aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2019-10-27 10:54:40 (GMT)
committerJouni Malinen <j@w1.fi>2019-10-27 10:54:40 (GMT)
commit50a2c8c906472732768b0e50fd259518e2279978 (patch)
tree50421f6a480cb1c280e7e14f45cfedff31184093
parentdf3b2e22a05b1ec7176d3a21f04eb0614848e2e9 (diff)
downloadhostap-50a2c8c906472732768b0e50fd259518e2279978.zip
hostap-50a2c8c906472732768b0e50fd259518e2279978.tar.gz
hostap-50a2c8c906472732768b0e50fd259518e2279978.tar.bz2
Do not indicate possible PSK failure when using SAE
wpa_key_mgmt_wpa_psk() includes SAE AKMs. However, with SAE, there is no way of reaching 4-way handshake without the password having already been verified as part of SAE authentication. As such, a failure to complete 4-way handshake with SAE cannot indicate that the used password was incorrect. Signed-off-by: Jouni Malinen <j@w1.fi>
-rw-r--r--wpa_supplicant/events.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c
index ac4274c..21ce943 100644
--- a/wpa_supplicant/events.c
+++ b/wpa_supplicant/events.c
@@ -3054,7 +3054,8 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
int locally_generated)
{
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
- !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt))
+ !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
+ wpa_key_mgmt_sae(wpa_s->key_mgmt))
return 0; /* Not in 4-way handshake with PSK */
/*