Remove always true check on EAPOL-Key message in authenticator
This was practically dead code since no other msg value exist anymore. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
627c3f35dc
commit
74a25a6602
1 changed files with 23 additions and 26 deletions
|
@ -1229,8 +1229,6 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
|||
msgtxt = "2/4 Pairwise";
|
||||
}
|
||||
|
||||
if (msg == REQUEST || msg == PAIRWISE_2 || msg == PAIRWISE_4 ||
|
||||
msg == GROUP_2) {
|
||||
if (sm->pairwise == WPA_CIPHER_CCMP ||
|
||||
sm->pairwise == WPA_CIPHER_GCMP) {
|
||||
if (wpa_use_cmac(sm->wpa_key_mgmt) &&
|
||||
|
@ -1259,7 +1257,6 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
|||
"did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases");
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
if (key_info & WPA_KEY_INFO_REQUEST) {
|
||||
if (sm->req_replay_counter_used &&
|
||||
|
|
Loading…
Reference in a new issue