• Home
  • Raw
  • Download

Lines Matching full:fixed

4 	* fixed EAP-pwd last fragment validation
6 * fixed WPS configuration update vulnerability with malformed passphrase
11 * fixed Suite B 192-bit AKM to use proper PMK length
12 (note: this makes old releases incompatible with the fixed behavior)
22 * fixed EAPOL reauthentication after FT protocol run
23 * fixed FTIE generation for 4-way handshake after FT protocol run
24 * fixed and improved various FST operations
53 * fixed PMKID derivation with SAE
77 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
79 * fixed WMM Action frame parser
81 * fixed EAP-pwd server missing payload length validation
84 * fixed validation of WPS and P2P NFC NDEF record payload length
87 - fixed vendor command handling to check OUI properly
88 * fixed hlr_auc_gw build with OpenSSL
92 * fixed and extended dynamic VLAN cases
106 * fixed key derivation for Suite B 192-bit AKM (this breaks
115 * fixed number of small issues based on hwsim test case failures and
117 * fixed Accounting-Request to not include duplicated Acct-Session-Id
121 * fixed channel switch from VHT to HT
128 * fixed a regression with driver=wired
134 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
135 * fixed a regression in HT 20/40 coex Action frame parsing
154 * fixed some RADIUS server failover cases
157 * fixed number of minor issues identified in static analyzer warnings
158 * fixed DFS and channel switch operation for multi-BSS cases
167 * fixed GET_CONFIG wpa_pairwise_cipher value
169 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases
170 * fixed OKC PMKSA cache entry fetch to avoid a possible infinite loop
172 * fixed hostapd_cli action script execution to use more robust mechanism
176 * fixed SAE confirm-before-commit validation to avoid a potential
186 * fixed HT40 co-ex scan for some pri/sec channel switches
189 * fixed HT40 co-ex support to check for overlapping 20 MHz BSS
190 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
196 * fixed STA validation step for WPS ER commands to prevent a potential
218 * added/fixed nl80211 functionality
222 * fixed PMF protection of Deauthentication frame when this is triggered
235 * fixed PTK derivation for CCMP-256 and GCMP-256
240 * fixed AP mode default TXOP Limit values for AC_VI and AC_VO (these
251 * fixed RADIUS client retransmit/failover behavior
254 * fixed a possible crash on double DISABLE command when multiple BSSes
256 * fixed a memory leak in SAE random number generation
257 * fixed GTK rekeying when the station uses FT protocol
258 * fixed off-by-one bounds checking in printf_encode()
306 * fixed number of small bugs (see git logs for more details)
318 * fixed WPS operation stopping on dual concurrent AP
339 * EAP-SIM: fixed re-authentication not to update pseudonym
343 * EAP-AKA': fixed identity for MK derivation
349 * fixed EAP/WPS to PSK transition on reassociation in cases where
379 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
389 * fixed EAPOL frame transmission to non-QoS STAs with nl80211
505 * TNC: fixed issues with fragmentation
534 * fixed HT Capabilities IE with nl80211 drivers
546 * fixed WPS Probe Request processing to handle missing required
548 * fixed PKCS#12 use with OpenSSL 1.0.0
560 * driver_nl80211: fixed STA accounting data collection (TX/RX bytes
564 * fixed EAPOL/EAP reauthentication when using an external RADIUS
566 * fixed TNC with EAP-TTLS
567 * fixed IEEE 802.11r key derivation function to match with the standard
569 * fixed SHA-256 based key derivation function to match with the
580 * fixed number of small WPS issues and added workarounds to
602 * fixed WEP authentication (both Open System and Shared Key) with
608 * fixed retransmission of EAP requests if no response is received
624 * fixed EAP-TLS message processing for the last TLS message if it is
627 * fixed listen interval configuration for nl80211 drivers
632 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
634 * fixed internal TLSv1 implementation for abbreviated handshake (used
646 * fixed WPA/RSN IE validation to verify that the proto (WPA vs. WPA2)
649 A-ID-Info (eap_fast_a_id_info) to allow A-ID to be set to a fixed
671 * fixed Reassociation Response callback processing when using internal
676 * fixed EAPOL state machine to handle a case in which no response is
679 * fixed EAP-SIM/AKA realm processing to allow decorated usernames to
683 * fixed EAP-SIM/AKA protected result indication to include AT_COUNTER
686 * fixed EAP-SIM Start response processing for fast reauthentication
692 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
735 * fixed EAP-PSK bit ordering of the Flags field
736 * fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
738 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
739 * fixed IPv6 connection to RADIUS accounting server
748 * fixed EAP-MSCHAPv2 server to use a space between S and M parameters
761 * fixed PMKSA cache update in the end of successful RSN
767 * driver_madwifi: fixed configuration of unencrypted modes (plaintext
782 * fixed session timeout processing with drivers that do not use
789 * fixed hostapd to add PMKID KDE into 4-Way Handshake Message 1 when
796 * fixed nt_password_hash build [Bug 144]
801 * fixed a segmentation fault when RSN pre-authentication was completed
814 * fixed EAP-MSCHAPv2 message length validation
817 * fixed stdarg use in hostapd_logger(): if both stdout and syslog
838 * fixed WPA message 3/4 not to encrypt Key Data field (WPA IE)
869 * driver_wired: fixed EAPOL sending to optionally use PAE group address
885 * driver_madwifi: fixed EAPOL packet receive for configuration where
888 * fixed EAPOL state machine step function to process all state
900 * fixed build without CONFIG_RSN_PREAUTH
901 * fixed FreeBSD build
904 * fixed PMKSA caching to copy User-Name and Class attributes so that
908 * fixed PMKSA caching for the case where STA (re)associates without
913 * fixed EAP-PAX MAC calculation
914 * fixed EAP-PAX CK and ICK key derivation
922 * fixed RADIUS server initialization when only auth or acct server
927 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
931 * fixed RADIUS Class attribute processing to only use Access-Accept
943 * fixed a bug which caused some RSN pre-authentication cases to use
945 * fixed private key loading for cases where passphrase is not set
948 * fixed WPA2 to add PMKSA cache entry when using integrated EAP
950 * fixed PMKSA caching (EAP authentication was not skipped correctly
966 * fixed PEAPv1 to use tunneled EAP-Success/Failure instead of EAP-TLV
968 * fixed EAP identifier duplicate processing with the new IEEE 802.1X
974 * fixed WPA message 2/4 processing not to cancel timeout for TimeoutEvt
978 * fixed reconfiguration of RADIUS client retransmission timer when
987 * fixed EAPOL-Start processing to trigger WPA reauthentication
1007 * driver_madwifi: fixed group key setup and added get_ssid method
1024 * fixed EAPOL reauthentication to trigger WPA/WPA2 reauthentication
1025 * fixed EAPOL state machine to stop if STA is removed during
1042 * fixed an alignment issue that could cause SHA-1 to fail on some
1045 * fixed RADIUS reconnection after an error in sending interim
1062 * fixed RADIUS accounting to generate a new session id for cases where
1064 * fixed STA disassociation handler to mark next timeout state to
1081 * fixed some accounting cases where Accounting-Start was sent when
1088 * fixed couple of cases where EAPOL state for a station was freed
1090 * fixed couple of bugs in processing WPA deauthentication (freed data
1094 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1095 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1101 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., do
1114 * fixed interim accounting to remove any pending accounting messages
1123 * fixed event loop to call signal handlers only after returning from
1133 * fixed accounting session handling to send Accounting-Start only once
1136 * fixed Accounting-Stop statistics in cases where the message was