aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/wpa_auth_i.h
diff options
context:
space:
mode:
authorGünther Kelleter <guenther.kelleter@devolo.de>2017-01-05 16:00:33 (GMT)
committerJouni Malinen <j@w1.fi>2017-02-06 22:25:36 (GMT)
commit41f140d38617e1fd3fa88c1667c1bce0cad79224 (patch)
tree2e8a5691cb7e154a0ee74c2948320dff6f226692 /src/ap/wpa_auth_i.h
parente54691106b29f41aa3081b00eb4f48e411cebc72 (diff)
downloadhostap-41f140d38617e1fd3fa88c1667c1bce0cad79224.zip
hostap-41f140d38617e1fd3fa88c1667c1bce0cad79224.tar.gz
hostap-41f140d38617e1fd3fa88c1667c1bce0cad79224.tar.bz2
Add hostapd options wpa_group_update_count and wpa_pairwise_update_count
wpa_group_update_count and wpa_pairwise_update_count can now be used to set the GTK and PTK rekey retry limits (dot11RSNAConfigGroupUpdateCount and dot11RSNAConfigPairwiseUpdateCount). Defaults set to current hardcoded value (4). Some stations may suffer from frequent deauthentications due to GTK rekey failures: EAPOL 1/2 frame is not answered during the total timeout period of currently ~3.5 seconds. For example, a Galaxy S6 with Android 6.0.1 appears to go into power save mode for up to 5 seconds. Increasing wpa_group_update_count to 6 fixed this issue. Signed-off-by: Günther Kelleter <guenther.kelleter@devolo.de>
Diffstat (limited to 'src/ap/wpa_auth_i.h')
-rw-r--r--src/ap/wpa_auth_i.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/ap/wpa_auth_i.h b/src/ap/wpa_auth_i.h
index 065a624..cda2c50 100644
--- a/src/ap/wpa_auth_i.h
+++ b/src/ap/wpa_auth_i.h
@@ -48,8 +48,8 @@ struct wpa_state_machine {
Boolean AuthenticationRequest;
Boolean ReAuthenticationRequest;
Boolean Disconnect;
- int TimeoutCtr;
- int GTimeoutCtr;
+ u32 TimeoutCtr;
+ u32 GTimeoutCtr;
Boolean TimeoutEvt;
Boolean EAPOLKeyReceived;
Boolean EAPOLKeyPairwise;