hostap/src/rsn_supp
Ashok Kumar Ponnaiah 801e117376 Fix validation of RSN EAPOL-Key version for GCMP with PMF
If PMF was enabled, the validation step for EAPOL-Key descriptor version
ended up rejecting the message if GCMP had been negotiated as the
pairwise cipher. Fix this by making the GCMP check skipped similarly to
the CCMP case if a SHA256-based AKM is used.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2014-06-02 17:03:33 +03:00
..
Makefile Add CONFIG_CODE_COVERAGE=y option for gcov 2013-11-24 19:16:12 +02:00
peerkey.c Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
peerkey.h rsn_supp: Do not track expiration time 2013-12-24 07:33:25 +02:00
pmksa_cache.c rsn_supp: Use monotonic time for PMKSA cache expiry 2013-12-24 07:50:26 +02:00
pmksa_cache.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
preauth.c Skip network disabling on expected EAP failure 2014-01-08 16:42:15 +02:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Fully tear down existing link before setup 2014-04-29 18:59:12 +03:00
wpa.c Fix validation of RSN EAPOL-Key version for GCMP with PMF 2014-06-02 17:03:33 +03:00
wpa.h TDLS: Make wpa_tdls_send_teardown() static 2014-04-29 18:59:12 +03:00
wpa_ft.c Enable FT with SAE 2013-12-29 10:00:31 +02:00
wpa_i.h Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
wpa_ie.c Allow management group cipher to be configured 2014-03-14 21:58:45 +02:00
wpa_ie.h TDLS: Use QoS info from WMM IE obtained in TDLS frames 2014-03-12 22:39:11 +02:00