DPP: Do not continue if public key hash derivation fails
sha256_vector() result was ignored apart from printing out the failure in the debug log. This is not really a normal case and it is better to reject the full operation rather than try to continue with an incorrect public key hash value. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
8a37d54ea7
commit
f981ce7298
1 changed files with 5 additions and 4 deletions
|
@ -1352,9 +1352,10 @@ char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve,
|
|||
addr[0] = wpabuf_head(der);
|
||||
len = wpabuf_len(der);
|
||||
res = sha256_vector(1, addr, &len, bi->pubkey_hash);
|
||||
if (res < 0)
|
||||
if (res < 0) {
|
||||
wpa_printf(MSG_DEBUG, "DPP: Failed to hash public key");
|
||||
else
|
||||
goto fail;
|
||||
}
|
||||
wpa_hexdump(MSG_DEBUG, "DPP: Public key hash", bi->pubkey_hash,
|
||||
SHA256_MAC_LEN);
|
||||
|
||||
|
|
Loading…
Reference in a new issue