Lines Matching refs:fixed
60 - fixed PMKSA caching with OKC
65 * fixed P2P provision discovery processing of a specially constructed
68 * fixed P2P group information processing of a specially constructed
71 * fixed PMF disconnection protection bypass in AP mode
76 * fixed various issues in experimental support for EAP-TEAP peer
81 * fixed EAP-FAST peer with TLS GCM/CCM ciphers
85 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
116 * fixed FT-EAP initial mobility domain association using PMKSA caching
119 * fixed a regression in OpenSSL 1.1+ engine loading
121 * fixed DPP bootstrapping URI parser of channel list
126 * fixed Hotspot 2.0 credential selection based on roaming consortium
130 * fixed a regression in WMM parameter configuration for a TDLS peer
131 * fixed a regression in operation with drivers that offload 802.1X
133 * fixed an ECDH operation corner case with OpenSSL
143 - fixed some association cases where both SAE and FT-SAE were enabled
147 - fixed FT-SAE when SAE PMKSA caching is used
164 * fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
171 * fixed OWE network profile saving
172 * fixed DPP network profile saving
176 * fixed build with LibreSSL
179 * fixed dNSName matching in domain_match and domain_suffix_match when
185 * fixed KEK2 derivation for FILS+FT
190 * fixed a regression in FT-over-DS with mac80211-based drivers
202 * fixed PTK rekeying with FILS and FT
205 * fixed WPA packet number reuse with replayed messages and key
210 * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
217 * fixed Suite B PMKSA caching not to update PMKID during each 4-way
219 * fixed EAP-pwd pre-processing with PasswordHashHash
221 * fixed a regression in TDLS prohibited bit validation
231 * fixed mesh channel configuration pri/sec switch case
236 * fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
239 * fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
240 * fixed a regression in RSN pre-authentication candidate selection
244 * fixed nl80211 AP and mesh mode configuration regression with
252 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
258 - fixed FT-SAE PMKID matching
271 - fixed additional IE inclusion in Reassociation Request frame when
275 * fixed WNM Sleep Mode processing when PMF is not enabled
277 * fixed EAP-pwd last fragment validation
279 * fixed EAP-pwd unexpected Confirm message processing
281 * fixed WPS configuration update vulnerability with malformed passphrase
283 * fixed configuration update vulnerability with malformed parameters set
286 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
311 * fixed PMKID derivation with SAE
341 * fixed Suite B 192-bit AKM to use proper PMK length
342 (note: this makes old releases incompatible with the fixed behavior)
350 * fixed EAPOL reauthentication after FT protocol run
351 * fixed FTIE generation for 4-way handshake after FT protocol run
354 * fixed and improved various FST operations
356 * fixed SIGNAL_POLL in IBSS and mesh cases
388 * EAP-PEAP: fixed interoperability issue with Windows 2012r2 server
390 * EAP-TTLS: fixed success after fragmented final Phase 2 message
404 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
419 * fixed P2P validation of SSID element length before copying it
421 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
423 * fixed WMM Action frame parser (AP mode)
425 * fixed EAP-pwd peer missing payload length validation
428 * fixed validation of WPS and P2P NFC NDEF record payload length
432 - fixed vendor command handling to check OUI properly
446 - fixed number of sequences with nl80211 P2P Device interface
454 - fixed WPS property of fi.w1.wpa_supplicant1.BSS interface
455 - fixed PresenceRequest to use group interface
466 * fixed SAE group selection in an error case
471 * fixed BSS selection based on estimated throughput
475 * fixed OpenSSL PKCS#12 extra certificate handling
476 * fixed key derivation for Suite B 192-bit AKM (this breaks
484 * fixed number of small issues based on hwsim test case failures and
505 * fixed number of issues with D-Bus P2P commands
506 * fixed regression in ap_scan=2 special case for WPS
507 * fixed macsec_validate configuration
520 * fixed expiration of BSS entry with all-zeros BSSID
525 * fixed EAP-IKEv2 fragmentation reassembly
560 * fixed number of minor issues identified in static analyzer warnings
561 * fixed wfd_dev_info to be more careful and not read beyond the buffer
570 * fixed some TDLS failure cases to clean up driver state
571 * fixed dynamic interface addition cases with nl80211 to avoid adding
576 * fixed EAP-AKA' message parser with multiple AT_KDF attributes
579 * fixed IBSS channel configuration in some corner cases
589 * fixed CTRL-EVENT-REGDOM-CHANGE event init parameter value
605 * fixed nl80211/RTM_DELLINK processing when a P2P GO interface is
607 * fixed number of small P2P issues to make negotiations more robust in
614 * fixed TDLS AID configuration for VHT
619 * fixed external MAC address changes while wpa_supplicant is running
621 * fixed wpa_cli action script execution to use more robust mechanism
626 * added/fixed nl80211 functionality
636 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
639 * fixed couple of sequences where radio work items could get stuck,
645 - fixed some service discovery cases with broadcast queries not being
647 - fixed Probe Request frame triggering invitation to trigger only a
650 - fixed a potential NULL pointer dereference crash when processing an
684 - fixed GAS indication for additional comeback delay with status
695 * fixed TDLS interoperability issues with supported operating class in
701 * fixed PTK derivation for CCMP-256 and GCMP-256
716 * fixed OBSS scan result processing for 20/40 MHz co-ex report
719 * fixed regression in parsing of WNM Sleep Mode exit key data
720 * fixed potential segmentation fault and memory leaks in WNM neighbor
729 * fixed EAP-SIM counter-too-small message
732 * fixed GSM authentication on USIM
734 * fixed some concurrent virtual interface cases with dedicated P2P
737 * fixed a memory leak in SAE random number generation
738 * fixed off-by-one bounds checking in printf_encode()
741 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM
779 * fixed ctrl_iface BSS command iteration with RANGE argument and no
780 exact matches; also fixed argument parsing for some cases with
802 * fixed OKC-based PMKSA cache entry clearing
803 * fixed TKIP group key configuration with FT
879 * fixed number of small bugs (see git logs for more details)
885 - fixed KDF for group 21 and zero-padding
938 * fixed issues in WPA/RSN element validation when roaming with ap_scan=1
942 * fixed WSC element inclusion in cases where P2P is disabled
944 * EAP-SIM: fixed AT_COUNTER_TOO_SMALL use
978 * EAP-TTLS: fixed peer challenge generation for MSCHAPv2
1065 * fixed P2P Bonjour SD to match entries with both compressed and not
1258 * nl80211: fixed number of issues with roaming
1269 * TNC: fixed issues with fragmentation
1322 * fixed PKCS#12 use with OpenSSL 1.0.0
1329 * fixed scan buffer processing with WEXT to handle up to 65535
1342 * fixed IEEE 802.11r key derivation function to match with the standard
1348 * fixed SHA-256 based key derivation function to match with the
1367 * fixed number of small WPS issues and added workarounds to
1370 * driver_ndis: fixed wired IEEE 802.1X authentication with PAE group
1397 * fixed PEAPv0 Cryptobinding interoperability issue with Windows Server
1399 * fixed PSK editing in wpa_gui
1419 * fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
1430 * fixed canceling of PMKSA caching when using drivers that generate
1440 * fixed FT (IEEE 802.11r) authentication after a failed association to
1450 * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
1459 * fixed race condition between disassociation event and group key
1461 * fixed opportunistic key caching (proactive_key_caching)
1482 * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
1484 * fixed EAPOL not to end up in infinite loop when processing dynamic
1486 * fixed problems in getting NDIS events from WMI on Windows 2000
1491 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
1546 * fixed a buffer overflow in parsing TSF from scan results when using
1550 * fixed an integer overflow issue in the ASN.1 parser used by the
1553 * fixed a race condition with -W option (wait for a control interface
1565 * fixed EAP-PAX key derivation
1566 * fixed EAP-PSK bit ordering of the Flags field
1567 * fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
1573 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
1582 * fixed dbus ctrl_iface to validate message interface before
1584 * fixed PeerKey key derivation to use the correct PRF label
1589 * fixed EAP-AKA Notification processing to allow Notification to be
1593 * fixed EAP-TTLS implementation not to crash on use of freed memory
1617 * fixed Windows named pipes ctrl_iface to not stop listening for
1620 * fixed USIM PIN status determination for the case that PIN is not
1629 * fixed EAP-SIM/AKA key derivation for re-authentication case (only
1639 * driver_ndis: fixed static WEP configuration to avoid race condition
1644 * fixed Release|Win32 target in the Visual Studio project files
1681 * fixed selection of the first network in ap_scan=2 mode; previously,
1693 * fixed build with CONFIG_STAKEY=y [Bug 143]
1711 * fixed WPA PSK update through ctrl_iface for the case where the old
1723 * fixed configuration parser not to remove CCMP from group cipher list
1725 * fixed integrated NDIS events processing not to hang the process due
1731 * eloop_win: fixed unregistration of Windows events
1732 * l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
1752 * driver_madwifi: fixed TKIP and CCMP sequence number configuration on
1756 * fixed EAP-GTC response to include correct user identity when run as
1773 * driver_wext: fixed privacy configuration for static WEP keys mode
1787 * fixed EAP phase 2 Nak for EAP-{PEAP,TTLS,FAST} (this was broken in
1795 * fixed EAPOL re-authentication for sessions that used PMKSA caching
1798 * fixed PMKSA cache deinitialization not to use freed memory when
1800 * fixed a memory leak in EAP-TTLS re-authentication
1818 * fixed TLS library deinitialization after RSN pre-authentication not
1825 * fixed PMKSA cache processing not to trigger deauthentication if the
1827 * fixed PC/SC initialization for ap_scan != 1 modes (this fixes
1836 * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to
1838 * fixed EAP-AKA to allow resynchronization within the same session
1860 * fixed PC/SC code to use correct length for GSM AUTH command buffer
1880 * fixed private key configuration as configuration blob and added
1901 * l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
1905 * fixed OpenSSL error reporting to go through all pending errors to
1908 * fixed configuration file updating to not write empty variables
1910 * fixed ADD_NETWORK ctrl_iface command to use the same default values
1913 * fixed EAP state machine to not discard EAP-Failure messages in many
1915 * fixed a infinite loop in private key reading if the configured file
1920 * driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
1934 * fixed RSN pre-authentication (it was broken in the clean up of WPA
1954 * driver_ndis: fixed driver polling not to increase frequency on each
1957 * fixed driver_wext.c to filter wireless events based on ifindex to
2012 * ndis_events: fixed Windows 2000 support
2025 * fixed parsing of strings that include both " and # within double
2041 * driver_ndis: fixed WinPcap 3.0 support
2042 * fixed build with CONFIG_DNET_PCAP=y on Linux
2055 * fixed a potential issue in RSN pre-authentication ending up using
2065 * driver_broadcom: fixed couple of memory leaks in scan result
2068 * fixed EAP-PAX MAC calculation
2069 * fixed EAP-PAX CK and ICK key derivation
2079 * fixed ctrl_interface_group processing for the case where gid is
2086 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
2097 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
2099 * fixed a possible double free in EAP-TTLS fast-reauthentication when
2121 * fixed EAPOL-Key validation to drop packets with invalid Key Data
2130 * driver_madwifi: fixed association in plaintext mode
2157 * fixed RSN IE in 4-Way Handshake message 2/4 for the case where
2168 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
2171 * fixed reprocessing of pending request after ctrl_iface requests for
2173 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of
2182 * fixed a busy loop introduced in v0.3.5 for scan result processing
2188 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
2191 * fixed issues with 64-bit CPUs and SHA1 cleanup in previous version
2193 * fixed EAP workaround and fast reauthentication configuration for
2200 * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS
2209 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
2233 * fixed private key loading for cases where passphrase is not set
2234 * fixed Windows/cygwin L2 packet handler freeing; previous version
2266 * fixed static WEP key configuration to use broadcast/default type for
2277 * fixed compilation with CONFIG_PCSC=y
2301 * wpa_cli: fixed parsing of -p <path> command line argument
2302 * PEAPv1: fixed tunneled EAP-Success reply handling to reply with TLS
2316 * fixed parsing of wep_tx_keyidx
2323 * fixed couple of errors in PCSC handling that could have caused
2340 * fixed couple of unaligned reads in scan result parsing to fix WPA
2347 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
2349 * fixed error handling for case where reading of scan results fails:
2386 * fixed WPA msg 3/4 processing to allow Key Data field contain other
2397 * driver_madwifi: fixed WEP key configuration for IEEE 802.1X when the
2400 * driver_hostap: fixed IEEE 802.1X WEP key updates and
2414 * driver_madwifi: fixed WPA2 configuration and scan_ssid=1 (e.g.,
2450 * fixed control interface socket removal for some error cases
2466 * fixed IEEE 802.1X WEP key derivation in the case where Authenticator
2497 * fixed RSN IE and WPA IE capabilities field parsing
2504 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
2535 * fixed wpa_supplicant to ignore possible extra data after WPA