commit wpa_supplicant for openSUSE:Factory
Hello community, here is the log from the commit of package wpa_supplicant for openSUSE:Factory checked in at 2014-06-19 13:08:27 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/wpa_supplicant (Old) and /work/SRC/openSUSE:Factory/.wpa_supplicant.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "wpa_supplicant" Changes: -------- --- /work/SRC/openSUSE:Factory/wpa_supplicant/wpa_supplicant.changes 2014-05-22 20:37:58.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.wpa_supplicant.new/wpa_supplicant.changes 2014-06-19 13:08:29.000000000 +0200 @@ -1,0 +2,57 @@ +Mon Jun 16 04:28:45 UTC 2014 - glin@suse.com + +- Update to 2.2 + * added DFS indicator to get_capability freq + * added/fixed nl80211 functionality + * removed unused NFC_RX_HANDOVER_REQ and NFC_RX_HANDOVER_SEL + control interface commands (the more generic + NFC_REPORT_HANDOVER is now used) + * fixed MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding + * P2P enhancements/fixes + * added phase1 network parameter options for disabling TLS v1.1 + and v1.2 to allow workarounds with misbehaving AAA servers + * Interworking/Hotspot 2.0 enhancements + * fixed TDLS interoperability issues with supported operating + class in + * some deployed stations + * internal TLS implementation enhancements/fixes + * fixed PTK derivation for CCMP-256 and GCMP-256 + * added "reattach" command for fast reassociate-back-to-same-BSS + * added "get_capability tdls" command + * D-Bus interface extensions/fixes + * fixed potential segmentation fault and memory leaks in WNM + neighbor report processing + * EAP-pwd fixes + * added MACsec/IEEE Std 802.1X-2010 PAE implementation + * fixed a memory leak in SAE random number generation + * fixed EAPOL-Key exchange when GCMP is used with SHA256-based + AKM + * added support for simultaneous authentication of equals (SAE) + for stronger password-based authentication with WPA2-Personal + * improved P2P negotiation and group formation robustness + * improved P2P channel selection + * added nl80211 functionality + - VHT configuration for nl80211 + - MFP (IEEE 802.11w) information for nl80211 command API + - support split wiphy dump + - FT (IEEE 802.11r) with driver-based SME + - use advertised number of supported concurrent channels + - QoS Mapping configuration + * improved TDLS negotiation robustness + * added 'SCAN TYPE=ONLY' ctrl_iface command to request manual + scan without executing roaming/network re-selection on scan + results + * added Session-Id derivation for EAP peer methods + * allow AP/Enrollee to be specified with BSSID instead of UUID + for WPS ER operations + * changed the default driver interface from wext to nl80211 if + both are included in the build + * added domain_suffix_match (and domain_suffix_match2 for Phase 2 + EAP-TLS) to specify additional constraint for the server + certificate domain name + * added support for WPS+NFC updates and P2P+NFC +- Drop wpa_supplicant-driver-wext-debug.patch and + wpa_supplicant-errormsg.patch: wext is deprecated +- Enable AP mode, P2P, RSN IBSS, EAP FAST, EAP AKA, and WPS NFC + +------------------------------------------------------------------- Old: ---- wpa_supplicant-2.0.tar.gz wpa_supplicant-driver-wext-debug.patch wpa_supplicant-errormsg.patch New: ---- wpa_supplicant-2.2.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wpa_supplicant.spec ++++++ --- /var/tmp/diff_new_pack.eQZ1LI/_old 2014-06-19 13:08:30.000000000 +0200 +++ /var/tmp/diff_new_pack.eQZ1LI/_new 2014-06-19 13:08:30.000000000 +0200 @@ -34,7 +34,7 @@ BuildRequires: libnl-devel %endif Url: http://hostap.epitest.fi/wpa_supplicant/ -Version: 2.0 +Version: 2.2 Release: 0 Summary: WPA supplicant implementation License: BSD-3-Clause and GPL-2.0+ @@ -46,14 +46,12 @@ Source4: logrotate.wpa_supplicant Source5: fi.w1.wpa_supplicant1.service Source6: wpa_supplicant.service -Patch0: wpa_supplicant-driver-wext-debug.patch # wpa_supplicant-flush-debug-output.patch won't go upstream as it might # change timings Patch1: wpa_supplicant-flush-debug-output.patch # wpa_supplicant-sigusr1-changes-debuglevel.patch won't go upstream as it # is not portable Patch2: wpa_supplicant-sigusr1-changes-debuglevel.patch -Patch3: wpa_supplicant-errormsg.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build Requires: logrotate %if ! %{defined _rundir} @@ -92,10 +90,8 @@ %if 0%{?suse_version} > 1140 echo "CONFIG_LIBNL32=y" >> wpa_supplicant/.config %endif -%patch0 -p0 %patch1 -p0 -%patch2 -p0 -%patch3 -p0 +%patch2 -p1 %build cd wpa_supplicant ++++++ config ++++++ --- /var/tmp/diff_new_pack.eQZ1LI/_old 2014-06-19 13:08:30.000000000 +0200 +++ /var/tmp/diff_new_pack.eQZ1LI/_new 2014-06-19 13:08:30.000000000 +0200 @@ -151,7 +151,7 @@ # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL, # the OpenSSL library must be patched (openssl-0.9.8d-tls-extensions.patch) # to add the needed functions. -#CONFIG_EAP_FAST=y +CONFIG_EAP_FAST=y # EAP-GTC CONFIG_EAP_GTC=y @@ -163,7 +163,7 @@ #CONFIG_EAP_SIM=y # EAP-PSK (experimental; this is _not_ needed for WPA-PSK) -CONFIG_EAP_PSK=y +#CONFIG_EAP_PSK=y # EAP-pwd (secure authentication using only a password) #CONFIG_EAP_PWD=y @@ -175,7 +175,7 @@ CONFIG_EAP_LEAP=y # EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) -#CONFIG_EAP_AKA=y +CONFIG_EAP_AKA=y # EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used). # This requires CONFIG_EAP_AKA to be enabled, too. @@ -205,7 +205,7 @@ # registrar. #CONFIG_WPS_REG_DISABLE_OPEN=y # Enable WPS support with NFC config method -#CONFIG_WPS_NFC=y +CONFIG_WPS_NFC=y # EAP-IKEv2 CONFIG_EAP_IKEV2=y @@ -477,7 +477,7 @@ #CONFIG_NO_RANDOM_POOL=y # IEEE 802.11n (High Throughput) support (mainly for AP mode) -#CONFIG_IEEE80211N=y +CONFIG_IEEE80211N=y # Wireless Network Management (IEEE Std 802.11v-2011) # Note: This is experimental and not complete implementation. @@ -497,12 +497,12 @@ # should be noted that this is mainly aimed at simple cases like # WPA2-Personal while more complex configurations like WPA2-Enterprise with an # external RADIUS server can be supported with hostapd. -#CONFIG_AP=y +CONFIG_AP=y # P2P (Wi-Fi Direct) # This can be used to enable P2P support in wpa_supplicant. See README-P2P for # more information on P2P operations. -#CONFIG_P2P=y +CONFIG_P2P=y # Autoscan # This can be used to enable automatic scan support in wpa_supplicant. @@ -524,3 +524,6 @@ # Enable background scan to improve roaming CONFIG_BGSCAN_SIMPLE=y + +# Enable RSN IBSS/AdHoc +CONFIG_IBSS_RSN=y ++++++ wpa_supplicant-2.0.tar.gz -> wpa_supplicant-2.2.tar.gz ++++++ ++++ 121220 lines of diff (skipped) ++++++ wpa_supplicant-sigusr1-changes-debuglevel.patch ++++++ --- /var/tmp/diff_new_pack.eQZ1LI/_old 2014-06-19 13:08:31.000000000 +0200 +++ /var/tmp/diff_new_pack.eQZ1LI/_new 2014-06-19 13:08:31.000000000 +0200 @@ -1,8 +1,10 @@ -Index: wpa_supplicant/wpa_supplicant.c -=================================================================== ---- wpa_supplicant/wpa_supplicant.c.orig -+++ wpa_supplicant/wpa_supplicant.c -@@ -139,6 +139,22 @@ int wpa_set_wep_keys(struct wpa_supplica +--- + wpa_supplicant/wpa_supplicant.c | 18 ++++++++++++++++++ + 1 file changed, 18 insertions(+) + +--- a/wpa_supplicant/wpa_supplicant.c ++++ b/wpa_supplicant/wpa_supplicant.c +@@ -123,6 +123,22 @@ int wpa_set_wep_keys(struct wpa_supplica return set; } @@ -23,9 +25,9 @@ + ((wpa_debug_level == MSG_MSGDUMP) ? "MSGDUMP" : "UNKNOWN"))); +} - static int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s, - struct wpa_ssid *ssid) -@@ -2342,6 +2358,8 @@ int wpa_supplicant_run(struct wpa_global + int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s, + struct wpa_ssid *ssid) +@@ -4124,6 +4140,8 @@ int wpa_supplicant_run(struct wpa_global eloop_register_signal_terminate(wpa_supplicant_terminate, global); eloop_register_signal_reconfig(wpa_supplicant_reconfig, global); -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org
participants (1)
-
root@hilbert.suse.de