Host AP/hostapd/wpa_supplicant - new stable release v0.2.6

Jouni Malinen jkmaline at
Sat Dec 25 14:18:18 EST 2004

New versions of Prism2/2.5/3 Host AP driver, hostapd, and
wpa_supplicant were just released and are now available from

This release is a bug fix version from the stable (0.2.x) branch and
replaces 0.2.5 as the recommended stable version. However, people using
Linux 2.2.x versions or older 2.4.x/2.6.x versions may have to use the
old stable series (0.1.x) since the 0.2.x versions do not support some
of the older kernel versions. Main development continues in the
development branch (0.3.x).

* added support for changed PCI API in Linux 2.6.10-rc1 and newer:
  pci_{save,restore}_state() lost one argument, pci_register_driver()

* fixed RADIUS accounting to generate a new session id for cases where
  a station reassociates without first being complete deauthenticated
* fixed STA disassociation handler to mark next timeout state to
  deauthenticate the station, i.e., skip long wait for inactivity poll
  and extra disassociation, if the STA disassociates without
* removed 'daemonize' configuration file option since it has not really
  been used at all for more than year

* added driver interface for Intel ipw2100 driver
* fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
  only if there is a PMKSA cache entry for the current AP
* fixed error handling for case where reading of scan results fails:
  must schedule a new scan or wpa_supplicant will remain waiting
* set pairwise/group cipher suite for non-WPA IEEE 802.1X to WEP-104
  if keys are not configured to be used; this fixes IEEE 802.1X mode
  with drivers that use this information to configure whether Privacy
  bit can be in Beacon frames (e.g., ndiswrapper)
* improved downgrade attack detection in IE verification of msg 3/4:
  verify both WPA and RSN IEs, if present, not only the selected one;
  reject the AP if an RSN IE is found in msg 3/4, but not in Beacon or
  Probe Response frame, and RSN is enabled in wpa_supplicant
* fixed WPA msg 3/4 processing to allow Key Data field contain other
  IEs than just one WPA IE
* modified association event handler to set portEnabled = FALSE before
  clearing port Valid in order to reset EAP state machine and avoid
  problems with new authentication getting ignored because of state
  machines ending up in AUTHENTICATED/SUCCESS state based on old

* split_combined_hex: updated to use head/tail -n argument
  (tail +N did not work anymore)

Jouni Malinen                                            PGP id EFC895FA

More information about the HostAP mailing list