summaryrefslogtreecommitdiff
path: root/src/rsn_supp
Commit message (Expand)AuthorAgeFilesLines
* WMM: Advertise support for 16 PTKSA replay counters for non-AP STAJouni Malinen2023-04-184-0/+10
* FT: Store PTKSA entry for the correct BSSID in the FT protocol caseJouni Malinen2023-02-211-1/+1
* Mark addr argument to storing PTKSA constJouni Malinen2023-02-212-2/+2
* PASN: Align RSNXE with IEEE P802.11az/D7.0 definitionsAndrei Otcheretianski2022-12-161-1/+1
* SAE: Add an enum for defining sae_pwe parameter valuesJouni Malinen2022-11-293-4/+7
* Add a callback to notify added PMKSA cache entry detailsVinay Gannevaram2022-11-285-1/+33
* RSN: Split EAPOL-Key msg 3/4 processing for WPA(v1)Jouni Malinen2022-11-271-2/+70
* RSN: Split EAPOL-Key msg 1/4 processing for WPA(v1)Jouni Malinen2022-11-271-25/+95
* RSN: Split EAPOL-Key group msg 1/2 processing more completely for WPA(v1)Jouni Malinen2022-11-271-193/+212
* RSN: Split WPA(v1) processing of EAPOL-Key frames into a separate functionJouni Malinen2022-11-271-49/+151
* RSN: Do not include RC4 use in FIPS buildsJouni Malinen2022-11-261-6/+6
* MLD STA: Fix IGTK and BIGTK MLO KDEs validationVeerendranath Jakkam2022-11-211-21/+11
* TDLS: Use stored FTE length in MIC calculationJouni Malinen2022-11-201-22/+30
* TDLS: Use stored peer RSNE length in MIC calculationJouni Malinen2022-11-201-11/+15
* FT: Simplify FTE parsing for FT-SAE-EXT-KEY using MIC Length subfieldJouni Malinen2022-11-202-15/+13
* DPP: Drop PMKSA entry if AP reject association due to invalid PMKIDJouni Malinen2022-11-204-0/+45
* Fix empty pmksa_cache_get()Jouni Malinen2022-11-191-2/+2
* Check for own address (SPA) match when finding PMKSA entriesJouni Malinen2022-11-105-16/+23
* Store own MAC address (SPA) in supplicant PMKSA cache entriesJouni Malinen2022-11-102-2/+6
* FT: Do not try to use FT protocol between mobility domainsJouni Malinen2022-11-094-6/+35
* MLO: Remove unnecessary debug prints about clearing AP RSNE/RSNXEJouni Malinen2022-11-081-4/+8
* MLD STA: Group key handshake processing for GTK/IGTK/BIGTK rekeyingRohan Dutta2022-11-061-3/+110
* MLD STA: Use AP MLD address as destination for 4-way handshake EAPOL-Key framesRohan Dutta2022-11-061-5/+4
* MLD STA: Validation of MLO KDEs for 4-way handshake EAPOL-Key framesVeerendranath Jakkam2022-11-061-0/+181
* MLD STA: Processing of EAPOL-Key msg 3/4 frame when using MLOVeerendranath Jakkam2022-11-062-31/+400
* MLD STA: Extend key configuration functions to support Link IDVeerendranath Jakkam2022-11-065-22/+22
* MLD STA: Configure TK to the driver using AP MLD addressRohan Dutta2022-11-062-13/+17
* MLD STA: Use AP MLD address in PMKSA entryVeerendranath Jakkam2022-11-061-1/+1
* MLD STA: Use AP MLD address to derive pairwise keysRohan Dutta2022-11-063-3/+12
* MLD STA: Add MLO KDEs for EAPOL-Key msg 2/4 and 4/4Veerendranath Jakkam2022-11-061-4/+96
* MLD STA: Set MLO connection info to wpa_smVeerendranath Jakkam2022-11-063-0/+125
* PASN: Remove wpa_sm dependency to add an entry to PMKSA cacheVinay Gannevaram2022-11-042-11/+18
* Enable use of PMKSA caching independent of RSN supplicant state machineVinay Gannevaram2022-11-041-10/+34
* FT: Cover variable length KCK in function documentationJouni Malinen2022-10-161-1/+1
* FT: Reassociation Response frame validation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-41/+28
* FT: Response processing for FT-SAE-EXT-KEYJouni Malinen2022-10-161-30/+9
* FT: Supplicant side FTE generation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-2/+17
* FT: Extend PMK-R0 derivation for FT-SAE-EXT-KEYJouni Malinen2022-10-162-4/+10
* FT: Extend FTE parsing for FT-SAE-EXT-KEYJouni Malinen2022-10-162-7/+12
* FT: Extend MIC derivation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-2/+3
* FT: Extend PMKR1Name derivation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-1/+1
* PASN: Fix CONFIG_PASN=y build without CONFIG_IEEE80211R=yJouni Malinen2022-10-041-2/+3
* PASN: Set secure ranging context to driver after associationVinay Gannevaram2022-09-024-9/+84
* Store secure ranging driver capabilities in WPA state machineVinay Gannevaram2022-09-012-0/+14
* SAE: Internal WPA_KEY_MGMT_* defines for extended key AKMsJouni Malinen2022-07-253-1/+8
* Use Secure=1 in PTK rekeying EAPOL-Key msg 1/4 and 2/4Jouni Malinen2022-05-161-0/+2
* Discard unencrypted EAPOL-Key msg 1/4 when TK is set and PMF is enabledJouni Malinen2022-05-071-2/+11
* Do not prevent Michael MIC error report based on disallowed PTK0 rekeyJouni Malinen2022-05-071-1/+1
* Provide information about the encryption status of received EAPOL framesJouni Malinen2022-05-073-4/+8
* Fix no_encrypt flag in control port TX for rekeyingJouni Malinen2022-05-073-1/+7