aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Preparations for v2.8 releasehostap_2_8Jouni Malinen2019-04-214-2/+126
* tests: EAP-IKEV2 server local errors and protocol testingJouni Malinen2019-04-201-0/+212
* tests: EAP-MD5 server local errors and protocol testingJouni Malinen2019-04-201-0/+80
* tests: EAP-PAX server local errors and protocol testingJouni Malinen2019-04-201-0/+189
* EAP-PAX server: Fix message length checks for MSGDUMP level hexdumpJouni Malinen2019-04-191-1/+1
* EAP-PAX server: Check hash function resultsJouni Malinen2019-04-191-24/+39
* tests: EAP-PSK server local errors and protocol testingJouni Malinen2019-04-192-0/+148
* tests: EAP-GPSK server local errors and protocol testingJouni Malinen2019-04-191-0/+295
* EAP-GPSK server: Fix memory freeing on error pathJouni Malinen2019-04-191-2/+2
* tests: Additional EAP-SAKE peer error path coverageJouni Malinen2019-04-191-12/+18
* tests: EAP-SAKE server local errors and protocol testingJouni Malinen2019-04-191-0/+154
* EAP-SAKE: Report hash function failures to callersJouni Malinen2019-04-194-54/+83
* EAP-SAKE server: Fix memory freeing on error pathJouni Malinen2019-04-191-1/+1
* tests: FT and PTK rekeyingJouni Malinen2019-04-191-55/+110
* FT: Derive PTK properly for rekeying with FT protocolJouni Malinen2019-04-191-1/+13
* FT: Do not add bogus PMKID in msg 1/4 for FT protocol PTK rekeyingJouni Malinen2019-04-181-0/+8
* FT: Maintain PMK-R1 for a connected STAJouni Malinen2019-04-183-0/+6
* WPA: Clear authenticator keys for a STA on deinit/disconnectionJouni Malinen2019-04-181-1/+7
* WPA: Stop WPA statement on STA disassociationJouni Malinen2019-04-181-0/+2
* FT: Start PTK rekey timer on FT protocol completionJouni Malinen2019-04-181-0/+1
* FT: Remove unused pmk argument from wpa_auth_derive_ptk_ft()Jouni Malinen2019-04-183-5/+3
* FT: Allow 4-way handshake for PTK rekeying to continue without PMK/PMKIDJouni Malinen2019-04-182-2/+12
* tests: PMKSA caching and PTK rekey triggered by APJouni Malinen2019-04-181-0/+47
* tests: FILS and PTK rekeyingJouni Malinen2019-04-181-4/+41
* FILS: Fix PTK rekeyingJouni Malinen2019-04-184-6/+51
* nl80211: Check nla_put_flag() failure for ext authJouni Malinen2019-04-181-2/+4
* tests: EAP-pwd protocol testing for the serverJouni Malinen2019-04-171-0/+149
* EAP-pwd server: Remove unused srandom() callJouni Malinen2019-04-171-8/+0
* tests: EAP-pwd protocol tests - unexpected more-fragment frameJouni Malinen2019-04-171-0/+11
* EAP-pwd peer: Fix reassembly buffer handlingJouni Malinen2019-04-171-1/+8
* tests: EAP-pwd local error cases on serverJouni Malinen2019-04-171-0/+82
* EAP-pwd server: Fix reassembly buffer handlingJouni Malinen2019-04-161-1/+7
* EAP-pwd server: Fix a memory leak on error pathJouni Malinen2019-04-161-2/+6
* tests: Addition WPS local error case coverageJouni Malinen2019-04-161-0/+12
* tests: OWE invalid Association Response frame contentsJouni Malinen2019-04-161-0/+88
* tests: Opportunistic Wireless Encryption - local errors on supplicantJouni Malinen2019-04-161-1/+64
* tests: WPA2-PSK and local error cases on supplicantJouni Malinen2019-04-161-0/+26
* tests: Additional coverage for EAP-MSCHAPv2 local error casesJouni Malinen2019-04-161-1/+27
* EAP-MSCHAPv2: Propagate GetAsymetricStartKey() failures up from getKey()Jouni Malinen2019-04-162-6/+14
* tests: Milenage local error casesJouni Malinen2019-04-161-0/+22
* tests: Previously missed aes_s2v() error pathJouni Malinen2019-04-161-0/+10
* tests: AES-EAX error cases that were previously missed in EAP-PSKJouni Malinen2019-04-161-0/+7
* tests: Protocol testing for supplicant PMF/IGTK KDE handlingJouni Malinen2019-04-163-29/+117
* RSN: Ignore IGTK configuration errors with swapped KeyID valuesJouni Malinen2019-04-161-3/+21
* RSN: Report completion only after IGTK configurationJouni Malinen2019-04-161-4/+9
* autoscan: Disable when we move above WPA_SCANNING stateWiktor Drewniak2019-04-151-1/+1
* SAE: Use open authentication to reassociate for PMKSA cachingSergey Matyukevich2019-04-151-1/+16
* Fix FILS ERP association event with 4-way HS offload driversAvraham Stern2019-04-151-11/+11
* nl80211: Handle NL80211_CMD_PROBE_CLIENT command responseIlan Peer2019-04-151-1/+7
* tests: AP with open mode and STA poll without ACKJouni Malinen2019-04-151-0/+16