esp-idf/components/wpa_supplicant
Nachiket Kukade af66eab249 wpa_supplicant: Fix WPA3 and WPA2 transition related failures
1. If Device is connected to AP in WPA3-PSK mode, AP switching
security to WPA2-PSK causes connection failures even after reset.
Fix is to not store WPA3's PMK in NVS for caching.

2. AP switching back to WPA3 causes even more connection failures.
This is due to device not clearing Supplicant level PMK Cache when
it is no longer valid. Fix is to clear the Cache when 4-way handshake
fails and to check Key Mgmt of Cache before using.

3. When AP switches from WPA3 to WPA2, device's PMF config in
Supplicant remains enabled. This may cause failures during
4-way handshake. So clear PMF config in when PMF is no longer used.
2020-10-22 10:05:02 +00:00
..
include esp_wifi: Support for additional WPA3 testcases 2020-03-05 12:15:03 +05:30
port wpa_supplicant: Disable TLSv1.2 by default 2020-04-28 10:46:59 +05:30
src wpa_supplicant: Fix WPA3 and WPA2 transition related failures 2020-10-22 10:05:02 +00:00
test hw crypto: activated hardware acceleration for esp32s2beta 2019-12-12 12:37:29 +08:00
CMakeLists.txt wpa_supplicant: Disable TLSv1.2 by default 2020-04-28 10:46:59 +05:30
component.mk wpa_supplicant: Support WPA3 4-way handshake, add config option 2019-11-26 10:59:55 +05:30
COPYING wpa_supplicant: replace pre-built crypto library with source code 2016-11-04 14:58:47 +08:00
Kconfig wpa_supplicant: WPS Inter operatability Fixes 2020-08-26 08:49:43 +00:00