diff options
author | Jouni Malinen <j@w1.fi> | 2017-09-22 11:59:13 (GMT) |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2017-10-15 23:03:47 (GMT) |
commit | a0bf1b68c034ed2e479a1d88f08b8bc0708f4efe (patch) | |
tree | d21024c8b02d2d3f58c0a01e7249337abb8e1e91 /hostapd/Android.mk | |
parent | 2956fcc4010f59b473c07eed16dc10d75cbebbc2 (diff) | |
download | hostap-a0bf1b68c034ed2e479a1d88f08b8bc0708f4efe.zip hostap-a0bf1b68c034ed2e479a1d88f08b8bc0708f4efe.tar.gz hostap-a0bf1b68c034ed2e479a1d88f08b8bc0708f4efe.tar.bz2 |
Remove all PeerKey functionality
This was originally added to allow the IEEE 802.11 protocol to be
tested, but there are no known fully functional implementations based on
this nor any known deployments of PeerKey functionality. Furthermore,
PeerKey design in the IEEE Std 802.11-2016 standard has already been
marked as obsolete for DLS and it is being considered for complete
removal in REVmd.
This implementation did not really work, so it could not have been used
in practice. For example, key configuration was using incorrect
algorithm values (WPA_CIPHER_* instead of WPA_ALG_*) which resulted in
mapping to an invalid WPA_ALG_* value for the actual driver operation.
As such, the derived key could not have been successfully set for the
link.
Since there are bugs in this implementation and there does not seem to
be any future for the PeerKey design with DLS (TDLS being the future for
DLS), the best approach is to simply delete all this code to simplify
the EAPOL-Key handling design and to get rid of any potential issues if
these code paths were accidentially reachable.
Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'hostapd/Android.mk')
-rw-r--r-- | hostapd/Android.mk | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/hostapd/Android.mk b/hostapd/Android.mk index a1153b3..73f96ed 100644 --- a/hostapd/Android.mk +++ b/hostapd/Android.mk @@ -215,11 +215,6 @@ L_CFLAGS += -DCONFIG_RSN_PREAUTH CONFIG_L2_PACKET=y endif -ifdef CONFIG_PEERKEY -L_CFLAGS += -DCONFIG_PEERKEY -OBJS += src/ap/peerkey_auth.c -endif - ifdef CONFIG_HS20 NEED_AES_OMAC1=y CONFIG_PROXYARP=y |