aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2005-06-24 04:21:26 (GMT)
committerJouni Malinen <j@w1.fi>2005-06-24 04:21:26 (GMT)
commita12dc6b699392c7c3f8013ca64c55df88b09cc65 (patch)
tree36fc511d89e597ea58ec7448a07899d8b2ee65d2
parent78a5bdbb4f2c0af06af0be17a9a0a236cb529687 (diff)
downloadhostap-history-a12dc6b699392c7c3f8013ca64c55df88b09cc65.zip
hostap-history-a12dc6b699392c7c3f8013ca64c55df88b09cc65.tar.gz
hostap-history-a12dc6b699392c7c3f8013ca64c55df88b09cc65.tar.bz2
Fixed reauth request generation based on
dot11RSNAConfigPMKReauthThreshold.
-rw-r--r--wpa_supplicant/preauth.c3
-rw-r--r--wpa_supplicant/todo.txt17
2 files changed, 17 insertions, 3 deletions
diff --git a/wpa_supplicant/preauth.c b/wpa_supplicant/preauth.c
index c07e9bd..114dcfb 100644
--- a/wpa_supplicant/preauth.c
+++ b/wpa_supplicant/preauth.c
@@ -80,7 +80,7 @@ static void pmksa_cache_free_entry(struct wpa_sm *sm,
int current;
current = sm->cur_pmksa == entry ||
- (sm->pmk_len = entry->pmk_len &&
+ (sm->pmk_len == entry->pmk_len &&
memcmp(sm->pmk, entry->pmk, sm->pmk_len) == 0);
free(entry);
@@ -118,6 +118,7 @@ static void pmksa_cache_reauth(void *eloop_ctx, void *timeout_ctx)
{
struct wpa_sm *sm = eloop_ctx;
struct wpa_supplicant *wpa_s = sm->ctx;
+ sm->cur_pmksa = NULL;
eapol_sm_request_reauth(wpa_s->eapol);
}
diff --git a/wpa_supplicant/todo.txt b/wpa_supplicant/todo.txt
index 0428088..adad6c3 100644
--- a/wpa_supplicant/todo.txt
+++ b/wpa_supplicant/todo.txt
@@ -43,9 +43,22 @@ To do:
driver_wired.c only reports empty SSID and association is not assumed to be
ok
- EAP-PAX with PAX_SEC
-- PMKSA cache entry expiration -> force reauth if PMK from the entry was
- currently in use
- add wpa_cli and wpa_gui commands for adding new networks and setting
security parameters for the networks
- ndis_events was reported not to work on Win2k; SENS should work:
http://msdn.microsoft.com/msdnmag/issues/02/08/SENS/default.aspx
+- EAP: extended nak, vendor method; go through rfc
+ RFC 3748
+ * Expanded Type (Sect. 5.7)
+ * Experimental Type
+ * Expanded Nak (Sect. 5.3.2)
+ * OTP Extended Responses (Sect. 5.5)
+- test what happens if authenticator sends EAP-Success before real EAP
+ authentication ("canned" Success); this should be ignored based on
+ RFC 3748 Sect. 4.2
+- EAP peer may conclude that EAP-Success was lost (e.g., if WPA key msg is
+ received?) and that authentication concluded successfully
+- stack size profiling, reduce stack use; valgrind --tool=massif
+- test compilation with gcc -W options (more warnings?)
+- add proper support for using dot11RSNAConfigPMKReauthThreshold,
+ dot11RSNAConfigSATimeout