FT: Do not add bogus PMKID in msg 1/4 for FT protocol PTK rekeying
Do not try to derive a PMKID for EAPOL-key msg 1/4 when going through 4-way handshake to rekey PTK during an association that was started through FT protocol. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
8a576f5ea5
commit
fb1dee221b
1 changed files with 8 additions and 0 deletions
|
@ -2161,6 +2161,14 @@ SM_STATE(WPA_PTK, PTKSTART)
|
||||||
pmkid = NULL;
|
pmkid = NULL;
|
||||||
}
|
}
|
||||||
#endif /* CONFIG_FILS */
|
#endif /* CONFIG_FILS */
|
||||||
|
#ifdef CONFIG_IEEE80211R_AP
|
||||||
|
} else if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) &&
|
||||||
|
sm->ft_completed) {
|
||||||
|
wpa_printf(MSG_DEBUG,
|
||||||
|
"FT: No PMKID in message 1/4 when using FT protocol");
|
||||||
|
pmkid = NULL;
|
||||||
|
pmkid_len = 0;
|
||||||
|
#endif /* CONFIG_IEEE80211R_AP */
|
||||||
#ifdef CONFIG_SAE
|
#ifdef CONFIG_SAE
|
||||||
} else if (wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
|
} else if (wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
|
||||||
if (sm->pmkid_set) {
|
if (sm->pmkid_set) {
|
||||||
|
|
Loading…
Reference in a new issue