summaryrefslogtreecommitdiff
path: root/debian/patches/series
blob: e290b8dad47ec7f88c0cebf5f366b7b6453e5ed1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
01_use_pkg-config_for_pcsc-lite_module.patch
02_dbus_group_policy.patch
06_wpa_gui_menu_exec_path.patch
07_dbus_service_syslog.patch
12_wpa_gui_knotify_support.patch
wpa_gui_desktop_add-keywords-entry.patch
wpasupplicant_band_selection_aa517ae2.patch
2015-1/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch
2015-2/0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch
2015-3/0001-AP-WMM-Fix-integer-underflow-in-WMM-Action-frame-par.patch
2015-4/0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch
2015-4/0002-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch
2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch
2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch
2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch
2015-5/0001-NFC-Fix-payload-length-validation-in-NDEF-record-par.patch
2015-6/backported-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch
2015-7/0001-EAP-pwd-server-Fix-last-fragment-length-validation.patch
2015-7/0001-EAP-pwd-peer-Fix-last-fragment-length-validation.patch
2015-8/0001-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m.patch
systemd_order-wpa_supplicant-before-network.target.patch
networkd-driver-fallback.patch
wpa_supplicant_fix-dependency-odering-when-invoked-with-dbus.patch
2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
2016-1/0005-Reject-SET-commands-with-newline-characters-in-the-s.patch
dbus-fix-operations-for-p2p-mgmt.patch
nl80211_dont_call_linux_iface_up_for_a_dedicated_p2p_device.patch
do_not_wait_for_monitor_to_attach_if_no_control_interface.patch
wpa_supplicant_do_not_wait_for_monitor_on_p2p_device_interface.patch
openssl-initialise-pkcs-11.patch
from-upstream-hostapd-fix-SMPS-mode.patch
2017-1/0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch
2017-1/0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch
2017-1/0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch
2017-1/0004-Fix-TK-configuration-to-the-driver-in-EAPOL-Key-3-4-.patch
2017-1/0005-Prevent-installation-of-an-all-zero-TK.patch
2017-1/0006-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
2017-1/0007-TDLS-Reject-TPK-TK-reconfiguration.patch
# already applied in 2015-6/backported-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch
# 2017-1/0008-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame.patch
2017-1/0009-WNM-Ignore-WNM-Sleep-Mode-Response-if-WNM-Sleep-Mode.patch
2017-1/0010-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch
2017-1/0011-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch
2017-1/0012-TDLS-Ignore-incoming-TDLS-Setup-Response-retries.patch