mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-29 10:48:22 -05:00
392e68e81f
The GTK rekey offload information was sent to the driver immediately after the 4-way handshake which ended up being before the initial group key exchange in the case of WPA (v1). This could result in even that initial GTK handshake being offloaded and wpa_supplicant being left in WPA_GROUP_HANDSHAKE state. Fix this by postponing the operation to happen only after the full set of initial EAPOL-Key exchanges have been completed (i.e., in the existing location for WPA2 and a after the group key handshake for WPA). Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> |
||
---|---|---|
.. | ||
Makefile | ||
peerkey.c | ||
peerkey.h | ||
pmksa_cache.c | ||
pmksa_cache.h | ||
preauth.c | ||
preauth.h | ||
tdls.c | ||
wpa_ft.c | ||
wpa_i.h | ||
wpa_ie.c | ||
wpa_ie.h | ||
wpa.c | ||
wpa.h |