On Thu, Oct 15, 2015 at 08:33:33PM -0400, Preyas Kamath wrote: > I have hostapd running on an ARM processor. I have created a custom driver > under drivers dir. hostapd authorizes station using callback API in > wpa_driver_ops.sta_set_flags() with flag enabled and sends out event > AP-STA-CONNECTED. > After idle time, the station is deauthenticated and event > AP-STA-DISCONNECTED is sent. > I was expecting wpa_driver_ops.sta_set_flags() to be invoked with flag > disabled, however this isn't occurring. > > Is this the correct behavior? Would EAP state machine maintain the station > as authorized even though AP-STA-DISCONNECTED event has been sent? The current expectation is that the moment the STA entry gets removed from kernel, the entry is fully removed and as such, does not continue to have a port that could be authorized or unauthorized. With that assumption, there is no need to waste time in setting STA flags separately if the STA entry is going to be removed anyway. hostapd may maintain a STA entry for a short duration (couple of seconds), but in general, the entry will be removed and there is no expectation of maintaining EAPOL authenticator state for the STA. -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap