path: root/wpa_supplicant/sme.h
Commit message (Collapse)AuthorAgeFilesLines
* STA OBSS: Add check for overlapping BSSsSergey Matyukevich2019-12-261-2/+4
| | | | | | | | | | | | | | | | In the previous implementation connected STA performs OBSS scan according to requests from its 20/40 MHz AP. However STA checks only 40 MHz intolerance subfield from HT Capabilities element in scan results. Meanwhile, as per IEEE Std 802.11-2016, 11.16.12, STA should check overlapping BSSs as well. Note that all the required code to check overlapping BSSs did already exist for AP mode since AP does those checks properly before operating as 20/40 MHz BSS in the 2.4 GHz band. Use that existing code by replace existing 40 MHz intolerance check in sme_proc_obss_scan() with the new shared helper function check_bss_coex_40mhz(). Signed-off-by: Sergey Matyukevich <sergey.matyukevich.os@quantenna.com>
* OCV: Perform an SA Query after a channel switchMathy Vanhoef2018-12-171-0/+5
| | | | | | | | | | | After the network changed to a new channel, perform an SA Query with the AP after a random delay if OCV was negotiated for the association. This is used to confirm that we are still operating on the real operating channel of the network. This commit is adding only the station side functionality for this, i.e., the AP behavior is not changed to disconnect stations with OCV that do not go through SA Query. Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
* SAE: Support external authentication offload for driver-SME casesSunil Dutt2018-02-021-0/+14
| | | | | | | | | | Extend the SME functionality to support the external authentication. External authentication may be used by the drivers that do not define separate commands for authentication and association (~WPA_DRIVER_FLAGS_SME) but rely on wpa_supplicant's SME for the authentication. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* SAE: Clear keys from memory on disassociationJouni Malinen2014-12-291-0/+5
| | | | | | | | There is no need to keep temporary keys in memory beyond the end of the association, so explicitly clear any SAE buffers that can contain keys as soon as such keys are not needed. Signed-off-by: Jouni Malinen <j@w1.fi>
* Clean up wpa_supplicant_event() with deauth/disassoc helper functionsJouni Malinen2013-07-211-2/+2
| | | | | | | wpa_supplicant_event() has grown overly large, so it is useful to split it into smaller pieces. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add handling of OBSS scan requests and 20/40 BSS coex reportsRajkumar Manoharan2012-05-031-0/+13
| | | | | | | | | | | | | | | | Add support for HT STA to report 40 MHz intolerance to the associated AP. A HT station generates a report (20/40 BSS coexistence) of channel list if it finds a non-HT capable AP or a HT AP which prohibits 40 MHz transmission (i.e., 40 MHz intolerant bit is set in HT capabilities IE) from the scan results. Parse the OBSS scan parameter from Beacon or Probe Response frames and schedule periodic scan to generate 20/40 coexistence channel report if requested to do so. This patch decodes Scan Interval alone from the OBSS Scan Parameters element and triggers scan on timeout. Signed-off-by: Rajkumar Manoharan <rmanohar@qca.qualcomm.com> Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* SME: Add timers for authentication and asscoiationBen Greear2011-02-241-1/+18
| | | | | | | | mac80211 authentication or association operation may get stuck for some reasons, so wpa_supplicant better use an internal timer to recover from this. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Use SA Query procedure to recovery from AP/STA state mismatchJouni Malinen2010-12-191-0/+11
| | | | | | | | | | | If a station received unprotected Deauthentication or Disassociation frame with reason code 6 or 7 from the current AP, there may be a mismatch in association state between the AP and STA. Verify whether this is the case by using SA Query procedure. If not response is received from the AP, deauthenticate. This implementation is only for user space SME with driver_nl80211.c.
* FT: Request reassociation after successful FT Action frame exchangeJouni Malinen2010-03-131-1/+3
* Use BSS table entry instead of raw scan result for connectionJouni Malinen2010-01-021-2/+2
* SME: Deauthenticate to clear state after disassociation eventsJouni Malinen2009-12-021-0/+7
| | | | | | | | | cfg80211/mac80211 can get into somewhat confused state if the AP only disassociates us and leaves us in authenticated state. For now, force the state to be cleared with deauthentication to avoid confusing errors if we try to associate with the AP again. This gets rid of 30 second delay (scan timeout) in cases where only a disassociation frame is received from the AP.
* Add handling of SME auth/assoc timeout eventsJouni Malinen2009-04-231-0/+14
| | | | | This allows wpa_supplicant to start searching for other APs (or re-try) if the MLME times out.
* SME: Add processing for rejected associationsJouni Malinen2009-04-011-0/+9
* Add SME support (separate authentication and association)Jouni Malinen2009-03-201-0/+46
This can be used, e.g., with mac80211-based Linux drivers with nl80211. This allows over-the-air FT protocol to be used (IEEE 802.11r). Since the nl80211 interface needed for this is very recent (added today into wireless-testing.git), driver_nl80211.c has backwards compatibility code that uses WEXT for association if the kernel does not support the new commands. This compatibility code can be disabled by defining NO_WEXT_COMPAT. That code will also be removed at some point to clean up driver_nl80211.c.