• Home
  • Raw
  • Download

Lines Matching full:fixed

11 	  - fixed PMKSA caching with OKC
16 * fixed WPS UPnP SUBSCRIBE handling of invalid operations
18 * fixed PMF disconnection protection bypass
21 * fixed various issues in experimental support for EAP-TEAP server
28 * fixed EAP-FAST server with TLS GCM/CCM ciphers
31 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
55 * fixed FT-EAP initial mobility domain association using PMKSA caching
57 * fixed FILS to and RSNE into (Re)Association Response frames
58 * fixed DPP bootstrapping URI parser of channel list
68 * fixed an ECDH operation corner case with OpenSSL
86 - fixed confirm message validation in error cases
106 * fixed build with LibreSSL
108 * fixed KEK2 derivation for FILS+FT
118 * fixed FT and SA Query Action frame with AP-MLME-in-driver cases
123 * fixed PTK rekeying with FILS and FT
126 * fixed WPA packet number reuse with replayed messages and key
143 - fixed wpa_psk_file use for FT-PSK
144 - fixed FT-SAE PMKID matching
149 - fixed some PMKSA caching cases with SAE
154 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
166 * fixed nl80211 AP mode configuration regression with Linux 4.15 and
169 * fixed some 20/40 MHz coexistence cases where the BSS could drop to
181 * fixed EAP-pwd last fragment validation
183 * fixed WPS configuration update vulnerability with malformed passphrase
188 * fixed Suite B 192-bit AKM to use proper PMK length
189 (note: this makes old releases incompatible with the fixed behavior)
199 * fixed EAPOL reauthentication after FT protocol run
200 * fixed FTIE generation for 4-way handshake after FT protocol run
201 * fixed and improved various FST operations
230 * fixed PMKID derivation with SAE
254 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
256 * fixed WMM Action frame parser
258 * fixed EAP-pwd server missing payload length validation
261 * fixed validation of WPS and P2P NFC NDEF record payload length
264 - fixed vendor command handling to check OUI properly
265 * fixed hlr_auc_gw build with OpenSSL
269 * fixed and extended dynamic VLAN cases
283 * fixed key derivation for Suite B 192-bit AKM (this breaks
292 * fixed number of small issues based on hwsim test case failures and
294 * fixed Accounting-Request to not include duplicated Acct-Session-Id
298 * fixed channel switch from VHT to HT
305 * fixed a regression with driver=wired
311 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
312 * fixed a regression in HT 20/40 coex Action frame parsing
331 * fixed some RADIUS server failover cases
334 * fixed number of minor issues identified in static analyzer warnings
335 * fixed DFS and channel switch operation for multi-BSS cases
344 * fixed GET_CONFIG wpa_pairwise_cipher value
346 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases
347 * fixed OKC PMKSA cache entry fetch to avoid a possible infinite loop
349 * fixed hostapd_cli action script execution to use more robust mechanism
353 * fixed SAE confirm-before-commit validation to avoid a potential
363 * fixed HT40 co-ex scan for some pri/sec channel switches
366 * fixed HT40 co-ex support to check for overlapping 20 MHz BSS
367 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
373 * fixed STA validation step for WPS ER commands to prevent a potential
395 * added/fixed nl80211 functionality
399 * fixed PMF protection of Deauthentication frame when this is triggered
412 * fixed PTK derivation for CCMP-256 and GCMP-256
417 * fixed AP mode default TXOP Limit values for AC_VI and AC_VO (these
428 * fixed RADIUS client retransmit/failover behavior
431 * fixed a possible crash on double DISABLE command when multiple BSSes
433 * fixed a memory leak in SAE random number generation
434 * fixed GTK rekeying when the station uses FT protocol
435 * fixed off-by-one bounds checking in printf_encode()
483 * fixed number of small bugs (see git logs for more details)
495 * fixed WPS operation stopping on dual concurrent AP
516 * EAP-SIM: fixed re-authentication not to update pseudonym
520 * EAP-AKA': fixed identity for MK derivation
526 * fixed EAP/WPS to PSK transition on reassociation in cases where
556 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
566 * fixed EAPOL frame transmission to non-QoS STAs with nl80211
682 * TNC: fixed issues with fragmentation
711 * fixed HT Capabilities IE with nl80211 drivers
723 * fixed WPS Probe Request processing to handle missing required
725 * fixed PKCS#12 use with OpenSSL 1.0.0
737 * driver_nl80211: fixed STA accounting data collection (TX/RX bytes
741 * fixed EAPOL/EAP reauthentication when using an external RADIUS
743 * fixed TNC with EAP-TTLS
744 * fixed IEEE 802.11r key derivation function to match with the standard
746 * fixed SHA-256 based key derivation function to match with the
757 * fixed number of small WPS issues and added workarounds to
779 * fixed WEP authentication (both Open System and Shared Key) with
785 * fixed retransmission of EAP requests if no response is received
801 * fixed EAP-TLS message processing for the last TLS message if it is
804 * fixed listen interval configuration for nl80211 drivers
809 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
811 * fixed internal TLSv1 implementation for abbreviated handshake (used
823 * fixed WPA/RSN IE validation to verify that the proto (WPA vs. WPA2)
826 A-ID-Info (eap_fast_a_id_info) to allow A-ID to be set to a fixed
848 * fixed Reassociation Response callback processing when using internal
853 * fixed EAPOL state machine to handle a case in which no response is
856 * fixed EAP-SIM/AKA realm processing to allow decorated usernames to
860 * fixed EAP-SIM/AKA protected result indication to include AT_COUNTER
863 * fixed EAP-SIM Start response processing for fast reauthentication
869 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
912 * fixed EAP-PSK bit ordering of the Flags field
913 * fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
915 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
916 * fixed IPv6 connection to RADIUS accounting server
925 * fixed EAP-MSCHAPv2 server to use a space between S and M parameters
938 * fixed PMKSA cache update in the end of successful RSN
944 * driver_madwifi: fixed configuration of unencrypted modes (plaintext
959 * fixed session timeout processing with drivers that do not use
966 * fixed hostapd to add PMKID KDE into 4-Way Handshake Message 1 when
973 * fixed nt_password_hash build [Bug 144]
978 * fixed a segmentation fault when RSN pre-authentication was completed
991 * fixed EAP-MSCHAPv2 message length validation
994 * fixed stdarg use in hostapd_logger(): if both stdout and syslog
1015 * fixed WPA message 3/4 not to encrypt Key Data field (WPA IE)
1046 * driver_wired: fixed EAPOL sending to optionally use PAE group address
1062 * driver_madwifi: fixed EAPOL packet receive for configuration where
1065 * fixed EAPOL state machine step function to process all state
1077 * fixed build without CONFIG_RSN_PREAUTH
1078 * fixed FreeBSD build
1081 * fixed PMKSA caching to copy User-Name and Class attributes so that
1085 * fixed PMKSA caching for the case where STA (re)associates without
1090 * fixed EAP-PAX MAC calculation
1091 * fixed EAP-PAX CK and ICK key derivation
1099 * fixed RADIUS server initialization when only auth or acct server
1104 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
1108 * fixed RADIUS Class attribute processing to only use Access-Accept
1120 * fixed a bug which caused some RSN pre-authentication cases to use
1122 * fixed private key loading for cases where passphrase is not set
1125 * fixed WPA2 to add PMKSA cache entry when using integrated EAP
1127 * fixed PMKSA caching (EAP authentication was not skipped correctly
1143 * fixed PEAPv1 to use tunneled EAP-Success/Failure instead of EAP-TLV
1145 * fixed EAP identifier duplicate processing with the new IEEE 802.1X
1151 * fixed WPA message 2/4 processing not to cancel timeout for TimeoutEvt
1155 * fixed reconfiguration of RADIUS client retransmission timer when
1164 * fixed EAPOL-Start processing to trigger WPA reauthentication
1184 * driver_madwifi: fixed group key setup and added get_ssid method
1201 * fixed EAPOL reauthentication to trigger WPA/WPA2 reauthentication
1202 * fixed EAPOL state machine to stop if STA is removed during
1219 * fixed an alignment issue that could cause SHA-1 to fail on some
1222 * fixed RADIUS reconnection after an error in sending interim
1239 * fixed RADIUS accounting to generate a new session id for cases where
1241 * fixed STA disassociation handler to mark next timeout state to
1258 * fixed some accounting cases where Accounting-Start was sent when
1265 * fixed couple of cases where EAPOL state for a station was freed
1267 * fixed couple of bugs in processing WPA deauthentication (freed data
1271 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1272 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1278 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., do
1291 * fixed interim accounting to remove any pending accounting messages
1300 * fixed event loop to call signal handlers only after returning from
1310 * fixed accounting session handling to send Accounting-Start only once
1313 * fixed Accounting-Stop statistics in cases where the message was