|
@@ -1978,8 +1978,11 @@ SM_STEP(WPA_PTK)
|
|
|
if (sm->Init)
|
|
|
SM_ENTER(WPA_PTK, INITIALIZE);
|
|
|
else if (sm->Disconnect
|
|
|
- /* || FIX: dot11RSNAConfigSALifetime timeout */)
|
|
|
+ /* || FIX: dot11RSNAConfigSALifetime timeout */) {
|
|
|
+ wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG,
|
|
|
+ "WPA_PTK: sm->Disconnect");
|
|
|
SM_ENTER(WPA_PTK, DISCONNECT);
|
|
|
+ }
|
|
|
else if (sm->DeauthenticationRequest)
|
|
|
SM_ENTER(WPA_PTK, DISCONNECTED);
|
|
|
else if (sm->AuthenticationRequest)
|
|
@@ -2015,6 +2018,8 @@ SM_STEP(WPA_PTK)
|
|
|
SM_ENTER(WPA_PTK, PTKSTART);
|
|
|
else {
|
|
|
wpa_auth->dot11RSNA4WayHandshakeFailures++;
|
|
|
+ wpa_auth_logger(sm->wpa_auth, sm->addr, LOGGER_INFO,
|
|
|
+ "INITPMK - keyAvailable = false");
|
|
|
SM_ENTER(WPA_PTK, DISCONNECT);
|
|
|
}
|
|
|
break;
|
|
@@ -2035,6 +2040,9 @@ SM_STEP(WPA_PTK)
|
|
|
else if (sm->TimeoutCtr >
|
|
|
(int) dot11RSNAConfigPairwiseUpdateCount) {
|
|
|
wpa_auth->dot11RSNA4WayHandshakeFailures++;
|
|
|
+ wpa_auth_vlogger(sm->wpa_auth, sm->addr, LOGGER_DEBUG,
|
|
|
+ "PTKSTART: Retry limit %d reached",
|
|
|
+ dot11RSNAConfigPairwiseUpdateCount);
|
|
|
SM_ENTER(WPA_PTK, DISCONNECT);
|
|
|
} else if (sm->TimeoutEvt)
|
|
|
SM_ENTER(WPA_PTK, PTKSTART);
|
|
@@ -2058,6 +2066,10 @@ SM_STEP(WPA_PTK)
|
|
|
else if (sm->TimeoutCtr >
|
|
|
(int) dot11RSNAConfigPairwiseUpdateCount) {
|
|
|
wpa_auth->dot11RSNA4WayHandshakeFailures++;
|
|
|
+ wpa_auth_vlogger(sm->wpa_auth, sm->addr, LOGGER_DEBUG,
|
|
|
+ "PTKINITNEGOTIATING: Retry limit %d "
|
|
|
+ "reached",
|
|
|
+ dot11RSNAConfigPairwiseUpdateCount);
|
|
|
SM_ENTER(WPA_PTK, DISCONNECT);
|
|
|
} else if (sm->TimeoutEvt)
|
|
|
SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);
|