fragattacks/src/rsn_supp
Jouni Malinen 8b138d2826 OWE: PTK derivation workaround in STA mode
Initial OWE implementation used SHA256 when deriving the PTK for all OWE
groups. This was supposed to change to SHA384 for group 20 and SHA512
for group 21. The new owe_ptk_workaround=1 network parameter can be used
to enable older behavior mainly for testing purposes. There is no impact
to group 19 behavior, but if enabled, this will make group 20 and 21
cases use SHA256-based PTK derivation which will not work with the
updated OWE implementation on the AP side.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-01-24 00:47:41 +02:00
..
Makefile Remove CONFIG_IEEE80211W build parameter 2019-09-08 17:33:40 +03:00
pmksa_cache.c Fix a typo in a comment 2019-11-06 19:44:50 +02:00
pmksa_cache.h Fix wpa_supplicant build with CONFIG_NO_WPA 2018-04-13 11:43:57 +03:00
preauth.c RSN: Do not add PMKSA candidates unnecessarily 2020-01-01 12:26:24 +02:00
preauth.h Fix wpa_supplicant build with IEEE8021X_EAPOL=y and CONFIG_NO_WPA=y 2016-01-15 20:04:41 +02:00
tdls.c Introduce and add key_flag 2020-01-09 12:38:36 +02:00
wpa_ft.c Introduce and add key_flag 2020-01-09 12:38:36 +02:00
wpa_i.h OWE: PTK derivation workaround in STA mode 2020-01-24 00:47:41 +02:00
wpa_ie.c Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers 2019-10-18 13:02:27 +03:00
wpa_ie.h Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers 2019-10-18 13:02:27 +03:00
wpa.c OWE: PTK derivation workaround in STA mode 2020-01-24 00:47:41 +02:00
wpa.h OWE: PTK derivation workaround in STA mode 2020-01-24 00:47:41 +02:00