hostapd/src/pae
Ze Gan 750403f3ad mka: Fix re-establishment by resetting MI
The key server may be removed due to the ingress packets delay. In this
situation, the endpoint of the key server may not be aware of this
participant who has removed the key server from the peer list. Because
the egress traffic is normal, the key server will not remove this
participant from the peer list of the key server. So in the next MKA
message, the key server will not dispatch a new SAK to this participant.
And this participant cannot be aware of that that is a new round of
communication so that it will not update its MI at re-adding the key
server to its peer list. So we need to update MI to avoid the failure of
re-establishment MKA session.

Signed-off-by: Ze Gan <ganze718@gmail.com>
2023-11-05 19:25:27 +02:00
..
ieee802_1x_cp.c mka: Allow configuration of MACsec hardware offload 2023-02-21 19:26:47 +02:00
ieee802_1x_cp.h MACsec: Convert Boolean to C99 bool 2020-04-24 17:06:50 +03:00
ieee802_1x_kay.c mka: Fix re-establishment by resetting MI 2023-11-05 19:25:27 +02:00
ieee802_1x_kay.h mka: Allow configuration of MACsec hardware offload 2023-02-21 19:26:47 +02:00
ieee802_1x_kay_i.h MACsec: Convert Boolean to C99 bool 2020-04-24 17:06:50 +03:00
ieee802_1x_key.c mka: Extend CAK/CKN-from-EAP-MSK API to pass in MSK length 2018-12-26 16:44:58 +02:00
ieee802_1x_key.h mka: Extend CAK/CKN-from-EAP-MSK API to pass in MSK length 2018-12-26 16:44:58 +02:00
ieee802_1x_secy_ops.c mka: Allow configuration of MACsec hardware offload 2023-02-21 19:26:47 +02:00
ieee802_1x_secy_ops.h mka: Allow configuration of MACsec hardware offload 2023-02-21 19:26:47 +02:00
Makefile MACsec: Add PAE implementation 2014-05-09 20:42:44 +03:00