hostapd/src/rsn_supp
Avichal Agarwal c93b7e1888 RSN: Check result of EAPOL-Key frame send request
Provide information on whether EAPOL-Key frame was sent successfully to
kernel for transmittion. wpa_eapol_key_send() will return
>= 0 on success and < 0 on failure. After receiving EAPOL-Key msg 3/4,
wpa_supplicant sends EAPOL-Key msg 4/4 and shows CTRL-EVENT-CONNECTED
only after verifying that the msg 4/4 was sent to kernel for
transmission successfully.

Signed-off-by: Avichal Agarwal <avichal.a@samsung.com>
Signed-off-by: Kyeong-Chae Lim <kcya.lim@samsung.com>
2015-10-28 22:42:16 +02:00
..
Makefile tests: Add eapol-fuzzer 2015-04-22 11:44:19 +03:00
peerkey.c Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
peerkey.h Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
pmksa_cache.c Fix Suite B 192-bit AKM to use proper PMK length 2015-10-14 18:43:26 +03:00
pmksa_cache.h Fix Suite B 192-bit AKM to use proper PMK length 2015-10-14 18:43:26 +03:00
preauth.c Fix resource leaks on rsn_preauth_init() error paths 2015-01-31 13:44:48 +02:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Do not send error case of TPK M3 if TX fails 2015-10-26 22:54:39 +02:00
wpa.c RSN: Check result of EAPOL-Key frame send request 2015-10-28 22:42:16 +02:00
wpa.h Preparations for variable length KCK and KEK 2015-01-27 01:26:49 +02:00
wpa_ft.c FT: Allow CCMP-256 and GCMP-256 as group ciphers 2015-07-07 16:25:06 +03:00
wpa_i.h RSN: Check result of EAPOL-Key frame send request 2015-10-28 22:42:16 +02:00
wpa_ie.c RSN: Avoid undefined behavior in pointer arithmetic 2015-10-25 15:34:59 +02:00
wpa_ie.h Simplify VHT Capabilities element parsing 2015-04-22 22:05:11 +03:00