Configure new GTK/IGTK to driver in case of TKIP countermeasures
authorYoni Divinsky <yoni.divinsky@ti.com>
Sun, 30 Oct 2011 20:19:49 +0000 (22:19 +0200)
committerJouni Malinen <j@w1.fi>
Sun, 30 Oct 2011 20:19:49 +0000 (22:19 +0200)
The GTK is renewed in the hostapd after a MIC attack dissassociation
without informing the driver, causing decryption failures. This patch
sends the new GTK/IGTK to the driver after it is updated by the hostapd.

Signed-off-by: Yoni Divinsky <yoni.divinsky@ti.com>
src/ap/wpa_auth.c

index c76b6ad..7ebfd8d 100644 (file)
@@ -2507,6 +2507,7 @@ void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth)
                group->GN_igtk = tmp;
 #endif /* CONFIG_IEEE80211W */
                wpa_gtk_update(wpa_auth, group);
+               wpa_group_config_group_keys(wpa_auth, group);
        }
 }