lp:~indicator-network-developers/wpasupplicant/trunk

Created by Kalle Valo on 2010-06-04 and last modified on 2020-10-20
Get this branch:
bzr branch lp:~indicator-network-developers/wpasupplicant/trunk

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Indicator Network Developers
Project:
wpa_supplicant
Status:
Development

Import details

Import Status: Reviewed

This branch is an import of the HEAD branch of the Git repository at git://w1.fi/srv/git/hostap.git.

The next import is scheduled to run in 1 hour.

Last successful import was 4 hours ago.

Import started 4 hours ago on izar and finished 4 hours ago taking 20 seconds — see the log
Import started 10 hours ago on alnitak and finished 10 hours ago taking 20 seconds — see the log
Import started 16 hours ago on izar and finished 16 hours ago taking 20 seconds — see the log
Import started 22 hours ago on alnitak and finished 22 hours ago taking 20 seconds — see the log
Import started on 2020-10-20 on alnitak and finished on 2020-10-20 taking 20 seconds — see the log
Import started on 2020-10-19 on alnitak and finished on 2020-10-19 taking 25 seconds — see the log
Import started on 2020-10-19 on izar and finished on 2020-10-19 taking 25 seconds — see the log
Import started on 2020-10-19 on izar and finished on 2020-10-19 taking 25 seconds — see the log
Import started on 2020-10-19 on alnitak and finished on 2020-10-19 taking 25 seconds — see the log
Import started on 2020-10-18 on izar and finished on 2020-10-18 taking 25 seconds — see the log

Recent revisions

16569. By Jouni Malinen <email address hidden> 10 hours ago

tests: Update dpp_controller_rx_errors to use the assigned TCP port

Signed-off-by: Jouni Malinen <email address hidden>

16568. By Jouni Malinen <email address hidden> 10 hours ago

DPP2: Update the default port number for DPP-over-TCP

IANA assigned the TCP port 8908 for DPP, so update the implementation to
match the formal assignment.

Signed-off-by: Jouni Malinen <email address hidden>

16567. By Jouni Malinen <email address hidden> on 2020-10-19

Fix couple more typos

Couple of similar cases that were not included in the previous commit.

Signed-off-by: Jouni Malinen <email address hidden>

16566. By Yegor Yefremov on 2020-10-19

wpa_supplicant: Fix typos

Signed-off-by: Yegor Yefremov <email address hidden>

16565. By Jouni Malinen <email address hidden> on 2020-10-19

tests: SAE status code handling

Signed-off-by: Jouni Malinen <email address hidden>

16564. By Jouni Malinen <email address hidden> on 2020-10-19

SAE-PK: Do not accept SAE-PK status code when no PK is configured

Make sae_status_success() more explicit by rejecting SAE-PK status code
when the AP is not configured with PK.

Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Jouni Malinen <email address hidden>

16563. By Andrei Otcheretianski <email address hidden> on 2020-10-19

SAE: Don't use potentially uninitialized keys

If SAE_CONFIG_PK is not defined and sae->pk isn't zero (which is
possible as it is controlled by the commit message status code),
sae_derive_keys() may end up deriving PMK and KCK from an
uninitialized array. Fix that.

Fixes: 6b9e99e571ee ("SAE-PK: Extend SAE functionality for AP validation")
Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Andrei Otcheretianski <email address hidden>

16562. By Andrei Otcheretianski <email address hidden> on 2020-10-19

wpa_supplicant: Remove unfeasible conditions in config parsing

pos can't be NULL in wpa_global_config_parse_str(), so there is no point
checking this, especially when pos was already dereferenced earlier.
Remove the redundant conditions.

Signed-off-by: Andrei Otcheretianski <email address hidden>

16561. By Andrei Otcheretianski <email address hidden> on 2020-10-19

wpa_cli: Don't access uninitialized variables

Don't print potentially uninitialized variables in wpa_ctrl_command_bss().
Some compilers and analyzers may warn about it.

Signed-off-by: Andrei Otcheretianski <email address hidden>

16560. By Pooventhiran G <email address hidden> on 2020-10-19

OpenSSL: Make openssl_debug_dump_certificate() more robust

SSL_CTX_get0_certificate() returns NULL if no certificate is installed.
While this should not be the case here due to the loop in
openssl_debug_dump_certificate_chains() proceeding only if the
SSL_CTX_set_current_cert() returns success, it is safer to make
openssl_debug_dump_certificate() explicitly check against NULL before
trying to dump details about the certificate.

Signed-off-by: Pooventhiran G <email address hidden>

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.

Subscribers

No subscribers.