mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
DPP: Do not continue if public key hash derivation fails
sha256_vector() result was ignored apart from printing out the failure in the debug log. This is not really a normal case and it is better to reject the full operation rather than try to continue with an incorrect public key hash value. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
8a37d54ea7
commit
f981ce7298
@ -1352,11 +1352,12 @@ char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve,
|
||||
addr[0] = wpabuf_head(der);
|
||||
len = wpabuf_len(der);
|
||||
res = sha256_vector(1, addr, &len, bi->pubkey_hash);
|
||||
if (res < 0)
|
||||
if (res < 0) {
|
||||
wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key");
|
||||
else
|
||||
wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash,
|
||||
SHA256_MAC_LEN);
|
||||
goto fail;
|
||||
}
|
||||
wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash,
|
||||
SHA256_MAC_LEN);
|
||||
|
||||
base64 = base64_encode(wpabuf_head(der), wpabuf_len(der), &len);
|
||||
wpabuf_free(der);
|
||||
|
Loading…
Reference in New Issue
Block a user