hostapd/src/rsn_supp
Jouni Malinen 761396e4be Reject Group Key message 1/2 prior to completion of 4-way handshake
Previously, it would have been possible to complete RSN connection by
skipping the msg 3/4 and 4/4 completely. This would have resulted in
pairwise key not being configured. This is obviously not supposed to
happen in practice and could result in unexpected behavior, so reject
group key message before the initial 4-way handshake has been completed.

Signed-off-by: Jouni Malinen <j@w1.fi>
2015-03-07 13:00:06 +02:00
..
Makefile Add CONFIG_CODE_COVERAGE=y option for gcov 2013-11-24 19:16:12 +02:00
peerkey.c Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
peerkey.h Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
pmksa_cache.c Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
pmksa_cache.h Suite B: PMKID derivation for AKM 00-0F-AC:11 2014-11-16 17:09:11 +02:00
preauth.c Fix resource leaks on rsn_preauth_init() error paths 2015-01-31 13:44:48 +02:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Ignore extra padding in all packets 2015-02-21 16:07:53 +02:00
wpa.c Reject Group Key message 1/2 prior to completion of 4-way handshake 2015-03-07 13:00:06 +02:00
wpa.h Preparations for variable length KCK and KEK 2015-01-27 01:26:49 +02:00
wpa_ft.c Preparations for variable length KCK and KEK 2015-01-27 01:26:49 +02:00
wpa_i.h Reject Group Key message 1/2 prior to completion of 4-way handshake 2015-03-07 13:00:06 +02:00
wpa_ie.c Add Suite B 192-bit AKM 2015-01-27 01:43:52 +02:00
wpa_ie.h TDLS: Use QoS info from WMM IE obtained in TDLS frames 2014-03-12 22:39:11 +02:00