aboutsummaryrefslogtreecommitdiffstats
path: root/src/rsn_supp
Commit message (Expand)AuthorAgeFilesLines
* STA: Allow PTK rekeying without Ext KeyID to be disabled as a workaroundAlexander Wetzel2 days3-0/+28
* Configure received BIGTK on station/supplicant sideJouni Malinen8 days3-5/+145
* wpa_supplicant configuration for Beacon protectionJouni Malinen8 days3-0/+4
* OWE: PTK derivation workaround in STA modeJouni Malinen2020-01-233-1/+15
* Fix a typo in a commentJouni Malinen2020-01-231-1/+1
* Introduce and add key_flagAlexander Wetzel2020-01-095-17/+25
* Add no_encrypt flag for control port TXMarkus Theil2020-01-052-0/+9
* RSN: Do not add PMKSA candidates unnecessarilyJouni Malinen2020-01-011-4/+13
* FT: More debug prints for RSNE modification for EAPOL-Key msg 2/4Jouni Malinen2019-12-241-0/+8
* Fix a typo in a commentJouni Malinen2019-11-061-1/+1
* FT-SAE: Add RSNXE into FT MICJouni Malinen2019-10-181-1/+20
* Merge wpa_supplicant and hostapd EAPOL-Key KDE parsersJouni Malinen2019-10-182-313/+0
* SAE: Add RSNXE in Association Request and EAPOL-Key msg 2/4Jouni Malinen2019-10-175-26/+137
* RSN: Verify RSNXE match between Beacon/ProbeResp and EAPOL-Key msg 3/4Jouni Malinen2019-10-155-2/+60
* FILS+FT: Fix MFPR flag in RSNE during FILS exchange for FTJouni Malinen2019-10-011-1/+3
* Remove CONFIG_IEEE80211W build parameterJouni Malinen2019-09-086-53/+3
* FT: Reject over-the-DS response with MFPC=0 if PMF is requiredJouni Malinen2019-08-161-0/+8
* FT: Fix MFPR flag in RSNE during FT protocolJouni Malinen2019-08-161-4/+3
* More forceful clearing of stack memory with keysJouni Malinen2019-05-262-20/+22
* FILS: Verify RSNE match between Beacon/Probe Response and (Re)AssocRespJouni Malinen2019-05-221-0/+20
* FT: Allow cached XXKey/MPMK to be used if new XXKey is not availableJouni Malinen2019-04-281-3/+12
* FT: Store XXKey/MPMK in PMKSA cache instead of MSK (supplicant)Jouni Malinen2019-04-281-15/+36
* Replace int status/reason_code with u16 variableJouni Malinen2019-04-222-2/+2
* FT: Allow 4-way handshake for PTK rekeying to continue without PMK/PMKIDJouni Malinen2019-04-182-2/+12
* RSN: Ignore IGTK configuration errors with swapped KeyID valuesJouni Malinen2019-04-161-3/+21
* RSN: Report completion only after IGTK configurationJouni Malinen2019-04-161-4/+9
* Add AKM info in the debug message noting PMKSA caching entry additionJouni Malinen2019-03-271-1/+2
* DPP2: PFS for PTK derivationJouni Malinen2019-03-183-1/+30
* DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in contextJouni Malinen2019-03-171-1/+1
* FILS+FT: STA mode validation of PMKR1Name in initial MD associationJouni Malinen2019-03-131-2/+22
* UBSan: Avoid an unsigned integer overflow warningJouni Malinen2019-02-251-1/+1
* tests: EAPOL-Key fuzzing toolJouni Malinen2019-02-111-0/+27
* RSN: Do not start preauthentication timer without candidatesJouni Malinen2019-02-111-1/+3
* OCV: Include and verify OCI in the FILS handshakeMathy Vanhoef2018-12-171-0/+39
* OCV: Include and verify OCI in the FT handshakeMathy Vanhoef2018-12-171-0/+41
* OCV: Verify OCI in 4-way and group key handshakeMathy Vanhoef2018-12-171-0/+40
* OCV: Parse all types of OCI information elementsMathy Vanhoef2018-12-162-0/+15
* OCV: Insert OCI in 4-way and group key handshakeMathy Vanhoef2018-12-162-2/+76
* OCV: Advertise OCV capability in RSN capabilities (STA)Mathy Vanhoef2018-12-165-1/+12
* Make channel_info available to the supplicant state machineMathy Vanhoef2018-12-162-0/+10
* Fix indentation levelJouni Malinen2018-11-301-5/+5
* RSN: Use COMPACT_MACSTR to match MAC2STRJohannes Berg2018-10-161-1/+1
* RSN: Do not replace existing Suite B PMKSA on 4-way handshakeJouni Malinen2018-09-271-1/+7
* WPA: Ignore unauthenticated encrypted EAPOL-Key dataMathy Vanhoef2018-08-081-0/+11
* FT: Derive PMKR0Name/PMKR1Name using SHA-384 with AKM 00-0F-AC:13Jouni Malinen2018-06-061-1/+1
* FT: Support BIP-CMAC-256, BIP-GMAC-128, BIP-GMAC-256 in STA caseJouni Malinen2018-06-051-11/+36
* FILS: Fix KEK2 use in FT-FILS use casesJouni Malinen2018-06-051-4/+22
* FT: FTE generation for SHA384-based AKM on STAJouni Malinen2018-06-051-11/+26
* FT: FTE parsing for SHA384-based AKMJouni Malinen2018-06-052-28/+74
* FT: PMK-R0 derivation using SHA384-based AKMJouni Malinen2018-06-052-4/+9