Ignore group-addressed SA Query frames
These frames are used for verifying that a specific SA and protected link is in functional state between two devices. The IEEE 802.11 standard defines only a case that uses individual MAC address as the destination. While there is no explicit rule on the receiver to ignore other cases, it seems safer to make sure group-addressed frames do not end up resulting in undesired behavior. As such, drop such frames instead of interpreting them as valid SA Query Request/Response. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
d314213f6c
commit
a826ff2d95
4 changed files with 15 additions and 3 deletions
|
@ -29,7 +29,7 @@ void sme_event_disassoc(struct wpa_supplicant *wpa_s,
|
|||
void sme_event_unprot_disconnect(struct wpa_supplicant *wpa_s, const u8 *sa,
|
||||
const u8 *da, u16 reason_code);
|
||||
void sme_event_ch_switch(struct wpa_supplicant *wpa_s);
|
||||
void sme_sa_query_rx(struct wpa_supplicant *wpa_s, const u8 *sa,
|
||||
void sme_sa_query_rx(struct wpa_supplicant *wpa_s, const u8 *da, const u8 *sa,
|
||||
const u8 *data, size_t len);
|
||||
void sme_state_changed(struct wpa_supplicant *wpa_s);
|
||||
void sme_disassoc_while_authenticating(struct wpa_supplicant *wpa_s,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue