[PATCH] hostap: send the driver the new gtk after mic failure

Yoni Divinsky yoni.divinsky at ti.com
Tue Aug 9 03:42:04 EDT 2011


The GTK is renewed in the hostapd after a MIC attack 
dissassociation without informing the driver, 
causing decryption failures. 
This patch sends the new gtk to the driver after it
is updated by the hostapd.

Signed-off-by: Yoni Divinsky <yoni.divinsky at ti.com>
---
 src/ap/wpa_auth.c |    3 +++
 1 files changed, 3 insertions(+), 0 deletions(-)

diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c
index 3fbb88b..fb9242f 100644
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -2466,6 +2466,9 @@ void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth)
 #endif /* CONFIG_IEEE80211W */
 		wpa_gtk_update(wpa_auth, group);
 	}
+	/* Send the Key to the device */
+	wpa_group_setkeysdone (wpa_auth,wpa_auth->group);
 }
 
 
-- 
1.7.0.4



More information about the HostAP mailing list