hostap/wlantest
Jouni Malinen d0b251d2e8 wlantest: Fix handling of PTK rekeying
Use a temporary PTK buffer during 4-way handshake when rekeying PTK
so that the new EAPOL-Key frame MIC values are checked against the
new PTK and frames are decrypted using the old PTK. Take the new
PTK into use once msg 4/4 is processed and clear RSC counters at
that point (including moving of RSC update to avoid setting RSC
based on the msg 4/4).

In addition, add a workaround to handle supplicant implementations that
set Secure bit to one during PTK rekeying 4-way handshake in msg 2/4.
This was previously assumed to be msg 4/4, but the key data contents
can be used to figure out whether this is msg 2/4 even if the Secure
bit is set to one.

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
2011-11-14 22:36:02 +02:00
..
bss.c
ccmp.c
crc32.c
ctrl.c
inject.c
Makefile
monitor.c
process.c
readpcap.c
rx_data.c
rx_eapol.c
rx_ip.c
rx_mgmt.c
rx_tdls.c
sta.c
tkip.c
wep.c
wired.c wlantest: Derive PMK from RADIUS exchange 2010-11-07 23:29:02 +02:00
wlantest.c
wlantest.h
wlantest_cli.c
wlantest_ctrl.h
writepcap.c