March 2022 Archives by subject
Starting: Wed Mar 2 14:26:21 PST 2022
Ending: Thu Mar 31 16:46:50 PDT 2022
Messages: 99
- [PATCH 0/9] introduce background radar detection support
Jouni Malinen
- [PATCH 0/9] introduce background radar detection support
Lorenzo Bianconi
- [PATCH 00/13] hostapd: MBSSID and EMA support
Aloka Dixit
- [PATCH 01/13] mbssid: add configuration options
Aloka Dixit
- [PATCH 02/13] mbssid: retrieve driver capabilities
Aloka Dixit
- [PATCH 03/13] mbssid: configure all BSSes before beacon setup
Aloka Dixit
- [PATCH 04/13] mbssid: get and set configuration parameters
Aloka Dixit
- [PATCH 05/13] mbssid: add multiple BSSID elements
Aloka Dixit
- [PATCH 06/13] mbssid: add MBSSID configuration element
Aloka Dixit
- [PATCH 07/13] mbssid: add non-inheritance element
Aloka Dixit
- [PATCH 08/13] mbssid: make the AID space shared
Aloka Dixit
- [PATCH 09/13] mbssid: set extended capabilities
Aloka Dixit
- [PATCH 1/1] MBO: Check association disallowed attribute in beacons and probe responses
Jouni Malinen
- [PATCH 1/1] MBO: Check association disallowed attribute in beacons and probe responses
Damon Chen
- [PATCH 1/1] MBO: Check association disallowed attribute in beacons and probe responses
Damon Chen
- [PATCH 1/9] Sync include/uapi/linux/nl80211.h with mac80211-next.git
Jouni Malinen
- [PATCH 10/13] mbssid: DTIM period configuration for EMA AP
Aloka Dixit
- [PATCH 11/13] mbssid: hidden SSID support
Aloka Dixit
- [PATCH 12/13] mbssid: process known BSSID element
Aloka Dixit
- [PATCH 13/13] mbssid: add nl80211 support
Aloka Dixit
- [PATCH 6/9] DFS: introduce hostapd_dfs_request_channel_switch routine
Jouni Malinen
- [PATCH 6/9] DFS: introduce hostapd_dfs_request_channel_switch routine
Lorenzo Bianconi
- [PATCH 8/9] DFS: switch to background radar channel if available
Jouni Malinen
- [PATCH 8/9] DFS: switch to background radar channel if available
Lorenzo Bianconi
- [PATCH 9/9] DFS: introduce radar_background parameter to config file
Jouni Malinen
- [PATCH 9/9] DFS: introduce radar_background parameter to config file
Lorenzo Bianconi
- [PATCH] ACS: always discard DFS channels when DFS isn't allowed
Nicolas Escande
- [PATCH] ACS: honor acs_exclude_dfs with hostapd's ACS implementation
Nicolas Escande
- [PATCH] Current auth mode should be set as real auth type when authentication is in progress. Wpa has property "State" which indicating the authentication stage already. I think set auth mode as "INACTIVE" in all auth progress seems not good idea, because sometimes we need to handle this connection according to auth type even authentication is not complete. For exsample, NetworkManager may recall ask-password-dialog when auth mode is "wpa-psk" and "sae", try next access point when auth mode is "EAP-xx" when password is incorrect. Since "CurrentAuthMode" is set as "INACTIVE" in all situation, we do not know how to handle it.
ArisAachen
- [PATCH] Current auth mode should be set as real auth type when authentication is in progress. Wpa has property "State" which indicating the authentication stage already. I think set auth mode as "INACTIVE" in all auth progress seems not good idea, because sometimes we need to handle this connection according to auth type even authentication is not complete. For exsample, NetworkManager may recall ask-password-dialog when auth mode is "wpa-psk" and "sae", try next access point when auth mode is "EAP-xx" when password is incorrect. Since "CurrentAuthMode" is set as "INACTIVE" in all situation, we do not know how to handle it.
Jan Ceuleers
- [PATCH] Current auth mode should be set as real auth type when authentication is in progress. Wpa has property "State" which indicating the authentication stage already. I think set auth mode as "INACTIVE" in all auth progress seems not good idea, because sometimes we need to handle this connection according to auth type even authentication is not complete. For exsample, NetworkManager may recall ask-password-dialog when auth mode is "wpa-psk" and "sae", try next access point when auth mode is "EAP-xx" when password is incorrect. Since "CurrentAuthMode" is set as "INACTIVE" in all situation, we do not know how to handle it.
Jouni Malinen
- [PATCH] D-Bus: Add 'wep_disabled' capability
Lubomir Rintel
- [PATCH] D-Bus: Add 'wep_disabled' capability
d. caratti
- [PATCH] D-Bus: Add 'wep_disabled' capability
Jouni Malinen
- [PATCH] Don't let cac_time_left_seconds overflow
Nicolas Escande
- [PATCH] Don't let cac_time_left_seconds overflow
Nicolas Escande
- [PATCH] Don't let cac_time_left_seconds overflow
Jouni Malinen
- [PATCH] Fix MIN() macro
Baligh Gasmi
- [PATCH] hostapd: add the missing CONFIG_SAE option to the defconfig
yegorslists at googlemail.com
- [PATCH] RRM: include passive channels in active beacon report scan
Andrei Otcheretianski
- [PATCH] src/common/dpp_crypto.c : fix uninitialised variable
Alasdair Mackintosh
- [PATCH] src/common/dpp_crypto.c : fix uninitialised variable
Jan Ceuleers
- [PATCH] src/common/dpp_crypto.c : fix uninitialised variable
Jouni Malinen
- [PATCH] src/common: fix typos
Jouni Malinen
- [PATCH] src/drivers: fix typos
Jouni Malinen
- [PATCH] wolfSSL: Add the server bit according to the openssl code
Masashi Honma
- [PATCH] wolfSSL: Add the server bit according to the openssl code
Jouni Malinen
- [PATCH] wolfSSL: Add the server bit according to the openssl code
Masashi Honma
- [PATCH] wpa_supplicant: Do not associate on 6GHz with invalid AP
Andrei Otcheretianski
- [PATCH] wpa_supplicant: Do not associate on 6GHz with invalid AP
Jouni Malinen
- [PATCH] wpa_supplicant: Do not associate on 6GHz with invalid AP
Otcheretianski, Andrei
- [PATCH v2 0/5] introduce background radar detection support
Lorenzo Bianconi
- [PATCH v2 0/5] introduce background radar detection support
Jouni Malinen
- [PATCH v2 1/5] DFS: rely on channel_type in dfs_downgrade_bandwidth signature
Lorenzo Bianconi
- [PATCH v2 2/5] DFS: configure background radar/cac detection.
Lorenzo Bianconi
- [PATCH v2 3/5] DFS: introduce hostapd_dfs_request_channel_switch routine
Lorenzo Bianconi
- [PATCH v2 4/5] DFS: enable CSA for background radar detection
Lorenzo Bianconi
- [PATCH v2 5/5] DFS: switch to background radar channel if available
Lorenzo Bianconi
- [PATCH v2] cleanup: remove unreachable code
Jouni Malinen
- [PATCH v2] SAE: Add support for RADIUS passphrase
Jouni Malinen
- [PATCH v2] wpa_supplicant: Do not associate on 6GHz with forbidden configurations
Andrei Otcheretianski
- [PATCH v2] wpa_supplicant: Do not associate on 6GHz with forbidden configurations
Matthew Wang
- [PATCH v2] wpa_supplicant: Do not associate on 6GHz with forbidden configurations
Peer, Ilan
- [PATCH v2] wpa_supplicant: Do not associate on 6GHz with forbidden configurations
Matthew Wang
- [PATCH v3 0/5] Introduce 802.11ax bss coloring support
Lorenzo Bianconi
- [PATCH v3 1/1] build: re-enable options for libwpa_client.so and wpa_passphrase
Jouni Malinen
- [PATCH v3 1/5] bss coloring: add support for handling collision events and triggering CCA
Lorenzo Bianconi
- [PATCH v3 2/5] bss_coloring: add the code required to generate the CCA IE
Lorenzo Bianconi
- [PATCH v3 3/5] bss coloring: disable BSS color during CCA
Lorenzo Bianconi
- [PATCH v3 4/5] bss coloring: add the switch_color handler to the nl80211 driver
Lorenzo Bianconi
- [PATCH v3 5/5] bss coloring: handle the collision and CCA events coming from the kernel
Lorenzo Bianconi
- [RFC PATCH 0/4] ACS: better channel selection for 40/80/160 MHz
Nicolas Escande
- [RFC PATCH 1/4] ACS: extract bw40/80/160 freqs out of acs_usable_bwXXX_chan
Nicolas Escande
- [RFC PATCH 2/4] ACS: introduce acs_get_bwXXX_center_chan
Nicolas Escande
- [RFC PATCH 3/4] ACS: introduce acs_adjust_secondary
Nicolas Escande
- [RFC PATCH 3/4] ACS: introduce acs_adjust_secondary
Nicolas Escande
- [RFC PATCH 4/4] ACS: allow selecting a better channel when using 40/80/160MHz
Nicolas Escande
- Bug#1003907: fails to successfully associate
Andrej Shadura
- Bug#1003907: fails to successfully associate
Michael Biebl
- Bug#1003907: fails to successfully associate
Masashi Honma
- Bug#1003907: fails to successfully associate
Andrej Shadura
- Bug#1003907: fails to successfully associate
Nicolas Cavallari
- Bug#1003907: fails to successfully associate
Michael Biebl
- Bug#1003907: fails to successfully associate
Masashi Honma
- Can't connec to PEAP anymore on current Ubuntu (2.10 built with openssl3)
Sebastien Bacher
- Can't connec to PEAP anymore on current Ubuntu (2.10 built with openssl3)
Sebastien Bacher
- Fail to access RSN property with DBus if pairwise cipher suite count is 0
Deroire, Guillaume
- Fail to access RSN property with DBus if pairwise cipher suite count is 0
Deroire, Guillaume
- problem with wpa_supplicant 2.10
Mathias
- problem with wpa_supplicant 2.10
Masashi Honma
- problem with wpa_supplicant 2.10
Mathias
- Retansmitted associate requests with OWE
James Prestwood
- SIGSEGV in dpp_tcp_conn_status_requested
Alexander Clouter
- Splitting function of wireless frame reception and decryption/encrypton
Johannes Berg
- WPA3-Personal: wpa_supplicant in AP mode issue
Yegor Yefremov
- WPA3-Personal: wpa_supplicant in AP mode issue
Yegor Yefremov
- WPA3-Personal: wpa_supplicant in AP mode issue
Masashi Honma
- wpa_supplicant and OpenSSL 3.0
Bala Duvvuri
- wpa_supplicant and OpenSSL 3.0
Jouni Malinen
Last message date:
Thu Mar 31 16:46:50 PDT 2022
Archived on: Fri Apr 1 01:01:08 PDT 2022
This archive was generated by
Pipermail 0.09 (Mailman edition).