|
@@ -65,6 +65,7 @@ static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
|
|
static const u32 eapol_key_timeout_first = 100; /* ms */
|
|
static const u32 eapol_key_timeout_first = 100; /* ms */
|
|
static const u32 eapol_key_timeout_subseq = 1000; /* ms */
|
|
static const u32 eapol_key_timeout_subseq = 1000; /* ms */
|
|
static const u32 eapol_key_timeout_first_group = 500; /* ms */
|
|
static const u32 eapol_key_timeout_first_group = 500; /* ms */
|
|
|
|
+static const u32 eapol_key_timeout_no_retrans = 4000; /* ms */
|
|
|
|
|
|
/* TODO: make these configurable */
|
|
/* TODO: make these configurable */
|
|
static const int dot11RSNAConfigPMKLifetime = 43200;
|
|
static const int dot11RSNAConfigPMKLifetime = 43200;
|
|
@@ -1604,6 +1605,9 @@ static void wpa_send_eapol(struct wpa_authenticator *wpa_auth,
|
|
eapol_key_timeout_first_group;
|
|
eapol_key_timeout_first_group;
|
|
else
|
|
else
|
|
timeout_ms = eapol_key_timeout_subseq;
|
|
timeout_ms = eapol_key_timeout_subseq;
|
|
|
|
+ if (wpa_auth->conf.wpa_disable_eapol_key_retries &&
|
|
|
|
+ (!pairwise || (key_info & WPA_KEY_INFO_MIC)))
|
|
|
|
+ timeout_ms = eapol_key_timeout_no_retrans;
|
|
if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
|
|
if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
|
|
sm->pending_1_of_4_timeout = 1;
|
|
sm->pending_1_of_4_timeout = 1;
|
|
wpa_printf(MSG_DEBUG, "WPA: Use EAPOL-Key timeout of %u ms (retry "
|
|
wpa_printf(MSG_DEBUG, "WPA: Use EAPOL-Key timeout of %u ms (retry "
|
|
@@ -2855,6 +2859,11 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
|
|
sm->TimeoutEvt = FALSE;
|
|
sm->TimeoutEvt = FALSE;
|
|
|
|
|
|
sm->TimeoutCtr++;
|
|
sm->TimeoutCtr++;
|
|
|
|
+ if (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
|
|
|
|
+ sm->TimeoutCtr > 1) {
|
|
|
|
+ /* Do not allow retransmission of EAPOL-Key msg 3/4 */
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
if (sm->TimeoutCtr > sm->wpa_auth->conf.wpa_pairwise_update_count) {
|
|
if (sm->TimeoutCtr > sm->wpa_auth->conf.wpa_pairwise_update_count) {
|
|
/* No point in sending the EAPOL-Key - we will disconnect
|
|
/* No point in sending the EAPOL-Key - we will disconnect
|
|
* immediately following this. */
|
|
* immediately following this. */
|
|
@@ -3197,7 +3206,9 @@ SM_STEP(WPA_PTK)
|
|
sm->EAPOLKeyPairwise && sm->MICVerified)
|
|
sm->EAPOLKeyPairwise && sm->MICVerified)
|
|
SM_ENTER(WPA_PTK, PTKINITDONE);
|
|
SM_ENTER(WPA_PTK, PTKINITDONE);
|
|
else if (sm->TimeoutCtr >
|
|
else if (sm->TimeoutCtr >
|
|
- sm->wpa_auth->conf.wpa_pairwise_update_count) {
|
|
|
|
|
|
+ sm->wpa_auth->conf.wpa_pairwise_update_count ||
|
|
|
|
+ (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
|
|
|
|
+ sm->TimeoutCtr > 1)) {
|
|
wpa_auth->dot11RSNA4WayHandshakeFailures++;
|
|
wpa_auth->dot11RSNA4WayHandshakeFailures++;
|
|
wpa_auth_vlogger(
|
|
wpa_auth_vlogger(
|
|
sm->wpa_auth, sm->addr, LOGGER_DEBUG,
|
|
sm->wpa_auth, sm->addr, LOGGER_DEBUG,
|
|
@@ -3237,6 +3248,11 @@ SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING)
|
|
SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
|
|
SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
|
|
|
|
|
|
sm->GTimeoutCtr++;
|
|
sm->GTimeoutCtr++;
|
|
|
|
+ if (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
|
|
|
|
+ sm->GTimeoutCtr > 1) {
|
|
|
|
+ /* Do not allow retransmission of EAPOL-Key group msg 1/2 */
|
|
|
|
+ return;
|
|
|
|
+ }
|
|
if (sm->GTimeoutCtr > sm->wpa_auth->conf.wpa_group_update_count) {
|
|
if (sm->GTimeoutCtr > sm->wpa_auth->conf.wpa_group_update_count) {
|
|
/* No point in sending the EAPOL-Key - we will disconnect
|
|
/* No point in sending the EAPOL-Key - we will disconnect
|
|
* immediately following this. */
|
|
* immediately following this. */
|
|
@@ -3340,7 +3356,9 @@ SM_STEP(WPA_PTK_GROUP)
|
|
!sm->EAPOLKeyPairwise && sm->MICVerified)
|
|
!sm->EAPOLKeyPairwise && sm->MICVerified)
|
|
SM_ENTER(WPA_PTK_GROUP, REKEYESTABLISHED);
|
|
SM_ENTER(WPA_PTK_GROUP, REKEYESTABLISHED);
|
|
else if (sm->GTimeoutCtr >
|
|
else if (sm->GTimeoutCtr >
|
|
- sm->wpa_auth->conf.wpa_group_update_count)
|
|
|
|
|
|
+ sm->wpa_auth->conf.wpa_group_update_count ||
|
|
|
|
+ (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
|
|
|
|
+ sm->GTimeoutCtr > 1))
|
|
SM_ENTER(WPA_PTK_GROUP, KEYERROR);
|
|
SM_ENTER(WPA_PTK_GROUP, KEYERROR);
|
|
else if (sm->TimeoutEvt)
|
|
else if (sm->TimeoutEvt)
|
|
SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
|
|
SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
|