Skip to content

Commit 7717ef8

Browse files
author
Mika Leppänen
committed
Improved initial EAPOL-key send stop logic on supplicant
Previously, during bootstrap authentication and on key update, any incoming KMP halted the supplicant from sending the initial EAPOL-key message to authenticator. Now the functionality is changed so that only accepted incoming KMPs (e.g. valid EAP-TLS identity requests) halt the sending of initial EAPOL-key messages. Ignored KMPs do not halt the sending.
1 parent 4185734 commit 7717ef8

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

source/6LoWPAN/ws/ws_pae_supp.c

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1175,9 +1175,6 @@ static kmp_api_t *ws_pae_supp_kmp_incoming_ind(kmp_service_t *service, kmp_type_
11751175
return NULL;
11761176
}
11771177

1178-
// No longer runs trickle timer for re-sending initial EAPOL-key
1179-
pae_supp->auth_trickle_running = false;
1180-
11811178
// Updates parent address
11821179
kmp_address_copy(&pae_supp->entry.addr, addr);
11831180

@@ -1271,6 +1268,15 @@ static void ws_pae_supp_kmp_api_create_indication(kmp_api_t *kmp, kmp_type_e typ
12711268
(void) addr;
12721269
(void) type;
12731270

1271+
kmp_service_t *service = kmp_api_service_get(kmp);
1272+
pae_supp_t *pae_supp = ws_pae_supp_by_kmp_service_get(service);
1273+
if (!pae_supp) {
1274+
return;
1275+
}
1276+
1277+
// Incoming KMP protocol has started, no longer runs trickle timer for re-sending EAPOL-key message
1278+
pae_supp->auth_trickle_running = false;
1279+
12741280
// For now, accept every KMP-CREATE.indication
12751281
kmp_api_create_response(kmp, KMP_RESULT_OK);
12761282
}

0 commit comments

Comments
 (0)