mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 10:18:21 -05:00
Always clear EAP altAccept and altReject variables on new association
Previously, this was only done when the new connection is using WPA-Personal. However, it looks like it was possible to trigger an infinite busy loop if altAccept or altReject were left set to true and an EAPOL frame is received (eapolEap is set to true). Clearing altAccept and altReject for each association prevents this loop from happening in the beginning of the next association.
This commit is contained in:
parent
351f09a221
commit
0a40ec6a90
@ -253,10 +253,9 @@ void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s)
|
||||
struct eapol_config eapol_conf;
|
||||
struct wpa_ssid *ssid = wpa_s->current_ssid;
|
||||
|
||||
if (wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt)) {
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
|
||||
}
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
|
||||
|
||||
if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE)
|
||||
eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
|
||||
|
Loading…
Reference in New Issue
Block a user