summaryrefslogtreecommitdiff
path: root/src/rsn_supp/wpa.c
Commit message (Expand)AuthorAgeFilesLines
* WMM: Advertise support for 16 PTKSA replay counters for non-AP STAJouni Malinen2023-04-181-0/+3
* Add a callback to notify added PMKSA cache entry detailsVinay Gannevaram2022-11-281-1/+11
* RSN: Split EAPOL-Key msg 3/4 processing for WPA(v1)Jouni Malinen2022-11-271-2/+70
* RSN: Split EAPOL-Key msg 1/4 processing for WPA(v1)Jouni Malinen2022-11-271-25/+95
* RSN: Split EAPOL-Key group msg 1/2 processing more completely for WPA(v1)Jouni Malinen2022-11-271-193/+212
* RSN: Split WPA(v1) processing of EAPOL-Key frames into a separate functionJouni Malinen2022-11-271-49/+151
* RSN: Do not include RC4 use in FIPS buildsJouni Malinen2022-11-261-6/+6
* MLD STA: Fix IGTK and BIGTK MLO KDEs validationVeerendranath Jakkam2022-11-211-21/+11
* FT: Simplify FTE parsing for FT-SAE-EXT-KEY using MIC Length subfieldJouni Malinen2022-11-201-2/+1
* DPP: Drop PMKSA entry if AP reject association due to invalid PMKIDJouni Malinen2022-11-201-0/+8
* Check for own address (SPA) match when finding PMKSA entriesJouni Malinen2022-11-101-6/+9
* FT: Do not try to use FT protocol between mobility domainsJouni Malinen2022-11-091-3/+15
* MLO: Remove unnecessary debug prints about clearing AP RSNE/RSNXEJouni Malinen2022-11-081-4/+8
* MLD STA: Group key handshake processing for GTK/IGTK/BIGTK rekeyingRohan Dutta2022-11-061-3/+110
* MLD STA: Use AP MLD address as destination for 4-way handshake EAPOL-Key framesRohan Dutta2022-11-061-5/+4
* MLD STA: Validation of MLO KDEs for 4-way handshake EAPOL-Key framesVeerendranath Jakkam2022-11-061-0/+181
* MLD STA: Processing of EAPOL-Key msg 3/4 frame when using MLOVeerendranath Jakkam2022-11-061-31/+394
* MLD STA: Extend key configuration functions to support Link IDVeerendranath Jakkam2022-11-061-10/+10
* MLD STA: Configure TK to the driver using AP MLD addressRohan Dutta2022-11-061-13/+16
* MLD STA: Use AP MLD address in PMKSA entryVeerendranath Jakkam2022-11-061-1/+1
* MLD STA: Use AP MLD address to derive pairwise keysRohan Dutta2022-11-061-2/+9
* MLD STA: Add MLO KDEs for EAPOL-Key msg 2/4 and 4/4Veerendranath Jakkam2022-11-061-4/+96
* MLD STA: Set MLO connection info to wpa_smVeerendranath Jakkam2022-11-061-0/+102
* PASN: Remove wpa_sm dependency to add an entry to PMKSA cacheVinay Gannevaram2022-11-041-9/+14
* FT: Extend PMK-R0 derivation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-2/+5
* FT: Extend FTE parsing for FT-SAE-EXT-KEYJouni Malinen2022-10-161-1/+2
* FT: Extend PMKR1Name derivation for FT-SAE-EXT-KEYJouni Malinen2022-10-161-1/+1
* PASN: Set secure ranging context to driver after associationVinay Gannevaram2022-09-021-5/+41
* Store secure ranging driver capabilities in WPA state machineVinay Gannevaram2022-09-011-0/+13
* SAE: Internal WPA_KEY_MGMT_* defines for extended key AKMsJouni Malinen2022-07-251-1/+2
* Use Secure=1 in PTK rekeying EAPOL-Key msg 1/4 and 2/4Jouni Malinen2022-05-161-0/+2
* Discard unencrypted EAPOL-Key msg 1/4 when TK is set and PMF is enabledJouni Malinen2022-05-071-2/+11
* Do not prevent Michael MIC error report based on disallowed PTK0 rekeyJouni Malinen2022-05-071-1/+1
* Provide information about the encryption status of received EAPOL framesJouni Malinen2022-05-071-1/+2
* Fix no_encrypt flag in control port TX for rekeyingJouni Malinen2022-05-071-1/+5
* WPA: Discard EAPOL-Key msg 1/4 with corrupted information elementsDomien Schepers2022-05-071-3/+7
* Add support for not transmitting EAPOL-Key group msg 2/2Veerendranath Jakkam2022-04-051-0/+10
* SAE: Fix sm->cur_pmksa assignmentHu Wang2021-10-251-3/+5
* SAE: Do not expire the current PMKSA cache entryJouni Malinen2021-10-181-1/+11
* Add support to reconfigure or flush PMKSA cache on interface enableVeerendranath Jakkam2021-10-151-0/+7
* FILS: Flush external-PMKSA when connection fails without ERP keysVeerendranath Jakkam2021-07-141-1/+17
* Add helper functions for parsing RSNXE capabilitiesJouni Malinen2021-04-101-4/+4
* Fix full EAP authentication after PMKSA cache add failureJouni Malinen2021-03-201-0/+4
* RSN: Validate RSNXE match in EAPOL-Key msg 3/4 only when RSN is usedJouni Malinen2021-02-061-5/+6
* WPA: Support deriving KDK based on capabilitiesIlan Peer2021-01-261-6/+21
* PASN: Support PASN with FT key derivationIlan Peer2021-01-261-0/+5
* PASN: Support PASN with SAE key derivationIlan Peer2021-01-251-0/+11
* WPA: Add PTKSA cache to wpa_supplicant for PASNIlan Peer2021-01-251-0/+6
* WPA: Add a function to get PMKSA cache entryIlan Peer2021-01-251-0/+10
* FILS: Extend the fils_pmk_to_ptk() function to also derive KDKIlan Peer2021-01-251-1/+2