aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorYoni Divinsky <yoni.divinsky@ti.com>2011-10-30 20:19:49 (GMT)
committerJouni Malinen <j@w1.fi>2011-10-30 20:19:49 (GMT)
commit9354e59480fbdffa4e773728909d1e0d4a2be68a (patch)
tree49499c291ac223138be257de26ac0489caa6a57f
parent6f75536fc9d3b05b049e2a0028a3ffd7da78e1c3 (diff)
downloadhostap-9354e59480fbdffa4e773728909d1e0d4a2be68a.zip
hostap-9354e59480fbdffa4e773728909d1e0d4a2be68a.tar.gz
hostap-9354e59480fbdffa4e773728909d1e0d4a2be68a.tar.bz2
Configure new GTK/IGTK to driver in case of TKIP countermeasures
The GTK is renewed in the hostapd after a MIC attack dissassociation without informing the driver, causing decryption failures. This patch sends the new GTK/IGTK to the driver after it is updated by the hostapd. Signed-off-by: Yoni Divinsky <yoni.divinsky@ti.com>
-rw-r--r--src/ap/wpa_auth.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c
index c76b6ad..7ebfd8d 100644
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -2507,6 +2507,7 @@ void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth)
group->GN_igtk = tmp;
#endif /* CONFIG_IEEE80211W */
wpa_gtk_update(wpa_auth, group);
+ wpa_group_config_group_keys(wpa_auth, group);
}
}