From 2a0b86d3194e39bfefcc8309e3f81994f2ac3850 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Wed, 26 Oct 2016 00:22:49 +0300 Subject: [PATCH] Note set_key(WPA_ALG_NONE) failure in debug log This makes wpa_remove_ptk() call to wpa_auth_set_key() more consistent with all the other calls that verify the return value to keep static analyzers happier. Signed-off-by: Jouni Malinen --- src/ap/wpa_auth.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c index 317e94505..8039ca8e6 100644 --- a/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c @@ -1673,7 +1673,10 @@ void wpa_remove_ptk(struct wpa_state_machine *sm) { sm->PTK_valid = FALSE; os_memset(&sm->PTK, 0, sizeof(sm->PTK)); - wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL, 0); + if (wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL, + 0)) + wpa_printf(MSG_DEBUG, + "RSN: PTK removal from the driver failed"); sm->pairwise_set = FALSE; eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm); }