mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-01-30 16:54:04 -05:00
wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying
When a PTK rekey fails it can't be caused by a PSK mismatch. Report a possible PSK mismatch only during the initial 4-way handshake to avoid incorrect reports. Signed-off-by: Alexander Wetzel <alexander@wetzel-home.de>
This commit is contained in:
parent
78d338d1b1
commit
84877f253d
@ -3071,9 +3071,10 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
|
||||
int locally_generated)
|
||||
{
|
||||
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
|
||||
!wpa_s->new_connection ||
|
||||
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||
wpa_key_mgmt_sae(wpa_s->key_mgmt))
|
||||
return 0; /* Not in 4-way handshake with PSK */
|
||||
return 0; /* Not in initial 4-way handshake with PSK */
|
||||
|
||||
/*
|
||||
* It looks like connection was lost while trying to go through PSK
|
||||
|
Loading…
Reference in New Issue
Block a user