hostapd/src/rsn_supp
Jouni Malinen 1bd131105b Clear pmk_len more consistently for extra protection
This gives more protection against unexpected behavior if RSN supplicant
code ends up trying to use sm->pmk[] with a stale value. Couple of the
code paths did not clear sm->pmk_len explicitly in cases where the old
PMK is being removed, so cover those cases as well to make sure these
will result in PMK-to-PTK derivation failures rather than use of
incorrect PMK value if such a code path could be reached somehow.

Signed-off-by: Jouni Malinen <j@w1.fi>
2018-04-08 19:44:05 +03:00
..
Makefile Remove all PeerKey functionality 2017-10-16 02:03:47 +03:00
pmksa_cache.c FILS: Update PMKID derivation rules for ERP key hierarchy establishment 2017-09-13 22:17:58 +03:00
pmksa_cache.h FILS: Use FILS Cache Identifier to extend PMKSA applicability 2017-02-26 12:05:40 +02:00
preauth.c FILS: Add support for Cache Identifier in add/remove PMKSA 2017-04-07 18:46:13 +03:00
preauth.h Fix wpa_supplicant build with IEEE8021X_EAPOL=y and CONFIG_NO_WPA=y 2016-01-15 20:04:41 +02:00
tdls.c TDLS: Add testing capability to send TPK M2 twice 2017-11-21 00:48:52 +02:00
wpa.c Clear pmk_len more consistently for extra protection 2018-04-08 19:44:05 +03:00
wpa.h Make last received ANonce available through control interface 2017-10-16 17:47:24 +03:00
wpa_ft.c FILS: Add more complete support for FT-FILS use cases 2018-03-26 12:31:04 +03:00
wpa_i.h Remove all PeerKey functionality 2017-10-16 02:03:47 +03:00
wpa_ie.c Remove all PeerKey functionality 2017-10-16 02:03:47 +03:00
wpa_ie.h Remove all PeerKey functionality 2017-10-16 02:03:47 +03:00