Note set_key(WPA_ALG_NONE) failure in debug log
This makes wpa_remove_ptk() call to wpa_auth_set_key() more consistent with all the other calls that verify the return value to keep static analyzers happier. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
7d8da7c837
commit
2a0b86d319
1 changed files with 4 additions and 1 deletions
|
@ -1673,7 +1673,10 @@ void wpa_remove_ptk(struct wpa_state_machine *sm)
|
||||||
{
|
{
|
||||||
sm->PTK_valid = FALSE;
|
sm->PTK_valid = FALSE;
|
||||||
os_memset(&sm->PTK, 0, sizeof(sm->PTK));
|
os_memset(&sm->PTK, 0, sizeof(sm->PTK));
|
||||||
wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL, 0);
|
if (wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL,
|
||||||
|
0))
|
||||||
|
wpa_printf(MSG_DEBUG,
|
||||||
|
"RSN: PTK removal from the driver failed");
|
||||||
sm->pairwise_set = FALSE;
|
sm->pairwise_set = FALSE;
|
||||||
eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
|
eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue