mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
EAP-FAST: Allow unprotected EAP-Failure in provisioning case
While EAP-FAST uses protected success notification, RFC 5422, Section 3.5 points out a possibility of EAP-Failure being sent out even after protected success notification in case of provisioning. Change the EAP-FAST peer implementation to accept that exception to the protected success notification. This allows the station to re-connect more quickly to complete EAP-FAST connection in the case the server rejects the initial attempt by only allowing it to use to provision a new PAC.
This commit is contained in:
parent
4458d91554
commit
88dc899a1b
@ -1037,11 +1037,15 @@ static struct wpabuf * eap_fast_process_pac(struct eap_sm *sm,
|
||||
} else {
|
||||
/*
|
||||
* This is PAC refreshing, i.e., normal authentication that is
|
||||
* expected to be completed with an EAP-Success.
|
||||
* expected to be completed with an EAP-Success. However,
|
||||
* RFC 5422, Section 3.5 allows EAP-Failure to be sent even
|
||||
* after protected success exchange in case of EAP-Fast
|
||||
* provisioning, so we better use DECISION_COND_SUCC here
|
||||
* instead of DECISION_UNCOND_SUCC.
|
||||
*/
|
||||
wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
|
||||
"- PAC refreshing completed successfully");
|
||||
ret->decision = DECISION_UNCOND_SUCC;
|
||||
ret->decision = DECISION_COND_SUCC;
|
||||
}
|
||||
ret->methodState = METHOD_DONE;
|
||||
return eap_fast_tlv_pac_ack();
|
||||
|
Loading…
Reference in New Issue
Block a user