Lines Matching refs:in
18 - use Secure=1 in message 3 during PTK rekeying
25 - this is based on additional details being added in the IEEE 802.11
33 * add support for explicit SSID protection in 4-way handshake
58 * fixed various issues in experimental support for EAP-TEAP server
117 - added Finite Cyclic Group field in status code 77 responses
119 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
121 - minimize timing and memory use differences in PWE derivation
123 - fixed confirm message validation in error cases
126 - minimize timing and memory use differences in PWE derivation
133 - fix a memory leak in PWE derivation
155 * fixed FT and SA Query Action frame with AP-MLME-in-driver cases
157 in preparation for DPP protocol extension
175 all APs in the ESS to be updated at the same time to maintain FT
213 - added support for OSEN connection in a shared RSN BSS
278 - use Address 3 = wildcard BSSID in GAS response if a query from an
283 * added command line parameter -i to override interface parameter in
305 * added support for hashed password (NtHash) in EAP-pwd server
332 * add support for Acct-Multi-Session-Id in RADIUS Accounting messages
348 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
349 * fixed a regression in HT 20/40 coex Action frame parsing
363 element in which the channel does not match the current operating
371 * fixed number of minor issues identified in static analyzer warnings
377 keeping private data in memory longer than necessary
385 in case the first entry does not match
391 segmentation fault in an unexpected message sequence that could be
397 - fix VHT80 segment picking in ACS
407 * reverted TLS certificate validation step change in v2.1 that rejected
416 in RADIUS Disconnect-Request
424 * Hotspot 2.0 release number indication in WFA RADIUS VSA
456 * added support for postponing FT response in case PMK-R1 needs to be
470 * fixed a memory leak in SAE random number generation
472 * fixed off-by-one bounds checking in printf_encode()
473 - this could result in deinial of service in some EAP server cases
515 included in more entries)
519 use of the Secure bit in EAPOL-Key msg 3/4
541 * added a workaround for EAPOL-Key 4/4 using incorrect type value in
542 WPA2 mode (some deployed stations use WPA type in that message)
545 consecutive failures in addition to using the exponential lockout
563 * fixed EAP/WPS to PSK transition on reassociation in cases where
567 SQN in Milenage file
574 parameters to allow adding/overriding of RADIUS attributes in
608 * Add channel selection support in hostapd. See hostapd.conf.
611 * Delay STA entry removal until Deauth/Disassoc TX status in AP mode.
613 Disassociation frames when the STA is in power save sleep. Only
619 * bsd: Add support for setting HT values in IFM_MMASK.
622 between associated stations in the BSS. By default, this bridging
642 registrar. It works in the same way as new AP settings received
653 * Add WPA_IGNORE_CONFIG_ERRORS build option to continue in case of bad
657 in WPS-NEW-AP-SETTINGS.
669 - Allow AP to start in Enrollee mode without AP PIN for probing,
690 - Allow TDLS use or TDLS channel switching in the BSS to be
691 prohibited in the BSS, using config params tdls_prohibit and
694 fragment_size in hostapd.conf).
698 * Interworking: Support added for 802.11u. Enable in .config with
704 * TLS: Add support for tls_disable_time_checks=1 in client mode.
711 Move HT IEs to be later in (Re)Assoc Resp.
727 * add SA Query Request processing in AP mode (IEEE 802.11w)
728 * fix IGTK PN in group rekeying (IEEE 802.11w)
758 interfaces (wds_sta=1 in config file; only supported with
763 * detect bridge interface automatically so that bridge parameter in
809 runtime configuration variables in hostapd.conf (see WPS section in
815 information (added if ieee80211d=1 in configuration)
836 channels to be used with hostapd (if allowed in the current
859 (driver=none in hostapd.conf; CONFIG_DRIVER_NONE=y in .config)
861 is enabled in configuration
873 * added support for EAP Sequences in EAP-FAST Phase 2
876 changes needed to run two methods in sequence (IF-T) and the IF-IMV
890 * fixed EAPOL state machine to handle a case in which no response is
892 could have triggered a crash in some cases after a timeout
896 termination in the username
898 attribute in notification messages only when using fast
902 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST}
913 AT_CHECKCODE (optional feature in RFC 4187)
916 * added support for configuring EAP-TTLS phase 2 non-EAP methods in
922 parameter in the configuration file; debug verbosity is now set with
925 only shared key/password authentication is supported in this version
930 setting CONFIG_TLS=internal and CONFIG_INTERNAL_LIBTOMMATH=y in
963 in Success Request [Bug 203]
964 * added support for sending EAP-AKA Notifications in error cases
973 radio interface (bss=<ifname> in hostapd.conf); this is only
975 * fixed PMKSA cache update in the end of successful RSN
983 * removed STAKey handshake since PeerKey handshake has replaced it in
1031 * fixed stdarg use in hostapd_logger(): if both stdout and syslog
1032 logging was enabled, hostapd could trigger a segmentation fault in
1049 broken with earlier change (r1357) in the driver
1058 a directory with sockets that include MAC address for each device in
1064 direct link setup (DLS); note: this is disabled by default in both
1073 * added support for EAP-AKA in the integrated EAP authenticator
1074 * added support for matching EAP identity prefixes (e.g., "1"*) in EAP
1086 in configuration file if the wired interface is used by only one
1088 * driver_madwifi: configure driver to use TKIP countermeasures in order
1104 condition in which EAPOL-Start message could trigger hostapd to send
1108 * added client CA list to the TLS certificate request in order to make
1148 * added support for more than one Class attribute in RADIUS packets
1151 options 'check_crl'; CRL must be included in the ca_cert file for now
1155 EAP-Request/Identity message (ASCII-0 (nul) in eap_message)
1169 radius_server_ipv6=1 needs to be set in hostapd.conf and addresses
1170 in RADIUS clients file can then use IPv6 format
1184 * clear accounting data in the driver when starting a new accounting
1205 * added support for EAP-PEAP in the integrated EAP authenticator
1206 * added support for EAP-GTC in the integrated EAP authenticator
1210 * added support for EAP-TTLS in the integrated EAP authenticator
1211 * added support for EAP-SIM in the integrated EAP authenticator
1215 radius_server_auth_port); this is not included in default build; use
1216 CONFIG_RADIUS_SERVER=y in .config to include
1222 * added support for EAP-MSCHAPv2 in the integrated EAP authenticator
1234 * added support for Event-Timestamp (in RADIUS Accounting-Requests)
1248 * added wired authenticator driver interface (driver=wired in
1250 * added madwifi driver interface (driver=madwifi in hostapd.conf, see
1253 .config, needs to be created in hostapd directory with
1254 CONFIG_DRIVER_MADWIFI=y to include this driver interface in hostapd
1259 * fixed RADIUS reconnection after an error in sending interim
1266 * added support for strict GTK rekeying (wpa_strict_rekey in
1271 * added Prism54 driver interface (driver=prism54 in hostapd.conf;
1272 note: .config needs to be created in hostapd directory with
1273 CONFIG_DRIVER_PRISM54=y to include this driver interface in hostapd
1288 ('minimal_eap' in hostapd.conf) which is now removed
1290 layer (driver=bsd in hostapd.conf and CONFIG_DRIVER_BSD=y in
1299 * modified RADIUS client to re-connect the socket in case of certain
1304 * fixed couple of bugs in processing WPA deauthentication (freed data
1309 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1314 EAP message (previously, Supplicant was not notified in this case)
1350 * fixed Accounting-Stop statistics in cases where the message was
1357 Older changes up to and including v0.1.0 are included in the ChangeLog