OVMS3-idf/components/wpa_supplicant
Nachiket Kukade e9a07592fc wpa_supplicant: Fix WPA3 and WPA2 transition related failures
1. If Device is connected to AP in WPA3-PSK mode, AP switching
security to WPA2-PSK causes connection failures even after reset.
Fix is to not store WPA3's PMK in NVS for caching.

2. AP switching back to WPA3 causes even more connection failures.
This is due to device not clearing Supplicant level PMK Cache when
it is no longer valid. Fix is to clear the Cache when 4-way handshake
fails and to check Key Mgmt of Cache before using.

3. When AP switches from WPA3 to WPA2, device's PMF config in
Supplicant remains enabled. This may cause failures during
4-way handshake. So clear PMF config in when PMF is no longer used.
2020-07-15 13:40:03 +00:00
..
include esp_wifi: Additional changes for WPA3 & PMF testcases 2020-05-06 10:20:46 +05:30
port wpa_supplicant: Add parsing support for WEP40 key 2020-05-11 11:23:10 +05:30
src wpa_supplicant: Fix WPA3 and WPA2 transition related failures 2020-07-15 13:40:03 +00:00
test wpa_supplicant: Support WPA3 4-way handshake, add config option 2020-05-06 10:20:35 +05:30
CMakeLists.txt wpa_supplicant: Disable TLSv1.2 by default 2020-05-06 10:21:25 +05:30
component.mk wpa_supplicant: Support WPA3 4-way handshake, add config option 2020-05-06 10:20:35 +05:30
COPYING wpa_supplicant: replace pre-built crypto library with source code 2016-11-04 14:58:47 +08:00
Kconfig wpa_supplicant: WPS Inter operatability Fixes 2020-06-03 13:33:49 +00:00