aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJouni Malinen <jouni@codeaurora.org>2019-04-18 22:11:41 (GMT)
committerJouni Malinen <j@w1.fi>2019-04-18 22:12:29 (GMT)
commitd178ab0d5783ca8ad1a4048c16178b085a3a9f1b (patch)
tree22ce8230861f1db67e52062b6a738703a4ba97d4
parent267c366f382405e5c42fb3d391efca5d0e2491d6 (diff)
downloadhostap-d178ab0d5783ca8ad1a4048c16178b085a3a9f1b.zip
hostap-d178ab0d5783ca8ad1a4048c16178b085a3a9f1b.tar.gz
hostap-d178ab0d5783ca8ad1a4048c16178b085a3a9f1b.tar.bz2
FT: Start PTK rekey timer on FT protocol completion
This is needed to trigger PTK rekeying properly for associations started with FT protocol. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
-rw-r--r--src/ap/wpa_auth.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c
index fe0f85d..a956e52 100644
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -1783,6 +1783,7 @@ int wpa_auth_sm_event(struct wpa_state_machine *sm, enum wpa_event event)
/* Using FT protocol, not WPA auth state machine */
sm->ft_completed = 1;
+ wpa_auth_set_ptk_rekey_timer(sm);
return 0;
#else /* CONFIG_IEEE80211R_AP */
break;