mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
Do not indicate possible PSK failure when using SAE
wpa_key_mgmt_wpa_psk() includes SAE AKMs. However, with SAE, there is no way of reaching 4-way handshake without the password having already been verified as part of SAE authentication. As such, a failure to complete 4-way handshake with SAE cannot indicate that the used password was incorrect. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
df3b2e22a0
commit
50a2c8c906
@ -3054,7 +3054,8 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
|
||||
int locally_generated)
|
||||
{
|
||||
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
|
||||
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt))
|
||||
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||
wpa_key_mgmt_sae(wpa_s->key_mgmt))
|
||||
return 0; /* Not in 4-way handshake with PSK */
|
||||
|
||||
/*
|
||||
|
Loading…
Reference in New Issue
Block a user