mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
P2P: Do not delay retries on failure during group formation
4-way handshake may fail under extremely noisy environment and if this happens during P2P group formation, the 10 second extra delay added in wpas_auth_failed() can result in running over the 15 second timeout. Avoid this by skipping the delay mechanism in wpas_auth_failed() for the P2P group formation case. The P2P formation timeout will take care of stopping the attempts if the failure condition does not get resolved. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
dc01de8a0e
commit
cbf41ca796
@ -3804,6 +3804,18 @@ void wpas_auth_failed(struct wpa_supplicant *wpa_s)
|
||||
return;
|
||||
|
||||
ssid->auth_failures++;
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
if (ssid->p2p_group &&
|
||||
(wpa_s->p2p_in_provisioning || wpa_s->show_group_started)) {
|
||||
/*
|
||||
* Skip the wait time since there is a short timeout on the
|
||||
* connection to a P2P group.
|
||||
*/
|
||||
return;
|
||||
}
|
||||
#endif /* CONFIG_P2P */
|
||||
|
||||
if (ssid->auth_failures > 50)
|
||||
dur = 300;
|
||||
else if (ssid->auth_failures > 20)
|
||||
|
Loading…
Reference in New Issue
Block a user