Allow forcing group rekeying for testing purposes
In order to test the WoWLAN GTK rekeying KRACK mitigation, add a REKEY_GTK hostapd control interface command that can be used at certain points of the test. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
This commit is contained in:
parent
7d1ebdec18
commit
92662fb281
3 changed files with 13 additions and 0 deletions
|
@ -4773,4 +4773,13 @@ int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
|
|||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int wpa_auth_rekey_gtk(struct wpa_authenticator *wpa_auth)
|
||||
{
|
||||
if (!wpa_auth)
|
||||
return -1;
|
||||
eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
|
||||
return eloop_register_timeout(0, 0, wpa_rekey_gtk, wpa_auth, NULL);
|
||||
}
|
||||
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
|
|
|
@ -437,5 +437,6 @@ int wpa_auth_resend_m3(struct wpa_state_machine *sm,
|
|||
int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
|
||||
void (*cb)(void *ctx1, void *ctx2),
|
||||
void *ctx1, void *ctx2);
|
||||
int wpa_auth_rekey_gtk(struct wpa_authenticator *wpa_auth);
|
||||
|
||||
#endif /* WPA_AUTH_H */
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue