Hello community, here is the log from the commit of package wpa_supplicant checked in at Tue Sep 2 12:16:57 CEST 2008. -------- --- wpa_supplicant/wpa_supplicant.changes 2008-08-04 12:53:59.000000000 +0200 +++ /mounts/work_src_done/STABLE/wpa_supplicant/wpa_supplicant.changes 2008-09-02 03:06:23.396403000 +0200 @@ -1,0 +2,21 @@ +Tue Sep 2 03:05:49 CEST 2008 - ro@suse.de + +- update to 0.6.4 + * added support for EAP Sequences in EAP-FAST Phase 2 + * added support for using TNC with EAP-FAST + * added driver_ps3 for the PS3 Linux wireless driver + * added support for optional cryptobinding with PEAPv0 + * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to + allow fallback to full handshake if server rejects PAC-Opaque + * added fragmentation support for EAP-TNC + * added support for parsing PKCS #8 formatted private keys into the + internal TLS implementation (both PKCS #1 RSA key and PKCS #8 + encapsulated RSA key can now be used) + * added option of using faster, but larger, routines in the internal + LibTomMath (for internal TLS implementation) to speed up DH and RSA + calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y) + * fixed race condition between disassociation event and group key + handshake to avoid getting stuck in incorrect state [Bug 261] + * fixed opportunistic key caching (proactive_key_caching) + +------------------------------------------------------------------- Old: ---- wpa_supplicant-0.6.3.tar.bz2 New: ---- wpa_supplicant-0.6.4.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ wpa_supplicant.spec ++++++ --- /var/tmp/diff_new_pack.V22450/_old 2008-09-02 12:16:49.000000000 +0200 +++ /var/tmp/diff_new_pack.V22450/_new 2008-09-02 12:16:49.000000000 +0200 @@ -1,10 +1,17 @@ # -# spec file for package wpa_supplicant (Version 0.6.3) +# spec file for package wpa_supplicant (Version 0.6.4) # # Copyright (c) 2008 SUSE LINUX Products GmbH, Nuernberg, Germany. -# This file and all modifications and additions to the pristine -# package are under the same license as the package itself. # +# All modifications and additions to the file contributed by third parties +# remain the property of their copyright owners, unless otherwise agreed +# upon. The license for this file, and modifications and additions to the +# file, is the same license as for the pristine package itself (unless the +# license for the pristine package is not an Open Source License, in which +# case the license is the MIT License). An "Open Source License" is a +# license that conforms to the Open Source Definition (Version 1.9) +# published by the Open Source Initiative. + # Please submit bugfixes or comments via http://bugs.opensuse.org/ # @@ -17,7 +24,7 @@ BuildRequires: madwifi-devel %endif Url: http://hostap.epitest.fi/wpa_supplicant/ -Version: 0.6.3 +Version: 0.6.4 Release: 1 License: BSD 3-Clause; GPL v2 or later Group: Productivity/Networking/Other @@ -117,6 +124,24 @@ /usr/sbin/wpa_gui %changelog +* Tue Sep 02 2008 ro@suse.de +- update to 0.6.4 + * added support for EAP Sequences in EAP-FAST Phase 2 + * added support for using TNC with EAP-FAST + * added driver_ps3 for the PS3 Linux wireless driver + * added support for optional cryptobinding with PEAPv0 + * fixed the OpenSSL patches (0.9.8g and 0.9.9) for EAP-FAST to + allow fallback to full handshake if server rejects PAC-Opaque + * added fragmentation support for EAP-TNC + * added support for parsing PKCS #8 formatted private keys into the + internal TLS implementation (both PKCS #1 RSA key and PKCS #8 + encapsulated RSA key can now be used) + * added option of using faster, but larger, routines in the internal + LibTomMath (for internal TLS implementation) to speed up DH and RSA + calculations (CONFIG_INTERNAL_LIBTOMMATH_FAST=y) + * fixed race condition between disassociation event and group key + handshake to avoid getting stuck in incorrect state [Bug 261] + * fixed opportunistic key caching (proactive_key_caching) * Mon Aug 04 2008 hschaa@suse.de - Remove patches that are already upstream - Rebase patches to new version ++++++ wpa_supplicant-0.6.3.tar.bz2 -> wpa_supplicant-0.6.4.tar.bz2 ++++++ ++++ 15963 lines of diff (skipped) ++++++ wpa_supplicant-driver-wext-debug.patch ++++++ --- /var/tmp/diff_new_pack.V22450/_old 2008-09-02 12:16:51.000000000 +0200 +++ /var/tmp/diff_new_pack.V22450/_new 2008-09-02 12:16:51.000000000 +0200 @@ -1,7 +1,6 @@ -diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c ---- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-02-23 03:45:24.000000000 +0100 -+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:20:37.000000000 +0200 -@@ -2069,20 +2069,32 @@ +--- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c ++++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c +@@ -2174,20 +2174,32 @@ */ if (drv->auth_alg_fallback && wpa_driver_wext_auth_alg_fallback(drv, params) < 0) @@ -34,7 +33,7 @@ if (params->wpa_ie == NULL || params->wpa_ie_len == 0) value = IW_AUTH_WPA_VERSION_DISABLED; else if (params->wpa_ie[0] == WLAN_EID_RSN) -@@ -2091,26 +2103,41 @@ +@@ -2196,26 +2208,41 @@ value = IW_AUTH_WPA_VERSION_WPA; if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_WPA_VERSION, value) < 0) @@ -76,14 +75,22 @@ /* Allow unencrypted EAPOL messages even if pairwise keys are set when * not using WPA. IEEE 802.1X specifies that these frames are not -@@ -2124,14 +2151,26 @@ +@@ -2231,7 +2258,11 @@ if (wpa_driver_wext_set_auth_param(drv, IW_AUTH_RX_UNENCRYPTED_EAPOL, allow_unencrypted_eapol) < 0) +- ret = -1; +{ +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed", __FUNCTION__); - ret = -1; ++ ret = -1; +} ++ + #ifdef WEXT_MFP_PENDING + #ifdef CONFIG_IEEE80211W + switch (params->mgmt_frame_protection) { +@@ -2250,12 +2281,21 @@ + #endif /* CONFIG_IEEE80211W */ + #endif /* WEXT_MFP_PENDING */ if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0) +{ +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_freq failed", __FUNCTION__); @@ -103,7 +110,7 @@ return ret; } -@@ -2156,6 +2195,8 @@ +@@ -2280,6 +2320,8 @@ res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG, algs); drv->auth_alg_fallback = res == -2; ++++++ wpa_supplicant-errormsg.patch ++++++ --- /var/tmp/diff_new_pack.V22450/_old 2008-09-02 12:16:51.000000000 +0200 +++ /var/tmp/diff_new_pack.V22450/_new 2008-09-02 12:16:51.000000000 +0200 @@ -1,17 +1,16 @@ -diff -ur BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c ---- BUILD/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:26.000000000 +0200 -+++ BUILD2/wpa_supplicant-0.6.3/src/drivers/driver_wext.c 2008-08-04 11:49:11.000000000 +0200 -@@ -251,10 +251,12 @@ +--- BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c ++++ BUILD/wpa_supplicant-0.6.4/src/drivers/driver_wext.c +@@ -228,12 +228,13 @@ iwr.u.param.value = value; if (ioctl(drv->ioctl_sock, SIOCSIWAUTH, &iwr) < 0) { -- perror("ioctl[SIOCSIWAUTH]"); + int saved_errno = errno; - fprintf(stderr, "WEXT auth param %d value 0x%x - ", - idx, value); + if (errno != EOPNOTSUPP) { + wpa_printf(MSG_DEBUG, "WEXT: SIOCSIWAUTH(param %d " + "value 0x%x) failed: %s)", + idx, value, strerror(errno)); + } - ret = errno == EOPNOTSUPP ? -2 : -1; -+ errno = saved_errno; -+ perror("ioctl[SIOCSIWAUTH]"); + ret = saved_errno == EOPNOTSUPP ? -2 : -1; } ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... --------------------------------------------------------------------- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org