hostapd/wpa_supplicant - new development release v0.5.4

Jouni Malinen jkmaline at cc.hut.fi
Tue Jun 20 21:36:31 EDT 2006


New versions of wpa_supplicant and hostapd were just
released and are now available from http://hostap.epitest.fi/

This release is from the development branch (0.5.x). Please note that
0.4.x branch continues to be the current source of stable releases.


hostapd:
* fixed nt_password_hash build [Bug 144]
* added PeerKey handshake implementation for IEEE 802.11e
  direct link setup (DLS) to replace STAKey handshake
* added support for EAP Generalized Pre-Shared Key (EAP-GPSK,
  draft-clancy-emu-eap-shared-secret-00.txt)
* fixed a segmentation fault when RSN pre-authentication was completed
  successfully [Bug 152]

wpa_supplicant:
* fixed build with CONFIG_STAKEY=y [Bug 143]
* added support for doing MLME (IEEE 802.11 management frame
  processing) in wpa_supplicant when using Devicescape IEEE 802.11
  stack (wireless-dev.git tree)
* added a new network block configuration option, fragment_size, to
  configure the maximum EAP fragment size
* driver_ndis: Disable WZC automatically for the selected interface to
  avoid conflicts with two programs trying to control the radio; WZC
  will be re-enabled (if it was enabled originally) when wpa_supplicant
  is terminated
* added an experimental TLSv1 client implementation
  (CONFIG_TLS=internal) that can be used instead of an external TLS
  library, e.g., to reduce total size requirement on systems that do
  not include any TLS library by default (this is not yet complete;
  basic functionality is there, but certificate validation is not yet
  included)
* added PeerKey handshake implementation for IEEE 802.11e
  direct link setup (DLS) to replace STAKey handshake
* fixed WPA PSK update through ctrl_iface for the case where the old
  PSK was derived from an ASCII passphrase and the new PSK is set as
  a raw PSK (hex string)
* added new configuration option for identifying which network block
  was used (id_str in wpa_supplicant.conf; included on
  WPA_EVENT_CONNECT monitor event and as WPA_ID_STR environmental
  variable in wpa_cli action scripts; in addition WPA_ID variable is
  set to the current unique identifier that wpa_supplicant assigned
  automatically for the network and that can be used with
  GET_NETWORK/SET_NETWORK ctrl_iface commands)
* wpa_cli action script is now called only when the connect/disconnect
  status changes or when associating with a different network
* fixed configuration parser not to remove CCMP from group cipher list
  if WPA-None (adhoc) is used (pairwise=NONE in that case)
* fixed integrated NDIS events processing not to hang the process due
  to a missed change in eloop_win.c API in v0.5.3 [Bug 155]
* added support for EAP Generalized Pre-Shared Key (EAP-GPSK,
  draft-clancy-emu-eap-shared-secret-00.txt)
* added Microsoft Visual Studio 2005 solution and project files for
  build wpa_supplicant for Windows (see vs2005 subdirectory)
* eloop_win: fixed unregistration of Windows events
* l2_packet_winpcap: fixed a deadlock in deinitializing l2_packet
  at the end of RSN pre-authentication and added unregistration of
  a Windows event to avoid getting eloop_win stuck with an invalid
  handle
* driver_ndis: added support for selecting AP based on BSSID
* added new environmental variable for wpa_cli action scripts:
  WPA_CTRL_DIR is the current control interface directory
* driver_ndis: added support for using NDISUIO instead of WinPcap for
  OID set/query operations (CONFIG_USE_NDISUIO=y in .config); with new
  l2_packet_ndis (CONFIG_L2_PACKET=ndis), this can be used to build
  wpa_supplicant without requiring WinPcap; note that using NDISUIO
  requires that WZC is disabled (net stop wzcsvc) since NDISUIO allows
  only one application to open the device
* changed NDIS driver naming to only include device GUID, e.g.,
  {7EE3EFE5-C165-472F-986D-F6FBEDFE8C8D}, instead of including WinPcap
  specific \Device\NPF_ prefix before the GUID; the prefix is still
  allowed for backwards compatibility, but it is not required anymore
  when specifying the interface
* driver_ndis: re-initialize driver interface is the adapter is removed
  and re-inserted [Bug 159]
* driver_madwifi: fixed TKIP and CCMP sequence number configuration on
  big endian hosts [Bug 146]

-- 
Jouni Malinen                                            PGP id EFC895FA



More information about the HostAP mailing list