hostapd/src/rsn_supp
Jouni Malinen 35936cd2cf FT: Verify that RSNXE is used consistently in Reassociation Response
Verify that the AP included RSNXE in Beacon/Probe Response frames if it
indicated in FTE that RSNXE is used. This is needed to protect against
downgrade attacks based on the design proposed in 20/332r3.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-03-21 00:01:47 +02:00
..
Makefile Remove CONFIG_IEEE80211W build parameter 2019-09-08 17:33:40 +03:00
pmksa_cache.c SAE: Do not use PMKSA entry after its reauth threshold 2020-02-28 18:41:24 +02:00
pmksa_cache.h Fix wpa_supplicant build with CONFIG_NO_WPA 2018-04-13 11:43:57 +03:00
preauth.c RSN: Do not add PMKSA candidates unnecessarily 2020-01-01 12:26:24 +02:00
preauth.h Fix wpa_supplicant build with IEEE8021X_EAPOL=y and CONFIG_NO_WPA=y 2016-01-15 20:04:41 +02:00
tdls.c nl80211: Drop outdated TDLS set_key() hack 2020-03-06 21:44:31 +02:00
wpa.c RSN: Stop 4-way handshake if scan results are not available 2020-03-08 16:16:11 +02:00
wpa.h STA: Allow PTK rekeying without Ext KeyID to be disabled as a workaround 2020-02-23 13:05:19 +02:00
wpa_ft.c FT: Verify that RSNXE is used consistently in Reassociation Response 2020-03-21 00:01:47 +02:00
wpa_i.h STA: Allow PTK rekeying without Ext KeyID to be disabled as a workaround 2020-02-23 13:05:19 +02:00
wpa_ie.c Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers 2019-10-18 13:02:27 +03:00
wpa_ie.h Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers 2019-10-18 13:02:27 +03:00