OBS User unknown 2008-09-02 10:16:58 +00:00 committed by Git OBS Bridge
parent 4a9425723c
commit 04602ab362
6 changed files with 76 additions and 24 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:8342a394f67d2690311fede0518b6b311b422d5a7bfb783936f14b362757896c
size 738030

View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:3690117bc4d9160ae9414bb72e2d76e10d8073a0977e6c6ba2eb4a352bf38114
size 776742

View File

@ -1,7 +1,6 @@
diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c --- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c
--- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-02-23 03:45:24.000000000 +0100 +++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c
+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:20:37.000000000 +0200 @@ -2174,20 +2174,32 @@
@@ -2069,20 +2069,32 @@
*/ */
if (drv->auth_alg_fallback && if (drv->auth_alg_fallback &&
wpa_driver_wext_auth_alg_fallback(drv, params) < 0) wpa_driver_wext_auth_alg_fallback(drv, params) < 0)
@ -34,7 +33,7 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic
if (params->wpa_ie == NULL || params->wpa_ie_len == 0) if (params->wpa_ie == NULL || params->wpa_ie_len == 0)
value = IW_AUTH_WPA_VERSION_DISABLED; value = IW_AUTH_WPA_VERSION_DISABLED;
else if (params->wpa_ie[0] == WLAN_EID_RSN) else if (params->wpa_ie[0] == WLAN_EID_RSN)
@@ -2091,26 +2103,41 @@ @@ -2196,26 +2208,41 @@
value = IW_AUTH_WPA_VERSION_WPA; value = IW_AUTH_WPA_VERSION_WPA;
if (wpa_driver_wext_set_auth_param(drv, if (wpa_driver_wext_set_auth_param(drv,
IW_AUTH_WPA_VERSION, value) < 0) IW_AUTH_WPA_VERSION, value) < 0)
@ -76,14 +75,22 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic
/* Allow unencrypted EAPOL messages even if pairwise keys are set when /* Allow unencrypted EAPOL messages even if pairwise keys are set when
* not using WPA. IEEE 802.1X specifies that these frames are not * not using WPA. IEEE 802.1X specifies that these frames are not
@@ -2124,14 +2151,26 @@ @@ -2231,7 +2258,11 @@
if (wpa_driver_wext_set_auth_param(drv, if (wpa_driver_wext_set_auth_param(drv,
IW_AUTH_RX_UNENCRYPTED_EAPOL, IW_AUTH_RX_UNENCRYPTED_EAPOL,
allow_unencrypted_eapol) < 0) allow_unencrypted_eapol) < 0)
- ret = -1;
+{ +{
+wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed", __FUNCTION__); +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed", __FUNCTION__);
ret = -1; + ret = -1;
+} +}
+
#ifdef WEXT_MFP_PENDING
#ifdef CONFIG_IEEE80211W
switch (params->mgmt_frame_protection) {
@@ -2250,12 +2281,21 @@
#endif /* CONFIG_IEEE80211W */
#endif /* WEXT_MFP_PENDING */
if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0) if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0)
+{ +{
+wpa_printf(MSG_DEBUG, "%s: assoc failed because set_freq failed", __FUNCTION__); +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_freq failed", __FUNCTION__);
@ -103,7 +110,7 @@ diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplic
return ret; return ret;
} }
@@ -2156,6 +2195,8 @@ @@ -2280,6 +2320,8 @@
res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG, res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG,
algs); algs);
drv->auth_alg_fallback = res == -2; drv->auth_alg_fallback = res == -2;

View File

@ -1,17 +1,16 @@
diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c --- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c
--- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:26.000000000 +0200 +++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c
+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:11.000000000 +0200 @@ -228,12 +228,13 @@
@@ -251,10 +251,12 @@
iwr.u.param.value = value; iwr.u.param.value = value;
if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) { if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) {
- perror("ioctl[SIOCSIWAUTH]");
+ int saved_errno = errno; + int saved_errno = errno;
fprintf(stderr, "WEXT auth param %d value 0x%x - ", if (errno != EOPNOTSUPP) {
idx, value); wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d "
"value 0x%x) failed: %s)",
idx, value, strerror(errno));
}
- ret = errno == EOPNOTSUPP ? -2 : -1; - ret = errno == EOPNOTSUPP ? -2 : -1;
+ errno = saved_errno;
+ perror("ioctl[SIOCSIWAUTH]");
+ ret = saved_errno == EOPNOTSUPP ? -2 : -1; + ret = saved_errno == EOPNOTSUPP ? -2 : -1;
} }

View File

@ -1,3 +1,24 @@
-------------------------------------------------------------------
Tue Sep 2 03:05:49 CEST 2008 - ro@suse.de
- update to 0.6.4
* added support for EAP Sequences in EAP-FAST Phase 2
* added support for using TNC with EAP-FAST
* added driver_ps3 for the PS3 Linux wireless driver
* added support for optional cryptobinding with PEAPv0
* fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
allow fallback to full handshake if server rejects PAC-Opaque
* added fragmentation support for EAP-TNC
* added support for parsing PKCS #8 formatted private keys into the
internal TLS implementation (both PKCS #1 RSA key and PKCS #8
encapsulated RSA key can now be used)
* added option of using faster, but larger, routines in the internal
LibTomMath (for internal TLS implementation) to speed up DH and RSA
calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y)
* fixed race condition between disassociation event and group key
handshake to avoid getting stuck in incorrect state [Bug 261]
* fixed opportunistic key caching (proactive_key_caching)
------------------------------------------------------------------- -------------------------------------------------------------------
Mon Aug 4 12:33:10 CEST 2008 - hschaa@suse.de Mon Aug 4 12:33:10 CEST 2008 - hschaa@suse.de

View File

@ -1,10 +1,17 @@
# #
# spec file for package wpa_supplicant (Version 0.6.3) # spec file for package wpa_supplicant (Version 0.6.4)
# #
# Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany. # Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
# package are under the same license as the package itself.
# #
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via http://bugs.opensuse.org/ # Please submit bugfixes or comments via http://bugs.opensuse.org/
# #
@ -17,7 +24,7 @@ BuildRequires: dbus-1-devel libqt4 libqt4-devel openssl-devel pkg-config readli
BuildRequires: madwifi-devel BuildRequires: madwifi-devel
%endif %endif
Url: http://hostap.epitest.fi/wpa_supplicant/ Url: http://hostap.epitest.fi/wpa_supplicant/
Version: 0.6.3 Version: 0.6.4
Release: 1 Release: 1
License: BSD 3-Clause; GPL v2 or later License: BSD 3-Clause; GPL v2 or later
Group: Productivity/Networking/Other Group: Productivity/Networking/Other
@ -117,6 +124,24 @@ install -m 755 wpa_supplicant/wpa_gui-qt4/wpa_gui %{buildroot}%{_sbindir}
/usr/sbin/wpa_gui /usr/sbin/wpa_gui
%changelog %changelog
* Tue Sep 02 2008 ro@suse.de
- update to 0.6.4
* added support for EAP Sequences in EAP-FAST Phase 2
* added support for using TNC with EAP-FAST
* added driver_ps3 for the PS3 Linux wireless driver
* added support for optional cryptobinding with PEAPv0
* fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to
allow fallback to full handshake if server rejects PAC-Opaque
* added fragmentation support for EAP-TNC
* added support for parsing PKCS #8 formatted private keys into the
internal TLS implementation (both PKCS #1 RSA key and PKCS #8
encapsulated RSA key can now be used)
* added option of using faster, but larger, routines in the internal
LibTomMath (for internal TLS implementation) to speed up DH and RSA
calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y)
* fixed race condition between disassociation event and group key
handshake to avoid getting stuck in incorrect state [Bug 261]
* fixed opportunistic key caching (proactive_key_caching)
* Mon Aug 04 2008 hschaa@suse.de * Mon Aug 04 2008 hschaa@suse.de
- Remove patches that are already upstream - Remove patches that are already upstream
- Rebase patches to new version - Rebase patches to new version