Work around interop issue with WPA type EAPOL-Key 4/4 in WPA2 mode
Some deployed station implementations seem to send msg 4/4 with
incorrect type value in WPA2 mode. Add a workaround to ignore that issue
so that such stations can interoperate with hostapd authenticator. The
validation checks were added in commit
f8e96eb6fd
.
Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
f9121813d7
commit
74590e710f
1 changed files with 8 additions and 1 deletions
|
@ -795,7 +795,14 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
||||||
}
|
}
|
||||||
|
|
||||||
if (sm->wpa == WPA_VERSION_WPA2) {
|
if (sm->wpa == WPA_VERSION_WPA2) {
|
||||||
if (key->type != EAPOL_KEY_TYPE_RSN) {
|
if (key->type == EAPOL_KEY_TYPE_WPA) {
|
||||||
|
/*
|
||||||
|
* Some deployed station implementations seem to send
|
||||||
|
* msg 4/4 with incorrect type value in WPA2 mode.
|
||||||
|
*/
|
||||||
|
wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
|
||||||
|
"with unexpected WPA type in RSN mode");
|
||||||
|
} else if (key->type != EAPOL_KEY_TYPE_RSN) {
|
||||||
wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
|
wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
|
||||||
"unexpected type %d in RSN mode",
|
"unexpected type %d in RSN mode",
|
||||||
key->type);
|
key->type);
|
||||||
|
|
Loading…
Reference in a new issue