path: root/wpa_supplicant/ibss_rsn.h
Commit message (Collapse)AuthorAgeFilesLines
* Add group_rekey parameter for IBSSJouni Malinen2016-08-131-1/+2
| | | | | | | The new network profile parameter group_rekey can now be used to specify the group rekeying internal in seconds for IBSS. Signed-off-by: Jouni Malinen <j@w1.fi>
* IBSS RSN: Use monotonic time for reinit detectionJohannes Berg2013-12-241-1/+1
| | | | | | | | The reinit detection skips reinit when the time since the own authentication frame TX is less than half a second, so it shouldn't be affected by wall time and use monotonic time instead. Signed-hostap: Johannes Berg <johannes.berg@intel.com>
* IBSS RSN: Work around Data RX vs. Authentication RX race conditionJouni Malinen2013-08-261-0/+2
| | | | | | | | | | | | | It is possible for the driver to report EAPOL frame RX before Authentication frame RX even if the frames arrived in the opposite order. This can result in issues in cases where both IBSS peers initiate Authentication frame exchange at about the same time and one of the EAPOL sessions is started before processing Authentication frame seq=1 RX. Work around this by not re-initializing EAPOL state on Authentication (SEQ=1) RX if own Authentication frame was transmitted within last 500 ms. Signed-hostap: Jouni Malinen <j@w1.fi>
* IBSS RSN: Add IBSS-RSN-COMPLETED event messageJouni Malinen2013-08-251-0/+6
| | | | | | | This new control interface event message is used to indicate when both 4-way handshakes have been completed with a new IBSS peer. Signed-hostap: Jouni Malinen <j@w1.fi>
* IBSS RSN: Add peer restart detectionAntonio Quartulli2013-07-211-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | To better support the IBSS/RSN mechanism, wpa_supplicant has to be able to detect a possible peer reboot and in this case it should start a new EAPOL handshake. To perform such reboot detection wpa_supplicant has to perform an Open Authentication by sending an Authentication frame and then replying to it. IF an Authentication frame is received when the key have already been exchanged, wpa_supplicant understands that the peer has rebooted and can reset its state machine. Whenever a new peer is added to the IBSS wpa_supplicant will start the Open Authentication and only after having accomplished it will start the key exchange. If the driver does not support Authentication frame exchange initiated from user space, this step is skipped to maintain previous behavior (just go through EAPOL-Key frame processing). The Open Authentication was partly supported by the Linux kernel but now wpa_supplicant can register for Authentication frames, handle it in userspace and so avoid any possible race condition. Signed-hostap: Nicolas Cavallari <cavallar@lri.fr> Signed-hostap: Antonio Quartulli <antonio@open-mesh.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* RSN IBSS: Restart IBSS state machines for each new IBSSJouni Malinen2011-03-231-5/+0
| | | | | | | | Change the old design of running a single long living RSN IBSS instance to keep a separate instance for each IBSS connection. This fixes number of issues in getting keys set properly for new connections and is in general quite a bit more correct design.
* IBSS RSN: Clear IBSS RSN peers based on peer lost eventsXi Chen2011-03-181-0/+1
* IBSS RSN: Delay setting of the initial TX GTKJouni Malinen2011-01-151-0/+5
| | | | | | The driver may get confused if we set the initial TX GTK before having fully configured and connected to an IBSS, so better delay this operation until the connection (join/start IBSS) has been completed.
* Get rid of unnecessary typedefs for enums.Jouni Malinen2009-12-261-1/+1
* IBSS RSN: Set the PSK based on network configurationJouni Malinen2009-01-171-0/+1
* IBSS RSN: Set more hardcoded RSN IEs for nowJouni Malinen2009-01-171-0/+2
| | | | This allows 4-way handshakes to be completed successfully.
* IBSS RSN: Added couple of required WPA supplicant callback functionsJouni Malinen2009-01-171-0/+1
* Process received EAPOL frames in IBSS RSN code if in IBSS modeJouni Malinen2009-01-171-0/+2
* Implement EAPOL sending callbacks for IBSS RSNJouni Malinen2009-01-151-0/+3
* Added initial step for IBSS RSN supportJouni Malinen2009-01-141-0/+40
This commit adds a new build option, CONFIG_IBSS_RSN=y, that can be used to enable RSN support for IBSS. This links in RSN Authenticator code from hostapd and adds code for managing per-peer information for IBSS. A new wpa_cli command or driver event can be used to request RSN authentication with an IBSS peer. New RSN Authenticator and Supplicant will be allocated for each peer. The basic state machine setup code is included in this commit, but the state machines are not properly started yet. In addition, some of the callback functions are not yet complete.