hostap/src
Sunil Dutt 392e68e81f Set GTK rekey offload information after initial group key handshake
The GTK rekey offload information was sent to the driver immediately
after the 4-way handshake which ended up being before the initial group
key exchange in the case of WPA (v1). This could result in even that
initial GTK handshake being offloaded and wpa_supplicant being left in
WPA_GROUP_HANDSHAKE state. Fix this by postponing the operation to
happen only after the full set of initial EAPOL-Key exchanges have been
completed (i.e., in the existing location for WPA2 and a after the group
key handshake for WPA).

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
2013-10-30 11:41:40 +02:00
..
ap
common
crypto Use ARRAY_SIZE() macro 2013-10-26 17:49:05 +03:00
drivers
eap_common
eap_peer eap_proxy: Add context data pointer to the get_imsi call 2013-10-23 20:51:46 +03:00
eap_server
eapol_auth
eapol_supp
l2_packet Update license notification in files initially contributed by Sam 2012-06-30 19:36:04 +03:00
p2p
radius
rsn_supp
tls
utils Android: Fix ARRAY_SIZE() compilation 2013-10-29 14:40:15 +02:00
wps
lib.rules
Makefile