|
@@ -15,7 +15,6 @@
|
|
|
|
|
|
#include "utils/common.h"
|
|
|
#include "utils/eloop.h"
|
|
|
-#include "crypto/sha1.h"
|
|
|
#include "radius/radius.h"
|
|
|
#include "radius/radius_client.h"
|
|
|
#include "hostapd.h"
|
|
@@ -443,7 +442,7 @@ static void decode_tunnel_passwords(struct hostapd_data *hapd,
|
|
|
struct hostapd_cached_radius_acl *cache)
|
|
|
{
|
|
|
int passphraselen;
|
|
|
- char *passphrase, *strpassphrase;
|
|
|
+ char *passphrase;
|
|
|
size_t i;
|
|
|
struct hostapd_sta_wpa_psk_short *psk;
|
|
|
|
|
@@ -464,19 +463,16 @@ static void decode_tunnel_passwords(struct hostapd_data *hapd,
|
|
|
* passphrase does not contain the NULL termination.
|
|
|
* Add it here as pbkdf2_sha1() requires it.
|
|
|
*/
|
|
|
- strpassphrase = os_zalloc(passphraselen + 1);
|
|
|
psk = os_zalloc(sizeof(struct hostapd_sta_wpa_psk_short));
|
|
|
- if (strpassphrase && psk) {
|
|
|
- os_memcpy(strpassphrase, passphrase, passphraselen);
|
|
|
- pbkdf2_sha1(strpassphrase,
|
|
|
- hapd->conf->ssid.ssid,
|
|
|
- hapd->conf->ssid.ssid_len, 4096,
|
|
|
- psk->psk, PMK_LEN);
|
|
|
+ if (psk) {
|
|
|
+ if (passphraselen > MAX_PASSPHRASE_LEN)
|
|
|
+ passphraselen = MAX_PASSPHRASE_LEN;
|
|
|
+ os_memcpy(psk->passphrase, passphrase, passphraselen);
|
|
|
+ psk->is_passphrase = 1;
|
|
|
psk->next = cache->psk;
|
|
|
cache->psk = psk;
|
|
|
psk = NULL;
|
|
|
}
|
|
|
- os_free(strpassphrase);
|
|
|
os_free(psk);
|
|
|
os_free(passphrase);
|
|
|
}
|