hostapd/wpa_supplicant - new development release v0.6.3

Dan Williams dcbw
Tue Feb 26 08:44:38 PST 2008

On Fri, 2008-02-22 at 19:09 -0800, Jouni Malinen wrote:
> New versions of wpa_supplicant and hostapd were just
> released and are now available from
> This release is from the development branch (0.6.x). Please note that
> the 0.5.x branch continues to be the current source of stable releases.
> hostapd:
> * fixed Reassociation Response callback processing when using internal
>   MLME (driver_{hostap,nl80211,test}.c)
> * updated FT support to use the latest draft, IEEE 802.11r/D9.0
> * copy optional Proxy-State attributes into RADIUS response when acting
>   as a RADIUS authentication server
> * fixed EAPOL state machine to handle a case in which no response is
>   received from the RADIUS authentication server; previous version
>   could have triggered a crash in some cases after a timeout
> * fixed EAP-SIM/AKA realm processing to allow decorated usernames to
>   be used
> * added a workaround for EAP-SIM/AKA peers that include incorrect null
>   termination in the username
> * fixed EAP-SIM/AKA protected result indication to include AT_COUNTER
>   attribute in notification messages only when using fast
>   reauthentication
> * fixed EAP-SIM Start response processing for fast reauthentication
>   case
> * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST}
>   phase 2 to allow EAP-SIM and EAP-AKA to be used as the Phase 2 method
> wpa_supplicant:
> * removed 'nai' and 'eappsk' network configuration variables that were
>   previously used for configuring user identity and key for EAP-PSK,
>   EAP-PAX, EAP-SAKE, and EAP-GPSK. 'identity' field is now used as the
>   replacement for 'nai' (if old configuration used a separate
>   'identity' value, that would now be configured as
>   'anonymous_identity'). 'password' field is now used as the
>   replacement for 'eappsk' (it can also be set using hexstring to
>   present random binary data)

Even though NM doesn't use these quite yet, would this mean that NM
would have to dynamically detect at runtime what version of
wpa_supplicant was installed to ensure that it wouldn't send the wrong
config options to the supplicant here?  I want to keep NM working with
both 0.5 and 0.6.

If that's the case, would you accept a patch to add a getVersion()
function to the D-Bus interface that passes back a (major, minor, micro)


> * removed '-w' command line parameter (wait for interface to be added,
>   if needed); cleaner way of handling this functionality is to use an
>   external mechanism (e.g., hotplug scripts) that start wpa_supplicant
>   when an interface is added
> * updated FT support to use the latest draft, IEEE 802.11r/D9.0
> * added ctrl_iface monitor event (CTRL-EVENT-SCAN-RESULTS) for
>   indicating when new scan results become available
> * added new ctrl_iface command, BSS, to allow scan results to be
>   fetched without hitting the message size limits (this command
>   can be used to iterate through the scan results one BSS at the time)
> * fixed EAP-SIM not to include AT_NONCE_MT and AT_SELECTED_VERSION
>   attributes in EAP-SIM Start/Response when using fast reauthentication
> * fixed EAPOL not to end up in infinite loop when processing dynamic
>   WEP keys with IEEE 802.1X
> * fixed problems in getting NDIS events from WMI on Windows 2000

More information about the Hostap mailing list