aboutsummaryrefslogtreecommitdiffstats
path: root/src/pae
Commit message (Expand)AuthorAgeFilesLines
* mka: Check OLPN for exhaustion on SAKuse decodeThomas Winter2019-09-181-91/+115
* mka: Check OLPN for exhaustion on SAKuse encodeThomas Winter2019-09-181-11/+24
* mka: Clear out old/latest key values on CHANGE in CP state machineThomas Winter2019-09-181-0/+18
* mka: Don't set newSAK to FALSE on ABANDON in CP state machineThomas Winter2019-09-181-1/+0
* mka: Change RECEIVE and RETIRE states to match the standardThomas Winter2019-09-181-16/+10
* mka: Accept last two used MNs in Peers List of a received MKPDUJouni Malinen2019-07-291-1/+11
* mka: Avoid memory leak in unexpected case in RECEIVEJouni Malinen2019-04-151-0/+4
* UBSan: Pack MACsec peer id structureJouni Malinen2019-02-251-1/+1
* mka: New MI should only be generated when peer's key is invalidMike Siedzik2019-01-071-6/+6
* mka: Log MI update failure in debug logJouni Malinen2018-12-301-1/+6
* mka: Make ICV Indicator dependant on ICV lengthJaap Keuter2018-12-291-5/+10
* mka: MIB informationJouni Malinen2018-12-293-1/+103
* mka: Provide more status information over control interfaceJouni Malinen2018-12-291-6/+63
* mka: Stop trying to generate and distribute new SAK when not key serverJouni Malinen2018-12-291-2/+3
* mka: Add more debug print detailsJouni Malinen2018-12-292-121/+263
* mka: Fix deleteSAs clearing of principal->new_keyJouni Malinen2018-12-291-2/+7
* mka: Derive MACsec cipher suite and MKA algorithm table indexJouni Malinen2018-12-292-12/+9
* mka: Clean up KaY log outputJaap Keuter2018-12-271-18/+19
* mka: Do not force entry into INIT state on CP state machine creationJouni Malinen2018-12-271-1/+0
* mka: Remove unused authorization data from CPJouni Malinen2018-12-272-18/+0
* mka: Extend CAK/CKN-from-EAP-MSK API to pass in MSK lengthJouni Malinen2018-12-264-22/+22
* mka: Allow CAK length 32 (256-bit) to be initializedJouni Malinen2018-12-262-4/+3
* mka: Determine KCK/ICK length from CAK lengthJouni Malinen2018-12-262-7/+2
* mka: ICV calculation using 256-bit ICKJouni Malinen2018-12-264-13/+24
* mka: Support 256-bit ICK derivationJouni Malinen2018-12-264-10/+15
* mka: Support 256-bit KEK derivationJouni Malinen2018-12-264-13/+18
* mka: Support 256-bit CAK in SAK derivationJouni Malinen2018-12-263-10/+10
* mka: AES-CMAC-256 -based KDFJouni Malinen2018-12-261-13/+23
* mka: Change MI if key invalidAndrey Kartashev2018-12-261-0/+1
* mka: Speed up processing of duplicated SCIAndrey Kartashev2018-12-261-0/+7
* mka: Support for 256-bit SAK generationAndrey Kartashev2018-12-263-9/+12
* mka: Remember LowestPN for each key serverAndrey Kartashev2018-12-261-1/+6
* mka: Check for errors on create Secure ChannelAndrey Kartashev2018-12-261-3/+13
* mka: Fix a memory leak on error pathAndrey Kartashev2018-12-261-0/+1
* mka: Debug output cleanup/fixAndrey Kartashev2018-12-262-17/+19
* mka: Allow configuration of MACsec replay protectionAndrey Kartashev2018-12-262-3/+6
* mka: Do not update potential peer liveness timerMike Siedzik2018-12-261-5/+13
* mka: Consider missing MKPDU parameter sets a failureMike Siedzik2018-12-262-2/+37
* mka: Do not ignore MKPDU parameter set decoding failuresMike Siedzik2018-12-261-5/+38
* mka: Fix resource leak when detecting duplicated SCIMike Siedzik2018-12-261-6/+20
* mka: Fix READY to TRANSMIT logic in CP state machineMike Siedzik2018-12-261-1/+1
* mka: Fix READY to ABANDON logic in CP state machineMike Siedzik2018-12-261-1/+1
* mka: Fix RECEIVING to TRANSMIT logic in CP state machineMike Siedzik2018-12-261-1/+2
* mka: Fix RETIRE state deletion of SAsMike Siedzik2018-12-261-2/+5
* mka: Fix lowest acceptable Packet Number (LPN) calculation and useMike Siedzik2018-12-264-28/+77
* mka: Fix MKPDU SAK Use Body's Delay Protect bit settingMike Siedzik2018-12-262-5/+11
* mka: Fix conf_offset value in MKPDU when in policy mode SHOULD_SECUREMike Siedzik2018-12-261-5/+9
* MKA: Handle unaligned CKN lengthMichael Braun2018-12-251-7/+8
* MKA: Mark frame structs packedJouni Malinen2018-12-252-10/+10
* mka: Support GCM-AES-256xiaofeis2018-08-211-0/+8