Lines Matching refs:fixed
4 * fixed SHA-256 based key derivation function to match with the
17 * fixed compilation with newer GnuTLS versions
18 * fixed PKCS#12 use with OpenSSL 1.0.0
23 * fixed IEEE 802.11r key derivation function to match with the standard
29 * fixed scan buffer processing with WEXT to handle up to 65535
44 * fixed PEAPv0 Cryptobinding interoperability issue with Windows Server
46 * fixed PSK editing in wpa_gui
66 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
77 * fixed canceling of PMKSA caching when using drivers that generate
87 * fixed FT (IEEE 802.11r) authentication after a failed association to
97 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
106 * fixed race condition between disassociation event and group key
108 * fixed opportunistic key caching (proactive_key_caching)
129 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
131 * fixed EAPOL not to end up in infinite loop when processing dynamic
133 * fixed problems in getting NDIS events from WMI on Windows 2000
138 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
193 * fixed a buffer overflow in parsing TSF from scan results when using
197 * fixed an integer overflow issue in the ASN.1 parser used by the
200 * fixed a race condition with -W option (wait for a control interface
212 * fixed EAP-PAX key derivation
213 * fixed EAP-PSK bit ordering of the Flags field
214 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
220 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
229 * fixed dbus ctrl_iface to validate message interface before
231 * fixed PeerKey key derivation to use the correct PRF label
236 * fixed EAP-AKA Notification processing to allow Notification to be
240 * fixed EAP-TTLS implementation not to crash on use of freed memory
264 * fixed Windows named pipes ctrl_iface to not stop listening for
267 * fixed USIM PIN status determination for the case that PIN is not
276 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
286 * driver_ndis: fixed static WEP configuration to avoid race condition
291 * fixed Release|Win32 target in the Visual Studio project files
328 * fixed selection of the first network in ap_scan=2 mode; previously,
340 * fixed build with CONFIG_STAKEY=y [Bug 143]
358 * fixed WPA PSK update through ctrl_iface for the case where the old
370 * fixed configuration parser not to remove CCMP from group cipher list
372 * fixed integrated NDIS events processing not to hang the process due
378 * eloop_win: fixed unregistration of Windows events
379 * l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
399 * driver_madwifi: fixed TKIP and CCMP sequence number configuration on
403 * fixed EAP-GTC response to include correct user identity when run as
420 * driver_wext: fixed privacy configuration for static WEP keys mode
434 * fixed EAP phase 2 Nak for EAP-{PEAP,TTLS,FAST} (this was broken in
442 * fixed EAPOL re-authentication for sessions that used PMKSA caching
445 * fixed PMKSA cache deinitialization not to use freed memory when
447 * fixed a memory leak in EAP-TTLS re-authentication
465 * fixed TLS library deinitialization after RSN pre-authentication not
472 * fixed PMKSA cache processing not to trigger deauthentication if the
474 * fixed PC/SC initialization for ap_scan != 1 modes (this fixes
483 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
485 * fixed EAP-AKA to allow resynchronization within the same session
507 * fixed PC/SC code to use correct length for GSM AUTH command buffer
527 * fixed private key configuration as configuration blob and added
548 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
552 * fixed OpenSSL error reporting to go through all pending errors to
555 * fixed configuration file updating to not write empty variables
557 * fixed ADD_NETWORK ctrl_iface command to use the same default values
560 * fixed EAP state machine to not discard EAP-Failure messages in many
562 * fixed a infinite loop in private key reading if the configured file
567 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
581 * fixed RSN pre-authentication (it was broken in the clean up of WPA
601 * driver_ndis: fixed driver polling not to increase frequency on each
604 * fixed driver_wext.c to filter wireless events based on ifindex to
658 * ndis_events: fixed Windows 2000 support
671 * fixed parsing of strings that include both " and # within double
687 * driver_ndis: fixed WinPcap 3.0 support
688 * fixed build with CONFIG_DNET_PCAP=y on Linux
701 * fixed a potential issue in RSN pre-authentication ending up using
711 * driver_broadcom: fixed couple of memory leaks in scan result
714 * fixed EAP-PAX MAC calculation
715 * fixed EAP-PAX CK and ICK key derivation
725 * fixed ctrl_interface_group processing for the case where gid is
732 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
743 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
745 * fixed a possible double free in EAP-TTLS fast-reauthentication when
767 * fixed EAPOL-Key validation to drop packets with invalid Key Data
776 * driver_madwifi: fixed association in plaintext mode
803 * fixed RSN IE in 4-Way Handshake message 2/4 for the case where
814 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
817 * fixed reprocessing of pending request after ctrl_iface requests for
819 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of
828 * fixed a busy loop introduced in v0.3.5 for scan result processing
834 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
837 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
839 * fixed EAP workaround and fast reauthentication configuration for
846 * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS
855 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
879 * fixed private key loading for cases where passphrase is not set
880 * fixed Windows/cygwin L2 packet handler freeing; previous version
912 * fixed static WEP key configuration to use broadcast/default type for
923 * fixed compilation with CONFIG_PCSC=y
947 * wpa_cli: fixed parsing of -p <path> command line argument
948 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
962 * fixed parsing of wep_tx_keyidx
969 * fixed couple of errors in PCSC handling that could have caused
986 * fixed couple of unaligned reads in scan result parsing to fix WPA
993 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
995 * fixed error handling for case where reading of scan results fails:
1032 * fixed WPA msg 3/4 processing to allow Key Data field contain other
1043 * driver_madwifi: fixed WEP key configuration for IEEE 802.1X when the
1046 * driver_hostap: fixed IEEE 802.1X WEP key updates and
1060 * driver_madwifi: fixed WPA2 configuration and scan_ssid=1 (e.g.,
1096 * fixed control interface socket removal for some error cases
1112 * fixed IEEE 802.1X WEP key derivation in the case where Authenticator
1143 * fixed RSN IE and WPA IE capabilities field parsing
1150 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
1181 * fixed wpa_supplicant to ignore possible extra data after WPA