• Home
  • Raw
  • Download

Lines Matching refs:fixed

4 	* nl80211: fixed number of issues with roaming
15 * TNC: fixed issues with fragmentation
68 * fixed PKCS#12 use with OpenSSL 1.0.0
75 * fixed scan buffer processing with WEXT to handle up to 65535
88 * fixed IEEE 802.11r key derivation function to match with the standard
94 * fixed SHA-256 based key derivation function to match with the
113 * fixed number of small WPS issues and added workarounds to
116 * driver_ndis: fixed wired IEEE 802.1X authentication with PAE group
143 * fixed PEAPv0 Cryptobinding interoperability issue with Windows Server
145 * fixed PSK editing in wpa_gui
165 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
176 * fixed canceling of PMKSA caching when using drivers that generate
186 * fixed FT (IEEE 802.11r) authentication after a failed association to
196 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
205 * fixed race condition between disassociation event and group key
207 * fixed opportunistic key caching (proactive_key_caching)
228 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
230 * fixed EAPOL not to end up in infinite loop when processing dynamic
232 * fixed problems in getting NDIS events from WMI on Windows 2000
237 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
292 * fixed a buffer overflow in parsing TSF from scan results when using
296 * fixed an integer overflow issue in the ASN.1 parser used by the
299 * fixed a race condition with -W option (wait for a control interface
311 * fixed EAP-PAX key derivation
312 * fixed EAP-PSK bit ordering of the Flags field
313 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
319 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
328 * fixed dbus ctrl_iface to validate message interface before
330 * fixed PeerKey key derivation to use the correct PRF label
335 * fixed EAP-AKA Notification processing to allow Notification to be
339 * fixed EAP-TTLS implementation not to crash on use of freed memory
363 * fixed Windows named pipes ctrl_iface to not stop listening for
366 * fixed USIM PIN status determination for the case that PIN is not
375 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
385 * driver_ndis: fixed static WEP configuration to avoid race condition
390 * fixed Release|Win32 target in the Visual Studio project files
427 * fixed selection of the first network in ap_scan=2 mode; previously,
439 * fixed build with CONFIG_STAKEY=y [Bug 143]
457 * fixed WPA PSK update through ctrl_iface for the case where the old
469 * fixed configuration parser not to remove CCMP from group cipher list
471 * fixed integrated NDIS events processing not to hang the process due
477 * eloop_win: fixed unregistration of Windows events
478 * l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
498 * driver_madwifi: fixed TKIP and CCMP sequence number configuration on
502 * fixed EAP-GTC response to include correct user identity when run as
519 * driver_wext: fixed privacy configuration for static WEP keys mode
533 * fixed EAP phase 2 Nak for EAP-{PEAP,TTLS,FAST} (this was broken in
541 * fixed EAPOL re-authentication for sessions that used PMKSA caching
544 * fixed PMKSA cache deinitialization not to use freed memory when
546 * fixed a memory leak in EAP-TTLS re-authentication
564 * fixed TLS library deinitialization after RSN pre-authentication not
571 * fixed PMKSA cache processing not to trigger deauthentication if the
573 * fixed PC/SC initialization for ap_scan != 1 modes (this fixes
582 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
584 * fixed EAP-AKA to allow resynchronization within the same session
606 * fixed PC/SC code to use correct length for GSM AUTH command buffer
626 * fixed private key configuration as configuration blob and added
647 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
651 * fixed OpenSSL error reporting to go through all pending errors to
654 * fixed configuration file updating to not write empty variables
656 * fixed ADD_NETWORK ctrl_iface command to use the same default values
659 * fixed EAP state machine to not discard EAP-Failure messages in many
661 * fixed a infinite loop in private key reading if the configured file
666 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
680 * fixed RSN pre-authentication (it was broken in the clean up of WPA
700 * driver_ndis: fixed driver polling not to increase frequency on each
703 * fixed driver_wext.c to filter wireless events based on ifindex to
757 * ndis_events: fixed Windows 2000 support
770 * fixed parsing of strings that include both " and # within double
786 * driver_ndis: fixed WinPcap 3.0 support
787 * fixed build with CONFIG_DNET_PCAP=y on Linux
800 * fixed a potential issue in RSN pre-authentication ending up using
810 * driver_broadcom: fixed couple of memory leaks in scan result
813 * fixed EAP-PAX MAC calculation
814 * fixed EAP-PAX CK and ICK key derivation
824 * fixed ctrl_interface_group processing for the case where gid is
831 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
842 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
844 * fixed a possible double free in EAP-TTLS fast-reauthentication when
866 * fixed EAPOL-Key validation to drop packets with invalid Key Data
875 * driver_madwifi: fixed association in plaintext mode
902 * fixed RSN IE in 4-Way Handshake message 2/4 for the case where
913 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
916 * fixed reprocessing of pending request after ctrl_iface requests for
918 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of
927 * fixed a busy loop introduced in v0.3.5 for scan result processing
933 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
936 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
938 * fixed EAP workaround and fast reauthentication configuration for
945 * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS
954 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
978 * fixed private key loading for cases where passphrase is not set
979 * fixed Windows/cygwin L2 packet handler freeing; previous version
1011 * fixed static WEP key configuration to use broadcast/default type for
1022 * fixed compilation with CONFIG_PCSC=y
1046 * wpa_cli: fixed parsing of -p <path> command line argument
1047 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
1061 * fixed parsing of wep_tx_keyidx
1068 * fixed couple of errors in PCSC handling that could have caused
1085 * fixed couple of unaligned reads in scan result parsing to fix WPA
1092 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
1094 * fixed error handling for case where reading of scan results fails:
1131 * fixed WPA msg 3/4 processing to allow Key Data field contain other
1142 * driver_madwifi: fixed WEP key configuration for IEEE 802.1X when the
1145 * driver_hostap: fixed IEEE 802.1X WEP key updates and
1159 * driver_madwifi: fixed WPA2 configuration and scan_ssid=1 (e.g.,
1195 * fixed control interface socket removal for some error cases
1211 * fixed IEEE 802.1X WEP key derivation in the case where Authenticator
1242 * fixed RSN IE and WPA IE capabilities field parsing
1249 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
1280 * fixed wpa_supplicant to ignore possible extra data after WPA