Lines Matching full:fixed
4 * fixed WPA packet number reuse with replayed messages and key
9 * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
16 * fixed Suite B PMKSA caching not to update PMKID during each 4-way
18 * fixed EAP-pwd pre-processing with PasswordHashHash
20 * fixed a regression in TDLS prohibited bit validation
30 * fixed mesh channel configuration pri/sec switch case
35 * fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
38 * fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
39 * fixed a regression in RSN pre-authentication candidate selection
43 * fixed nl80211 AP and mesh mode configuration regression with
51 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
57 - fixed FT-SAE PMKID matching
70 - fixed additional IE inclusion in Reassociation Request frame when
74 * fixed WNM Sleep Mode processing when PMF is not enabled
76 * fixed EAP-pwd last fragment validation
78 * fixed EAP-pwd unexpected Confirm message processing
80 * fixed WPS configuration update vulnerability with malformed passphrase
82 * fixed configuration update vulnerability with malformed parameters set
85 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
110 * fixed PMKID derivation with SAE
140 * fixed Suite B 192-bit AKM to use proper PMK length
141 (note: this makes old releases incompatible with the fixed behavior)
149 * fixed EAPOL reauthentication after FT protocol run
150 * fixed FTIE generation for 4-way handshake after FT protocol run
153 * fixed and improved various FST operations
155 * fixed SIGNAL_POLL in IBSS and mesh cases
187 * EAP-PEAP: fixed interoperability issue with Windows 2012r2 server
189 * EAP-TTLS: fixed success after fragmented final Phase 2 message
203 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
218 * fixed P2P validation of SSID element length before copying it
220 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
222 * fixed WMM Action frame parser (AP mode)
224 * fixed EAP-pwd peer missing payload length validation
227 * fixed validation of WPS and P2P NFC NDEF record payload length
231 - fixed vendor command handling to check OUI properly
245 - fixed number of sequences with nl80211 P2P Device interface
253 - fixed WPS property of fi.w1.wpa_supplicant1.BSS interface
254 - fixed PresenceRequest to use group interface
265 * fixed SAE group selection in an error case
270 * fixed BSS selection based on estimated throughput
274 * fixed OpenSSL PKCS#12 extra certificate handling
275 * fixed key derivation for Suite B 192-bit AKM (this breaks
283 * fixed number of small issues based on hwsim test case failures and
304 * fixed number of issues with D-Bus P2P commands
305 * fixed regression in ap_scan=2 special case for WPS
306 * fixed macsec_validate configuration
319 * fixed expiration of BSS entry with all-zeros BSSID
324 * fixed EAP-IKEv2 fragmentation reassembly
359 * fixed number of minor issues identified in static analyzer warnings
360 * fixed wfd_dev_info to be more careful and not read beyond the buffer
369 * fixed some TDLS failure cases to clean up driver state
370 * fixed dynamic interface addition cases with nl80211 to avoid adding
375 * fixed EAP-AKA' message parser with multiple AT_KDF attributes
378 * fixed IBSS channel configuration in some corner cases
388 * fixed CTRL-EVENT-REGDOM-CHANGE event init parameter value
404 * fixed nl80211/RTM_DELLINK processing when a P2P GO interface is
406 * fixed number of small P2P issues to make negotiations more robust in
413 * fixed TDLS AID configuration for VHT
418 * fixed external MAC address changes while wpa_supplicant is running
420 * fixed wpa_cli action script execution to use more robust mechanism
425 * added/fixed nl80211 functionality
435 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
438 * fixed couple of sequencies where radio work items could get stuck,
444 - fixed some service discovery cases with broadcast queries not being
446 - fixed Probe Request frame triggering invitation to trigger only a
449 - fixed a potential NULL pointer dereference crash when processing an
483 - fixed GAS indication for additional comeback delay with status
494 * fixed TDLS interoperability issues with supported operating class in
500 * fixed PTK derivation for CCMP-256 and GCMP-256
515 * fixed OBSS scan result processing for 20/40 MHz co-ex report
518 * fixed regression in parsing of WNM Sleep Mode exit key data
519 * fixed potential segmentation fault and memory leaks in WNM neighbor
528 * fixed EAP-SIM counter-too-small message
531 * fixed GSM authentication on USIM
533 * fixed some concurrent virtual interface cases with dedicated P2P
536 * fixed a memory leak in SAE random number generation
537 * fixed off-by-one bounds checking in printf_encode()
540 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM
578 * fixed ctrl_iface BSS command iteration with RANGE argument and no
579 exact matches; also fixed argument parsing for some cases with
601 * fixed OKC-based PMKSA cache entry clearing
602 * fixed TKIP group key configuration with FT
678 * fixed number of small bugs (see git logs for more details)
684 - fixed KDF for group 21 and zero-padding
737 * fixed issues in WPA/RSN element validation when roaming with ap_scan=1
741 * fixed WSC element inclusion in cases where P2P is disabled
743 * EAP-SIM: fixed AT_COUNTER_TOO_SMALL use
777 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2
864 * fixed P2P Bonjour SD to match entries with both compressed and not
1057 * nl80211: fixed number of issues with roaming
1068 * TNC: fixed issues with fragmentation
1121 * fixed PKCS#12 use with OpenSSL 1.0.0
1128 * fixed scan buffer processing with WEXT to handle up to 65535
1141 * fixed IEEE 802.11r key derivation function to match with the standard
1147 * fixed SHA-256 based key derivation function to match with the
1166 * fixed number of small WPS issues and added workarounds to
1169 * driver_ndis: fixed wired IEEE 802.1X authentication with PAE group
1196 * fixed PEAPv0 Cryptobinding interoperability issue with Windows Server
1198 * fixed PSK editing in wpa_gui
1218 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
1229 * fixed canceling of PMKSA caching when using drivers that generate
1239 * fixed FT (IEEE 802.11r) authentication after a failed association to
1249 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
1258 * fixed race condition between disassociation event and group key
1260 * fixed opportunistic key caching (proactive_key_caching)
1281 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
1283 * fixed EAPOL not to end up in infinite loop when processing dynamic
1285 * fixed problems in getting NDIS events from WMI on Windows 2000
1290 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
1345 * fixed a buffer overflow in parsing TSF from scan results when using
1349 * fixed an integer overflow issue in the ASN.1 parser used by the
1352 * fixed a race condition with -W option (wait for a control interface
1364 * fixed EAP-PAX key derivation
1365 * fixed EAP-PSK bit ordering of the Flags field
1366 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
1372 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
1381 * fixed dbus ctrl_iface to validate message interface before
1383 * fixed PeerKey key derivation to use the correct PRF label
1388 * fixed EAP-AKA Notification processing to allow Notification to be
1392 * fixed EAP-TTLS implementation not to crash on use of freed memory
1416 * fixed Windows named pipes ctrl_iface to not stop listening for
1419 * fixed USIM PIN status determination for the case that PIN is not
1428 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
1438 * driver_ndis: fixed static WEP configuration to avoid race condition
1443 * fixed Release|Win32 target in the Visual Studio project files
1480 * fixed selection of the first network in ap_scan=2 mode; previously,
1492 * fixed build with CONFIG_STAKEY=y [Bug 143]
1510 * fixed WPA PSK update through ctrl_iface for the case where the old
1522 * fixed configuration parser not to remove CCMP from group cipher list
1524 * fixed integrated NDIS events processing not to hang the process due
1530 * eloop_win: fixed unregistration of Windows events
1531 * l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
1551 * driver_madwifi: fixed TKIP and CCMP sequence number configuration on
1555 * fixed EAP-GTC response to include correct user identity when run as
1557 * driver_ndis: Fixed encryption mode configuration for unencrypted
1572 * driver_wext: fixed privacy configuration for static WEP keys mode
1586 * fixed EAP phase 2 Nak for EAP-{PEAP,TTLS,FAST} (this was broken in
1594 * fixed EAPOL re-authentication for sessions that used PMKSA caching
1597 * fixed PMKSA cache deinitialization not to use freed memory when
1599 * fixed a memory leak in EAP-TTLS re-authentication
1617 * fixed TLS library deinitialization after RSN pre-authentication not
1624 * fixed PMKSA cache processing not to trigger deauthentication if the
1626 * fixed PC/SC initialization for ap_scan != 1 modes (this fixes
1635 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
1637 * fixed EAP-AKA to allow resynchronization within the same session
1659 * fixed PC/SC code to use correct length for GSM AUTH command buffer
1679 * fixed private key configuration as configuration blob and added
1700 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
1704 * fixed OpenSSL error reporting to go through all pending errors to
1707 * fixed configuration file updating to not write empty variables
1709 * fixed ADD_NETWORK ctrl_iface command to use the same default values
1712 * fixed EAP state machine to not discard EAP-Failure messages in many
1714 * fixed a infinite loop in private key reading if the configured file
1719 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
1733 * fixed RSN pre-authentication (it was broken in the clean up of WPA
1753 * driver_ndis: fixed driver polling not to increase frequency on each
1756 * fixed driver_wext.c to filter wireless events based on ifindex to
1810 * ndis_events: fixed Windows 2000 support
1823 * fixed parsing of strings that include both " and # within double
1839 * driver_ndis: fixed WinPcap 3.0 support
1840 * fixed build with CONFIG_DNET_PCAP=y on Linux
1853 * fixed a potential issue in RSN pre-authentication ending up using
1863 * driver_broadcom: fixed couple of memory leaks in scan result
1866 * fixed EAP-PAX MAC calculation
1867 * fixed EAP-PAX CK and ICK key derivation
1877 * fixed ctrl_interface_group processing for the case where gid is
1884 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
1895 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
1897 * fixed a possible double free in EAP-TTLS fast-reauthentication when
1919 * fixed EAPOL-Key validation to drop packets with invalid Key Data
1928 * driver_madwifi: fixed association in plaintext mode
1955 * fixed RSN IE in 4-Way Handshake message 2/4 for the case where
1966 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
1969 * fixed reprocessing of pending request after ctrl_iface requests for
1971 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of
1980 * fixed a busy loop introduced in v0.3.5 for scan result processing
1986 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
1989 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
1991 * fixed EAP workaround and fast reauthentication configuration for
1998 * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS
2007 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
2031 * fixed private key loading for cases where passphrase is not set
2032 * fixed Windows/cygwin L2 packet handler freeing; previous version
2064 * fixed static WEP key configuration to use broadcast/default type for
2075 * fixed compilation with CONFIG_PCSC=y
2099 * wpa_cli: fixed parsing of -p <path> command line argument
2100 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
2114 * fixed parsing of wep_tx_keyidx
2121 * fixed couple of errors in PCSC handling that could have caused
2138 * fixed couple of unaligned reads in scan result parsing to fix WPA
2145 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
2147 * fixed error handling for case where reading of scan results fails:
2184 * fixed WPA msg 3/4 processing to allow Key Data field contain other
2195 * driver_madwifi: fixed WEP key configuration for IEEE 802.1X when the
2198 * driver_hostap: fixed IEEE 802.1X WEP key updates and
2212 * driver_madwifi: fixed WPA2 configuration and scan_ssid=1 (e.g.,
2248 * fixed control interface socket removal for some error cases
2264 * fixed IEEE 802.1X WEP key derivation in the case where Authenticator
2295 * fixed RSN IE and WPA IE capabilities field parsing
2302 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
2333 * fixed wpa_supplicant to ignore possible extra data after WPA