mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
Use monotonic clock for last_sae_token_key_update
Just the usual, with a new function os_reltime_initialized() thrown in that checks whether time has ever been retrieved (time can't be completely zero). Signed-hostap: Johannes Berg <johannes.berg@intel.com>
This commit is contained in:
parent
100298e896
commit
fe52c210cf
@ -241,7 +241,7 @@ struct hostapd_data {
|
||||
#ifdef CONFIG_SAE
|
||||
/** Key used for generating SAE anti-clogging tokens */
|
||||
u8 sae_token_key[8];
|
||||
os_time_t last_sae_token_key_update;
|
||||
struct os_reltime last_sae_token_key_update;
|
||||
#endif /* CONFIG_SAE */
|
||||
};
|
||||
|
||||
|
@ -411,17 +411,17 @@ static struct wpabuf * auth_build_token_req(struct hostapd_data *hapd,
|
||||
{
|
||||
struct wpabuf *buf;
|
||||
u8 *token;
|
||||
struct os_time t;
|
||||
struct os_reltime now;
|
||||
|
||||
os_get_time(&t);
|
||||
if (hapd->last_sae_token_key_update == 0 ||
|
||||
t.sec > hapd->last_sae_token_key_update + 60) {
|
||||
os_get_reltime(&now);
|
||||
if (!os_reltime_initialized(&hapd->last_sae_token_key_update) ||
|
||||
os_reltime_expired(&now, &hapd->last_sae_token_key_update, 60)) {
|
||||
if (random_get_bytes(hapd->sae_token_key,
|
||||
sizeof(hapd->sae_token_key)) < 0)
|
||||
return NULL;
|
||||
wpa_hexdump(MSG_DEBUG, "SAE: Updated token key",
|
||||
hapd->sae_token_key, sizeof(hapd->sae_token_key));
|
||||
hapd->last_sae_token_key_update = t.sec;
|
||||
hapd->last_sae_token_key_update = now;
|
||||
}
|
||||
|
||||
buf = wpabuf_alloc(SHA256_MAC_LEN);
|
||||
|
@ -108,6 +108,12 @@ static inline int os_reltime_expired(struct os_reltime *now,
|
||||
}
|
||||
|
||||
|
||||
static inline int os_reltime_initialized(struct os_reltime *t)
|
||||
{
|
||||
return t->sec != 0 || t->usec != 0;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* os_mktime - Convert broken-down time into seconds since 1970-01-01
|
||||
* @year: Four digit year
|
||||
|
Loading…
Reference in New Issue
Block a user