Discard EAPOL-Key request without Secure=1
EAPOL-Key request is accepted only if the MIC has been verified, so PTK must have already been derived and Secure=1 needs to be used. Check the Secure bit explicitly for completeness even though the MIC verification is already taking care of validating that the sender is in the possession of valid keys. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
0967940885
commit
b27086e6eb
1 changed files with 6 additions and 0 deletions
|
@ -1516,6 +1516,12 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
|||
}
|
||||
|
||||
if (key_info & WPA_KEY_INFO_REQUEST) {
|
||||
if (!(key_info & WPA_KEY_INFO_SECURE)) {
|
||||
wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
|
||||
LOGGER_INFO,
|
||||
"received EAPOL-Key request without Secure=1");
|
||||
goto out;
|
||||
}
|
||||
if (sm->MICVerified) {
|
||||
sm->req_replay_counter_used = 1;
|
||||
os_memcpy(sm->req_replay_counter, key->replay_counter,
|
||||
|
|
Loading…
Reference in a new issue