which ioctl in driver takes WPA-TKIP passphrase?

Bryan Kadzban bryan
Tue Feb 20 19:06:30 PST 2007


Dan Williams wrote:
> You don't push the passphrase to the driver, you hash the passphrase 
> with wpa_passphrase to get the key and you push the key down to the 
> driver using SIOCSIWENCODEEXT.  Drivers certainly shouldn't be
> accepting passphrases unless they are smoking really, really unholy
> crack.

Is even the key accepted by the driver?  I thought the client needed to
generate a key from the passphrase, then do a 4-way handshake with the
AP using that key, to get a temporal key, and then finally program the
temporal key into the driver.  (Then it has to do a group handshake to
get the group key as well, although WPA2 does this during the second
half of the 4-way handshake.  Either way, the client needs to program
the group temporal key into the driver as well.)

And in any case, if you don't do the 4-way handshake after associating,
then the AP will either disconnect you, or not let you pass any traffic.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 252 bytes
Desc: OpenPGP digital signature
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20070220/f53f3c86/attachment.pgp 



More information about the Hostap mailing list