||
* transmission. To stay compatible with such devices, we have relaxed
|
* transmission. To stay compatible with such devices, we have relaxed
|
||||||
* this requirement in iwd.
|
* this requirement in iwd.
|
||||||
*/
|
*/
|
||||||
if (!(flags & PEAP_FLAG_M))
|
if (!(flags & PEAP_FLAG_M))
|
||||||
l_warn("Server has failed to set the M flag in the first packet"
|
l_warn("PEAP: Server has failed to set the M flag in the first"
|
||||||
" of the fragmented transmission.");
|
" packet of the fragmented transmission.");
|
||||||
|
|
||||||
peap->rx_pdu_buf_len = l_get_be32(pkt);
|
peap->rx_pdu_buf_len = l_get_be32(pkt);
|
||||||
len -= 4;
|
len -= 4;
|
||||||
|
|
||||||
if (!peap->rx_pdu_buf_len || peap->rx_pdu_buf_len > PEAP_PDU_MAX_LEN) {
|
if (!peap->rx_pdu_buf_len || peap->rx_pdu_buf_len > PEAP_PDU_MAX_LEN) {
|
||||||
l_warn("Fragmented pkt size is outside of alowed boundaries "
|
l_warn("PEAP: Fragmented pkt size is outside of alowed"
|
||||||
"[1, %u]", PEAP_PDU_MAX_LEN);
|
" boundaries [1, %u]", PEAP_PDU_MAX_LEN);
|
||||||
|
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
@ -635,7 +635,7 @@ static int eap_peap_init_request_assembly(struct eap_state *eap,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (peap->rx_pdu_buf_len < len) {
|
if (peap->rx_pdu_buf_len < len) {
|
||||||
l_warn("Fragmented pkt size is smaller than the received "
|
l_warn("PEAP: Fragmented pkt size is smaller than the received "
|
||||||
"packet");
|
"packet");
|
||||||
|
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
@ -717,7 +717,7 @@ static int eap_peap_handle_fragmented_request(struct eap_state *eap,
|
|||||||
pdu_len = len - rx_header_offset;
|
pdu_len = len - rx_header_offset;
|
||||||
|
|
||||||
if (peap->rx_pdu_buf_len < peap->rx_pdu_buf_offset + pdu_len) {
|
if (peap->rx_pdu_buf_len < peap->rx_pdu_buf_offset + pdu_len) {
|
||||||
l_error("Request fragment pkt size mismatch");
|
l_error("PEAP: Request fragment pkt size mismatch");
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -787,7 +787,7 @@ static void eap_peap_handle_request(struct eap_state *eap,
|
|||||||
goto error;
|
goto error;
|
||||||
|
|
||||||
if (peap->rx_pdu_buf_len != peap->rx_pdu_buf_offset) {
|
if (peap->rx_pdu_buf_len != peap->rx_pdu_buf_offset) {
|
||||||
l_error("Request fragment pkt size mismatch");
|
l_error("PEAP: Request fragment pkt size mismatch");
|
||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -920,7 +920,7 @@ static int eap_peap_check_settings(struct l_settings *settings,
|
|||||||
if (client_cert) {
|
if (client_cert) {
|
||||||
cert = l_pem_load_certificate(client_cert, &size);
|
cert = l_pem_load_certificate(client_cert, &size);
|
||||||
if (!cert) {
|
if (!cert) {
|
||||||
l_error("Failed to load %s", client_cert);
|
l_error("PEAP: Failed to load %s", client_cert);
|
||||||
return -EIO;
|
return -EIO;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user