From 50cf0c2d2440140c0b8ab99e38288461043e18a1 Mon Sep 17 00:00:00 2001 From: Nachiket Kukade Date: Mon, 9 Nov 2020 14:32:38 +0530 Subject: [PATCH] wpa_supplicant: Increase PMK Lifetime to a very high value For WPA3 connection nearing PMK lifetime expiry, PMK Cache needs a re-authentication or the cache will expire. After current expiry of 12 hours Station ends up sending a deauth to the AP. An SAE re-authentication also cannot occur without a disconnection with current implementation. So increase the PMK lifetime to 100 days for now. --- components/wpa_supplicant/src/rsn_supp/pmksa_cache.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/components/wpa_supplicant/src/rsn_supp/pmksa_cache.c b/components/wpa_supplicant/src/rsn_supp/pmksa_cache.c index b8ea823d31..00c1bad290 100644 --- a/components/wpa_supplicant/src/rsn_supp/pmksa_cache.c +++ b/components/wpa_supplicant/src/rsn_supp/pmksa_cache.c @@ -18,7 +18,7 @@ #ifdef IEEE8021X_EAPOL static const int pmksa_cache_max_entries = 10; -static const int dot11RSNAConfigPMKLifetime = 43200; +static const int dot11RSNAConfigPMKLifetime = 8640000; // 100 days = 3600 x 24 x 100 Seconds static const int dot11RSNAConfigPMKReauthThreshold = 70; struct rsn_pmksa_cache {