RSN supplicant: Use os_memcmp_const() for hash/password comparisons
This makes the implementation less likely to provide useful timing information to potential attackers from comparisons of information received from a remote device and private material known only by the authorized devices. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
72619ce61b
commit
0d15b69f0a
5 changed files with 24 additions and 19 deletions
|
@ -564,7 +564,7 @@ static int wpa_supplicant_verify_tdls_mic(u8 trans_seq,
|
|||
wpa_tdls_ftie_mic(peer->tpk.kck, trans_seq, lnkid,
|
||||
peer->rsnie_p, timeoutie, (u8 *) ftie,
|
||||
mic);
|
||||
if (os_memcmp(mic, ftie->mic, 16) != 0) {
|
||||
if (os_memcmp_const(mic, ftie->mic, 16) != 0) {
|
||||
wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - "
|
||||
"dropping packet");
|
||||
wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
|
||||
|
@ -591,7 +591,7 @@ static int wpa_supplicant_verify_tdls_mic_teardown(
|
|||
if (peer->tpk_set) {
|
||||
wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
|
||||
dtoken, lnkid, (u8 *) ftie, mic);
|
||||
if (os_memcmp(mic, ftie->mic, 16) != 0) {
|
||||
if (os_memcmp_const(mic, ftie->mic, 16) != 0) {
|
||||
wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - "
|
||||
"dropping packet");
|
||||
return -1;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue