mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 01:08:22 -05:00
ae7d9fbd3d
The previous implementation used an obsolete sm->eapol_key_crypt pointer which was not set anywhere (i.e., was always NULL). In addition, the condition of sm->eap_if->eapKeyAvailable was not valid here since this is the case of MSK from an external authentication server and not the internal EAP server. Consequently, the wpa_auth_pmksa_add() call here was never used. The PMKSA cache was still added, but it happened at the completion of the 4-way handshake rather than at the completion of EAP authentication. That later location looks better, so delete the unreachable code in Access-Accept handling. In addition, remove the now complete unused struct eapol_state_machine eapol_key_* variables. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> |
||
---|---|---|
.. | ||
eapol_auth_dump.c | ||
eapol_auth_sm_i.h | ||
eapol_auth_sm.c | ||
eapol_auth_sm.h | ||
Makefile |