aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/wpa_auth_i.h
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2010-04-04 06:16:11 (GMT)
committerJouni Malinen <j@w1.fi>2010-04-04 06:16:11 (GMT)
commitd8ad6cb966bf6e2e25b9d406eb837102a87833e6 (patch)
tree225442f819e762f5759966f892e39330357556c9 /src/ap/wpa_auth_i.h
parent9a3cb18d743ec9939fb8d6c81aafdbe4be5d6e00 (diff)
downloadhostap-d8ad6cb966bf6e2e25b9d406eb837102a87833e6.zip
hostap-d8ad6cb966bf6e2e25b9d406eb837102a87833e6.tar.gz
hostap-d8ad6cb966bf6e2e25b9d406eb837102a87833e6.tar.bz2
FT: Force key configuration after association in FT-over-DS
This seems to be needed at least with mac80211 when a STA is using FT-over-DS to reassociate back to the AP when the AP still has the previous association state.
Diffstat (limited to 'src/ap/wpa_auth_i.h')
-rw-r--r--src/ap/wpa_auth_i.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/ap/wpa_auth_i.h b/src/ap/wpa_auth_i.h
index 86df3a4..3901c7d 100644
--- a/src/ap/wpa_auth_i.h
+++ b/src/ap/wpa_auth_i.h
@@ -116,6 +116,7 @@ struct wpa_state_machine {
* Request */
u8 r0kh_id[FT_R0KH_ID_MAX_LEN]; /* R0KH-ID from FT Auth Request */
size_t r0kh_id_len;
+ int ft_over_ds;
#endif /* CONFIG_IEEE80211R */
};