fragattacks/src/rsn_supp
Jouni Malinen 0ab1dd0106 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA)
This changes 4-way handshake authenticator processing to decrypt the
EAPOL-Key frames using an AEAD cipher (AES-SIV with FILS AKMs) before
processing the Key Data field. This replaces Key MIC validation for the
cases where AEAD cipher is used.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2016-10-10 21:11:47 +03:00
..
Makefile tests: Add eapol-fuzzer 2015-04-22 11:44:19 +03:00
peerkey.c RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only 2016-10-10 21:11:47 +03:00
peerkey.h Make struct wpa_eapol_key easier to use with variable length MIC 2016-10-10 21:11:46 +03:00
pmksa_cache.c SAE: Fix PMKID calculation for PMKSA cache 2016-02-18 21:07:47 +02:00
pmksa_cache.h SAE: Fix PMKID calculation for PMKSA cache 2016-02-18 21:07:47 +02:00
preauth.c SAE: Fix PMKID calculation for PMKSA cache 2016-02-18 21:07:47 +02:00
preauth.h Fix wpa_supplicant build with IEEE8021X_EAPOL=y and CONFIG_NO_WPA=y 2016-01-15 20:04:41 +02:00
tdls.c TDLS: Clean up os_memcmp use 2016-02-16 15:49:28 +02:00
wpa_ft.c FT: Allow CCMP-256 and GCMP-256 as group ciphers 2015-07-07 16:25:06 +03:00
wpa_i.h RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only 2016-10-10 21:11:47 +03:00
wpa_ie.c FILS: Add AKM definitions 2016-10-10 20:46:36 +03:00
wpa_ie.h Simplify VHT Capabilities element parsing 2015-04-22 22:05:11 +03:00
wpa.c FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) 2016-10-10 21:11:47 +03:00
wpa.h TDLS: Declare tdls_testing as extern in a header file 2016-06-23 13:31:04 +03:00