.. |
ap
|
tests: EAPOL-Key fuzzing tool
|
2019-02-11 02:35:29 +02:00 |
common
|
common: Use for_each_element_id/_extid for get_ie/get_ie_ext/get_vendor_ie
|
2019-02-11 13:37:22 +02:00 |
crypto
|
tests: TLS fuzzing tool
|
2019-02-11 02:35:29 +02:00 |
drivers
|
nl80211: Use wpa_ssid_txt() for debug messages more consistently
|
2019-02-10 01:43:50 +02:00 |
eap_common
|
EAP-pwd: Mask timing of PWE derivation
|
2018-05-28 22:15:15 +03:00 |
eap_peer
|
EAP peer: Clear temporary message buffers before freeing
|
2019-02-05 23:34:30 +02:00 |
eap_server
|
PEAP: Explicitly clear temporary keys from memory when using CMK
|
2019-02-02 00:01:29 +02:00 |
eapol_auth
|
Add hostapd tls_flags parameter
|
2017-09-18 12:12:48 +03:00 |
eapol_supp
|
eap_proxy: Fix memory leaks when using eap_peer_erp_init()
|
2018-09-21 21:34:08 +03:00 |
fst
|
fst: Fix compile error in fst_ctrl_aux.h with C++ compilers
|
2018-05-21 17:47:03 +03:00 |
l2_packet
|
wpa_supplicant: Don't reply to EAPOL if pkt_type is PACKET_OTHERHOST
|
2018-04-02 12:21:27 +03:00 |
p2p
|
P2P: Update find_start timer only when p2p_scan is started.
|
2019-02-07 11:56:35 +02:00 |
pae
|
mka: New MI should only be generated when peer's key is invalid
|
2019-01-08 01:12:02 +02:00 |
radius
|
RADIUS client: Cease endless retry for message for multiple servers
|
2019-01-07 23:38:18 +02:00 |
rsn_supp
|
tests: EAPOL-Key fuzzing tool
|
2019-02-11 02:35:29 +02:00 |
tls
|
TLS: Fix X.509 certificate name conversion into empty string
|
2019-02-11 02:35:29 +02:00 |
utils
|
JSON: Fix string parsing when \\ escape is at the end of buffer
|
2019-02-11 02:35:29 +02:00 |
wps
|
WPS: Fix wps_validate_credential() argument type
|
2018-12-24 11:12:53 +02:00 |
lib.rules
|
tests: TLS fuzzing tool
|
2019-02-11 02:35:29 +02:00 |
Makefile
|
FST: Add the Fast Session Transfer (FST) module
|
2015-07-16 18:26:15 +03:00 |