summaryrefslogtreecommitdiffstats
path: root/include/net/netfilter/nf_conntrack_count.h
diff options
context:
space:
mode:
authorAlexander Wetzel2018-08-31 15:00:37 +0200
committerJohannes Berg2018-09-05 10:03:17 +0200
commit2b815b04dfe45d1278fd4137675fe1398f656b0a (patch)
tree265d60a9640196f51b7f38fba57cd422d902b7ef /include/net/netfilter/nf_conntrack_count.h
parentmac80211: support radiotap L-SIG data (diff)
downloadkernel-qcow2-linux-2b815b04dfe45d1278fd4137675fe1398f656b0a.tar.gz
kernel-qcow2-linux-2b815b04dfe45d1278fd4137675fe1398f656b0a.tar.xz
kernel-qcow2-linux-2b815b04dfe45d1278fd4137675fe1398f656b0a.zip
nl80211: Add CAN_REPLACE_PTK0 API
Drivers able to correctly replace a in-use key should set @NL80211_EXT_FEATURE_CAN_REPLACE_PTK0 to allow the user space (e.g. hostapd or wpa_supplicant) to rekey PTK keys. The user space must detect a PTK rekey attempt and only go ahead with it when the driver has set this flag. If the driver is not supporting the feature the user space either must not replace the PTK key or perform a full re-association instead. Ignoring this flag and continuing to rekey the connection can still work but has to be considered insecure and broken. Depending on the driver it can leak clear text packets or freeze the connection and is only supported to allow the user space to be updated. Signed-off-by: Alexander Wetzel <alexander@wetzel-home.de> Reviewed-by: Denis Kenzior <denkenz@gmail.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'include/net/netfilter/nf_conntrack_count.h')
0 files changed, 0 insertions, 0 deletions