path: root/hostapd/wpa.h
Commit message (Collapse)AuthorAgeFilesLines
* Added endianness annotation for sparseJouni Malinen2009-01-031-4/+4
* Reject association if HT STA tries to use TKIP as pairwise cipherJouni Malinen2008-12-221-0/+1
* Clear various flags on re-association to allow key_mgmt changesJouni Malinen2008-11-301-0/+1
| | | | | | If a STA reassociates and changes key_mgmt (e.g., from WPA-PSK to WPS), hostapd needs to reset some of the existing STA and WPA state machine variables to allow correct processing for the new association.
* Added support for enforcing frequent PTK rekeyingJouni Malinen2008-11-061-0/+1
| | | | | | | | | | | | Added a new configuration option, wpa_ptk_rekey, that can be used to enforce frequent PTK rekeying, e.g., to mitigate some attacks against TKIP deficiencies. This can be set either by the Authenticator (to initiate periodic 4-way handshake to rekey PTK) or by the Supplicant (to request Authenticator to rekey PTK). With both wpa_ptk_rekey and wpa_group_rekey (in hostapd) set to 600, TKIP keys will not be used for more than 10 minutes which may make some attacks against TKIP more difficult to implement.
* Fixed WPA/RSN IE validation to verify the proto (WPA vs. WPA2) is enabledJouni Malinen2008-10-151-1/+1
| | | | | | Previous version could have allowed a broken client to complete WPA (or WPA2) authentication even if the selected proto was not enabled in hostapd configuration.
* IEEE Std 802.11r-2008 has been released, so update referencesJouni Malinen2008-08-151-1/+2
* Added support for opportunistic key caching (OKC)Jouni Malinen2008-08-031-0/+3
| | | | | This allows hostapd to share the PMKSA caches internally when multiple BSSes or radios are being controlled by the same hostapd process.
* Added WLAN_STA_MFP flag for driver wrappers so that they can configure theJouni Malinen2008-06-171-0/+1
| | | | driver to enable MFP (IEEE 802.11w) processing for the STA.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+276