fragattacks/src/rsn_supp
Jouni Malinen db76aa64f1 Fix PeerKey 4-way handshake
The earlier changes to buffer EAPOL frames when not associated to avoid
race conditions (especially commit
3ab35a6603 but maybe something even before
that) broke PeerKey 4-way handshake. Fix this by using a separate check
before the race condition workaround to process PeerKey 4-way handshake
EAPOL-Key messages differently.

Signed-hostap: Jouni Malinen <j@w1.fi>
2013-12-28 16:32:54 +02:00
..
Makefile Add CONFIG_CODE_COVERAGE=y option for gcov 2013-11-24 19:16:12 +02:00
peerkey.c Fix PeerKey deinit behavior 2013-12-28 16:32:54 +02:00
peerkey.h rsn_supp: Do not track expiration time 2013-12-24 07:33:25 +02:00
pmksa_cache.c rsn_supp: Use monotonic time for PMKSA cache expiry 2013-12-24 07:50:26 +02:00
pmksa_cache.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
preauth.c Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Do not reenable TDLS link on retransmitted setup frame 2013-11-22 17:47:09 +02:00
wpa_ft.c FT: Fix TKIP group key configuration in FT protocol 2013-05-24 16:03:54 +03:00
wpa_i.h TDLS: Pass peer's AID information to kernel 2013-05-06 15:47:44 +03:00
wpa_ie.c Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
wpa_ie.h TDLS: Pass peer's AID information to kernel 2013-05-06 15:47:44 +03:00
wpa.c Fix PeerKey 4-way handshake 2013-12-28 16:32:54 +02:00
wpa.h Fix PeerKey 4-way handshake 2013-12-28 16:32:54 +02:00