hostapd/src/eapol_auth
Jouni Malinen 386d59e00d Do not disconnect EAPOL-Logoff before authentication
Some station devices are apparently sending the EAPOL-Logoff message in
some cases before the initial authentication for WPA2/WPA3-Enterprise.
hostapd would have forced a "post EAP-Failure" disconnection in 10 ms
for such cases while still allowing the EAP authentication to try to
complete.

This is not ideal and could result in interoperability issues, so skip
the forced disconnection in the particular case where the EAPOL-Logoff
message is received before the first authentication is completed.

In addition, disconnect the STA without starting new EAP authentication
and the 10 ms delay if an EAPOL-Logoff message is received after
authentication has been completed successfully. This results in cleaner
behavior by avoiding the extra start of a new EAP authentication in a
case where the STA is going to be disconnected shortly.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
2023-05-04 11:10:16 +03:00
..
eapol_auth_dump.c Check os_snprintf() result more consistently - automatic 1 2014-12-08 11:42:07 +02:00
eapol_auth_sm.c Do not disconnect EAPOL-Logoff before authentication 2023-05-04 11:10:16 +03:00
eapol_auth_sm.h Do not disconnect EAPOL-Logoff before authentication 2023-05-04 11:10:16 +03:00
eapol_auth_sm_i.h Do not disconnect EAPOL-Logoff before authentication 2023-05-04 11:10:16 +03:00
Makefile build: Make more library things common 2020-10-12 20:20:35 +03:00