aboutsummaryrefslogtreecommitdiffstats
path: root/src/rsn_supp/wpa.c
Commit message (Expand)AuthorAgeFilesLines
* SAE: Add RSNXE in Association Request and EAPOL-Key msg 2/4Jouni Malinen2019-10-171-25/+106
* RSN: Verify RSNXE match between Beacon/ProbeResp and EAPOL-Key msg 3/4Jouni Malinen2019-10-151-0/+44
* FILS+FT: Fix MFPR flag in RSNE during FILS exchange for FTJouni Malinen2019-10-011-1/+3
* Remove CONFIG_IEEE80211W build parameterJouni Malinen2019-09-081-30/+3
* More forceful clearing of stack memory with keysJouni Malinen2019-05-261-18/+20
* FILS: Verify RSNE match between Beacon/Probe Response and (Re)AssocRespJouni Malinen2019-05-221-0/+20
* FT: Store XXKey/MPMK in PMKSA cache instead of MSK (supplicant)Jouni Malinen2019-04-281-15/+36
* FT: Allow 4-way handshake for PTK rekeying to continue without PMK/PMKIDJouni Malinen2019-04-181-0/+9
* RSN: Ignore IGTK configuration errors with swapped KeyID valuesJouni Malinen2019-04-161-3/+21
* RSN: Report completion only after IGTK configurationJouni Malinen2019-04-161-4/+9
* DPP2: PFS for PTK derivationJouni Malinen2019-03-181-1/+25
* DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in contextJouni Malinen2019-03-171-1/+1
* FILS+FT: STA mode validation of PMKR1Name in initial MD associationJouni Malinen2019-03-131-2/+22
* tests: EAPOL-Key fuzzing toolJouni Malinen2019-02-111-0/+27
* RSN: Do not start preauthentication timer without candidatesJouni Malinen2019-02-111-1/+3
* OCV: Include and verify OCI in the FILS handshakeMathy Vanhoef2018-12-171-0/+39
* OCV: Verify OCI in 4-way and group key handshakeMathy Vanhoef2018-12-171-0/+40
* OCV: Insert OCI in 4-way and group key handshakeMathy Vanhoef2018-12-161-2/+70
* OCV: Advertise OCV capability in RSN capabilities (STA)Mathy Vanhoef2018-12-161-0/+5
* RSN: Use COMPACT_MACSTR to match MAC2STRJohannes Berg2018-10-161-1/+1
* RSN: Do not replace existing Suite B PMKSA on 4-way handshakeJouni Malinen2018-09-271-1/+7
* WPA: Ignore unauthenticated encrypted EAPOL-Key dataMathy Vanhoef2018-08-081-0/+11
* FT: Derive PMKR0Name/PMKR1Name using SHA-384 with AKM 00-0F-AC:13Jouni Malinen2018-06-061-1/+1
* FT: FTE parsing for SHA384-based AKMJouni Malinen2018-06-051-1/+2
* FT: PMK-R0 derivation using SHA384-based AKMJouni Malinen2018-06-051-2/+5
* FT: XXKey derivation for SHA384-based AKMJouni Malinen2018-06-051-2/+9
* FT: Support variable length keysJouni Malinen2018-06-051-1/+4
* FT: Add MDE to assoc request IEs in connect paramsAhmad Masri2018-04-191-0/+6
* SAE: Only allow SAE AKMP for PMKSA caching attemptsJouni Malinen2018-04-091-4/+4
* Clear pmk_len more consistently for extra protectionJouni Malinen2018-04-081-1/+5
* FILS: Fix CONFIG_FILS=y build without CONFIG_IEEE80211R=yJouni Malinen2018-03-261-0/+2
* SAE: Fix FT-SAE key derivation for a case where PMKID in msg 1/4 matchesJouni Malinen2018-03-231-0/+12
* SAE: Fix EAPOL-Key integrity and key-wrap algorithm selectionJouni Malinen2018-03-161-32/+9
* Fix a typo in a comment (the variable is ptk, not pkt)andrekorol2017-10-211-1/+1
* Clear BSSID information in supplicant state machine on disconnectionJouni Malinen2017-10-161-0/+1
* Additional consistentcy checks for PTK component lengthsJouni Malinen2017-10-161-6/+20
* Make last received ANonce available through control interfaceJouni Malinen2017-10-161-0/+8
* Clear PMK length and check for this when deriving PTKJouni Malinen2017-10-151-3/+4
* Add debug prints on PMK configuration in WPA supplicantJouni Malinen2017-10-151-0/+6
* WPA: Extra defense against PTK reinstalls in 4-way handshakeMathy Vanhoef2017-10-151-0/+8
* Remove all PeerKey functionalityJouni Malinen2017-10-151-88/+11
* FILS: Do not allow multiple (Re)Association Response framesJouni Malinen2017-10-151-0/+6
* FT: Do not allow multiple Reassociation Response framesJouni Malinen2017-10-151-0/+3
* Prevent installation of an all-zero TKMathy Vanhoef2017-10-151-3/+3
* Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode casesJouni Malinen2017-10-151-16/+39
* Prevent reinstallation of an already in-use group keyMathy Vanhoef2017-10-151-45/+73
* OWE: PMKSA caching in station modeJouni Malinen2017-10-091-5/+23
* OWE: Support DH groups 20 (NIST P-384) and 21 (NIST P-521) in stationJouni Malinen2017-10-081-16/+68
* OWE: Set PMK length properly on supplicant sideJouni Malinen2017-10-081-0/+1
* FILS: Add DHss into FILS-Key-Data derivation when using FILS SK+PFSJouni Malinen2017-09-131-2/+13