mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 09:18:24 -05:00
1ac2d4a9ee
It looks like some Windows NDIS drivers (e.g., Intel) do not clear the PMKID list even when wpa_supplicant explicitly sets the list to be empty. In such a case, the driver ends up trying to use PMKSA caching with the AP and wpa_supplicant may not have the PMK that would be needed to complete 4-way handshake. RSN processing already had some code for aborting PMKSA caching by sending EAPOL-Start. However, this was not triggered in this particular case where the driver generates the RSN IE. With this change, this case is included, too, and the failed PMKSA caching attempt is cleanly canceled and wpa_supplicant can fall back to full EAP authentication. |
||
---|---|---|
.. | ||
.gitignore | ||
Makefile | ||
peerkey.c | ||
peerkey.h | ||
pmksa_cache.c | ||
pmksa_cache.h | ||
preauth.c | ||
preauth.h | ||
wpa_ft.c | ||
wpa_i.h | ||
wpa_ie.c | ||
wpa_ie.h | ||
wpa.c | ||
wpa.h |