Lines Matching full:fixed
48 - fixed PMKSA caching with OKC
53 * fixed WPS UPnP SUBSCRIBE handling of invalid operations
55 * fixed PMF disconnection protection bypass
58 * fixed various issues in experimental support for EAP-TEAP server
65 * fixed EAP-FAST server with TLS GCM/CCM ciphers
68 * fixed OWE key derivation with groups 20 and 21; this breaks backwards
92 * fixed FT-EAP initial mobility domain association using PMKSA caching
94 * fixed FILS to and RSNE into (Re)Association Response frames
95 * fixed DPP bootstrapping URI parser of channel list
105 * fixed an ECDH operation corner case with OpenSSL
123 - fixed confirm message validation in error cases
143 * fixed build with LibreSSL
145 * fixed KEK2 derivation for FILS+FT
155 * fixed FT and SA Query Action frame with AP-MLME-in-driver cases
160 * fixed PTK rekeying with FILS and FT
163 * fixed WPA packet number reuse with replayed messages and key
180 - fixed wpa_psk_file use for FT-PSK
181 - fixed FT-SAE PMKID matching
186 - fixed some PMKSA caching cases with SAE
191 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
203 * fixed nl80211 AP mode configuration regression with Linux 4.15 and
206 * fixed some 20/40 MHz coexistence cases where the BSS could drop to
218 * fixed EAP-pwd last fragment validation
220 * fixed WPS configuration update vulnerability with malformed passphrase
225 * fixed Suite B 192-bit AKM to use proper PMK length
226 (note: this makes old releases incompatible with the fixed behavior)
236 * fixed EAPOL reauthentication after FT protocol run
237 * fixed FTIE generation for 4-way handshake after FT protocol run
238 * fixed and improved various FST operations
267 * fixed PMKID derivation with SAE
291 * fixed WPS UPnP vulnerability with HTTP chunked transfer encoding
293 * fixed WMM Action frame parser
295 * fixed EAP-pwd server missing payload length validation
298 * fixed validation of WPS and P2P NFC NDEF record payload length
301 - fixed vendor command handling to check OUI properly
302 * fixed hlr_auc_gw build with OpenSSL
306 * fixed and extended dynamic VLAN cases
320 * fixed key derivation for Suite B 192-bit AKM (this breaks
329 * fixed number of small issues based on hwsim test case failures and
331 * fixed Accounting-Request to not include duplicated Acct-Session-Id
335 * fixed channel switch from VHT to HT
342 * fixed a regression with driver=wired
348 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
349 * fixed a regression in HT 20/40 coex Action frame parsing
368 * fixed some RADIUS server failover cases
371 * fixed number of minor issues identified in static analyzer warnings
372 * fixed DFS and channel switch operation for multi-BSS cases
381 * fixed GET_CONFIG wpa_pairwise_cipher value
383 * fixed PMKSA cache timeout from Session-Timeout for WPA/WPA2 cases
384 * fixed OKC PMKSA cache entry fetch to avoid a possible infinite loop
386 * fixed hostapd_cli action script execution to use more robust mechanism
390 * fixed SAE confirm-before-commit validation to avoid a potential
400 * fixed HT40 co-ex scan for some pri/sec channel switches
403 * fixed HT40 co-ex support to check for overlapping 20 MHz BSS
404 * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding;
410 * fixed STA validation step for WPS ER commands to prevent a potential
432 * added/fixed nl80211 functionality
436 * fixed PMF protection of Deauthentication frame when this is triggered
449 * fixed PTK derivation for CCMP-256 and GCMP-256
454 * fixed AP mode default TXOP Limit values for AC_VI and AC_VO (these
465 * fixed RADIUS client retransmit/failover behavior
468 * fixed a possible crash on double DISABLE command when multiple BSSes
470 * fixed a memory leak in SAE random number generation
471 * fixed GTK rekeying when the station uses FT protocol
472 * fixed off-by-one bounds checking in printf_encode()
520 * fixed number of small bugs (see git logs for more details)
532 * fixed WPS operation stopping on dual concurrent AP
553 * EAP-SIM: fixed re-authentication not to update pseudonym
557 * EAP-AKA': fixed identity for MK derivation
563 * fixed EAP/WPS to PSK transition on reassociation in cases where
593 * fixed EAP-TLS/PEAP/TTLS/FAST server to validate TLS Message Length
603 * fixed EAPOL frame transmission to non-QoS STAs with nl80211
719 * TNC: fixed issues with fragmentation
748 * fixed HT Capabilities IE with nl80211 drivers
760 * fixed WPS Probe Request processing to handle missing required
762 * fixed PKCS#12 use with OpenSSL 1.0.0
774 * driver_nl80211: fixed STA accounting data collection (TX/RX bytes
778 * fixed EAPOL/EAP reauthentication when using an external RADIUS
780 * fixed TNC with EAP-TTLS
781 * fixed IEEE 802.11r key derivation function to match with the standard
783 * fixed SHA-256 based key derivation function to match with the
794 * fixed number of small WPS issues and added workarounds to
816 * fixed WEP authentication (both Open System and Shared Key) with
822 * fixed retransmission of EAP requests if no response is received
838 * fixed EAP-TLS message processing for the last TLS message if it is
841 * fixed listen interval configuration for nl80211 drivers
846 * fixed EAP-FAST PAC-Opaque padding (0.6.4 broke this for some peer
848 * fixed internal TLSv1 implementation for abbreviated handshake (used
860 * fixed WPA/RSN IE validation to verify that the proto (WPA vs. WPA2)
863 A-ID-Info (eap_fast_a_id_info) to allow A-ID to be set to a fixed
885 * fixed Reassociation Response callback processing when using internal
890 * fixed EAPOL state machine to handle a case in which no response is
893 * fixed EAP-SIM/AKA realm processing to allow decorated usernames to
897 * fixed EAP-SIM/AKA protected result indication to include AT_COUNTER
900 * fixed EAP-SIM Start response processing for fast reauthentication
906 * fixed EAP-SIM and EAP-AKA message parser to validate attribute
949 * fixed EAP-PSK bit ordering of the Flags field
950 * fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
952 * fixed EAP-TTLS AVP parser processing for too short AVP lengths
953 * fixed IPv6 connection to RADIUS accounting server
962 * fixed EAP-MSCHAPv2 server to use a space between S and M parameters
975 * fixed PMKSA cache update in the end of successful RSN
981 * driver_madwifi: fixed configuration of unencrypted modes (plaintext
996 * fixed session timeout processing with drivers that do not use
1003 * fixed hostapd to add PMKID KDE into 4-Way Handshake Message 1 when
1010 * fixed nt_password_hash build [Bug 144]
1015 * fixed a segmentation fault when RSN pre-authentication was completed
1028 * fixed EAP-MSCHAPv2 message length validation
1031 * fixed stdarg use in hostapd_logger(): if both stdout and syslog
1052 * fixed WPA message 3/4 not to encrypt Key Data field (WPA IE)
1083 * driver_wired: fixed EAPOL sending to optionally use PAE group address
1099 * driver_madwifi: fixed EAPOL packet receive for configuration where
1102 * fixed EAPOL state machine step function to process all state
1114 * fixed build without CONFIG_RSN_PREAUTH
1115 * fixed FreeBSD build
1118 * fixed PMKSA caching to copy User-Name and Class attributes so that
1122 * fixed PMKSA caching for the case where STA (re)associates without
1127 * fixed EAP-PAX MAC calculation
1128 * fixed EAP-PAX CK and ICK key derivation
1136 * fixed RADIUS server initialization when only auth or acct server
1141 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
1145 * fixed RADIUS Class attribute processing to only use Access-Accept
1157 * fixed a bug which caused some RSN pre-authentication cases to use
1159 * fixed private key loading for cases where passphrase is not set
1162 * fixed WPA2 to add PMKSA cache entry when using integrated EAP
1164 * fixed PMKSA caching (EAP authentication was not skipped correctly
1180 * fixed PEAPv1 to use tunneled EAP-Success/Failure instead of EAP-TLV
1182 * fixed EAP identifier duplicate processing with the new IEEE 802.1X
1188 * fixed WPA message 2/4 processing not to cancel timeout for TimeoutEvt
1192 * fixed reconfiguration of RADIUS client retransmission timer when
1201 * fixed EAPOL-Start processing to trigger WPA reauthentication
1221 * driver_madwifi: fixed group key setup and added get_ssid method
1238 * fixed EAPOL reauthentication to trigger WPA/WPA2 reauthentication
1239 * fixed EAPOL state machine to stop if STA is removed during
1256 * fixed an alignment issue that could cause SHA-1 to fail on some
1259 * fixed RADIUS reconnection after an error in sending interim
1276 * fixed RADIUS accounting to generate a new session id for cases where
1278 * fixed STA disassociation handler to mark next timeout state to
1295 * fixed some accounting cases where Accounting-Start was sent when
1302 * fixed couple of cases where EAPOL state for a station was freed
1304 * fixed couple of bugs in processing WPA deauthentication (freed data
1308 * fixed WPA/WPA2 group rekeying to use key index correctly (GN/GM)
1309 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1315 * fixed mixed WPA-PSK and WPA-EAP mode to work with WPA-PSK (i.e., do
1328 * fixed interim accounting to remove any pending accounting messages
1337 * fixed event loop to call signal handlers only after returning from
1347 * fixed accounting session handling to send Accounting-Start only once
1350 * fixed Accounting-Stop statistics in cases where the message was