mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 09:18:24 -05:00
c772d054c2
Commit 296a34f0c1
changed hostapd to
remove the internal STA entry at the beginning of TKIP countermeasures.
However, this did not take into account the case where this is triggered
by an EAPOL-Key error report from a station. In such a case, WPA
authenticator state machine may continue processing after having
processed the error report. This could result in use of freed memory.
Fix this by stopping WPA processing if the STA entry got removed.
Signed-hostap: Jouni Malinen <j@w1.fi>
16 lines
451 B
C
16 lines
451 B
C
/*
|
|
* hostapd / TKIP countermeasures
|
|
* Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#ifndef TKIP_COUNTERMEASURES_H
|
|
#define TKIP_COUNTERMEASURES_H
|
|
|
|
int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local);
|
|
void ieee80211_tkip_countermeasures_deinit(struct hostapd_data *hapd);
|
|
|
|
#endif /* TKIP_COUNTERMEASURES_H */
|