hostap/hostapd/wpa_supplicant - new stable release v0.3.9

Jouni Malinen jkmaline
Fri Jun 10 20:35:58 PDT 2005

New versions of the Host AP driver, hostapd, and wpa_supplicant were
just released and are now available from

This release is a bug fix version from the stable (0.3.x) branch and
it replaces 0.3.7/0.3.8 as the recommended stable version. Main
development continues in the development branch (0.4.x).

* fixed background scans (iwlist wlan0 scan) not to break data
  connection when in host_roaming 2 mode (e.g., when using
* fixed beacon frame when moving from monitor mode to master mode
  (workaround for firmware bug that left IBSS IE in the Beacon frames)

* fixed a bug which caused some RSN pre-authentication cases to use
  freed memory and potentially crash hostapd
* fixed private key loading for cases where passphrase is not set
* fixed WPA2 to add PMKSA cache entry when using integrated EAP
* driver_madwifi: fixed pairwise key removal to allow WPA reauth
  without disassociation
* fixed RADIUS attribute Class processing to only use Access-Accept
  packets to update Class; previously, other RADIUS authentication
  packets could have cleared Class attribute
* fixed PMKSA caching (EAP authentication was not skipped correctly
  with the new state machine changes from IEEE 802.1X draft)

* modified the EAP workaround that accepts EAP-Success with incorrect
  Identifier to be even less strict about verification in order to
  interoperate with some authentication servers
* fixed RSN IE in 4-Way Handshake message 2/4 for the case where
  Authenticator rejects PMKSA caching attempt and the driver is not
  using assoc_info events
* fixed a possible double free in EAP-TTLS fast-reauthentication when
  identity or password is entered through control interface
* added -P<pid file> argument for wpa_supplicant to write the current
  process id into a file
* driver_madwifi: fixed association in plaintext mode
* driver_madwifi: added preliminary support for compiling against 'BSD'
  branch of madwifi CVS tree
* added EAP workaround for PEAPv1 session resumption: allow outer,
  i.e., not tunneled, EAP-Success to terminate session since; this can
  be disabled with eap_workaround=0
* driver_ipw: updated driver structures to match with ipw2200-1.0.4
  (note: ipw2100-1.1.0 is likely to require an update to work with
* driver_broadcom: fixed couple of memory leaks in scan result

Jouni Malinen                                            PGP id EFC895FA

More information about the Hostap mailing list