From 04602ab362345abef12988210889b6e911d5f8696186ef11751d3c9e187af907 Mon Sep 17 00:00:00 2001 From: OBS User unknown Date: Tue, 2 Sep 2008 10:16:58 +0000 Subject: [PATCH] OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wpa_supplicant?expand=0&rev=13 --- wpa_supplicant-0.6.3.tar.bz2 | 3 --- wpa_supplicant-0.6.4.tar.bz2 | 3 +++ wpa_supplicant-driver-wext-debug.patch | 23 +++++++++++------- wpa_supplicant-errormsg.patch | 17 +++++++------ wpa_supplicant.changes | 21 ++++++++++++++++ wpa_supplicant.spec | 33 ++++++++++++++++++++++---- 6 files changed, 76 insertions(+), 24 deletions(-) delete mode 100644 wpa_supplicant-0.6.3.tar.bz2 create mode 100644 wpa_supplicant-0.6.4.tar.bz2 diff --git a/wpa_supplicant-0.6.3.tar.bz2 b/wpa_supplicant-0.6.3.tar.bz2 deleted file mode 100644 index 31ea4f4..0000000 --- a/wpa_supplicant-0.6.3.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:8342a394f67d2690311fede0518b6b311b422d5a7bfb783936f14b362757896c -size 738030 diff --git a/wpa_supplicant-0.6.4.tar.bz2 b/wpa_supplicant-0.6.4.tar.bz2 new file mode 100644 index 0000000..965bf27 --- /dev/null +++ b/wpa_supplicant-0.6.4.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3690117bc4d9160ae9414bb72e2d76e10d8073a0977e6c6ba2eb4a352bf38114 +size 776742 diff --git a/wpa_supplicant-driver-wext-debug.patch b/wpa_supplicant-driver-wext-debug.patch index b208847..115a6ce 100644 --- a/wpa_supplicant-driver-wext-debug.patch +++ b/wpa_supplicant-driver-wext-debug.patch @@ -1,7 +1,6 @@ -diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c ---- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-02-23 03:45:24.000000000 +0100 -+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:20:37.000000000 +0200 -@@ -2069,20 +2069,32 @@ +--- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c ++++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c +@@ -2174,20 +2174,32 @@ */ if (drv->auth_alg_fallback && wpa_driver_wext_auth_alg_fallback(drv, params) < 0) @@ -34,7 +33,7 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic if (params->wpa_ie == NULL || params->wpa_ie_len == 0) value = IW_AUTH_WPA_VERSION_DISABLED; else if (params->wpa_ie[0] == WLAN_EID_RSN) -@@ -2091,26 +2103,41 @@ +@@ -2196,26 +2208,41 @@ value = IW_AUTH_WPA_VERSION_WPA; if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_WPA_VERSION, value) < 0) @@ -76,14 +75,22 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic /* Allow unencrypted EAPOL messages even if pairwise keys are set when * not using WPA. IEEE 802.1X specifies that these frames are not -@@ -2124,14 +2151,26 @@ +@@ -2231,7 +2258,11 @@ if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_RX_UNENCRYPTED_EAPOL, allow_unencrypted_eapol) < 0) +- ret = -1; +{ +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed", __FUNCTION__); - ret = -1; ++ ret = -1; +} ++ + #ifdef WEXT_MFP_PENDING + #ifdef CONFIG_IEEE80211W + switch (params->mgmt_frame_protection) { +@@ -2250,12 +2281,21 @@ + #endif /* CONFIG_IEEE80211W */ + #endif /* WEXT_MFP_PENDING */ if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0) +{ +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_freq failed", __FUNCTION__); @@ -103,7 +110,7 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic return ret; } -@@ -2156,6 +2195,8 @@ +@@ -2280,6 +2320,8 @@ res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG, algs); drv->auth_alg_fallback = res == -2; diff --git a/wpa_supplicant-errormsg.patch b/wpa_supplicant-errormsg.patch index a0f8aad..619abd4 100644 --- a/wpa_supplicant-errormsg.patch +++ b/wpa_supplicant-errormsg.patch @@ -1,17 +1,16 @@ -diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c ---- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:26.000000000 +0200 -+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:11.000000000 +0200 -@@ -251,10 +251,12 @@ +--- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c ++++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c +@@ -228,12 +228,13 @@ iwr.u.param.value = value; if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) { -- perror("ioctl[SIOCSIWAUTH]"); + int saved_errno = errno; - fprintf(stderr, "WEXT auth param %d value 0x%x - ", - idx, value); + if (errno != EOPNOTSUPP) { + wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " + "value 0x%x) failed: %s)", + idx, value, strerror(errno)); + } - ret = errno == EOPNOTSUPP ? -2 : -1; -+ errno = saved_errno; -+ perror("ioctl[SIOCSIWAUTH]"); + ret = saved_errno == EOPNOTSUPP ? -2 : -1; } diff --git a/wpa_supplicant.changes b/wpa_supplicant.changes index c90d28a..b3cd3cc 100644 --- a/wpa_supplicant.changes +++ b/wpa_supplicant.changes @@ -1,3 +1,24 @@ +------------------------------------------------------------------- +Tue Sep 2 03:05:49 CEST 2008 - ro@suse.de + +- update to 0.6.4 + * added support for EAP Sequences in EAP-FAST Phase 2 + * added support for using TNC with EAP-FAST + * added driver_ps3 for the PS3 Linux wireless driver + * added support for optional cryptobinding with PEAPv0 + * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to + allow fallback to full handshake if server rejects PAC-Opaque + * added fragmentation support for EAP-TNC + * added support for parsing PKCS #8 formatted private keys into the + internal TLS implementation (both PKCS #1 RSA key and PKCS #8 + encapsulated RSA key can now be used) + * added option of using faster, but larger, routines in the internal + LibTomMath (for internal TLS implementation) to speed up DH and RSA + calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y) + * fixed race condition between disassociation event and group key + handshake to avoid getting stuck in incorrect state [Bug 261] + * fixed opportunistic key caching (proactive_key_caching) + ------------------------------------------------------------------- Mon Aug 4 12:33:10 CEST 2008 - hschaa@suse.de diff --git a/wpa_supplicant.spec b/wpa_supplicant.spec index 67afb90..7e9d95d 100644 --- a/wpa_supplicant.spec +++ b/wpa_supplicant.spec @@ -1,10 +1,17 @@ # -# spec file for package wpa_supplicant (Version 0.6.3) +# spec file for package wpa_supplicant (Version 0.6.4) # # Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany. -# This file and all modifications and additions to the pristine -# package are under the same license as the package itself. # +# All modifications and additions to the file contributed by third parties +# remain the property of their copyright owners, unless otherwise agreed +# upon. The license for this file, and modifications and additions to the +# file, is the same license as for the pristine package itself (unless the +# license for the pristine package is not an Open Source License, in which +# case the license is the MIT License). An "Open Source License" is a +# license that conforms to the Open Source Definition (Version 1.9) +# published by the Open Source Initiative. + # Please submit bugfixes or comments via http://bugs.opensuse.org/ # @@ -17,7 +24,7 @@ BuildRequires: dbus-1-devel libqt4 libqt4-devel openssl-devel pkg-config readli BuildRequires: madwifi-devel %endif Url: http://hostap.epitest.fi/wpa_supplicant/ -Version: 0.6.3 +Version: 0.6.4 Release: 1 License: BSD 3-Clause; GPL v2 or later Group: Productivity/Networking/Other @@ -117,6 +124,24 @@ install -m 755 wpa_supplicant/wpa_gui-qt4/wpa_gui %{buildroot}%{_sbindir} /usr/sbin/wpa_gui %changelog +* Tue Sep 02 2008 ro@suse.de +- update to 0.6.4 + * added support for EAP Sequences in EAP-FAST Phase 2 + * added support for using TNC with EAP-FAST + * added driver_ps3 for the PS3 Linux wireless driver + * added support for optional cryptobinding with PEAPv0 + * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to + allow fallback to full handshake if server rejects PAC-Opaque + * added fragmentation support for EAP-TNC + * added support for parsing PKCS #8 formatted private keys into the + internal TLS implementation (both PKCS #1 RSA key and PKCS #8 + encapsulated RSA key can now be used) + * added option of using faster, but larger, routines in the internal + LibTomMath (for internal TLS implementation) to speed up DH and RSA + calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y) + * fixed race condition between disassociation event and group key + handshake to avoid getting stuck in incorrect state [Bug 261] + * fixed opportunistic key caching (proactive_key_caching) * Mon Aug 04 2008 hschaa@suse.de - Remove patches that are already upstream - Rebase patches to new version