Do not indicate possible PSK failure when using SAE
wpa_key_mgmt_wpa_psk() includes SAE AKMs. However, with SAE, there is no way of reaching 4-way handshake without the password having already been verified as part of SAE authentication. As such, a failure to complete 4-way handshake with SAE cannot indicate that the used password was incorrect. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
df3b2e22a0
commit
50a2c8c906
|
@ -3054,7 +3054,8 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
|
||||||
int locally_generated)
|
int locally_generated)
|
||||||
{
|
{
|
||||||
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
|
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
|
||||||
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt))
|
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||||
|
wpa_key_mgmt_sae(wpa_s->key_mgmt))
|
||||||
return 0; /* Not in 4-way handshake with PSK */
|
return 0; /* Not in 4-way handshake with PSK */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
|
Loading…
Reference in a new issue