Configure new GTK/IGTK to driver in case of TKIP countermeasures
The GTK is renewed in the hostapd after a MIC attack dissassociation without informing the driver, causing decryption failures. This patch sends the new GTK/IGTK to the driver after it is updated by the hostapd. Signed-off-by: Yoni Divinsky <yoni.divinsky@ti.com>
This commit is contained in:
		
							parent
							
								
									6f75536fc9
								
							
						
					
					
						commit
						9354e59480
					
				
					 1 changed files with 1 additions and 0 deletions
				
			
		|  | @ -2507,6 +2507,7 @@ void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth) | ||||||
| 		group->GN_igtk = tmp; | 		group->GN_igtk = tmp; | ||||||
| #endif /* CONFIG_IEEE80211W */ | #endif /* CONFIG_IEEE80211W */ | ||||||
| 		wpa_gtk_update(wpa_auth, group); | 		wpa_gtk_update(wpa_auth, group); | ||||||
|  | 		wpa_group_config_group_keys(wpa_auth, group); | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
		Loading…
	
		Reference in a new issue
	
	 Yoni Divinsky
						Yoni Divinsky