aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/wpa_auth_ft.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2014-06-01 09:24:49 (GMT)
committerJouni Malinen <j@w1.fi>2014-06-01 10:21:40 (GMT)
commit3d4d2348c092fc3236504507466ff565c39d060a (patch)
treeac3ce2422742cacf8a94478ac03317156284ec70 /src/ap/wpa_auth_ft.c
parent3b25ad4cd64d08677d5664cb0bb54153d7baca80 (diff)
downloadhostap-3d4d2348c092fc3236504507466ff565c39d060a.zip
hostap-3d4d2348c092fc3236504507466ff565c39d060a.tar.gz
hostap-3d4d2348c092fc3236504507466ff565c39d060a.tar.bz2
FT: Fix GTK rekeying after FT protocol
Move to PTKINITDONE state and mark PTK valid after successful completion of FT protocol. This allows the AP/Authenticator to start GTK rekeying when FT protocol is used. Previously, the station using FT protocol did not get the new GTK which would break delivery of group addressed frames. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'src/ap/wpa_auth_ft.c')
-rw-r--r--src/ap/wpa_auth_ft.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/ap/wpa_auth_ft.c b/src/ap/wpa_auth_ft.c
index 7701596..a80bbb7 100644
--- a/src/ap/wpa_auth_ft.c
+++ b/src/ap/wpa_auth_ft.c
@@ -898,6 +898,7 @@ static int wpa_ft_process_auth_req(struct wpa_state_machine *sm,
wpa_hexdump(MSG_DEBUG, "FT: PTKName", ptk_name, WPA_PMK_NAME_LEN);
sm->pairwise = pairwise;
+ sm->PTK_valid = TRUE;
wpa_ft_install_ptk(sm);
buflen = 2 + sizeof(struct rsn_mdie) + 2 + sizeof(struct rsn_ftie) +