aboutsummaryrefslogtreecommitdiffstats
path: root/src/rsn_supp/wpa.c
Commit message (Expand)AuthorAgeFilesLines
* OCV: Move "OCV failed" prefix to callersJouni Malinen5 days1-3/+4
* OCV: Add support to override channel info OCI element (STA)Vamsi Krishna5 days1-0/+11
* Debug print PMK-R0/R1 and PMKR0/R1Name in the helper functionsJouni Malinen7 days1-6/+0
* DPP: Allow version number to be overridden for testing purposesJouni Malinen2020-05-031-3/+4
* DPP2: Detect PFS downgrade attack while processing EAPOL-Key msg 3/4Jouni Malinen2020-05-031-0/+14
* DPP2: Add DPP KDE into EAPOL-Key msg 2/4 when using DPP AKMJouni Malinen2020-05-031-1/+28
* DPP2: Indicate if PFS was used in control interface STATUSJouni Malinen2020-05-031-0/+9
* RSN supp: Convert Boolean to C99 boolJouni Malinen2020-04-241-11/+9
* FT: Testing override for RSNXE Used subfield in FTEJouni Malinen2020-04-141-0/+5
* Process Transition Disable KDE in station modeJouni Malinen2020-03-251-0/+5
* STA: Support Extended Key IDAlexander Wetzel2020-03-231-8/+109
* Set beacon protection config irrespective of macro CONFIG_FILSVeerendranath Jakkam2020-03-211-1/+1
* RSN: Stop 4-way handshake if scan results are not availableJouni Malinen2020-03-081-4/+3
* Report RSNXE mismatch in EAPOL-Key msg 3/4 more consistently with RSNEJouni Malinen2020-03-071-0/+5
* OWE: Fix PTK derivation workaround for interoperabilityHu Wang2020-03-061-1/+1
* WPA: Rename FILS wrapped dataIlan Peer2020-02-291-8/+8
* STA: Allow PTK rekeying without Ext KeyID to be disabled as a workaroundAlexander Wetzel2020-02-231-0/+18
* Configure received BIGTK on station/supplicant sideJouni Malinen2020-02-171-1/+72
* wpa_supplicant configuration for Beacon protectionJouni Malinen2020-02-171-0/+2
* OWE: PTK derivation workaround in STA modeJouni Malinen2020-01-231-1/+13
* Fix a typo in a commentJouni Malinen2020-01-231-1/+1
* Introduce and add key_flagAlexander Wetzel2020-01-091-7/+10
* Add no_encrypt flag for control port TXMarkus Theil2020-01-051-0/+8
* FT: More debug prints for RSNE modification for EAPOL-Key msg 2/4Jouni Malinen2019-12-241-0/+8
* SAE: Add RSNXE in Association Request and EAPOL-Key msg 2/4Jouni Malinen2019-10-171-25/+106
* RSN: Verify RSNXE match between Beacon/ProbeResp and EAPOL-Key msg 3/4Jouni Malinen2019-10-151-0/+44
* FILS+FT: Fix MFPR flag in RSNE during FILS exchange for FTJouni Malinen2019-10-011-1/+3
* Remove CONFIG_IEEE80211W build parameterJouni Malinen2019-09-081-30/+3
* More forceful clearing of stack memory with keysJouni Malinen2019-05-261-18/+20
* FILS: Verify RSNE match between Beacon/Probe Response and (Re)AssocRespJouni Malinen2019-05-221-0/+20
* FT: Store XXKey/MPMK in PMKSA cache instead of MSK (supplicant)Jouni Malinen2019-04-281-15/+36
* FT: Allow 4-way handshake for PTK rekeying to continue without PMK/PMKIDJouni Malinen2019-04-181-0/+9
* RSN: Ignore IGTK configuration errors with swapped KeyID valuesJouni Malinen2019-04-161-3/+21
* RSN: Report completion only after IGTK configurationJouni Malinen2019-04-161-4/+9
* DPP2: PFS for PTK derivationJouni Malinen2019-03-181-1/+25
* DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in contextJouni Malinen2019-03-171-1/+1
* FILS+FT: STA mode validation of PMKR1Name in initial MD associationJouni Malinen2019-03-131-2/+22
* tests: EAPOL-Key fuzzing toolJouni Malinen2019-02-111-0/+27
* RSN: Do not start preauthentication timer without candidatesJouni Malinen2019-02-111-1/+3
* OCV: Include and verify OCI in the FILS handshakeMathy Vanhoef2018-12-171-0/+39
* OCV: Verify OCI in 4-way and group key handshakeMathy Vanhoef2018-12-171-0/+40
* OCV: Insert OCI in 4-way and group key handshakeMathy Vanhoef2018-12-161-2/+70
* OCV: Advertise OCV capability in RSN capabilities (STA)Mathy Vanhoef2018-12-161-0/+5
* RSN: Use COMPACT_MACSTR to match MAC2STRJohannes Berg2018-10-161-1/+1
* RSN: Do not replace existing Suite B PMKSA on 4-way handshakeJouni Malinen2018-09-271-1/+7
* WPA: Ignore unauthenticated encrypted EAPOL-Key dataMathy Vanhoef2018-08-081-0/+11
* FT: Derive PMKR0Name/PMKR1Name using SHA-384 with AKM 00-0F-AC:13Jouni Malinen2018-06-061-1/+1
* FT: FTE parsing for SHA384-based AKMJouni Malinen2018-06-051-1/+2
* FT: PMK-R0 derivation using SHA384-based AKMJouni Malinen2018-06-051-2/+5
* FT: XXKey derivation for SHA384-based AKMJouni Malinen2018-06-051-2/+9