OWE: PTK derivation workaround in STA mode
Initial OWE implementation used SHA256 when deriving the PTK for all OWE groups. This was supposed to change to SHA384 for group 20 and SHA512 for group 21. The new owe_ptk_workaround=1 network parameter can be used to enable older behavior mainly for testing purposes. There is no impact to group 19 behavior, but if enabled, this will make group 20 and 21 cases use SHA256-based PTK derivation which will not work with the updated OWE implementation on the AP side. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
65a44e849a
commit
8b138d2826
7 changed files with 31 additions and 1 deletions
|
@ -1008,6 +1008,19 @@ struct wpa_ssid {
|
|||
*/
|
||||
int owe_only;
|
||||
|
||||
/**
|
||||
* owe_ptk_workaround - OWE PTK derivation workaround
|
||||
*
|
||||
* Initial OWE implementation used SHA256 when deriving the PTK for all
|
||||
* OWE groups. This was supposed to change to SHA384 for group 20 and
|
||||
* SHA512 for group 21. This parameter can be used to enable older
|
||||
* behavior mainly for testing purposes. There is no impact to group 19
|
||||
* behavior, but if enabled, this will make group 20 and 21 cases use
|
||||
* SHA256-based PTK derivation which will not work with the updated
|
||||
* OWE implementation on the AP side.
|
||||
*/
|
||||
int owe_ptk_workaround;
|
||||
|
||||
/**
|
||||
* owe_transition_bss_select_count - OWE transition BSS select count
|
||||
*
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue