View | Details | Raw Unified | Return to bug 611024
Collapse All | Expand All

(-)a/src/rsn_supp/wpa.c (-1 / +9 lines)
Lines 231-236 static int wpa_supplicant_get_pmk(struct wpa_sm *sm, Link Here
231
			wpa_sm_ether_send(sm, sm->bssid, ETH_P_EAPOL,
231
			wpa_sm_ether_send(sm, sm->bssid, ETH_P_EAPOL,
232
					  buf, buflen);
232
					  buf, buflen);
233
			os_free(buf);
233
			os_free(buf);
234
			return -2;
234
		}
235
		}
235
236
236
		return -1;
237
		return -1;
Lines 361-366 static void wpa_supplicant_process_1_of_4(struct wpa_sm *sm, Link Here
361
	struct wpa_eapol_ie_parse ie;
362
	struct wpa_eapol_ie_parse ie;
362
	struct wpa_ptk *ptk;
363
	struct wpa_ptk *ptk;
363
	u8 buf[8];
364
	u8 buf[8];
365
	int res;
364
366
365
	if (wpa_sm_get_network_ctx(sm) == NULL) {
367
	if (wpa_sm_get_network_ctx(sm) == NULL) {
366
		wpa_printf(MSG_WARNING, "WPA: No SSID info found (msg 1 of "
368
		wpa_printf(MSG_WARNING, "WPA: No SSID info found (msg 1 of "
Lines 388-394 static void wpa_supplicant_process_1_of_4(struct wpa_sm *sm, Link Here
388
	}
390
	}
389
#endif /* CONFIG_NO_WPA2 */
391
#endif /* CONFIG_NO_WPA2 */
390
392
391
	if (wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid))
393
	res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid);
394
	if (res == -2) {
395
		wpa_printf(MSG_DEBUG, "RSN: Do not reply to msg 1/4 - "
396
			   "requesting full EAP authentication");
397
		return;
398
	}
399
	if (res)
392
		goto failed;
400
		goto failed;
393
401
394
	if (sm->renew_snonce) {
402
	if (sm->renew_snonce) {

Return to bug 611024