aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* mka: Log MI update failure in debug logJouni Malinen2018-12-301-1/+6
* nl80211: Note interface-removal-from-bridge errors in debug logJouni Malinen2018-12-301-3/+6
* tests: hostapd configuration reload from file when disabledJouni Malinen2018-12-301-0/+20
* hostapd: Add openssl_ecdh_curves configuration parameterHristo Venev2018-12-304-0/+6
* OpenSSL: Add openssl_ecdh_curves parameterHristo Venev2018-12-305-0/+90
* HS 2.0: DHCP broadcast-to-unicast conversion before address learningJouni Malinen2018-12-291-9/+9
* tests: Add UDP checksum into DHCP frames in ProxyARP/DGAF disabled caseJouni Malinen2018-12-291-4/+13
* mka: Make ICV Indicator dependant on ICV lengthJaap Keuter2018-12-291-5/+10
* tests: Clear regulatory Beacon hints more robustly in TDLS test casesJouni Malinen2018-12-291-28/+20
* tests: MKA MIB informationJouni Malinen2018-12-291-0/+22
* mka: MIB informationJouni Malinen2018-12-294-1/+108
* tests: MACsec PSK with bridge interfaceJouni Malinen2018-12-291-0/+108
* tests: Use more robust way to determine MKA is done for MACsec testingJouni Malinen2018-12-291-13/+47
* mka: Provide more status information over control interfaceJouni Malinen2018-12-291-6/+63
* mka: Stop trying to generate and distribute new SAK when not key serverJouni Malinen2018-12-291-2/+3
* mka: Add more debug print detailsJouni Malinen2018-12-292-121/+263
* mka: Fix deleteSAs clearing of principal->new_keyJouni Malinen2018-12-291-2/+7
* mka: Derive MACsec cipher suite and MKA algorithm table indexJouni Malinen2018-12-292-12/+9
* wpa_supplicant: Document nl80211 driver in the man pageAsbjørn Sloth Tønnesen2018-12-271-3/+23
* mka: Clean up KaY log outputJaap Keuter2018-12-271-18/+19
* tests: MACsec PSK local failures in CP state machineJouni Malinen2018-12-271-24/+71
* mka: Do not force entry into INIT state on CP state machine creationJouni Malinen2018-12-271-1/+0
* mka: Remove unused authorization data from CPJouni Malinen2018-12-272-18/+0
* tests: MACsecJouni Malinen2018-12-261-0/+472
* mka: Extend CAK/CKN-from-EAP-MSK API to pass in MSK lengthJouni Malinen2018-12-265-27/+26
* mka: Allow 256-bit CAK to be configured for PSK modeJouni Malinen2018-12-264-11/+18
* mka: Allow CAK length 32 (256-bit) to be initializedJouni Malinen2018-12-262-4/+3
* mka: Determine KCK/ICK length from CAK lengthJouni Malinen2018-12-262-7/+2
* mka: ICV calculation using 256-bit ICKJouni Malinen2018-12-264-13/+24
* mka: Support 256-bit ICK derivationJouni Malinen2018-12-264-10/+15
* mka: Support 256-bit KEK derivationJouni Malinen2018-12-264-13/+18
* mka: Support 256-bit CAK in SAK derivationJouni Malinen2018-12-263-10/+10
* mka: AES-CMAC-256 -based KDFJouni Malinen2018-12-261-13/+23
* mka: Change MI if key invalidAndrey Kartashev2018-12-261-0/+1
* mka: Speed up processing of duplicated SCIAndrey Kartashev2018-12-261-0/+7
* mka: Support for 256-bit SAK generationAndrey Kartashev2018-12-263-9/+12
* mka: Remember LowestPN for each key serverAndrey Kartashev2018-12-261-1/+6
* mka: Check for errors on create Secure ChannelAndrey Kartashev2018-12-261-3/+13
* mka: Fix a memory leak on error pathAndrey Kartashev2018-12-261-0/+1
* mka: Debug output cleanup/fixAndrey Kartashev2018-12-262-17/+19
* mka: Allow configuration of MACsec replay protectionAndrey Kartashev2018-12-268-4/+57
* wpa_debug: Support wpa_hexdump_ascii() outputting into syslogAndrey Kartashev2018-12-261-0/+6
* mka: Do not update potential peer liveness timerMike Siedzik2018-12-261-5/+13
* mka: Consider missing MKPDU parameter sets a failureMike Siedzik2018-12-262-2/+37
* mka: Do not ignore MKPDU parameter set decoding failuresMike Siedzik2018-12-261-5/+38
* mka: Fix resource leak when detecting duplicated SCIMike Siedzik2018-12-261-6/+20
* mka: Fix READY to TRANSMIT logic in CP state machineMike Siedzik2018-12-261-1/+1
* mka: Fix READY to ABANDON logic in CP state machineMike Siedzik2018-12-261-1/+1
* mka: Fix RECEIVING to TRANSMIT logic in CP state machineMike Siedzik2018-12-261-1/+2
* mka: Fix RETIRE state deletion of SAsMike Siedzik2018-12-261-2/+5