SAE key derivation requires use of a secret element, PWE. This element is deterministically discovered by repeatedly hashing the password with some additional information until the resulting hash is the abscissa of a point on the elliptic curve (for ECC) or by exponentiating the hash digest to a constant to produce an element (for FFC). This "hunting-and-pecking" loop method is prone to side channel attacks. To avoid this, a direct hashing to element technique in SAE is introduced in IEEE P802.11-REVmd/D3.0. Support new RSNX IEEE as part of the hash to element PWE derivation. The user space sends the RSNX IE in the connect request. Add support to save RSNXE from connect request and pack this IE over SAE assoc request. Also send the IE in assoc IEs in RSO commands. Change-Id: I8eb756840400753794b1b80befe3a20f7d7c7705 CRs-Fixed: 2569596 |
||
---|---|---|
.. | ||
inc | ||
src |