caf4cad3b4
- Fix incorrect allocation of eb due to rsn ie len mismatch - Set default NVS sae pwe value to SAE_PWE_BOTH for ap and station - Fix incorrect deauth reason parsing for station - Fix memory corruption by avoiding unncessary encryption of Mgmt frames When wpa_supplicant sends an authentication response for an already connection station (with keys installed after a successful 4-way handshake), the Mgmt packet was encrypted unconditionaly based on 'bss->pmf_enable'. This lead to memory corruption since extra space for the encryption header was assumed even when it was not there. Fix this by verifying that the packet is actually a robust management frame before enabling the encryption.