Browse Source

krackattack: minor fixes

Mathy 7 years ago
parent
commit
57425f45b7
2 changed files with 4 additions and 4 deletions
  1. 3 3
      krackattack/krack-test-client.py
  2. 1 1
      src/ap/wpa_auth.c

+ 3 - 3
krackattack/krack-test-client.py

@@ -433,8 +433,8 @@ class KRAckAttackClient():
 			log(DEBUG, "%s: Removing ClientState object" % clientmac)
 
 	def handle_replay(self, p):
-		"""Replayed frames (caused by a pairwise key reinstallation) are rejected by the kernel.
-		This process these frames manually so we can still test reinstallations of the group key."""
+		"""Replayed frames (caused by a pairwise key reinstallation) are rejected by the kernel. This
+		function processes these frames manually so we can still test reinstallations of the group key."""
 		if not Dot11WEP in p: return
 
 		# Reconstruct Ethernet header
@@ -650,7 +650,7 @@ if __name__ == "__main__":
 	try:
 		interface = hostapd_read_config("hostapd.conf")
 	except Exception as ex:
-		log(ERROR, "Failed to parse the hostapd config file")
+		log(ERROR, "Failed to parse the hostapd.conf config file")
 		raise
 	if not interface:
 		log(ERROR, "Failed to determine wireless interface. Specify one in the hostapd config file.")

+ 1 - 1
src/ap/wpa_auth.c

@@ -2296,12 +2296,12 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
 		}
 		sm->pairwise_set = TRUE;
 	}
-#endif
 
 	// Reset transmit packet number of the group key, so we can detect if clients
 	// will accept re-used packet numbers (IVs) in broadcast data frames. Debug
 	// output is printed below.
 	wpa_group_config_group_keys(sm->wpa_auth, sm->group);
+#endif
 
 	/* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
 	   GTK[GN], IGTK, [FTIE], [TIE * 2])