fragattacks/src/eapol_auth
Jouni Malinen dee2020243 EAPOL auth: clear keyRun in AUTH_PAE INITIALIZE
Clearing keyRun here is not specified in IEEE Std 802.1X-2004, but it
looks like this would be logical thing to do here since the EAPOL-Key
exchange is not possible in this state. It is possible to get here on
disconnection event without advancing to the AUTHENTICATING state to
clear keyRun before the IEEE 802.11 RSN authenticator state machine runs
and that may advance from AUTHENTICATION2 to INITPMK if keyRun = TRUE
has been left from the last association. This can be avoided by clearing
keyRun here.

It was possible to hit this corner case in the hwsim test case
ap_wpa2_eap_eke_server_oom in the case getKey operation was forced to
fail memory allocation. The following association resulted in the
station getting disconnected when entering INITPMK without going through
EAP authentication.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2015-08-28 16:30:06 +03:00
..
eapol_auth_dump.c Check os_snprintf() result more consistently - automatic 1 2014-12-08 11:42:07 +02:00
eapol_auth_sm_i.h Add Acct-Multi-Session-Id into RADIUS Accounting messages 2014-10-18 10:38:17 +03:00
eapol_auth_sm.c EAPOL auth: clear keyRun in AUTH_PAE INITIALIZE 2015-08-28 16:30:06 +03:00
eapol_auth_sm.h EAP server: Add tls_session_lifetime configuration 2015-08-24 02:29:30 +03:00
Makefile tests: Add ap-mgmt-fuzzer 2015-04-22 11:44:19 +03:00