Lines Matching full:wpa
63 from being used with non-WPA networks and disabled workaround for
64 ignoring bogus WPA/RSN IE in non-WPA configuration
211 * fixed WPA PSK update through ctrl_iface for the case where the old
224 if WPA-None (adhoc) is used (pairwise=NONE in that case)
301 * reject WPA/WPA2 message 3/4 if it does not include any valid
302 WPA/RSN IE
422 the new AP is using different WPA/RSN IE
427 * allow fallback to WPA, if mixed WPA+WPA2 networks have mismatch in
428 RSN IE, but WPA IE would match with wpa_supplicant configuration
434 * fixed RSN pre-authentication (it was broken in the clean up of WPA
465 roaming from WPA enabled AP to plaintext one
475 layer (Ethernet) header during WPA and EAPOL/EAP processing; this
509 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used
510 with drivers that do not support WPA
585 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
596 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
635 is set to an empty string, any SSID will be accepted for non-WPA AP
667 * fixed WPA/RSN IE verification in message 3 of 4-Way Handshake when
687 * fixed non-WPA IEEE 802.1X to use the same authentication timeout as
688 WPA with IEEE 802.1X (i.e., timeout 10 -> 70 sec to allow
708 WPA-NONE, i.e., TKIP or CCMP with a fixed key (based on psk) and no
713 supports WPA-None)
763 interface can distinguish plaintext and IEEE 802.1X (no WPA)
768 * driver_ndis: added legacy WPA capability detection for non-WPA2
839 * fixed couple of unaligned reads in scan result parsing to fix WPA
842 * added support for LEAP with WPA
856 * set pairwise/group cipher suite for non-WPA IEEE 802.1X to WEP-104
881 verify both WPA and RSN IEs, if present, not only the selected one;
885 * fixed WPA msg 3/4 processing to allow Key Data field contain other
886 IEs than just one WPA IE
901 WPA
904 currently, this can be used only for non-WPA IEEE 802.1X mode, but
905 eventually, this is to be extended to support full WPA/WPA2 once
959 WPA Group Key messages when pairwise keys are used (without this,
996 * fixed RSN IE and WPA IE capabilities field parsing
1003 * fixed WPA-PSK only mode when compiled without IEEE 802.1X support
1011 - EAP-MD5 (cannot be used with WPA-RADIUS)
1027 * use module prefix in debug messages (WPA, EAP, EAP-TLS, ..)
1028 * added support for non-WPA IEEE 802.1X mode with dynamic WEP keys
1030 EAPOL-Key frames instead of WPA key handshakes)
1034 * fixed wpa_supplicant to ignore possible extra data after WPA