mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-02-18 01:53:06 -05:00
Commit 296a34f0c1730416bf2a61ab78690be43d82a3c0 changed hostapd to remove the internal STA entry at the beginning of TKIP countermeasures. However, this did not take into account the case where this is triggered by an EAPOL-Key error report from a station. In such a case, WPA authenticator state machine may continue processing after having processed the error report. This could result in use of freed memory. Fix this by stopping WPA processing if the STA entry got removed. Signed-hostap: Jouni Malinen <j@w1.fi>
16 lines
451 B
C
16 lines
451 B
C
/*
|
|
* hostapd / TKIP countermeasures
|
|
* Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#ifndef TKIP_COUNTERMEASURES_H
|
|
#define TKIP_COUNTERMEASURES_H
|
|
|
|
int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local);
|
|
void ieee80211_tkip_countermeasures_deinit(struct hostapd_data *hapd);
|
|
|
|
#endif /* TKIP_COUNTERMEASURES_H */
|