• Home
  • Raw
  • Download

Lines Matching refs:with

22 	  kernel with 32-bit userspace)
37 association with drivers that take very long time to scan all
38 channels (e.g., madwifi with dual-band cards); wpa_supplicant is now
51 * fixed a race condition with -W option (wait for a control interface
63 from being used with non-WPA networks and disabled workaround for
71 * updated driver_wext.c to build with the current wireless-dev.git tree
91 * added support for EAP-FAST authentication with inner methods that
101 * added experimental, integrated TLSv1 client implementation with the
121 needed (this allows EAP-AKA to be used with USIM cards that do not
124 be used with cards that do not support file selection based on
130 affects IEEE 802.1X with dynamic WEP keys)
137 * added support for building Windows version with UNICODE defined
140 issues with some NDIS drivers between association and setting WEP
157 - allow both directory and group be configured with ctrl_interface
167 used even if the source address does not match with it
168 (this resolves an interoperability issue with Thomson SpeedTouch 580)
170 Windows builds before this release) to prevent packets with forged
179 correctly (e.g., with some USB WLAN adapters, e.g., Ralink RT2500
189 * allow wpa_gui subdirectory to be built with both Qt3 and Qt4
193 * fixed build with CONFIG_STAKEY=y [Bug 143]
200 avoid conflicts with two programs trying to control the radio; WZC
219 automatically for the network and that can be used with
222 status changes or when associating with a different network
234 a Windows event to avoid getting eloop_win stuck with an invalid
240 OID set/query operations (CONFIG_USE_NDISUIO=y in .config); with new
260 refused to associate with open networks) [Bug 106]
292 a lot with, e.g., madwifi-ng driver)
308 a directory with sockets that include MAC address for each device in
326 current PMKSA cache entry is replaced with a valid new entry
328 EAP-SIM and EAP-AKA with real SIM/USIM card when using ap_scan=0 or
334 build and runtime configuration (can be enabled with CONFIG_STAKEY=y
344 * wpa_supplicant can now be built with Microsoft Visual C++
345 (e.g., with the freely available Toolkit 2003 version or Visual
361 and to not use pioRecvPci with SCardTransmit() calls; these were not
362 causing visible problems with pcsc-lite, but Windows Winscard.dll
367 for non-socket objects; this can be selected with
388 with MinGW so that CONFIG_NDIS_EVENTS_INTEGRATED can be used more
391 version of wpa_supplicant.exe with configuration backend using
392 Windows registry and with the entry point designed to run as a
397 * load winscard.dll functions dynamically when building with MinGW
401 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
423 * use longer timeout for IEEE 802.11 association to avoid problems with
428 RSN IE, but WPA IE would match with wpa_supplicant configuration
444 driver_param; these new arguments can also be used with a
464 * added a workaround for clearing keys with ndiswrapper to allow
470 Ethernet headers (e.g., network stack with native IEEE 802.11 frames)
480 tested with hostapd; removed support for draft 3, including
483 to be able to receive EAPOL frames with drivers that do not include
490 this is disabled by default and can be enabled with global
498 (openssl-tls-extensions.patch) with a more generic and correct
499 patch (the new patch is not compatible with the previous one, so the
500 OpenSSL library will need to be patched with the new patch in order
501 to be able to build wpa_supplicant with EAP-FAST support)
505 this with private_key)
508 built with the open source version of the Qt4 for Windows
509 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used
510 with drivers that do not support WPA
518 be enabled with enable_network command once the configuration is done
528 be disabled with eap_workaround=0
541 * fixed build with CONFIG_DNET_PCAP=y on Linux
546 * driver_ipw: updated driver structures to match with ipw2200-1.0.4
547 (note: ipw2100-1.1.0 is likely to require an update to work with
549 * added support for using ap_scan=2 mode with multiple network blocks;
559 * driver_ndis: added support for IEEE 802.1X authentication with wired
569 * added support for using password with EAP-PAX (as an alternative to
570 entering key with eappsk); SHA-1 hash of the password will be used as
573 configuration file with a new driver_param field; this adds a new
575 * added possibility to override l2_packet module with driver interface
580 * driver_test: added support for testing hostapd with wpa_supplicant
592 * added support for password changes with EAP-MSCHAPv2 (used when the
596 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
601 with "CTRL-EVENT-EAP-NOTIFICATION" prefix
603 automatically with 'make'; use 'make wpa_gui' to build (this requires
614 be disabled with eap_workaround=0
620 * fixed EAPOL-Key validation to drop packets with invalid Key Data
630 * modified the EAP workaround that accepts EAP-Success with incorrect
632 interoperate with some authentication servers
655 default, can be enabled with proactive_key_caching=1)
665 even if the packet is not fragmented; this may be needed with some
685 * added a workaround for an interoperability issue with a Cisco AP
688 WPA with IEEE 802.1X (i.e., timeout 10 -> 70 sec to allow
690 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
698 where the ones with strongest signal level are failing authentication
708 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
721 small problems with error case processing not terminating on
723 * added couple of workarounds for interoperability issues with a
735 * added support for PMKSA caching with drivers that generate RSN IEs
755 problems with new authentication getting ignored because of state
776 * fixed compilation with CONFIG_PCSC=y
778 association, but need to be configured with security policy and SSID,
780 drivers to work with hidden SSIDs and optimized roaming; when
801 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
804 interoperate with most RADIUS servers that implements PEAPv1
819 (auth_alg; mainly for using Shared Key authentication with static
821 * added support for EAP-AKA (with UMTS SIM)
827 * added support for EAP-SIM with two challanges
832 and optional DH key exchange to achieve forward secracy with RSA keys
834 certificate with a substring when using EAP-TLS/PEAP/TTLS; new
842 * added support for LEAP with WPA
852 default; all key information can be included with -K command line
855 default, can be enabled with -t command line argument)
858 with drivers that use this information to configure whether Privacy
874 command line (-c, -i, -D arguments) with -N as a separator
891 disabled with network block option eap_workaround=0
894 * resolved couple of interoperability issues with EAP-PEAPv1 and
909 enabled with global ap_scan=0 variable in wpa_supplicant.conf;
910 this mode can be used, e.g., with generic 'wext' driver interface to
911 use wpa_supplicant as IEEE 802.1X Supplicant with any Linux driver
914 operation with an AP that does not include SSID in the Beacon frames)
921 password; this can be used with both EAP-OTP and EAP-GTC
938 in /var/run/wpa_supplicant; this path can be overriden with -p option
939 and an interface can be selected with -i option (i.e., in most common
945 results are searched for matches with network blocks in this order)
953 * PEAP version can now be forced with phase1="peapver=<ver>"
988 tunnel (e.g., with EAP-TTLS)
1000 with TLS support (this replaces the included implementation with
1011 - EAP-MD5 (cannot be used with WPA-RADIUS)
1014 - EAP-MSCHAPv2 (currently used only with EAP-PEAP)
1018 default; tested with FreeRADIUS, Microsoft IAS, and Funk Odyssey)
1022 disabling the internal IEEE 802.1X Supplicant with -e command line
1028 * added support for non-WPA IEEE 802.1X mode with dynamic WEP keys
1040 - CLI example (wpa_cli) with interactive mode and command line
1042 - replaced SIGUSR1 status/statistics with the new control interface