• Home
  • Raw
  • Download

Lines Matching full:fixed

4 	* fixed WNM Sleep Mode processing when PMF is not enabled
6 * fixed EAP-pwd last fragment validation
8 * fixed EAP-pwd unexpected Confirm message processing
10 * fixed WPS configuration update vulnerability with malformed passphrase
12 * fixed configuration update vulnerability with malformed parameters set
15 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
40 * fixed PMKID derivation with SAE
70 * fixed Suite B 192-bit AKM to use proper PMK length
71 (note: this makes old releases incompatible with the fixed behavior)
79 * fixed EAPOL reauthentication after FT protocol run
80 * fixed FTIE generation for 4-way handshake after FT protocol run
83 * fixed and improved various FST operations
85 * fixed SIGNAL_POLL in IBSS and mesh cases
117 * EAP-PEAP: fixed interoperability issue with Windows 2012r2 server
119 * EAP-TTLS: fixed success after fragmented final Phase 2 message
133 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
148 * fixed P2P validation of SSID element length before copying it
150 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
152 * fixed WMM Action frame parser (AP mode)
154 * fixed EAP-pwd peer missing payload length validation
157 * fixed validation of WPS and P2P NFC NDEF record payload length
161 - fixed vendor command handling to check OUI properly
175 - fixed number of sequences with nl80211 P2P Device interface
183 - fixed WPS property of fi.w1.wpa_supplicant1.BSS interface
184 - fixed PresenceRequest to use group interface
195 * fixed SAE group selection in an error case
200 * fixed BSS selection based on estimated throughput
204 * fixed OpenSSL PKCS#12 extra certificate handling
205 * fixed key derivation for Suite B 192-bit AKM (this breaks
213 * fixed number of small issues based on hwsim test case failures and
234 * fixed number of issues with D-Bus P2P commands
235 * fixed regression in ap_scan=2 special case for WPS
236 * fixed macsec_validate configuration
249 * fixed expiration of BSS entry with all-zeros BSSID
254 * fixed EAP-IKEv2 fragmentation reassembly
289 * fixed number of minor issues identified in static analyzer warnings
290 * fixed wfd_dev_info to be more careful and not read beyond the buffer
299 * fixed some TDLS failure cases to clean up driver state
300 * fixed dynamic interface addition cases with nl80211 to avoid adding
305 * fixed EAP-AKA' message parser with multiple AT_KDF attributes
308 * fixed IBSS channel configuration in some corner cases
318 * fixed CTRL-EVENT-REGDOM-CHANGE event init parameter value
334 * fixed nl80211/RTM_DELLINK processing when a P2P GO interface is
336 * fixed number of small P2P issues to make negotiations more robust in
343 * fixed TDLS AID configuration for VHT
348 * fixed external MAC address changes while wpa_supplicant is running
350 * fixed wpa_cli action script execution to use more robust mechanism
355 * added/fixed nl80211 functionality
365 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
368 * fixed couple of sequencies where radio work items could get stuck,
374 - fixed some service discovery cases with broadcast queries not being
376 - fixed Probe Request frame triggering invitation to trigger only a
379 - fixed a potential NULL pointer dereference crash when processing an
413 - fixed GAS indication for additional comeback delay with status
424 * fixed TDLS interoperability issues with supported operating class in
430 * fixed PTK derivation for CCMP-256 and GCMP-256
445 * fixed OBSS scan result processing for 20/40 MHz co-ex report
448 * fixed regression in parsing of WNM Sleep Mode exit key data
449 * fixed potential segmentation fault and memory leaks in WNM neighbor
458 * fixed EAP-SIM counter-too-small message
461 * fixed GSM authentication on USIM
463 * fixed some concurrent virtual interface cases with dedicated P2P
466 * fixed a memory leak in SAE random number generation
467 * fixed off-by-one bounds checking in printf_encode()
470 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM
508 * fixed ctrl_iface BSS command iteration with RANGE argument and no
509 exact matches; also fixed argument parsing for some cases with
531 * fixed OKC-based PMKSA cache entry clearing
532 * fixed TKIP group key configuration with FT
608 * fixed number of small bugs (see git logs for more details)
614 - fixed KDF for group 21 and zero-padding
667 * fixed issues in WPA/RSN element validation when roaming with ap_scan=1
671 * fixed WSC element inclusion in cases where P2P is disabled
673 * EAP-SIM: fixed AT_COUNTER_TOO_SMALL use
707 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2
794 * fixed P2P Bonjour SD to match entries with both compressed and not
987 * nl80211: fixed number of issues with roaming
998 * TNC: fixed issues with fragmentation
1051 * fixed PKCS#12 use with OpenSSL 1.0.0
1058 * fixed scan buffer processing with WEXT to handle up to 65535
1071 * fixed IEEE 802.11r key derivation function to match with the standard
1077 * fixed SHA-256 based key derivation function to match with the
1096 * fixed number of small WPS issues and added workarounds to
1099 * driver_ndis: fixed wired IEEE 802.1X authentication with PAE group
1126 * fixed PEAPv0 Cryptobinding interoperability issue with Windows Server
1128 * fixed PSK editing in wpa_gui
1148 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
1159 * fixed canceling of PMKSA caching when using drivers that generate
1169 * fixed FT (IEEE 802.11r) authentication after a failed association to
1179 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
1188 * fixed race condition between disassociation event and group key
1190 * fixed opportunistic key caching (proactive_key_caching)
1211 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
1213 * fixed EAPOL not to end up in infinite loop when processing dynamic
1215 * fixed problems in getting NDIS events from WMI on Windows 2000
1220 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
1275 * fixed a buffer overflow in parsing TSF from scan results when using
1279 * fixed an integer overflow issue in the ASN.1 parser used by the
1282 * fixed a race condition with -W option (wait for a control interface
1294 * fixed EAP-PAX key derivation
1295 * fixed EAP-PSK bit ordering of the Flags field
1296 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
1302 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
1311 * fixed dbus ctrl_iface to validate message interface before
1313 * fixed PeerKey key derivation to use the correct PRF label
1318 * fixed EAP-AKA Notification processing to allow Notification to be
1322 * fixed EAP-TTLS implementation not to crash on use of freed memory
1346 * fixed Windows named pipes ctrl_iface to not stop listening for
1349 * fixed USIM PIN status determination for the case that PIN is not
1358 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
1368 * driver_ndis: fixed static WEP configuration to avoid race condition
1373 * fixed Release|Win32 target in the Visual Studio project files
1410 * fixed selection of the first network in ap_scan=2 mode; previously,
1422 * fixed build with CONFIG_STAKEY=y [Bug 143]
1440 * fixed WPA PSK update through ctrl_iface for the case where the old
1452 * fixed configuration parser not to remove CCMP from group cipher list
1454 * fixed integrated NDIS events processing not to hang the process due
1460 * eloop_win: fixed unregistration of Windows events
1461 * l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
1481 * driver_madwifi: fixed TKIP and CCMP sequence number configuration on
1485 * fixed EAP-GTC response to include correct user identity when run as
1487 * driver_ndis: Fixed encryption mode configuration for unencrypted
1502 * driver_wext: fixed privacy configuration for static WEP keys mode
1516 * fixed EAP phase 2 Nak for EAP-{PEAP,TTLS,FAST} (this was broken in
1524 * fixed EAPOL re-authentication for sessions that used PMKSA caching
1527 * fixed PMKSA cache deinitialization not to use freed memory when
1529 * fixed a memory leak in EAP-TTLS re-authentication
1547 * fixed TLS library deinitialization after RSN pre-authentication not
1554 * fixed PMKSA cache processing not to trigger deauthentication if the
1556 * fixed PC/SC initialization for ap_scan != 1 modes (this fixes
1565 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
1567 * fixed EAP-AKA to allow resynchronization within the same session
1589 * fixed PC/SC code to use correct length for GSM AUTH command buffer
1609 * fixed private key configuration as configuration blob and added
1630 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
1634 * fixed OpenSSL error reporting to go through all pending errors to
1637 * fixed configuration file updating to not write empty variables
1639 * fixed ADD_NETWORK ctrl_iface command to use the same default values
1642 * fixed EAP state machine to not discard EAP-Failure messages in many
1644 * fixed a infinite loop in private key reading if the configured file
1649 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
1663 * fixed RSN pre-authentication (it was broken in the clean up of WPA
1683 * driver_ndis: fixed driver polling not to increase frequency on each
1686 * fixed driver_wext.c to filter wireless events based on ifindex to
1740 * ndis_events: fixed Windows 2000 support
1753 * fixed parsing of strings that include both " and # within double
1769 * driver_ndis: fixed WinPcap 3.0 support
1770 * fixed build with CONFIG_DNET_PCAP=y on Linux
1783 * fixed a potential issue in RSN pre-authentication ending up using
1793 * driver_broadcom: fixed couple of memory leaks in scan result
1796 * fixed EAP-PAX MAC calculation
1797 * fixed EAP-PAX CK and ICK key derivation
1807 * fixed ctrl_interface_group processing for the case where gid is
1814 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
1825 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
1827 * fixed a possible double free in EAP-TTLS fast-reauthentication when
1849 * fixed EAPOL-Key validation to drop packets with invalid Key Data
1858 * driver_madwifi: fixed association in plaintext mode
1885 * fixed RSN IE in 4-Way Handshake message 2/4 for the case where
1896 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
1899 * fixed reprocessing of pending request after ctrl_iface requests for
1901 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of
1910 * fixed a busy loop introduced in v0.3.5 for scan result processing
1916 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
1919 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
1921 * fixed EAP workaround and fast reauthentication configuration for
1928 * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS
1937 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
1961 * fixed private key loading for cases where passphrase is not set
1962 * fixed Windows/cygwin L2 packet handler freeing; previous version
1994 * fixed static WEP key configuration to use broadcast/default type for
2005 * fixed compilation with CONFIG_PCSC=y
2029 * wpa_cli: fixed parsing of -p <path> command line argument
2030 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
2044 * fixed parsing of wep_tx_keyidx
2051 * fixed couple of errors in PCSC handling that could have caused
2068 * fixed couple of unaligned reads in scan result parsing to fix WPA
2075 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
2077 * fixed error handling for case where reading of scan results fails:
2114 * fixed WPA msg 3/4 processing to allow Key Data field contain other
2125 * driver_madwifi: fixed WEP key configuration for IEEE 802.1X when the
2128 * driver_hostap: fixed IEEE 802.1X WEP key updates and
2142 * driver_madwifi: fixed WPA2 configuration and scan_ssid=1 (e.g.,
2178 * fixed control interface socket removal for some error cases
2194 * fixed IEEE 802.1X WEP key derivation in the case where Authenticator
2225 * fixed RSN IE and WPA IE capabilities field parsing
2232 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
2263 * fixed wpa_supplicant to ignore possible extra data after WPA