Use os_get_random() for Shared Key authentication challenge
authorNick Lowe <nick.lowe@lugatech.com>
Tue, 9 Feb 2016 14:43:21 +0000 (14:43 +0000)
committerJouni Malinen <j@w1.fi>
Fri, 19 Feb 2016 16:44:40 +0000 (18:44 +0200)
commitf441e5af777c01f8649374fe91ff135e080aa959
treeac00c423780b07e8326325097563e4aa6eee8650
parent20c48fd99b1458db6ab61d4ec46aed2a824b257f
Use os_get_random() for Shared Key authentication challenge

Do not use the system clock or os_random() that uses a low quality PRNG
as part of the pseudo-random challenge in auth_shared_key(). The
construction can be improved upon by replacing it with a call to
os_get_random(), which uses a high quality PRNG.

Signed-off-by: Nick Lowe <nick.lowe@lugatech.com>
src/ap/ieee802_11.c