hostapd/src
Jouni Malinen 07a7bcd7ea WMM: Advertise support for 16 PTKSA replay counters for non-AP STA
In theory, each device that supports WMM (or the IEEE 802.11 QoS for
that matter) is expected to advertise how many replay counters it
supports and the peer device is supposed to use that information to
restrict the total number of different MSDU priorities (AC/UP) that
might be used. In practice, this is not really done in deployed devices
and instead, it is just assumed that everyone supports the eight
different replay counters so that there is no need to restrict which
MSDU priorities can be used.

hostapd implementation of WMM has advertised support for 16 PTKSA replay
counters from the beginning while wpa_supplicant has not had any code
for setting the supported replay counter fields in RSNE, i.e., has left
the value to 0 which implies that only a single replay counter is
supported. While this does not really result in any real issues with
deployed devices, this is not really correct behavior based on the
current IEEE 802.11 standard and the WMM specification.

Update wpa_supplicant to use similar design to the hostapd RSNE
generation by setting the number of supported PTKSA replay counters to
16 whenever WMM is enabled. For now, this is done based on the
association being for HT/VHT/HE/EHT and also based on the AP supporting
WMM since it is much more likely for the local device to support WMM and
eight replay counters (which can be indicated only with the value that
implies support for 16 counters since there is no separate value for 8).

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
2023-04-18 11:40:10 +03:00
..
ap RNR: Add elements by default for EMA AP 2023-04-18 11:35:06 +03:00
common Add QCA vendor feature flag for allowed frequency list 2023-04-03 23:09:07 +03:00
crypto OpenSSL: Add TLS 1.3 signature algorithms for Suite B 2023-03-22 23:58:47 +02:00
drivers nl80211: Support for RNR elements 2023-04-18 11:39:32 +03:00
eap_common crypto: Check if crypto_bignum_to_bin() is successful 2022-12-17 12:11:13 +02:00
eap_peer crypto: Check if crypto_bignum_to_bin() is successful 2022-12-17 12:11:13 +02:00
eap_server EAP-TTLS server: Add Ident field to MS-CHAP-Error 2023-02-20 19:38:02 +02:00
eapol_auth EAP-TLS: Testing functionality to skip protected success indication 2022-04-07 00:43:12 +03:00
eapol_supp Discard unencrypted EAPOL-EAP when TK is set and PMF is enabled 2022-05-07 21:37:08 +03:00
fst FST: More robust bounds checking of local data in fst_dump_mb_ies() 2022-05-08 17:18:58 +03:00
l2_packet Replace "dummy" with "stub" in comments/documentation 2021-10-11 20:52:50 +03:00
p2p P2P: Filter out 6 GHz frequencies if not allowed for P2P connection 2023-02-23 13:20:50 +02:00
pae mka: Allow configuration of MACsec hardware offload 2023-02-21 19:26:47 +02:00
pasn SAE: Make sme_sae_auth() return IE offset 2022-12-17 17:11:16 +02:00
radius RADIUS: Add Filter-Id attribute 2022-10-31 11:56:57 +02:00
rsn_supp WMM: Advertise support for 16 PTKSA replay counters for non-AP STA 2023-04-18 11:40:10 +03:00
tls TLS: Fix unsigned int underflow in internal TLS 1.0/1.1 implementation 2022-11-20 19:11:01 +02:00
utils webkit2: Avoid deprecated function call 2023-02-23 16:30:04 +02:00
wps WPS: Check NDEF record length fields separately 2022-11-20 15:15:58 +02:00
build.rules build: Rebuild libs all the time 2020-10-12 20:18:02 +03:00
lib.rules build: lib.rules: Add common-clean 2020-10-16 12:51:12 +03:00
Makefile PASN: Move initiator changes into a separate file 2022-11-04 00:52:17 +02:00
objs.mk build: Fix dependency file inclusion 2020-10-12 11:05:16 +03:00