• Home
  • Raw
  • Download

Lines Matching full:fixed

4 	* fixed WPA packet number reuse with replayed messages and key
21 - fixed wpa_psk_file use for FT-PSK
22 - fixed FT-SAE PMKID matching
27 - fixed some PMKSA caching cases with SAE
32 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
44 * fixed nl80211 AP mode configuration regression with Linux 4.15 and
47 * fixed some 20/40 MHz coexistence cases where the BSS could drop to
59 * fixed EAP-pwd last fragment validation
61 * fixed WPS configuration update vulnerability with malformed passphrase
66 * fixed Suite B 192-bit AKM to use proper PMK length
67 (note: this makes old releases incompatible with the fixed behavior)
77 * fixed EAPOL reauthentication after FT protocol run
78 * fixed FTIE generation for 4-way handshake after FT protocol run
79 * fixed and improved various FST operations
108 * fixed PMKID derivation with SAE
132 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
134 * fixed WMM Action frame parser
136 * fixed EAP-pwd server missing payload length validation
139 * fixed validation of WPS and P2P NFC NDEF record payload length
142 - fixed vendor command handling to check OUI properly
143 * fixed hlr_auc_gw build with OpenSSL
147 * fixed and extended dynamic VLAN cases
161 * fixed key derivation for Suite B 192-bit AKM (this breaks
170 * fixed number of small issues based on hwsim test case failures and
172 * fixed Accounting-Request to not include duplicated Acct-Session-Id
176 * fixed channel switch from VHT to HT
183 * fixed a regression with driver=wired
189 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
190 * fixed a regression in HT 20/40 coex Action frame parsing
209 * fixed some RADIUS server failover cases
212 * fixed number of minor issues identified in static analyzer warnings
213 * fixed DFS and channel switch operation for multi-BSS cases
222 * fixed GET_CONFIG wpa_pairwise_cipher value
224 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases
225 * fixed OKC PMKSA cache entry fetch to avoid a possible infinite loop
227 * fixed hostapd_cli action script execution to use more robust mechanism
231 * fixed SAE confirm-before-commit validation to avoid a potential
241 * fixed HT40 co-ex scan for some pri/sec channel switches
244 * fixed HT40 co-ex support to check for overlapping 20 MHz BSS
245 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
251 * fixed STA validation step for WPS ER commands to prevent a potential
273 * added/fixed nl80211 functionality
277 * fixed PMF protection of Deauthentication frame when this is triggered
290 * fixed PTK derivation for CCMP-256 and GCMP-256
295 * fixed AP mode default TXOP Limit values for AC_VI and AC_VO (these
306 * fixed RADIUS client retransmit/failover behavior
309 * fixed a possible crash on double DISABLE command when multiple BSSes
311 * fixed a memory leak in SAE random number generation
312 * fixed GTK rekeying when the station uses FT protocol
313 * fixed off-by-one bounds checking in printf_encode()
361 * fixed number of small bugs (see git logs for more details)
373 * fixed WPS operation stopping on dual concurrent AP
394 * EAP-SIM: fixed re-authentication not to update pseudonym
398 * EAP-AKA': fixed identity for MK derivation
404 * fixed EAP/WPS to PSK transition on reassociation in cases where
434 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
444 * fixed EAPOL frame transmission to non-QoS STAs with nl80211
560 * TNC: fixed issues with fragmentation
589 * fixed HT Capabilities IE with nl80211 drivers
601 * fixed WPS Probe Request processing to handle missing required
603 * fixed PKCS#12 use with OpenSSL 1.0.0
615 * driver_nl80211: fixed STA accounting data collection (TX/RX bytes
619 * fixed EAPOL/EAP reauthentication when using an external RADIUS
621 * fixed TNC with EAP-TTLS
622 * fixed IEEE 802.11r key derivation function to match with the standard
624 * fixed SHA-256 based key derivation function to match with the
635 * fixed number of small WPS issues and added workarounds to
657 * fixed WEP authentication (both Open System and Shared Key) with
663 * fixed retransmission of EAP requests if no response is received
679 * fixed EAP-TLS message processing for the last TLS message if it is
682 * fixed listen interval configuration for nl80211 drivers
687 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
689 * fixed internal TLSv1 implementation for abbreviated handshake (used
701 * fixed WPA/RSN IE validation to verify that the proto (WPA vs. WPA2)
704 A-ID-Info (eap_fast_a_id_info) to allow A-ID to be set to a fixed
726 * fixed Reassociation Response callback processing when using internal
731 * fixed EAPOL state machine to handle a case in which no response is
734 * fixed EAP-SIM/AKA realm processing to allow decorated usernames to
738 * fixed EAP-SIM/AKA protected result indication to include AT_COUNTER
741 * fixed EAP-SIM Start response processing for fast reauthentication
747 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
790 * fixed EAP-PSK bit ordering of the Flags field
791 * fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
793 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
794 * fixed IPv6 connection to RADIUS accounting server
803 * fixed EAP-MSCHAPv2 server to use a space between S and M parameters
816 * fixed PMKSA cache update in the end of successful RSN
822 * driver_madwifi: fixed configuration of unencrypted modes (plaintext
837 * fixed session timeout processing with drivers that do not use
844 * fixed hostapd to add PMKID KDE into 4-Way Handshake Message 1 when
851 * fixed nt_password_hash build [Bug 144]
856 * fixed a segmentation fault when RSN pre-authentication was completed
869 * fixed EAP-MSCHAPv2 message length validation
872 * fixed stdarg use in hostapd_logger(): if both stdout and syslog
893 * fixed WPA message 3/4 not to encrypt Key Data field (WPA IE)
924 * driver_wired: fixed EAPOL sending to optionally use PAE group address
940 * driver_madwifi: fixed EAPOL packet receive for configuration where
943 * fixed EAPOL state machine step function to process all state
955 * fixed build without CONFIG_RSN_PREAUTH
956 * fixed FreeBSD build
959 * fixed PMKSA caching to copy User-Name and Class attributes so that
963 * fixed PMKSA caching for the case where STA (re)associates without
968 * fixed EAP-PAX MAC calculation
969 * fixed EAP-PAX CK and ICK key derivation
977 * fixed RADIUS server initialization when only auth or acct server
982 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
986 * fixed RADIUS Class attribute processing to only use Access-Accept
998 * fixed a bug which caused some RSN pre-authentication cases to use
1000 * fixed private key loading for cases where passphrase is not set
1003 * fixed WPA2 to add PMKSA cache entry when using integrated EAP
1005 * fixed PMKSA caching (EAP authentication was not skipped correctly
1021 * fixed PEAPv1 to use tunneled EAP-Success/Failure instead of EAP-TLV
1023 * fixed EAP identifier duplicate processing with the new IEEE 802.1X
1029 * fixed WPA message 2/4 processing not to cancel timeout for TimeoutEvt
1033 * fixed reconfiguration of RADIUS client retransmission timer when
1042 * fixed EAPOL-Start processing to trigger WPA reauthentication
1062 * driver_madwifi: fixed group key setup and added get_ssid method
1079 * fixed EAPOL reauthentication to trigger WPA/WPA2 reauthentication
1080 * fixed EAPOL state machine to stop if STA is removed during
1097 * fixed an alignment issue that could cause SHA-1 to fail on some
1100 * fixed RADIUS reconnection after an error in sending interim
1117 * fixed RADIUS accounting to generate a new session id for cases where
1119 * fixed STA disassociation handler to mark next timeout state to
1136 * fixed some accounting cases where Accounting-Start was sent when
1143 * fixed couple of cases where EAPOL state for a station was freed
1145 * fixed couple of bugs in processing WPA deauthentication (freed data
1149 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1150 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1156 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., do
1169 * fixed interim accounting to remove any pending accounting messages
1178 * fixed event loop to call signal handlers only after returning from
1188 * fixed accounting session handling to send Accounting-Start only once
1191 * fixed Accounting-Stop statistics in cases where the message was