mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-27 09:48:43 -05:00
0c2b3f6541
IEEE Std 802.11-2012 description of SAE does not require this, i.e., it describes the requirement as 0 < scalar < r for processing the Commit message. However, this is not correct and will be changes to 1 < scalar < r to match the Dragonfly description so that a trivial secret case will be avoided explicitly. This is not much of an issue for the locally generated commit-scalar since it would be very unlikely to get the value of 1. For Commit message processing, a peer with knowledge of the password could potentially force the exchange to expose key material without this check. Signed-off-by: Jouni Malinen <j@w1.fi> |
||
---|---|---|
.. | ||
common_module_tests.c | ||
defs.h | ||
eapol_common.h | ||
gas.c | ||
gas.h | ||
hw_features_common.c | ||
hw_features_common.h | ||
ieee802_1x_defs.h | ||
ieee802_11_common.c | ||
ieee802_11_common.h | ||
ieee802_11_defs.h | ||
Makefile | ||
privsep_commands.h | ||
qca-vendor-attr.h | ||
qca-vendor.h | ||
sae.c | ||
sae.h | ||
tnc.h | ||
version.h | ||
wpa_common.c | ||
wpa_common.h | ||
wpa_ctrl.c | ||
wpa_ctrl.h | ||
wpa_helpers.c | ||
wpa_helpers.h |