network: enforce max EAP/pkey password length

This commit is contained in:
James Prestwood 2020-03-06 11:16:28 -08:00 committed by Denis Kenzior
parent d40a8d1a6d
commit ca9110e8c2
1 changed files with 16 additions and 1 deletions

View File

@ -892,7 +892,15 @@ static void eap_password_callback(enum agent_result result, const char *value,
struct eap_secret_request *req = user_data;
req->network->agent_request = 0;
req->secret->value = l_strdup(value);
if (value) {
if (strlen(value) < IWD_MAX_PASSWORD_LEN)
req->secret->value = l_strdup(value);
else {
l_error("EAP password too long");
result = AGENT_RESULT_FAILED;
}
}
req->callback(result, message, req);
}
@ -910,11 +918,18 @@ static void eap_user_password_callback(enum agent_result result,
size_t len1 = strlen(user) + 1;
size_t len2 = strlen(passwd) + 1;
if (len2 > IWD_MAX_PASSWORD_LEN) {
l_error("EAP password too long");
result = AGENT_RESULT_FAILED;
goto done;
}
req->secret->value = l_malloc(len1 + len2);
memcpy(req->secret->value, user, len1);
memcpy(req->secret->value + len1, passwd, len2);
}
done:
req->callback(result, message, req);
}