wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying
When a PTK rekey fails it can't be caused by a PSK mismatch. Report a possible PSK mismatch only during the initial 4-way handshake to avoid incorrect reports. Signed-off-by: Alexander Wetzel <alexander@wetzel-home.de>
This commit is contained in:
parent
78d338d1b1
commit
84877f253d
1 changed files with 2 additions and 1 deletions
|
@ -3071,9 +3071,10 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
|
|||
int locally_generated)
|
||||
{
|
||||
if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
|
||||
!wpa_s->new_connection ||
|
||||
!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||
wpa_key_mgmt_sae(wpa_s->key_mgmt))
|
||||
return 0; /* Not in 4-way handshake with PSK */
|
||||
return 0; /* Not in initial 4-way handshake with PSK */
|
||||
|
||||
/*
|
||||
* It looks like connection was lost while trying to go through PSK
|
||||
|
|
Loading…
Reference in a new issue