]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Do not indicate possible PSK failure when using SAE
authorJouni Malinen <j@w1.fi>
Sun, 27 Oct 2019 10:54:40 +0000 (12:54 +0200)
committerJouni Malinen <j@w1.fi>
Sun, 27 Oct 2019 10:54:40 +0000 (12:54 +0200)
wpa_key_mgmt_wpa_psk() includes SAE AKMs. However, with SAE, there is no
way of reaching 4-way handshake without the password having already been
verified as part of SAE authentication. As such, a failure to complete
4-way handshake with SAE cannot indicate that the used password was
incorrect.

Signed-off-by: Jouni Malinen <j@w1.fi>
wpa_supplicant/events.c

index ac4274cfbcdbb7f9f20dafb70f97427d3622db00..21ce943d661f55c7abcf1430101aa17a1dfed337 100644 (file)
@@ -3054,7 +3054,8 @@ static int could_be_psk_mismatch(struct wpa_supplicant *wpa_s, u16 reason_code,
                                 int locally_generated)
 {
        if (wpa_s->wpa_state != WPA_4WAY_HANDSHAKE ||
-           !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt))
+           !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
+           wpa_key_mgmt_sae(wpa_s->key_mgmt))
                return 0; /* Not in 4-way handshake with PSK */
 
        /*