summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorStefan Sperling <stsp@cvs.openbsd.org>2018-11-02 14:40:25 +0000
committerStefan Sperling <stsp@cvs.openbsd.org>2018-11-02 14:40:25 +0000
commit771cde1fdc6f2b34544dd515227ceef5b63fc10f (patch)
tree8fd6ffde5b8338739bde6a63d6834c29abc1e0df
parentf1c343c1f6e0744b7970524ebec2b141981e7861 (diff)
Remove 'reused group key update received' printfs.
These have served no useful purpose in practice; all reported instances were legitimate group key retransmissions by the AP, e.g. after laptop suspend. We fixed KRACK long ago; re-used group key messages are nothing to worry about.
-rw-r--r--sys/net80211/ieee80211_pae_input.c22
1 files changed, 6 insertions, 16 deletions
diff --git a/sys/net80211/ieee80211_pae_input.c b/sys/net80211/ieee80211_pae_input.c
index f62d5f2dba4..ba8c1872a2d 100644
--- a/sys/net80211/ieee80211_pae_input.c
+++ b/sys/net80211/ieee80211_pae_input.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ieee80211_pae_input.c,v 1.31 2017/10/16 10:39:41 stsp Exp $ */
+/* $OpenBSD: ieee80211_pae_input.c,v 1.32 2018/11/02 14:40:24 stsp Exp $ */
/*-
* Copyright (c) 2007,2008 Damien Bergamini <damien.bergamini@free.fr>
@@ -603,9 +603,7 @@ ieee80211_recv_4way_msg3(struct ieee80211com *ic,
reason = IEEE80211_REASON_AUTH_LEAVE;
goto deauth;
}
- } else
- printf("%s: reused group key update received from %s\n",
- ic->ic_if.if_xname, ether_sprintf(ni->ni_macaddr));
+ }
}
if (igtk != NULL) { /* implies MFP && gtk != NULL */
u_int16_t kid;
@@ -636,9 +634,7 @@ ieee80211_recv_4way_msg3(struct ieee80211com *ic,
reason = IEEE80211_REASON_AUTH_LEAVE;
goto deauth;
}
- } else
- printf("%s: reused group key update received from %s\n",
- ic->ic_if.if_xname, ether_sprintf(ni->ni_macaddr));
+ }
}
if (info & EAPOL_KEY_INSTALL)
ni->ni_flags |= IEEE80211_NODE_TXRXPROT;
@@ -879,9 +875,7 @@ ieee80211_recv_rsn_group_msg1(struct ieee80211com *ic,
reason = IEEE80211_REASON_AUTH_LEAVE;
goto deauth;
}
- } else
- printf("%s: reused group key update received from %s\n",
- ic->ic_if.if_xname, ether_sprintf(ni->ni_macaddr));
+ }
if (igtk != NULL) { /* implies MFP */
/* check that the IGTK KDE is valid */
if (igtk[1] != 4 + 24) {
@@ -909,9 +903,7 @@ ieee80211_recv_rsn_group_msg1(struct ieee80211com *ic,
reason = IEEE80211_REASON_AUTH_LEAVE;
goto deauth;
}
- } else
- printf("%s: reused group key update received from %s\n",
- ic->ic_if.if_xname, ether_sprintf(ni->ni_macaddr));
+ }
}
if (info & EAPOL_KEY_SECURE) {
#ifndef IEEE80211_STA_ONLY
@@ -1016,9 +1008,7 @@ ieee80211_recv_wpa_group_msg1(struct ieee80211com *ic,
ieee80211_new_state(ic, IEEE80211_S_SCAN, -1);
return;
}
- } else
- printf("%s: reused group key update received from %s\n",
- ic->ic_if.if_xname, ether_sprintf(ni->ni_macaddr));
+ }
if (info & EAPOL_KEY_SECURE) {
#ifndef IEEE80211_STA_ONLY
if (ic->ic_opmode != IEEE80211_M_IBSS ||