diff --git a/src/common/ieee802_11_defs.h b/src/common/ieee802_11_defs.h index be251d0e4..5408ae576 100644 --- a/src/common/ieee802_11_defs.h +++ b/src/common/ieee802_11_defs.h @@ -209,6 +209,9 @@ #define WLAN_STATUS_DENIED_HE_NOT_SUPPORTED 124 #define WLAN_STATUS_SAE_HASH_TO_ELEMENT 126 #define WLAN_STATUS_SAE_PK 127 +#define WLAN_STATUS_INVALID_PUBLIC_KEY 136 +#define WLAN_STATUS_PASN_BASE_AKMP_FAILED 137 +#define WLAN_STATUS_OCI_MISMATCH 138 /* Reason codes (IEEE Std 802.11-2016, 9.4.1.7, Table 9-45) */ #define WLAN_REASON_UNSPECIFIED 1 diff --git a/src/pasn/pasn_responder.c b/src/pasn/pasn_responder.c index ea2737c0f..e36aa39b8 100644 --- a/src/pasn/pasn_responder.c +++ b/src/pasn/pasn_responder.c @@ -687,7 +687,7 @@ int handle_auth_pasn_1(struct pasn_data *pasn, if (!pasn_params.pubkey || !pasn_params.pubkey_len) { wpa_printf(MSG_DEBUG, "PASN: Invalid public key"); - status = WLAN_STATUS_UNSPECIFIED_FAILURE; + status = WLAN_STATUS_INVALID_PARAMETERS; goto send_resp; } @@ -702,7 +702,7 @@ int handle_auth_pasn_1(struct pasn_data *pasn, if (ret) { wpa_printf(MSG_DEBUG, "PASN: Invalid comeback token"); - status = WLAN_STATUS_UNSPECIFIED_FAILURE; + status = WLAN_STATUS_INVALID_PARAMETERS; goto send_resp; } } else if (pasn->use_anti_clogging) { @@ -730,7 +730,7 @@ int handle_auth_pasn_1(struct pasn_data *pasn, wpa_printf(MSG_DEBUG, "PASN: Invalid first octet in pubkey=0x%x", pasn_params.pubkey[0]); - status = WLAN_STATUS_UNSPECIFIED_FAILURE; + status = WLAN_STATUS_INVALID_PUBLIC_KEY; goto send_resp; } @@ -863,7 +863,7 @@ int handle_auth_pasn_1(struct pasn_data *pasn, &pasn_params, wrapped_data, secret); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to derive keys"); - status = WLAN_STATUS_UNSPECIFIED_FAILURE; + status = WLAN_STATUS_PASN_BASE_AKMP_FAILED; goto send_resp; }