⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changelog

📁 WPA在Linux下实现的原代码 WPA在Linux下实现的原代码
💻
📖 第 1 页 / 共 3 页
字号:
ChangeLog for wpa_supplicant2008-02-23 - v0.4.11	* updated driver_madwifi to work with changes in madwifi-ng	* fixed EAP-AKA Notification processing to allow Notification to be	  processed after AKA Challenge response has been sent	* fixed OpenSSL TLS wrapper to clear trusted CA list to allow	  network blocks to use different trusted CA configurations	* fixed a potential EAP state machine loop when moving from PSK to EAP	  configuration without restarting wpa_supplicant	* fixed EAP-SIM and EAP-AKA message parser to validate attribute	  lengths properly to avoid potential crash caused by invalid messages	* added driver_wext workaround for race condition between scanning and	  association with drivers that take very long time to scan all	  channels (e.g., madwifi with dual-band cards); wpa_supplicant is now	  using a longer hardcoded timeout for the scan if the driver supports	  notifications for scan completion (SIOCGIWSCAN event); this helps,	  e.g., in cases where wpa_supplicant and madwifi driver ended up in	  loop where the driver did not even try to associate	* fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION	  attributes in EAP-SIM Start/Response when using fast reauthentication2007-02-19 - v0.4.10	* driver_madwifi: fixed TKIP and CCMP sequence number configuration on	  big endian hosts [Bug 146]	* Windows: added a workaround for UDP-based control interface to	  prevent packets with forged addresses from being accepted as local	  control requests	* fixed EAP-SIM/AKA key derivation for re-authentication case (only	  affects IEEE 802.1X with dynamic WEP keys)	* fixed WPA PSK update through ctrl_iface for the case where the old	  PSK was derived from an ASCII passphrase and the new PSK is set as	  a raw PSK (hex string)	* fixed configuration parser not to remove CCMP from group cipher list	  if WPA-None (adhoc) is used (pairwise=NONE in that case)	* driver_ndis: fixed static WEP configuration to avoid race condition	  issues with some NDIS drivers between association and setting WEP	  keys	* driver_ndis: added validation for IELength value in scan results to	  avoid crashes when using buggy NDIS drivers [Bug 165]	* fixed selection of the first network in ap_scan=2 mode; previously,	  wpa_supplicant could get stuck in SCANNING state when only the first	  network for enabled (e.g., after 'wpa_cli select_network 0')	* driver_ndis: added support for selecting AP based on BSSID	* fixed USIM PIN status determination for the case that PIN is not	  needed (this allows EAP-AKA to be used with USIM cards that do not	  use PIN)	* added support for reading 3G USIM AID from EF_DIR to allow EAP-AKA to	  be used with cards that do not support file selection based on	  partial AID	* fixed EAP-PSK bit ordering of the Flags field	* fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in	  tunnelled identity request (previously, the identifier from the outer	  method was used, not the tunnelled identifier which could be	  different)	* fixed EAP-TTLS AVP parser processing for too short AVP lengths	* updated Windows binary build to link against OpenSSL 0.9.8d and	  added support for EAP-FAST	* added a workaround for a case where the AP is using unknown address	  (e.g., MAC address of the wired interface) as the source address for	  EAPOL-Key frames; previously, that source address was used as the	  destination for EAPOL-Key frames and in key derivation; now, BSSID is	  used even if the source address does not match with it	  (this resolves an interoperability issue with Thomson SpeedTouch 580)2006-05-06 - v0.4.9	* fixed EAPOL re-authentication for sessions that used PMKSA caching	* reject WPA/WPA2 message 3/4 if it does not include any valid	  WPA/RSN IE	* driver_ndis: Fixed encryption mode configuration for unencrypted	  networks (some NDIS drivers ignored this, but others, e.g., Broadcom,	  refused to associate with open networks) [Bug 106]	* driver_wext: added support for WE-21 change to SSID configuration	* driver_wext: fixed privacy configuration for static WEP keys mode	  [Bug 140]	* driver_wext: added fallback to use SIOCSIWENCODE for setting auth_alg	  if the driver does not support SIOCSIWAUTH2006-02-08 - v0.4.8	* fixed PC/SC code to use correct length for GSM AUTH command buffer	  and to not use pioRecvPci with SCardTransmit() calls; these were not	  causing visible problems with pcsc-lite, but Windows Winscard.dll	  refused the previously used parameters; this fixes EAP-SIM and	  EAP-AKA authentication using SIM/USIM card under Windows	* added support for EAP-FAST key derivation using other ciphers than	  RC4-128-SHA for authentication and AES128-SHA for provisioning	* fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to	  decrypt AT_ENCR_DATA attributes correctly	* added support for configuring CA certificate as DER file and as a	  configuration blob	* fixed private key configuration as configuration blob and added	  support for using PKCS#12 as a blob	* fixed cygwin build	* added support for loading trusted CA certificates from Windows	  certificate store: ca_cert="cert_store://<name>", where <name> is	  likely CA (Intermediate CA certificates) or ROOT (root certificates)	* fixed TLS library deinitialization after RSN pre-authentication not	  to disable TLS library for normal authentication	* fixed PMKSA cache processing not to trigger deauthentication if the	  current PMKSA cache entry is replaced with a valid new entry	* fixed PC/SC initialization for ap_scan != 1 modes (this fixes	  EAP-SIM and EAP-AKA with real SIM/USIM card when using ap_scan=0 or	  ap_scan=2)	* do not try to use USIM APDUs when initializing PC/SC for SIM card	  access for a network that has not enabled EAP-AKA2005-11-20 - v0.4.7 (beginning of 0.4.x stable releases)	* l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap	  and WinPcap to receive frames sent to PAE group address	* disable EAP state machine when IEEE 802.1X authentication is not used	  in order to get rid of bogus "EAP failed" messages	* fixed OpenSSL error reporting to go through all pending errors to	  avoid confusing reports of old errors being reported at later point	  during handshake	* fixed configuration file updating to not write empty variables	  (e.g., proto or key_mgmt) that the file parser would not accept	* fixed ADD_NETWORK ctrl_iface command to use the same default values	  for variables as empty network definitions read from config file	  would get	* fixed EAP state machine to not discard EAP-Failure messages in many	  cases (e.g., during TLS handshake)	* fixed a infinite loop in private key reading if the configured file	  cannot be parsed successfully	* driver_madwifi: added support for madwifi-ng	* wpa_gui: do not display password/PSK field contents	* wpa_gui: added CA certificate configuration	* driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID	* driver_ndis: include Beacon IEs in AssocInfo in order to notice if	  the new AP is using different WPA/RSN IE	* use longer timeout for IEEE 802.11 association to avoid problems with	  drivers that may take more than five second to associate2005-10-27 - v0.4.6	* allow fallback to WPA, if mixed WPA+WPA2 networks have mismatch in	  RSN IE, but WPA IE would match with wpa_supplicant configuration	* added support for named configuration blobs in order to avoid having	  to use file system for external files (e.g., certificates);	  variables can be set to "blob://<blob name>" instead of file path to	  use a named blob; supported fields: pac_file, client_cert,	  private_key	* fixed RSN pre-authentication (it was broken in the clean up of WPA	  state machine interface in v0.4.5)	* driver_madwifi: set IEEE80211_KEY_GROUP flag for group keys to make	  sure the driver configures broadcast decryption correctly	* added ca_path (and ca_path2) configuration variables that can be used	  to configure OpenSSL CA path, e.g., /etc/ssl/certs, for using the	  system-wide trusted CA list	* added support for starting wpa_supplicant without a configuration	  file (-C argument must be used to set ctrl_interface parameter for	  this case; in addition, -p argument can be used to provide	  driver_param; these new arguments can also be used with a	  configuration to override the values from the configuration)	* added global control interface that can be optionally used for adding	  and removing network interfaces dynamically (-g command line argument	  for both wpa_supplicant and wpa_cli) without having to restart	  wpa_supplicant process	* wpa_gui:	  - try to save configuration whenever something is modified	  - added WEP key configuration	  - added possibility to edit the current network configuration	* driver_ndis: fixed driver polling not to increase frequency on each	  received EAPOL frame due to incorrectly cancelled timeout	* added simple configuration file examples (in examples subdirectory)	* fixed driver_wext.c to filter wireless events based on ifindex to	  avoid interfaces receiving events from other interfaces	* delay sending initial EAPOL-Start couple of seconds to speed up	  authentication for the most common case of Authenticator starting	  EAP authentication immediately after association2005-09-25 - v0.4.5	* added a workaround for clearing keys with ndiswrapper to allow	  roaming from WPA enabled AP to plaintext one	* added docbook documentation (doc/docbook) that can be used to	  generate, e.g., man pages	* l2_packet_linux: use socket type SOCK_DGRAM instead of SOCK_RAW for	  PF_PACKET in order to prepare for network devices that do not use	  Ethernet headers (e.g., network stack with native IEEE 802.11 frames)	* use receipt of EAPOL-Key frame as a lower layer success indication	  for EAP state machine to allow recovery from dropped EAP-Success	  frame	* cleaned up internal EAPOL frame processing by not including link	  layer (Ethernet) header during WPA and EAPOL/EAP processing; this	  header is added only when transmitted the frame; this makes it easier	  to use wpa_supplicant on link layers that use different header than	  Ethernet	* updated EAP-PSK to use draft 9 by default since this can now be	  tested with hostapd; removed support for draft 3, including	  server_nai configuration option from network blocks	* driver_wired: add PAE address to the multicast address list in order	  to be able to receive EAPOL frames with drivers that do not include	  these multicast addresses by default	* driver_wext: add support for WE-19	* added support for multiple configuration backends (CONFIG_BACKEND	  option); currently, only 'file' is supported (i.e., the format used	  in wpa_supplicant.conf)	* added support for updating configuration ('wpa_cli save_config');	  this is disabled by default and can be enabled with global	  update_config=1 variable in wpa_supplicant.conf; this allows wpa_cli	  and wpa_gui to store the configuration changes in a permanent store	* added GET_NETWORK ctrl_iface command	  (e.g., 'wpa_cli get_network 0 ssid')2005-08-21 - v0.4.4	* replaced OpenSSL patch for EAP-FAST support	  (openssl-tls-extensions.patch) with a more generic and correct	  patch (the new patch is not compatible with the previous one, so the	  OpenSSL library will need to be patched with the new patch in order	  to be able to build wpa_supplicant with EAP-FAST support)	* added support for using Windows certificate store (through CryptoAPI)	  for client certificate and private key operations (EAP-TLS)	  (see wpa_supplicant.conf for more information on how to configure	  this with private_key)	* ported wpa_gui to Windows	* added Qt4 version of wpa_gui (wpa_gui-qt4 directory); this can be	  built with the open source version of the Qt4 for Windows	* allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used	  with drivers that do not support WPA	* ndis_events: fixed Windows 2000 support	* added support for enabling/disabling networks from the list of all	  configured networks ('wpa_cli enable_network <network id>' and	  'wpa_cli disable_network <network id>')	* added support for adding and removing network from the current	  configuration ('wpa_cli add_network' and 'wpa_cli remove_network	  <network id>'); added networks are disabled by default and they can	  be enabled with enable_network command once the configuration is done	  for the new network; note: configuration file is not yet updated, so	  these new networks are lost when wpa_supplicant is restarted	* added support for setting network configuration parameters through	  the control interface, for example:	  wpa_cli set_network 0 ssid "\"my network\""	* fixed parsing of strings that include both " and # within double	  quoted area (e.g., "start"#end")	* added EAP workaround for PEAP session resumption: allow outer,	  i.e., not tunneled, EAP-Success to terminate session since; this can	  be disabled with eap_workaround=0	  (this was allowed for PEAPv1 before, but now it is also allowed for	  PEAPv0 since at least one RADIUS authentication server seems to be	  doing this for PEAPv0, too)	* wpa_gui: added preliminary support for adding new networks to the	  wpa_supplicant configuration (double click on the scan results to	  open network configuration)2005-06-26 - v0.4.3	* removed interface for external EAPOL/EAP supplicant (e.g.,	  Xsupplicant), (CONFIG_XSUPPLICANT_IFACE) since it is not required	  anymore and is unlikely to be used by anyone	* driver_ndis: fixed WinPcap 3.0 support	* fixed build with CONFIG_DNET_PCAP=y on Linux	* l2_packet: moved different implementations into separate files	  (l2_packet_*.c)2005-06-12 - v0.4.2	* driver_ipw: updated driver structures to match with ipw2200-1.0.4

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -