commit 8fc165dcc0e49be6d91af9456b70acf5251d4ce95a05dfdd0fd824b07de1ea0c Author: OBS User unknown Date: Mon Jan 15 23:41:30 2007 +0000 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wpa_supplicant?expand=0&rev=1 diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..9b03811 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,23 @@ +## Default LFS +*.7z filter=lfs diff=lfs merge=lfs -text +*.bsp filter=lfs diff=lfs merge=lfs -text +*.bz2 filter=lfs diff=lfs merge=lfs -text +*.gem filter=lfs diff=lfs merge=lfs -text +*.gz filter=lfs diff=lfs merge=lfs -text +*.jar filter=lfs diff=lfs merge=lfs -text +*.lz filter=lfs diff=lfs merge=lfs -text +*.lzma filter=lfs diff=lfs merge=lfs -text +*.obscpio filter=lfs diff=lfs merge=lfs -text +*.oxt filter=lfs diff=lfs merge=lfs -text +*.pdf filter=lfs diff=lfs merge=lfs -text +*.png filter=lfs diff=lfs merge=lfs -text +*.rpm filter=lfs diff=lfs merge=lfs -text +*.tbz filter=lfs diff=lfs merge=lfs -text +*.tbz2 filter=lfs diff=lfs merge=lfs -text +*.tgz filter=lfs diff=lfs merge=lfs -text +*.ttf filter=lfs diff=lfs merge=lfs -text +*.txz filter=lfs diff=lfs merge=lfs -text +*.whl filter=lfs diff=lfs merge=lfs -text +*.xz filter=lfs diff=lfs merge=lfs -text +*.zip filter=lfs diff=lfs merge=lfs -text +*.zst filter=lfs diff=lfs merge=lfs -text diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..57affb6 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +.osc diff --git a/config b/config new file mode 100644 index 0000000..41d81c1 --- /dev/null +++ b/config @@ -0,0 +1,28 @@ +CONFIG_DRIVER_HOSTAP=y +CONFIG_DRIVER_PRISM54=y +# CONFIG_DRIVER_HERMES +# CONFIG_DRIVER_MADWIFI gets dynamically added when needed +CONFIG_DRIVER_ATMEL=y +CONFIG_DRIVER_WEXT=y +CONFIG_DRIVER_NDISWRAPPER=y +CONFIG_DRIVER_IPW=y +CONFIG_DRIVER_WIRED=y +CONFIG_WIRELESS_EXTENSION=y +CONFIG_IEEE8021X_EAPOL=y +CONFIG_EAP_MD5=y +CONFIG_MSCHAPV2=y +CONFIG_EAP_TLS=y +CONFIG_EAP_PEAP=y +CONFIG_EAP_TTLS=y +CONFIG_EAP_GTC=y +CONFIG_EAP_OTP=y +CONFIG_EAP_PSK=y +CONFIG_EAP_PAX=y +CONFIG_EAP_LEAP=y +CONFIG_PKCS12=y +CONFIG_SMARTCARD=y +CONFIG_CTRL_IFACE=y +CONFIG_READLINE=y +#CONFIG_PCSC +#CONFIG_EAP_SIM +#CONFIG_EAP_AKA diff --git a/ready b/ready new file mode 100644 index 0000000..473a0f4 diff --git a/wpa_supplicant-0.4.9.tar.bz2 b/wpa_supplicant-0.4.9.tar.bz2 new file mode 100644 index 0000000..9c243b8 --- /dev/null +++ b/wpa_supplicant-0.4.9.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3d85a5f73596e13cfedc692c861b7ee18de8bc93ab78f73939813db2dd72f471 +size 373470 diff --git a/wpa_supplicant-ctrl-iface-ap-scan.patch b/wpa_supplicant-ctrl-iface-ap-scan.patch new file mode 100644 index 0000000..5d92019 --- /dev/null +++ b/wpa_supplicant-ctrl-iface-ap-scan.patch @@ -0,0 +1,31 @@ +--- ctrl_iface.c.orig 2005-11-07 23:12:50.000000000 -0500 ++++ ctrl_iface.c 2006-01-09 11:26:55.000000000 -0500 +@@ -930,6 +930,18 @@ + } + + ++static int wpa_supplicant_ctrl_iface_ap_scan(struct wpa_supplicant *wpa_s, ++ char *cmd) ++{ ++ int ap_scan = atoi (cmd); ++ ++ if (ap_scan < 0 || ap_scan > 2) ++ return -1; ++ wpa_s->conf->ap_scan = ap_scan; ++ return 0; ++} ++ ++ + static void wpa_supplicant_ctrl_iface_receive(int sock, void *eloop_ctx, + void *sock_ctx) + { +@@ -1064,6 +1076,9 @@ + } else if (strncmp(buf, "GET_CAPABILITY ", 15) == 0) { + reply_len = wpa_supplicant_ctrl_iface_get_capability( + wpa_s, buf + 15, reply, reply_size); ++ } else if (strncmp(buf, "AP_SCAN ", 8) == 0) { ++ if (wpa_supplicant_ctrl_iface_ap_scan(wpa_s, buf + 8)) ++ reply_len = -1; + } else { + memcpy(reply, "UNKNOWN COMMAND\n", 16); + reply_len = 16; diff --git a/wpa_supplicant-driver-ssid-len.patch b/wpa_supplicant-driver-ssid-len.patch new file mode 100644 index 0000000..b8cb59a --- /dev/null +++ b/wpa_supplicant-driver-ssid-len.patch @@ -0,0 +1,13 @@ +--- wpa_supplicant.c.ssid-len 2006-01-10 00:13:09.000000000 -0500 ++++ wpa_supplicant.c 2006-01-10 00:16:26.000000000 -0500 +@@ -1429,6 +1429,10 @@ + } + ssid_len = res; + ++ /* Some drivers NULL the end and add one to the length */ ++ if (ssid[ssid_len - 1] == '\0') ++ ssid_len--; ++ + if (wpa_drv_get_bssid(wpa_s, bssid) < 0) { + wpa_printf(MSG_WARNING, "Could not read BSSID from driver."); + return NULL; diff --git a/wpa_supplicant-iw_encode_temp.diff b/wpa_supplicant-iw_encode_temp.diff new file mode 100644 index 0000000..f31705b --- /dev/null +++ b/wpa_supplicant-iw_encode_temp.diff @@ -0,0 +1,28 @@ +Index: wpa_supplicant-0.4.8/driver_wext.c +=================================================================== +--- wpa_supplicant-0.4.8.orig/driver_wext.c 2006-07-13 11:23:05.000000000 +0200 ++++ wpa_supplicant-0.4.8/driver_wext.c 2006-07-13 11:23:57.000000000 +0200 +@@ -1280,6 +1280,7 @@ static int wpa_driver_wext_set_key_ext(v + memset(&iwr, 0, sizeof(iwr)); + strncpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); + iwr.u.encoding.flags = key_idx + 1; ++ iwr.u.encoding.flags |= IW_ENCODE_TEMP; + if (alg == WPA_ALG_NONE) + iwr.u.encoding.flags |= IW_ENCODE_DISABLED; + iwr.u.encoding.pointer = (caddr_t) ext; +@@ -1401,6 +1402,7 @@ int wpa_driver_wext_set_key(void *priv, + memset(&iwr, 0, sizeof(iwr)); + strncpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); + iwr.u.encoding.flags = key_idx + 1; ++ iwr.u.encoding.flags |= IW_ENCODE_TEMP; + if (alg == WPA_ALG_NONE) + iwr.u.encoding.flags |= IW_ENCODE_DISABLED; + iwr.u.encoding.pointer = (caddr_t) key; +@@ -1415,6 +1417,7 @@ int wpa_driver_wext_set_key(void *priv, + memset(&iwr, 0, sizeof(iwr)); + strncpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); + iwr.u.encoding.flags = key_idx + 1; ++ iwr.u.encoding.flags |= IW_ENCODE_TEMP; + iwr.u.encoding.pointer = (caddr_t) NULL; + iwr.u.encoding.length = 0; + if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) { diff --git a/wpa_supplicant-wep_key_fix.dif b/wpa_supplicant-wep_key_fix.dif new file mode 100644 index 0000000..50e3653 --- /dev/null +++ b/wpa_supplicant-wep_key_fix.dif @@ -0,0 +1,13 @@ +Index: wpa_supplicant-0.4.8/driver_wext.c +=================================================================== +--- wpa_supplicant-0.4.8.orig/driver_wext.c ++++ wpa_supplicant-0.4.8/driver_wext.c +@@ -1415,7 +1415,7 @@ int wpa_driver_wext_set_key(void *priv, + memset(&iwr, 0, sizeof(iwr)); + strncpy(iwr.ifr_name, drv->ifname, IFNAMSIZ); + iwr.u.encoding.flags = key_idx + 1; +- iwr.u.encoding.pointer = (caddr_t) key; ++ iwr.u.encoding.pointer = (caddr_t) NULL; + iwr.u.encoding.length = 0; + if (ioctl(drv->ioctl_sock, SIOCSIWENCODE, &iwr) < 0) { + perror("ioctl[SIOCSIWENCODE] (set_tx)"); diff --git a/wpa_supplicant.changes b/wpa_supplicant.changes new file mode 100644 index 0000000..622aa3e --- /dev/null +++ b/wpa_supplicant.changes @@ -0,0 +1,434 @@ +------------------------------------------------------------------- +Mon Nov 6 16:29:14 CET 2006 - jg@suse.de + +- set IW_ENCODE_TEMP flag (needed to use dynamic WEP with airo + driver, bug 185528) + +------------------------------------------------------------------- +Fri Oct 6 11:52:37 CEST 2006 - jg@suse.de + +- update to 0.4.9: + * fixed EAPOL re-authentication for sessions that used PMKSA + caching + * reject WPA/WPA2 message 3/4 if it does not include any valid + WPA/RSN IE + * driver_wext: added support for WE-21 change to SSID configuration + * driver_wext: fixed privacy configuration for static WEP keys mode + [Bug 140] + * driver_wext: added fallback to use SIOCSIWENCODE for setting + auth_alg if the driver does not support SIOCSIWAUTH + +------------------------------------------------------------------- +Fri Mar 24 19:08:20 CET 2006 - jg@suse.de + +- fixed static WEP key usage (bug 144268) + +------------------------------------------------------------------- +Thu Feb 16 10:04:31 CET 2006 - jg@suse.de + +- update to 0.4.8 (bug 151151) + * added support for EAP-FAST key derivation using other ciphers than + RC4-128-SHA for authentication and AES128-SHA for provisioning + * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to + decrypt AT_ENCR_DATA attributes correctly + * added support for configuring CA certificate as DER file and as a + configuration blob + * fixed private key configuration as configuration blob and added + support for using PKCS#12 as a blob + * added support for loading trusted CA certificates from Windows + certificate store: ca_cert="cert_store://", where is + likely CA (Intermediate CA certificates) or ROOT (root certificates) + * fixed TLS library deinitialization after RSN pre-authentication not + to disable TLS library for normal authentication + * fixed PMKSA cache processing not to trigger deauthentication if the + current PMKSA cache entry is replaced with a valid new entry + * fixed PC/SC initialization for ap_scan != 1 modes (this fixes + EAP-SIM and EAP-AKA with real SIM/USIM card when using ap_scan=0 or + ap_scan=2) + * do not try to use USIM APDUs when initializing PC/SC for SIM card + access for a network that has not enabled EAP-AKA + +------------------------------------------------------------------- +Sun Feb 5 18:34:21 CET 2006 - ro@suse.de + +- removed km_wlan from BuildRequires + +------------------------------------------------------------------- +Wed Jan 25 21:42:51 CET 2006 - mls@suse.de + +- converted neededforbuild to BuildRequires + +------------------------------------------------------------------- +Tue Jan 17 19:32:07 CET 2006 - rml@suse.de + +- Add patch (from upstream) fixing bad drivers that NULL out + the SSID and send the wrong length. + +------------------------------------------------------------------- +Tue Jan 10 12:27:27 CET 2006 - jg@suse.de + +- added AP scan mode selection via control interface (patch + from rml@novell.com) + +------------------------------------------------------------------- +Mon Nov 21 12:41:52 CET 2005 - jg@suse.de + +- update to 0.4.7, changes (shortened): + * l2_packet_pcap: fixed wired IEEE 802.1X authentication with + libpcap and WinPcap to receive frames sent to PAE group address + * disable EAP state machine when IEEE 802.1X authentication is + not used in order to get rid of bogus "EAP failed" messages + * fixed OpenSSL error reporting to go through all pending errors + to avoid confusing reports of old errors being reported at + later point during handshake + * fixed configuration file updating to not write empty variables + (e.g., proto or key_mgmt) that the file parser would not accept + * fixed ADD_NETWORK ctrl_iface command to use the same default + values for variables as empty network definitions read from + config file would get + * fixed EAP state machine to not discard EAP-Failure messages in + many cases (e.g., during TLS handshake) + * fixed a infinite loop in private key reading if the configured + file cannot be parsed successfully + * driver_madwifi: added support for madwifi-ng + * wpa_gui: do not display password/PSK field contents + * wpa_gui: added CA certificate configuration + * use longer timeout for IEEE 802.11 association to avoid problems + with drivers that may take more than five second to associate +- dropped obsolete madwifi patch +- dropped obsolete copy of wireless.h +- updated config file +- use $RPM_OPT_FLAGS and %jobs +- created subpackage wpa_supplicant-gui containing wpa_gui + +------------------------------------------------------------------- +Tue Nov 8 15:22:13 CET 2005 - jg@suse.de + +- do not build as root + +------------------------------------------------------------------- +Fri Nov 4 18:16:50 CET 2005 - jg@suse.de + +- added support for madwifi-ng +- compiling against Wireless Extensions v19 +- removed obsolete config option CONFIG_XSUPPLICANT_IFACE + +------------------------------------------------------------------- +Fri Oct 28 12:25:59 CEST 2005 - jg@suse.de + +- update to 0.4.6, changes (shortened): + * allow fallback to WPA, if mixed WPA+WPA2 networks have mismatch + in RSN IE, but WPA IE would match with wpa_supplicant + configuration + * added support for named configuration blobs in order to avoid + having to use file system for external files (e.g., certificates) + * fixed RSN pre-authentication + * driver_madwifi: set IEEE80211_KEY_GROUP flag for group keys to + make sure the driver configures broadcast decryption correctly + * added ca_path (and ca_path2) configuration variables that can be + used to configure OpenSSL CA path, e.g., /etc/ssl/certs, for + using the system-wide trusted CA list + * added support for starting wpa_supplicant without a configuration + file + * added global control interface that can be optionally used for + adding and removing network interfaces dynamically + * wpa_gui: + - try to save configuration whenever something is modified + - added WEP key configuration + - added possibility to edit the current network configuration + * driver_ndis: fixed driver polling not to increase frequency on + each received EAPOL frame due to incorrectly cancelled timeout + * fixed driver_wext.c to filter wireless events based on ifindex + to avoid interfaces receiving events from other interfaces + * delay sending initial EAPOL-Start couple of seconds to speed + up authentication for the most common case of Authenticator + starting EAP authentication immediately after association + +------------------------------------------------------------------- +Thu Oct 13 16:40:44 CEST 2005 - jg@suse.de + +- update to 0.4.5, changes (shortened): + * added a workaround for clearing keys with ndiswrapper to allow + roaming from WPA enabled AP to plaintext one + * l2_packet_linux: use socket type SOCK_DGRAM instead of SOCK_RAW + for PF_PACKET in order to prepare for network devices that do + not use Ethernet headers (e.g., network stack with native IEEE + 802.11 frames) + * use receipt of EAPOL-Key frame as a lower layer success indication + for EAP state machine to allow recovery from dropped EAP-Success + frame + * driver_wext: add support for WE-19 + * added support for multiple configuration backends (CONFIG_BACKEND + option); currently, only 'file' is supported (i.e., the format used + in wpa_supplicant.conf) + * added support for updating configuration ('wpa_cli save_config') + * added GET_NETWORK ctrl_iface command + +------------------------------------------------------------------- +Mon Aug 29 15:26:27 CEST 2005 - jg@suse.de + +- update to 0.4.4 (bug 112977), changes (shortened): + * replaced OpenSSL patch for EAP-FAST support + (openssl-tls-extensions.patch) with a more generic and correct + patch + * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be + used with drivers that do not support WPA + * added support for enabling/disabling networks from the list of + all configured networks + * added support for adding and removing network from the current + configuration + * added support for setting network configuration parameters + through the control interface + * fixed parsing of strings that include both " and # within double + quoted area (e.g., "start"#end") + * removed interface for external EAPOL/EAP supplicant + * fixed build with CONFIG_DNET_PCAP=y on Linux + * l2_packet: moved different implementations into separate files + * added support for using ap_scan=2 mode with multiple network + blocks + * fixed a potential issue in RSN pre-authentication ending up using + freed memory if pre-authentication times out + * added support for querying private key password (EAP-TLS) through + the control interface (wpa_cli/wpa_gui) if one is not included in + the configuration file + * driver_broadcom: fixed couple of memory leaks in scan result + processing + * EAP-PAX is now registered as EAP type 46 + * fixed EAP-PAX MAC calculation + * fixed EAP-PAX CK and ICK key derivation + * added support for using password with EAP-PAX + * added support for arbitrary driver interface parameters through the + configuration file with a new driver_param field + * added possibility to override l2_packet module with driver + interface API (new send_eapol handler) + * fixed ctrl_interface_group processing for the case where gid is + entered as a number, not group name + * driver_test: added support for testing hostapd with wpa_supplicant + by using test driver interface without any kernel drivers or + network cards + * added support for EAP-MSCHAPv2 password retries within the same + EAP authentication session + * added support for password changes with EAP-MSCHAPv2 + * added support for reading additional certificates from PKCS#12 + files and adding them to the certificate chain + * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys + were used + * display EAP Notification messages to user through control + interface with "CTRL-EVENT-EAP-NOTIFICATION" prefix + * added 'disconnect' command to control interface for setting + wpa_supplicant in state where it will not associate before + 'reassociate' command has been used + * added support for getting scan results through control interface + * added support for wired authentication (IEEE 802.1X on wired + Ethernet); driver interface 'wired' + * added support for sending TLS alerts + * added support for 'any' SSID wildcard; if ssid is not configured or + is set to an empty string, any SSID will be accepted for non-WPA AP + * added support for asking PIN (for SIM) from frontends (e.g., + wpa_cli); + * added support for using external devices (e.g., a smartcard) for + private key operations in EAP-TLS (CONFIG_SMARTCARD=y in .config); + * added experimental support for EAP-PAX + * added monitor mode for wpa_cli + +------------------------------------------------------------------- +Mon Jul 11 15:46:53 CEST 2005 - jg@suse.de + +- update to 0.3.9, changes: + * modified the EAP workaround that accepts EAP-Success with + incorrect Identifier to be even less strict about verification + in order to interoperate with some authentication servers + * fixed RSN IE in 4-Way Handshake message 2/4 for the case where + Authenticator rejects PMKSA caching attempt and the driver is + not using assoc_info events + * fixed a possible double free in EAP-TTLS fast-reauthentication + when identity or password is entered through control interface + * added -P argument for wpa_supplicant to write the + current process id into a file + * driver_madwifi: fixed association in plaintext mode + * driver_madwifi: added preliminary support for compiling against + 'BSD' branch of madwifi CVS tree + * added EAP workaround for PEAPv1 session resumption: allow outer, + i.e., not tunneled, EAP-Success to terminate session since; this + can be disabled with eap_workaround=0 + * driver_ipw: updated driver structures to match with ipw2200-1.0.4 + (note: ipw2100-1.1.0 is likely to require an update to work with + this) + * driver_broadcom: fixed couple of memory leaks in scan result + processing +- removed pidfile patch in favour of the new upstream + implementation + +------------------------------------------------------------------- +Mon Mar 21 11:36:26 CET 2005 - jg@suse.de + +- creating directory /var/run/wpa_supplicant when needed (bug 74023) + +------------------------------------------------------------------- +Mon Feb 14 09:58:59 CET 2005 - jg@suse.de + +- update to 0.3.8, changes: + * fixed EAPOL-Key validation to drop packets with invalid Key + Data Length; such frames could have crashed wpa_supplicant due + to buffer overflow + +------------------------------------------------------------------- +Mon Feb 7 17:00:37 CET 2005 - jg@suse.de + +- update to 0.3.7-pre, changes: + * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake + when using drivers that take care of AP selection (e.g., when + using ap_scan=2) + * fixed reprocessing of pending request after ctrl_iface requests + for identity/password/otp + * fixed ctrl_iface requests for identity/password/otp in Phase 2 + of EAP-PEAP and EAP-TTLS + * all drivers using driver_wext: set interface up and select + Managed mode when starting wpa_supplicant; set interface down + when exiting + * renamed driver_ipw2100.c to driver_ipw.c since it now supports + both ipw2100 and ipw2200 + * fixed a busy loop introduced in v0.3.5 for scan result + processing when no matching AP is found + * added a workaround for an interoperability issue with a Cisco AP + when using WPA2-PSK + * fixed non-WPA IEEE 802.1X to use the same authentication timeout + as WPA with IEEE 802.1X + * fixed issues with 64-bit CPUs and SHA1 cleanup in previous + version (e.g., segfault when processing EAPOL-Key frames) + * fixed EAP workaround and fast reauthentication configuration for + RSN pre-authentication + * added support for blacklisting APs that fail or timeout + authentication in ap_scan=1 mode so that all APs are tried in + cases where the ones with strongest signal level are failing + authentication + * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS + authentication attempt + * added preliminary support for IBSS (ad-hoc) mode configuration + * added optional support for GNU Readline and History Libraries + for wpa_cli (CONFIG_READLINE) + * added couple of workarounds for interoperability issues with a + Cisco AP when using WPA2 + * fixed private key loading for cases where passphrase is not set + * improved recovery from PMKID mismatches by requesting full EAP + authentication in case of failed PMKSA caching attempt + * driver_ndis: added support for NDIS NdisMIncidateStatus() events + * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys + * added support for driver interfaces to replace the interface + name based on driver/OS specific mapping, e.g., in case of + driver_ndis, this allows the beginning of the adapter + description to be used as the interface name + * driver_ndis: enable radio before starting scanning, disable + radio when exiting + * added KEY_MGMT_802_1X_NO_WPA as a new key_mgmt type so that + driver interface can distinguish plaintext and IEEE 802.1X + (no WPA) authentication + * fixed static WEP key configuration to use broadcast/default type + for all keys + * driver_ndis: added legacy WPA capability detection for non-WPA2 + drivers + * added support for setting static WEP keys for IEEE 802.1X + without dynamic WEP keying (eapol_flags=0) + * added support for reading PKCS#12 (PFX) files (as a replacement + for PEM/DER) to get certificate and private key (CONFIG_PKCS12) + * added new ap_scan mode, ap_scan=2, for drivers that take care of + association, but need to be configured with security policy and + SSID, e.g., ndiswrapper and NDIS driver + +------------------------------------------------------------------- +Thu Jan 13 12:32:51 CET 2005 - jg@suse.de + +- update to 0.2.6, changes: + * added driver interface for Intel ipw2100 driver + * fixed a bug in PMKSA cache processing: skip sending of + EAPOL-Start only if there is a PMKSA cache entry for the + current AP + * fixed error handling for case where reading of scan results + fails: must schedule a new scan or wpa_supplicant will remain + waiting forever + * set pairwise/group cipher suite for non-WPA IEEE 802.1X to + WEP-104 if keys are not configured to be used; this fixes + IEEE 802.1X mode with drivers that use this information to + configure whether Privacy bit can be in Beacon frames + (e.g., ndiswrapper) + * improved downgrade attack detection in IE verification of + msg 3/4: verify both WPA and RSN IEs, if present, not only the + selected one; reject the AP if an RSN IE is found in msg 3/4, + but not in Beacon or Probe Response frame, and RSN is enabled in + wpa_supplicant configuration + * fixed WPA msg 3/4 processing to allow Key Data field contain + other IEs than just one WPA IE + * modified association event handler to set portEnabled = FALSE + before clearing port Valid in order to reset EAP state machine + and avoid problems with new authentication getting ignored because + of state machines ending up in AUTHENTICATED/SUCCESS state based + on old information +- removed obsolete ipw2100 patch +- added wpa_supplicant.fig to filelist + +------------------------------------------------------------------- +Fri Oct 22 12:47:44 CEST 2004 - jg@suse.de + +- update to 0.2.5, changes: + * wpa_cli: fixed parsing of -p command line argument + * fixed parsing of wep_tx_keyidx + * fixed couple of errors in PCSC handling that could have caused + random-looking errors for EAP-SIM + * PEAPv1: fixed tunneled EAP-Success reply handling to reply with + TLS ACK, not tunneled EAP-Success + * PEAPv1: added support for terminating PEAP authentication on + tunneled EAP-Success message + * PEAPv1: changed phase1 option peaplabel to use default to 0, i.e., + to the old label for key derivation; previously, the default was 1, + but it looks like most existing PEAPv1 implementations use the old + label which is thus more suitable default option + * changed SSID configuration in driver_wext.c (used by many driver + interfaces) to use ssid_len+1 as the length for SSID since some + Linux drivers expect this + * fixed couple of unaligned reads in scan result parsing to fix WPA + connection on some platforms (e.g., ARM) +- disabled madwifi support on ppc + +------------------------------------------------------------------- +Wed Sep 29 00:36:22 CEST 2004 - jg@suse.de + +- added support for ipw2100 driver + +------------------------------------------------------------------- +Tue Aug 31 16:57:27 CEST 2004 - jg@suse.de + +- added support for writing pid-file + +------------------------------------------------------------------- +Mon Aug 2 18:52:39 CEST 2004 - jg@suse.de + +- fixed build on non-x86 platforms + +------------------------------------------------------------------- +Mon Aug 2 17:35:57 CEST 2004 - jg@suse.de + +- update to version 0.2.4, important changes: + - support for new EAP authentication methods: + EAP-TTLS/EAP-MD5-Challenge + EAP-TTLS/EAP-GTC + EAP-TTLS/EAP-MSCHAPv2 + EAP-TTLS/EAP-TLS + EAP-TTLS/MSCHAPv2 + EAP-TTLS/MSCHAP + EAP-TTLS/PAP + EAP-TTLS/CHAP + EAP-PEAP/TLS + EAP-PEAP/GTC + EAP-PEAP/MD5-Challenge + EAP-GTC + EAP-TTLS/EAP-OTP, EAP-PEAPv0/OTP, EAP-PEAPv1/OTP, EAP-OTP + - support for ATMEL AT76C5XXX driver + - support for madwifi driver + - lots of minor changes, see ChangeLog +- added km_wlan to needforbuild (driver source of madwifi is + needed) + +------------------------------------------------------------------- +Thu Jun 17 14:40:13 CEST 2004 - jg@suse.de + +- Initial package diff --git a/wpa_supplicant.dif b/wpa_supplicant.dif new file mode 100644 index 0000000..16ee788 --- /dev/null +++ b/wpa_supplicant.dif @@ -0,0 +1,84 @@ +Index: Makefile +=================================================================== +--- Makefile.orig ++++ Makefile +@@ -6,6 +6,8 @@ ifndef CFLAGS + CFLAGS = -MMD -O2 -Wall -g + endif + ++MADWIFI_SOURCE=$(shell echo /usr/include/madwifi-*) ++ + # Include directories for CVS version + CFLAGS += -I. -I../utils -I../hostapd + +@@ -79,7 +81,7 @@ CONFIG_WIRELESS_EXTENSION=y + endif + + ifdef CONFIG_DRIVER_MADWIFI +-CFLAGS += -DCONFIG_DRIVER_MADWIFI ++CFLAGS += -DCONFIG_DRIVER_MADWIFI -I$(MADWIFI_SOURCE) + OBJS_d += driver_madwifi.o + CONFIG_WIRELESS_EXTENSION=y + endif +Index: driver_atmel.c +=================================================================== +--- driver_atmel.c.orig ++++ driver_atmel.c +@@ -44,6 +44,7 @@ + #include + #include + #include ++#include + #include + + #include "wireless_copy.h" +Index: driver_hostap.c +=================================================================== +--- driver_hostap.c.orig ++++ driver_hostap.c +@@ -17,6 +17,7 @@ + #include + #include + #include ++#include + #include + + #include "wireless_copy.h" +Index: driver_prism54.c +=================================================================== +--- driver_prism54.c.orig ++++ driver_prism54.c +@@ -18,6 +18,7 @@ + #include + #include + #include ++#include + #include + + #include "wireless_copy.h" +Index: driver_madwifi.c +=================================================================== +--- driver_madwifi.c.orig ++++ driver_madwifi.c +@@ -18,7 +18,9 @@ + #include + #include + #include ++#include + #include ++#include + + #include "common.h" + #include "driver.h" +Index: driver_ipw.c +=================================================================== +--- driver_ipw.c.orig ++++ driver_ipw.c +@@ -19,6 +19,7 @@ + #include + #include + #include ++#include + #include + + #include "wireless_copy.h" diff --git a/wpa_supplicant.spec b/wpa_supplicant.spec new file mode 100644 index 0000000..e14d250 --- /dev/null +++ b/wpa_supplicant.spec @@ -0,0 +1,456 @@ +# +# spec file for package wpa_supplicant (Version 0.4.9) +# +# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany. +# This file and all modifications and additions to the pristine +# package are under the same license as the package itself. +# +# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# + +# norootforbuild + +Name: wpa_supplicant +BuildRequires: libdrm-devel libjpeg-devel openssl-devel qt3-devel readline-devel update-desktop-files +%ifarch %ix86 x86_64 +BuildRequires: madwifi-devel +%endif +URL: http://hostap.epitest.fi/ +Version: 0.4.9 +Release: 16 +License: BSD License and BSD-like, GNU General Public License (GPL) - all versions +Group: Productivity/Networking/Other +Summary: WPA supplicant implementation +Source: http://hostap.epitest.fi/releases/wpa_supplicant-%{version}.tar.bz2 +Source1: config +Patch0: wpa_supplicant.dif +Patch1: wpa_supplicant-ctrl-iface-ap-scan.patch +Patch2: wpa_supplicant-driver-ssid-len.patch +Patch3: wpa_supplicant-wep_key_fix.dif +Patch4: wpa_supplicant-iw_encode_temp.diff +BuildRoot: %{_tmppath}/%{name}-%{version}-build + +%description +wpa_supplicant is an implementation of the WPA Supplicant component, +i.e., the part that runs in the client stations. It implements key +negotiation with a WPA Authenticator and it controls the roaming and +IEEE 802.11 authentication/association of the wlan driver. + + + +Authors: +-------- + Jouni Malinen + +%package gui +Summary: WPA supplicant graphical front-end +Requires: wpa_supplicant +Group: System/Monitoring + +%description gui +This package contains a graphical front-end to wpa_supplicant, an +implementation of the WPA Supplicant component. + + + +Authors: +-------- + Jouni Malinen + +%prep +%setup -n wpa_supplicant-%{version} +%patch0 +%patch1 +%patch2 +%patch3 -p1 +%patch4 -p1 +cp %{SOURCE1} .config + +%build +%ifarch %ix86 x86_64 +echo CONFIG_DRIVER_MADWIFI=y >>.config +%endif +CFLAGS="$RPM_OPT_FLAGS" make %{?jobs:-j%jobs} +cd wpa_gui +/usr/lib/qt3/bin/qmake +make %{?jobs:-j%jobs} + +%install +mkdir -p %{buildroot}%{_sbindir} +install -m 755 wpa_cli %{buildroot}%{_sbindir} +install -m 755 wpa_passphrase %{buildroot}%{_sbindir} +install -m 755 wpa_supplicant %{buildroot}%{_sbindir} +install -m 755 wpa_gui/wpa_gui %{buildroot}%{_sbindir} + +%files +%defattr(-,root,root) +%doc ChangeLog COPYING README todo.txt doc/wpa_supplicant.fig examples wpa_supplicant.conf +%{_sbindir}/wpa_cli +%{_sbindir}/wpa_passphrase +%{_sbindir}/wpa_supplicant + +%files gui +%defattr(-,root,root) +/usr/sbin/wpa_gui + +%changelog -n wpa_supplicant +* Mon Nov 06 2006 - jg@suse.de +- set IW_ENCODE_TEMP flag (needed to use dynamic WEP with airo + driver, bug 185528) +* Fri Oct 06 2006 - jg@suse.de +- update to 0.4.9: + * fixed EAPOL re-authentication for sessions that used PMKSA + caching + * reject WPA/WPA2 message 3/4 if it does not include any valid + WPA/RSN IE + * driver_wext: added support for WE-21 change to SSID configuration + * driver_wext: fixed privacy configuration for static WEP keys mode + [Bug 140] + * driver_wext: added fallback to use SIOCSIWENCODE for setting + auth_alg if the driver does not support SIOCSIWAUTH +* Fri Mar 24 2006 - jg@suse.de +- fixed static WEP key usage (bug 144268) +* Thu Feb 16 2006 - jg@suse.de +- update to 0.4.8 (bug 151151) + * added support for EAP-FAST key derivation using other ciphers than + RC4-128-SHA for authentication and AES128-SHA for provisioning + * fixed EAP-SIM and EAP-AKA pseudonym and fast re-authentication to + decrypt AT_ENCR_DATA attributes correctly + * added support for configuring CA certificate as DER file and as a + configuration blob + * fixed private key configuration as configuration blob and added + support for using PKCS#12 as a blob + * added support for loading trusted CA certificates from Windows + certificate store: ca_cert="cert_store://", where is + likely CA (Intermediate CA certificates) or ROOT (root certificates) + * fixed TLS library deinitialization after RSN pre-authentication not + to disable TLS library for normal authentication + * fixed PMKSA cache processing not to trigger deauthentication if the + current PMKSA cache entry is replaced with a valid new entry + * fixed PC/SC initialization for ap_scan != 1 modes (this fixes + EAP-SIM and EAP-AKA with real SIM/USIM card when using ap_scan=0 or + ap_scan=2) + * do not try to use USIM APDUs when initializing PC/SC for SIM card + access for a network that has not enabled EAP-AKA +* Sun Feb 05 2006 - ro@suse.de +- removed km_wlan from BuildRequires +* Wed Jan 25 2006 - mls@suse.de +- converted neededforbuild to BuildRequires +* Tue Jan 17 2006 - rml@suse.de +- Add patch (from upstream) fixing bad drivers that NULL out + the SSID and send the wrong length. +* Tue Jan 10 2006 - jg@suse.de +- added AP scan mode selection via control interface (patch + from rml@novell.com) +* Mon Nov 21 2005 - jg@suse.de +- update to 0.4.7, changes (shortened): + * l2_packet_pcap: fixed wired IEEE 802.1X authentication with + libpcap and WinPcap to receive frames sent to PAE group address + * disable EAP state machine when IEEE 802.1X authentication is + not used in order to get rid of bogus "EAP failed" messages + * fixed OpenSSL error reporting to go through all pending errors + to avoid confusing reports of old errors being reported at + later point during handshake + * fixed configuration file updating to not write empty variables + (e.g., proto or key_mgmt) that the file parser would not accept + * fixed ADD_NETWORK ctrl_iface command to use the same default + values for variables as empty network definitions read from + config file would get + * fixed EAP state machine to not discard EAP-Failure messages in + many cases (e.g., during TLS handshake) + * fixed a infinite loop in private key reading if the configured + file cannot be parsed successfully + * driver_madwifi: added support for madwifi-ng + * wpa_gui: do not display password/PSK field contents + * wpa_gui: added CA certificate configuration + * use longer timeout for IEEE 802.11 association to avoid problems + with drivers that may take more than five second to associate +- dropped obsolete madwifi patch +- dropped obsolete copy of wireless.h +- updated config file +- use $RPM_OPT_FLAGS and %%jobs +- created subpackage wpa_supplicant-gui containing wpa_gui +* Tue Nov 08 2005 - jg@suse.de +- do not build as root +* Fri Nov 04 2005 - jg@suse.de +- added support for madwifi-ng +- compiling against Wireless Extensions v19 +- removed obsolete config option CONFIG_XSUPPLICANT_IFACE +* Fri Oct 28 2005 - jg@suse.de +- update to 0.4.6, changes (shortened): + * allow fallback to WPA, if mixed WPA+WPA2 networks have mismatch + in RSN IE, but WPA IE would match with wpa_supplicant + configuration + * added support for named configuration blobs in order to avoid + having to use file system for external files (e.g., certificates) + * fixed RSN pre-authentication + * driver_madwifi: set IEEE80211_KEY_GROUP flag for group keys to + make sure the driver configures broadcast decryption correctly + * added ca_path (and ca_path2) configuration variables that can be + used to configure OpenSSL CA path, e.g., /etc/ssl/certs, for + using the system-wide trusted CA list + * added support for starting wpa_supplicant without a configuration + file + * added global control interface that can be optionally used for + adding and removing network interfaces dynamically + * wpa_gui: + - try to save configuration whenever something is modified + - added WEP key configuration + - added possibility to edit the current network configuration + * driver_ndis: fixed driver polling not to increase frequency on + each received EAPOL frame due to incorrectly cancelled timeout + * fixed driver_wext.c to filter wireless events based on ifindex + to avoid interfaces receiving events from other interfaces + * delay sending initial EAPOL-Start couple of seconds to speed + up authentication for the most common case of Authenticator + starting EAP authentication immediately after association +* Thu Oct 13 2005 - jg@suse.de +- update to 0.4.5, changes (shortened): + * added a workaround for clearing keys with ndiswrapper to allow + roaming from WPA enabled AP to plaintext one + * l2_packet_linux: use socket type SOCK_DGRAM instead of SOCK_RAW + for PF_PACKET in order to prepare for network devices that do + not use Ethernet headers (e.g., network stack with native IEEE + 802.11 frames) + * use receipt of EAPOL-Key frame as a lower layer success indication + for EAP state machine to allow recovery from dropped EAP-Success + frame + * driver_wext: add support for WE-19 + * added support for multiple configuration backends (CONFIG_BACKEND + option); currently, only 'file' is supported (i.e., the format used + in wpa_supplicant.conf) + * added support for updating configuration ('wpa_cli save_config') + * added GET_NETWORK ctrl_iface command +* Mon Aug 29 2005 - jg@suse.de +- update to 0.4.4 (bug 112977), changes (shortened): + * replaced OpenSSL patch for EAP-FAST support + (openssl-tls-extensions.patch) with a more generic and correct + patch + * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be + used with drivers that do not support WPA + * added support for enabling/disabling networks from the list of + all configured networks + * added support for adding and removing network from the current + configuration + * added support for setting network configuration parameters + through the control interface + * fixed parsing of strings that include both " and # within double + quoted area (e.g., "start"#end") + * removed interface for external EAPOL/EAP supplicant + * fixed build with CONFIG_DNET_PCAP=y on Linux + * l2_packet: moved different implementations into separate files + * added support for using ap_scan=2 mode with multiple network + blocks + * fixed a potential issue in RSN pre-authentication ending up using + freed memory if pre-authentication times out + * added support for querying private key password (EAP-TLS) through + the control interface (wpa_cli/wpa_gui) if one is not included in + the configuration file + * driver_broadcom: fixed couple of memory leaks in scan result + processing + * EAP-PAX is now registered as EAP type 46 + * fixed EAP-PAX MAC calculation + * fixed EAP-PAX CK and ICK key derivation + * added support for using password with EAP-PAX + * added support for arbitrary driver interface parameters through the + configuration file with a new driver_param field + * added possibility to override l2_packet module with driver + interface API (new send_eapol handler) + * fixed ctrl_interface_group processing for the case where gid is + entered as a number, not group name + * driver_test: added support for testing hostapd with wpa_supplicant + by using test driver interface without any kernel drivers or + network cards + * added support for EAP-MSCHAPv2 password retries within the same + EAP authentication session + * added support for password changes with EAP-MSCHAPv2 + * added support for reading additional certificates from PKCS#12 + files and adding them to the certificate chain + * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys + were used + * display EAP Notification messages to user through control + interface with "CTRL-EVENT-EAP-NOTIFICATION" prefix + * added 'disconnect' command to control interface for setting + wpa_supplicant in state where it will not associate before + 'reassociate' command has been used + * added support for getting scan results through control interface + * added support for wired authentication (IEEE 802.1X on wired + Ethernet); driver interface 'wired' + * added support for sending TLS alerts + * added support for 'any' SSID wildcard; if ssid is not configured or + is set to an empty string, any SSID will be accepted for non-WPA AP + * added support for asking PIN (for SIM) from frontends (e.g., + wpa_cli); + * added support for using external devices (e.g., a smartcard) for + private key operations in EAP-TLS (CONFIG_SMARTCARD=y in .config); + * added experimental support for EAP-PAX + * added monitor mode for wpa_cli +* Mon Jul 11 2005 - jg@suse.de +- update to 0.3.9, changes: + * modified the EAP workaround that accepts EAP-Success with + incorrect Identifier to be even less strict about verification + in order to interoperate with some authentication servers + * fixed RSN IE in 4-Way Handshake message 2/4 for the case where + Authenticator rejects PMKSA caching attempt and the driver is + not using assoc_info events + * fixed a possible double free in EAP-TTLS fast-reauthentication + when identity or password is entered through control interface + * added -P argument for wpa_supplicant to write the + current process id into a file + * driver_madwifi: fixed association in plaintext mode + * driver_madwifi: added preliminary support for compiling against + 'BSD' branch of madwifi CVS tree + * added EAP workaround for PEAPv1 session resumption: allow outer, + i.e., not tunneled, EAP-Success to terminate session since; this + can be disabled with eap_workaround=0 + * driver_ipw: updated driver structures to match with ipw2200-1.0.4 + (note: ipw2100-1.1.0 is likely to require an update to work with + this) + * driver_broadcom: fixed couple of memory leaks in scan result + processing +- removed pidfile patch in favour of the new upstream + implementation +* Mon Mar 21 2005 - jg@suse.de +- creating directory /var/run/wpa_supplicant when needed (bug 74023) +* Mon Feb 14 2005 - jg@suse.de +- update to 0.3.8, changes: + * fixed EAPOL-Key validation to drop packets with invalid Key + Data Length; such frames could have crashed wpa_supplicant due + to buffer overflow +* Mon Feb 07 2005 - jg@suse.de +- update to 0.3.7-pre, changes: + * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake + when using drivers that take care of AP selection (e.g., when + using ap_scan=2) + * fixed reprocessing of pending request after ctrl_iface requests + for identity/password/otp + * fixed ctrl_iface requests for identity/password/otp in Phase 2 + of EAP-PEAP and EAP-TTLS + * all drivers using driver_wext: set interface up and select + Managed mode when starting wpa_supplicant; set interface down + when exiting + * renamed driver_ipw2100.c to driver_ipw.c since it now supports + both ipw2100 and ipw2200 + * fixed a busy loop introduced in v0.3.5 for scan result + processing when no matching AP is found + * added a workaround for an interoperability issue with a Cisco AP + when using WPA2-PSK + * fixed non-WPA IEEE 802.1X to use the same authentication timeout + as WPA with IEEE 802.1X + * fixed issues with 64-bit CPUs and SHA1 cleanup in previous + version (e.g., segfault when processing EAPOL-Key frames) + * fixed EAP workaround and fast reauthentication configuration for + RSN pre-authentication + * added support for blacklisting APs that fail or timeout + authentication in ap_scan=1 mode so that all APs are tried in + cases where the ones with strongest signal level are failing + authentication + * fixed CA certificate loading after a failed EAP-TLS/PEAP/TTLS + authentication attempt + * added preliminary support for IBSS (ad-hoc) mode configuration + * added optional support for GNU Readline and History Libraries + for wpa_cli (CONFIG_READLINE) + * added couple of workarounds for interoperability issues with a + Cisco AP when using WPA2 + * fixed private key loading for cases where passphrase is not set + * improved recovery from PMKID mismatches by requesting full EAP + authentication in case of failed PMKSA caching attempt + * driver_ndis: added support for NDIS NdisMIncidateStatus() events + * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys + * added support for driver interfaces to replace the interface + name based on driver/OS specific mapping, e.g., in case of + driver_ndis, this allows the beginning of the adapter + description to be used as the interface name + * driver_ndis: enable radio before starting scanning, disable + radio when exiting + * added KEY_MGMT_802_1X_NO_WPA as a new key_mgmt type so that + driver interface can distinguish plaintext and IEEE 802.1X + (no WPA) authentication + * fixed static WEP key configuration to use broadcast/default type + for all keys + * driver_ndis: added legacy WPA capability detection for non-WPA2 + drivers + * added support for setting static WEP keys for IEEE 802.1X + without dynamic WEP keying (eapol_flags=0) + * added support for reading PKCS#12 (PFX) files (as a replacement + for PEM/DER) to get certificate and private key (CONFIG_PKCS12) + * added new ap_scan mode, ap_scan=2, for drivers that take care of + association, but need to be configured with security policy and + SSID, e.g., ndiswrapper and NDIS driver +* Thu Jan 13 2005 - jg@suse.de +- update to 0.2.6, changes: + * added driver interface for Intel ipw2100 driver + * fixed a bug in PMKSA cache processing: skip sending of + EAPOL-Start only if there is a PMKSA cache entry for the + current AP + * fixed error handling for case where reading of scan results + fails: must schedule a new scan or wpa_supplicant will remain + waiting forever + * set pairwise/group cipher suite for non-WPA IEEE 802.1X to + WEP-104 if keys are not configured to be used; this fixes + IEEE 802.1X mode with drivers that use this information to + configure whether Privacy bit can be in Beacon frames + (e.g., ndiswrapper) + * improved downgrade attack detection in IE verification of + msg 3/4: verify both WPA and RSN IEs, if present, not only the + selected one; reject the AP if an RSN IE is found in msg 3/4, + but not in Beacon or Probe Response frame, and RSN is enabled in + wpa_supplicant configuration + * fixed WPA msg 3/4 processing to allow Key Data field contain + other IEs than just one WPA IE + * modified association event handler to set portEnabled = FALSE + before clearing port Valid in order to reset EAP state machine + and avoid problems with new authentication getting ignored because + of state machines ending up in AUTHENTICATED/SUCCESS state based + on old information +- removed obsolete ipw2100 patch +- added wpa_supplicant.fig to filelist +* Fri Oct 22 2004 - jg@suse.de +- update to 0.2.5, changes: + * wpa_cli: fixed parsing of -p command line argument + * fixed parsing of wep_tx_keyidx + * fixed couple of errors in PCSC handling that could have caused + random-looking errors for EAP-SIM + * PEAPv1: fixed tunneled EAP-Success reply handling to reply with + TLS ACK, not tunneled EAP-Success + * PEAPv1: added support for terminating PEAP authentication on + tunneled EAP-Success message + * PEAPv1: changed phase1 option peaplabel to use default to 0, i.e., + to the old label for key derivation; previously, the default was 1, + but it looks like most existing PEAPv1 implementations use the old + label which is thus more suitable default option + * changed SSID configuration in driver_wext.c (used by many driver + interfaces) to use ssid_len+1 as the length for SSID since some + Linux drivers expect this + * fixed couple of unaligned reads in scan result parsing to fix WPA + connection on some platforms (e.g., ARM) +- disabled madwifi support on ppc +* Wed Sep 29 2004 - jg@suse.de +- added support for ipw2100 driver +* Tue Aug 31 2004 - jg@suse.de +- added support for writing pid-file +* Mon Aug 02 2004 - jg@suse.de +- fixed build on non-x86 platforms +* Mon Aug 02 2004 - jg@suse.de +- update to version 0.2.4, important changes: + - support for new EAP authentication methods: + EAP-TTLS/EAP-MD5-Challenge + EAP-TTLS/EAP-GTC + EAP-TTLS/EAP-MSCHAPv2 + EAP-TTLS/EAP-TLS + EAP-TTLS/MSCHAPv2 + EAP-TTLS/MSCHAP + EAP-TTLS/PAP + EAP-TTLS/CHAP + EAP-PEAP/TLS + EAP-PEAP/GTC + EAP-PEAP/MD5-Challenge + EAP-GTC + EAP-TTLS/EAP-OTP, EAP-PEAPv0/OTP, EAP-PEAPv1/OTP, EAP-OTP + - support for ATMEL AT76C5XXX driver + - support for madwifi driver + - lots of minor changes, see ChangeLog +- added km_wlan to needforbuild (driver source of madwifi is + needed) +* Thu Jun 17 2004 - jg@suse.de +- Initial package