RSN: Do not try to connect if PMF disabled and AP requires it
Instead of trying to associate in configuration that is known to result in the AP rejecting the association, reject the BSS candidate based on the MFPR=1 RSN capability when STA configuration has PMF disabled. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
8acbe7f2a4
commit
fa46426725
1 changed files with 7 additions and 0 deletions
|
@ -564,6 +564,13 @@ static int wpa_supplicant_ssid_bss_match(struct wpa_supplicant *wpa_s,
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
#endif /* CONFIG_IEEE80211W */
|
#endif /* CONFIG_IEEE80211W */
|
||||||
|
if ((ie.capabilities & WPA_CAPABILITY_MFPR) &&
|
||||||
|
wpas_get_ssid_pmf(wpa_s, ssid) ==
|
||||||
|
NO_MGMT_FRAME_PROTECTION) {
|
||||||
|
wpa_dbg(wpa_s, MSG_DEBUG,
|
||||||
|
" skip RSN IE - no mgmt frame protection enabled but AP requires it");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
wpa_dbg(wpa_s, MSG_DEBUG, " selected based on RSN IE");
|
wpa_dbg(wpa_s, MSG_DEBUG, " selected based on RSN IE");
|
||||||
return 1;
|
return 1;
|
||||||
|
|
Loading…
Reference in a new issue