mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
IBSS RSN: Add more verbose debug info for key setup
This commit is contained in:
parent
a95795ad61
commit
a486c0c72a
@ -107,21 +107,23 @@ static int supp_set_key(void *ctx, wpa_alg alg,
|
|||||||
{
|
{
|
||||||
struct ibss_rsn_peer *peer = ctx;
|
struct ibss_rsn_peer *peer = ctx;
|
||||||
|
|
||||||
|
wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
|
||||||
|
"set_tx=%d)",
|
||||||
|
__func__, alg, MAC2STR(addr), key_idx, set_tx);
|
||||||
|
wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
|
||||||
|
wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
|
||||||
|
|
||||||
if (key_idx == 0) {
|
if (key_idx == 0) {
|
||||||
/*
|
/*
|
||||||
* In IBSS RSN, the pairwise key from the 4-way handshake
|
* In IBSS RSN, the pairwise key from the 4-way handshake
|
||||||
* initiated by the peer with highest MAC address is used.
|
* initiated by the peer with highest MAC address is used.
|
||||||
*/
|
*/
|
||||||
if (os_memcmp(peer->ibss_rsn->wpa_s->own_addr, peer->addr,
|
if (os_memcmp(peer->ibss_rsn->wpa_s->own_addr, peer->addr,
|
||||||
ETH_ALEN) > 0)
|
ETH_ALEN) > 0) {
|
||||||
|
wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
|
|
||||||
"set_tx=%d)",
|
|
||||||
__func__, alg, MAC2STR(addr), key_idx, set_tx);
|
|
||||||
wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
|
|
||||||
wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
|
|
||||||
|
|
||||||
return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx,
|
return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx,
|
||||||
set_tx, seq, seq_len, key, key_len);
|
set_tx, seq, seq_len, key, key_len);
|
||||||
@ -243,14 +245,27 @@ static int auth_set_key(void *ctx, int vlan_id, wpa_alg alg, const u8 *addr,
|
|||||||
u8 seq[6];
|
u8 seq[6];
|
||||||
|
|
||||||
os_memset(seq, 0, sizeof(seq));
|
os_memset(seq, 0, sizeof(seq));
|
||||||
|
|
||||||
|
if (addr) {
|
||||||
|
wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
|
||||||
|
" key_idx=%d)",
|
||||||
|
__func__, alg, MAC2STR(addr), idx);
|
||||||
|
} else {
|
||||||
|
wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
|
||||||
|
__func__, alg, idx);
|
||||||
|
}
|
||||||
|
wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len);
|
||||||
|
|
||||||
if (idx == 0) {
|
if (idx == 0) {
|
||||||
/*
|
/*
|
||||||
* In IBSS RSN, the pairwise key from the 4-way handshake
|
* In IBSS RSN, the pairwise key from the 4-way handshake
|
||||||
* initiated by the peer with highest MAC address is used.
|
* initiated by the peer with highest MAC address is used.
|
||||||
*/
|
*/
|
||||||
if (os_memcmp(ibss_rsn->wpa_s->own_addr, addr, ETH_ALEN) < 0)
|
if (os_memcmp(ibss_rsn->wpa_s->own_addr, addr, ETH_ALEN) < 0) {
|
||||||
|
wpa_printf(MSG_DEBUG, "AUTH: Do not use this PTK");
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return wpa_drv_set_key(ibss_rsn->wpa_s, alg, addr, idx,
|
return wpa_drv_set_key(ibss_rsn->wpa_s, alg, addr, idx,
|
||||||
1, seq, 6, key, key_len);
|
1, seq, 6, key, key_len);
|
||||||
|
Loading…
Reference in New Issue
Block a user