OVMS3-idf/components/wpa_supplicant
Nachiket Kukade 21dc9fcb5d wpa_supplicant: Fix WPA3 and WPA2 transition related failures
1. If Device is connected to AP in WPA3-PSK mode, AP switching
security to WPA2-PSK causes connection failures even after reset.
Fix is to not store WPA3's PMK in NVS for caching.

2. AP switching back to WPA3 causes even more connection failures.
This is due to device not clearing Supplicant level PMK Cache when
it is no longer valid. Fix is to clear the Cache when 4-way handshake
fails and to check Key Mgmt of Cache before using.

3. When AP switches from WPA3 to WPA2, device's PMF config in
Supplicant remains enabled. This may cause failures during
4-way handshake. So clear PMF config in when PMF is no longer used.
2020-08-10 09:05:48 +00:00
..
include wpa_supplicant: Port dpp feature from supplicant 2020-04-14 18:53:35 +05:30
port wpa_supplicant: Support for mbedtls tls handshake 2020-07-27 18:47:27 +05:30
src wpa_supplicant: Fix WPA3 and WPA2 transition related failures 2020-08-10 09:05:48 +00:00
test wpa_supplicant: Port dpp feature from supplicant 2020-04-14 18:53:35 +05:30
CMakeLists.txt wpa_supplicant: Support for mbedtls tls handshake 2020-07-27 18:47:27 +05:30
component.mk wpa_supplicant: Support for mbedtls tls handshake 2020-07-27 18:47:27 +05:30
COPYING wpa_supplicant: replace pre-built crypto library with source code 2016-11-04 14:58:47 +08:00
Kconfig wpa_supplicant: Support for mbedtls tls handshake 2020-07-27 18:47:27 +05:30