Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Oct 2010 08:01:22 +0000 (UTC)
From:      Rui Paulo <rpaulo@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-vendor@freebsd.org
Subject:   svn commit: r214501 - in vendor/wpa/dist: hostapd patches src src/ap src/common src/crypto src/drivers src/eap_common src/eap_peer src/eap_server src/eapol_auth src/eapol_supp src/hlr_auc_gw src/l2...
Message-ID:  <201010290801.o9T81MdV075661@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rpaulo
Date: Fri Oct 29 08:01:21 2010
New Revision: 214501
URL: http://svn.freebsd.org/changeset/base/214501

Log:
  Import wpa_supplicant / hostapd 0.7.3.
  
  Changes:
  
  2010-09-07 - v0.7.3
  	* fixed fallback from failed PMKSA caching into full EAP authentication
  	  [Bug 355]
  	* fixed issue with early D-Bus signals during initialization
  	* fixed X.509 name handling in internal TLS
  	* fixed WPS ER to use corrent Enrollee MAC Address in Credential
  	* fixed scanning routines ot improve AP selection for WPS
  	* added WPS workaround for open networks
  	* fixed WPS Diffie-Hellman derivation to use correct public key length
  	* fixed wpa_supplicant AP mode operations to ignore Supplicant and
  	  scan result events
  	* improved SME operations with nl80211
  	* fixed WPS ER event_id handling in some cases
  	* fixed some issues with bgscan simple to avoid unnecessary scans
  	* fixed issue with l2_packet_ndis overlapped writes corrupting stack
  	  [Bug 328]
  	* updated WinPcap to the latest stable version 4.1.2 in Windows
  	  installer
  
  2010-04-18 - v0.7.2
  	* nl80211: fixed number of issues with roaming
  	* avoid unnecessary roaming if multiple APs with similar signal
  	  strength are present in scan results
  	* add TLS client events and server probing to ease design of
  	  automatic detection of EAP parameters
  	* add option for server certificate matching (SHA256 hash of the
  	  certificate) instead of trusted CA certificate configuration
  	* bsd: Cleaned up driver wrapper and added various low-level
  	  configuration options
  	* wpa_gui-qt4: do not show too frequent WPS AP available events as
  	  tray messages
  	* TNC: fixed issues with fragmentation
  	* EAP-TNC: add Flags field into fragment acknowledgement (needed to
  	  interoperate with other implementations; may potentially breaks
  	  compatibility with older wpa_supplicant/hostapd versions)
  	* wpa_cli: added option for using a separate process to receive event
  	  messages to reduce latency in showing these
  	  (CFLAGS += -DCONFIG_WPA_CLI_FORK=y in .config to enable this)
  	* maximum BSS table size can now be configured (bss_max_count)
  	* BSSes to be included in the BSS table can be filtered based on
  	  configured SSIDs to save memory (filter_ssids)
  	* fix number of issues with IEEE 802.11r/FT; this version is not
  	  backwards compatible with old versions
  	* nl80211: add support for IEEE 802.11r/FT protocol (both over-the-air
  	  and over-the-DS)
  	* add freq_list network configuration parameter to allow the AP
  	  selection to filter out entries based on the operating channel
  	* add signal strength change events for bgscan; this allows more
  	  dynamic changes to background scanning interval based on changes in
  	  the signal strength with the current AP; this improves roaming within
  	  ESS quite a bit, e.g., with bgscan="simple:30:-45:300" in the network
  	  configuration block to request background scans less frequently when
  	  signal strength remains good and to automatically trigger background
  	  scans whenever signal strength drops noticeably
  	  (this is currently only available with nl80211)
  	* add BSSID and reason code (if available) to disconnect event messages
  	* wpa_gui-qt4: more complete support for translating the GUI with
  	  linguist and add German translation
  	* fix DH padding with internal crypto code (mainly, for WPS)
  	* do not trigger initial scan automatically anymore if there are no
  	  enabled networks
  
  2010-01-16 - v0.7.1
  	* cleaned up driver wrapper API (struct wpa_driver_ops); the new API
  	  is not fully backwards compatible, so out-of-tree driver wrappers
  	  will need modifications
  	* cleaned up various module interfaces
  	* merge hostapd and wpa_supplicant developers' documentation into a
  	  single document
  	* nl80211: use explicit deauthentication to clear cfg80211 state to
  	  avoid issues when roaming between APs
  	* dbus: major design changes in the new D-Bus API
  	  (fi.w1.wpa_supplicant1)
  	* nl80211: added support for IBSS networks
  	* added internal debugging mechanism with backtrace support and memory
  	  allocation/freeing validation, etc. tests (CONFIG_WPA_TRACE=y)
  	* added WPS ER unsubscription command to more cleanly unregister from
  	  receiving UPnP events when ER is terminated
  	* cleaned up AP mode operations to avoid need for virtual driver_ops
  	  wrapper
  	* added BSS table to maintain more complete scan result information
  	  over multiple scans (that may include only partial results)
  	* wpa_gui-qt4: update Peers dialog information more dynamically while
  	  the dialog is kept open
  	* fixed PKCS#12 use with OpenSSL 1.0.0
  	* driver_wext: Added cfg80211-specific optimization to avoid some
  	  unnecessary scans and to speed up association
  
  2009-11-21 - v0.7.0
  	* increased wpa_cli ping interval to 5 seconds and made this
  	  configurable with a new command line options (-G<seconds>)
  	* fixed scan buffer processing with WEXT to handle up to 65535
  	  byte result buffer (previously, limited to 32768 bytes)
  	* allow multiple driver wrappers to be specified on command line
  	  (e.g., -Dnl80211,wext); the first one that is able to initialize the
  	  interface will be used
  	* added support for multiple SSIDs per scan request to optimize
  	  scan_ssid=1 operations in ap_scan=1 mode (i.e., search for hidden
  	  SSIDs); this requires driver support and can currently be used only
  	  with nl80211
  	* added support for WPS USBA out-of-band mechanism with USB Flash
  	  Drives (UFD) (CONFIG_WPS_UFD=y)
  	* driver_ndis: add PAE group address to the multicast address list to
  	  fix wired IEEE 802.1X authentication
  	* fixed IEEE 802.11r key derivation function to match with the standard
  	  (note: this breaks interoperability with previous version) [Bug 303]
  	* added better support for drivers that allow separate authentication
  	  and association commands (e.g., mac80211-based Linux drivers with
  	  nl80211; SME in wpa_supplicant); this allows over-the-air FT protocol
  	  to be used (IEEE 802.11r)
  	* fixed SHA-256 based key derivation function to match with the
  	  standard when using CCMP (for IEEE 802.11r and IEEE 802.11w)
  	  (note: this breaks interoperability with previous version) [Bug 307]
  	* use shared driver wrapper files with hostapd
  	* added AP mode functionality (CONFIG_AP=y) with mode=2 in the network
  	  block; this can be used for open and WPA2-Personal networks
  	  (optionally, with WPS); this links in parts of hostapd functionality
  	  into wpa_supplicant
  	* wpa_gui-qt4: added new Peers dialog to show information about peers
  	  (other devices, including APs and stations, etc. in the neighborhood)
  	* added support for WPS External Registrar functionality (configure APs
  	  and enroll new devices); can be used with wpa_gui-qt4 Peers dialog
  	  and wpa_cli commands wps_er_start, wps_er_stop, wps_er_pin,
  	  wps_er_pbc, wps_er_learn
  	  (this can also be used with a new 'none' driver wrapper if no
  	  wireless device or IEEE 802.1X on wired is needed)
  	* driver_nl80211: multiple updates to provide support for new Linux
  	  nl80211/mac80211 functionality
  	* updated management frame protection to use IEEE Std 802.11w-2009
  	* fixed number of small WPS issues and added workarounds to
  	  interoperate with common deployed broken implementations
  	* added support for NFC out-of-band mechanism with WPS
  	* driver_ndis: fixed wired IEEE 802.1X authentication with PAE group
  	  address frames
  	* added preliminary support for IEEE 802.11r RIC processing
  	* added support for specifying subset of enabled frequencies to scan
  	  (scan_freq option in the network configuration block); this can speed
  	  up scanning process considerably if it is known that only a small
  	  subset of channels is actually used in the network (this is currently
  	  supported only with -Dnl80211)
  	* added a workaround for race condition between receiving the
  	  association event and the following EAPOL-Key
  	* added background scan and roaming infrastructure to allow
  	  network-specific optimizations to be used to improve roaming within
  	  an ESS (same SSID)
  	* added new DBus interface (fi.w1.wpa_supplicant1)

Added:
  vendor/wpa/dist/patches/
  vendor/wpa/dist/patches/openssl-0.9.8-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.8d-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.8e-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.8g-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.8h-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.8i-tls-extensions.patch
  vendor/wpa/dist/patches/openssl-0.9.9-session-ticket.patch
  vendor/wpa/dist/src/ap/
  vendor/wpa/dist/src/ap/Makefile   (contents, props changed)
  vendor/wpa/dist/src/ap/accounting.c   (contents, props changed)
  vendor/wpa/dist/src/ap/accounting.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_config.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_config.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_drv_ops.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_drv_ops.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_list.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_list.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_mlme.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ap_mlme.h   (contents, props changed)
  vendor/wpa/dist/src/ap/authsrv.c   (contents, props changed)
  vendor/wpa/dist/src/ap/authsrv.h   (contents, props changed)
  vendor/wpa/dist/src/ap/beacon.c   (contents, props changed)
  vendor/wpa/dist/src/ap/beacon.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ctrl_iface_ap.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ctrl_iface_ap.h   (contents, props changed)
  vendor/wpa/dist/src/ap/drv_callbacks.c   (contents, props changed)
  vendor/wpa/dist/src/ap/hostapd.c   (contents, props changed)
  vendor/wpa/dist/src/ap/hostapd.h   (contents, props changed)
  vendor/wpa/dist/src/ap/hw_features.c   (contents, props changed)
  vendor/wpa/dist/src/ap/hw_features.h   (contents, props changed)
  vendor/wpa/dist/src/ap/iapp.c   (contents, props changed)
  vendor/wpa/dist/src/ap/iapp.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_11.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_11.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_11_auth.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_11_auth.h   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_11_ht.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_1x.c   (contents, props changed)
  vendor/wpa/dist/src/ap/ieee802_1x.h   (contents, props changed)
  vendor/wpa/dist/src/ap/peerkey_auth.c   (contents, props changed)
  vendor/wpa/dist/src/ap/pmksa_cache_auth.c   (contents, props changed)
  vendor/wpa/dist/src/ap/pmksa_cache_auth.h   (contents, props changed)
  vendor/wpa/dist/src/ap/preauth_auth.c   (contents, props changed)
  vendor/wpa/dist/src/ap/preauth_auth.h   (contents, props changed)
  vendor/wpa/dist/src/ap/sta_info.c   (contents, props changed)
  vendor/wpa/dist/src/ap/sta_info.h   (contents, props changed)
  vendor/wpa/dist/src/ap/tkip_countermeasures.c   (contents, props changed)
  vendor/wpa/dist/src/ap/tkip_countermeasures.h   (contents, props changed)
  vendor/wpa/dist/src/ap/utils.c   (contents, props changed)
  vendor/wpa/dist/src/ap/vlan_init.c   (contents, props changed)
  vendor/wpa/dist/src/ap/vlan_init.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wmm.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wmm.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_ft.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_glue.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_glue.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_i.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_ie.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wpa_auth_ie.h   (contents, props changed)
  vendor/wpa/dist/src/ap/wps_hostapd.c   (contents, props changed)
  vendor/wpa/dist/src/ap/wps_hostapd.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/.gitignore
  vendor/wpa/dist/src/crypto/aes-cbc.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-ctr.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-eax.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-encblock.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-internal-dec.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-internal-enc.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-omac1.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-unwrap.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes-wrap.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/aes_i.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/crypto_internal-cipher.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/crypto_internal-modexp.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/crypto_internal-rsa.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/crypto_nss.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/des-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/des_i.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/dh_group5.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/dh_group5.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/fips_prf_cryptoapi.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/fips_prf_gnutls.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/fips_prf_internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/fips_prf_nss.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/fips_prf_openssl.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/md4-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/md5-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/md5-non-fips.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/md5_i.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/milenage.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/milenage.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha1-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha1-pbkdf2.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha1-tlsprf.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha1-tprf.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha1_i.h   (contents, props changed)
  vendor/wpa/dist/src/crypto/sha256-internal.c   (contents, props changed)
  vendor/wpa/dist/src/crypto/tls_nss.c   (contents, props changed)
  vendor/wpa/dist/src/drivers/.gitignore
  vendor/wpa/dist/src/drivers/driver_atheros.c   (contents, props changed)
  vendor/wpa/dist/src/drivers/driver_none.c   (contents, props changed)
  vendor/wpa/dist/src/drivers/drivers.mak
  vendor/wpa/dist/src/drivers/linux_ioctl.c   (contents, props changed)
  vendor/wpa/dist/src/drivers/linux_ioctl.h   (contents, props changed)
  vendor/wpa/dist/src/drivers/netlink.c   (contents, props changed)
  vendor/wpa/dist/src/drivers/netlink.h   (contents, props changed)
  vendor/wpa/dist/src/drivers/nl80211_copy.h   (contents, props changed)
  vendor/wpa/dist/src/drivers/wireless_copy.h   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_aka.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_fast.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_gpsk.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_gtc.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_identity.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_ikev2.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_md5.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_methods.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_mschapv2.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_pax.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_peap.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_psk.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_sake.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_sim.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_tls.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_tls_common.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_tnc.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_ttls.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_vendor_test.c   (contents, props changed)
  vendor/wpa/dist/src/eap_server/eap_server_wsc.c   (contents, props changed)
  vendor/wpa/dist/src/eapol_auth/
  vendor/wpa/dist/src/eapol_auth/Makefile   (contents, props changed)
  vendor/wpa/dist/src/eapol_auth/eapol_auth_dump.c   (contents, props changed)
  vendor/wpa/dist/src/eapol_auth/eapol_auth_sm.c   (contents, props changed)
  vendor/wpa/dist/src/eapol_auth/eapol_auth_sm.h   (contents, props changed)
  vendor/wpa/dist/src/eapol_auth/eapol_auth_sm_i.h   (contents, props changed)
  vendor/wpa/dist/src/lib.rules
  vendor/wpa/dist/src/radius/.gitignore
  vendor/wpa/dist/src/tls/.gitignore
  vendor/wpa/dist/src/tls/pkcs1.c   (contents, props changed)
  vendor/wpa/dist/src/tls/pkcs1.h   (contents, props changed)
  vendor/wpa/dist/src/tls/pkcs5.c   (contents, props changed)
  vendor/wpa/dist/src/tls/pkcs5.h   (contents, props changed)
  vendor/wpa/dist/src/tls/pkcs8.c   (contents, props changed)
  vendor/wpa/dist/src/tls/pkcs8.h   (contents, props changed)
  vendor/wpa/dist/src/utils/.gitignore
  vendor/wpa/dist/src/utils/list.h   (contents, props changed)
  vendor/wpa/dist/src/utils/radiotap.c   (contents, props changed)
  vendor/wpa/dist/src/utils/radiotap.h   (contents, props changed)
  vendor/wpa/dist/src/utils/radiotap_iter.h   (contents, props changed)
  vendor/wpa/dist/src/utils/trace.c   (contents, props changed)
  vendor/wpa/dist/src/utils/trace.h   (contents, props changed)
  vendor/wpa/dist/src/wps/http.h   (contents, props changed)
  vendor/wpa/dist/src/wps/http_client.c   (contents, props changed)
  vendor/wpa/dist/src/wps/http_client.h   (contents, props changed)
  vendor/wpa/dist/src/wps/http_server.c   (contents, props changed)
  vendor/wpa/dist/src/wps/http_server.h   (contents, props changed)
  vendor/wpa/dist/src/wps/ndef.c   (contents, props changed)
  vendor/wpa/dist/src/wps/upnp_xml.c   (contents, props changed)
  vendor/wpa/dist/src/wps/upnp_xml.h   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_er.c   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_er.h   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_er_ssdp.c   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_nfc.c   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_nfc_pn531.c   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_ufd.c   (contents, props changed)
  vendor/wpa/dist/src/wps/wps_upnp_ap.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/.gitignore
  vendor/wpa/dist/wpa_supplicant/ap.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/ap.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/bgscan.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/bgscan.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/bgscan_simple.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/bss.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/bss.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/
  vendor/wpa/dist/wpa_supplicant/dbus/.gitignore
  vendor/wpa/dist/wpa_supplicant/dbus/Makefile   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus-wpa_supplicant.conf   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_common.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_common.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_common_i.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_dict_helpers.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_dict_helpers.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_handlers.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_handlers.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_handlers_wps.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_helpers.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_helpers.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_new_introspect.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_old.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_old.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_old_handlers.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_old_handlers.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/dbus_old_handlers_wps.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/dbus/fi.epitest.hostap.WPASupplicant.service
  vendor/wpa/dist/wpa_supplicant/dbus/fi.w1.wpa_supplicant1.service
  vendor/wpa/dist/wpa_supplicant/doc/docbook/.gitignore
  vendor/wpa/dist/wpa_supplicant/driver_i.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/eap_register.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/examples/60_wpa_supplicant   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/examples/wpas-dbus-new-getall.py   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/examples/wpas-dbus-new-signals.py   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/examples/wpas-dbus-new-wps.py   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/examples/wpas-dbus-new.py   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/ibss_rsn.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/ibss_rsn.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/notify.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/notify.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/scan.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/sme.c   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/sme.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/.gitignore
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons/ap.svg
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons/laptop.svg
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/lang/
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/lang/.gitignore
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/lang/wpa_gui_de.ts
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/peers.cpp   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/peers.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/peers.ui
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/stringquery.cpp   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/stringquery.h   (contents, props changed)
  vendor/wpa/dist/wpa_supplicant/wpa_gui/.gitignore
  vendor/wpa/dist/wpa_supplicant/xcode/
  vendor/wpa/dist/wpa_supplicant/xcode/wpa_supplicant.xcodeproj/
  vendor/wpa/dist/wpa_supplicant/xcode/wpa_supplicant.xcodeproj/project.pbxproj
Deleted:
  vendor/wpa/dist/hostapd/
  vendor/wpa/dist/src/common/nl80211_copy.h
  vendor/wpa/dist/src/common/wireless_copy.h
  vendor/wpa/dist/src/crypto/aes.c
  vendor/wpa/dist/src/crypto/aes_wrap.c
  vendor/wpa/dist/src/crypto/des.c
  vendor/wpa/dist/src/crypto/md4.c
  vendor/wpa/dist/src/crypto/rc4.h
  vendor/wpa/dist/src/drivers/driver_prism54.c
  vendor/wpa/dist/src/drivers/driver_ps3.c
  vendor/wpa/dist/src/drivers/radiotap.c
  vendor/wpa/dist/src/drivers/radiotap.h
  vendor/wpa/dist/src/drivers/radiotap_iter.h
  vendor/wpa/dist/src/drivers/scan_helpers.c
  vendor/wpa/dist/src/eap_server/eap.c
  vendor/wpa/dist/src/eap_server/eap_aka.c
  vendor/wpa/dist/src/eap_server/eap_fast.c
  vendor/wpa/dist/src/eap_server/eap_gpsk.c
  vendor/wpa/dist/src/eap_server/eap_gtc.c
  vendor/wpa/dist/src/eap_server/eap_identity.c
  vendor/wpa/dist/src/eap_server/eap_ikev2.c
  vendor/wpa/dist/src/eap_server/eap_md5.c
  vendor/wpa/dist/src/eap_server/eap_methods.c
  vendor/wpa/dist/src/eap_server/eap_mschapv2.c
  vendor/wpa/dist/src/eap_server/eap_pax.c
  vendor/wpa/dist/src/eap_server/eap_peap.c
  vendor/wpa/dist/src/eap_server/eap_psk.c
  vendor/wpa/dist/src/eap_server/eap_sake.c
  vendor/wpa/dist/src/eap_server/eap_sim.c
  vendor/wpa/dist/src/eap_server/eap_tls.c
  vendor/wpa/dist/src/eap_server/eap_tls_common.c
  vendor/wpa/dist/src/eap_server/eap_tnc.c
  vendor/wpa/dist/src/eap_server/eap_ttls.c
  vendor/wpa/dist/src/eap_server/eap_vendor_test.c
  vendor/wpa/dist/src/eap_server/eap_wsc.c
  vendor/wpa/dist/src/hlr_auc_gw/Makefile
  vendor/wpa/dist/src/hlr_auc_gw/hlr_auc_gw.c
  vendor/wpa/dist/src/hlr_auc_gw/hlr_auc_gw.milenage_db
  vendor/wpa/dist/src/hlr_auc_gw/milenage.c
  vendor/wpa/dist/src/hlr_auc_gw/milenage.h
  vendor/wpa/dist/src/tls/asn1_test.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_dbus.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_dbus.h
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_dbus_handlers.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_dbus_handlers.h
  vendor/wpa/dist/wpa_supplicant/dbus-wpa_supplicant.conf
  vendor/wpa/dist/wpa_supplicant/dbus-wpa_supplicant.service
  vendor/wpa/dist/wpa_supplicant/dbus_dict_helpers.c
  vendor/wpa/dist/wpa_supplicant/dbus_dict_helpers.h
  vendor/wpa/dist/wpa_supplicant/doc/code_structure.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/ctrl_iface.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/doxygen.fast
  vendor/wpa/dist/wpa_supplicant/doc/doxygen.full
  vendor/wpa/dist/wpa_supplicant/doc/driver_wrapper.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/eap.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/kerneldoc2doxygen.pl
  vendor/wpa/dist/wpa_supplicant/doc/mainpage.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/porting.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/testing_tools.doxygen
  vendor/wpa/dist/wpa_supplicant/doc/wpa_supplicant.fig
  vendor/wpa/dist/wpa_supplicant/tests/test_aes.c
  vendor/wpa/dist/wpa_supplicant/tests/test_md4.c
  vendor/wpa/dist/wpa_supplicant/tests/test_md5.c
  vendor/wpa/dist/wpa_supplicant/tests/test_ms_funcs.c
  vendor/wpa/dist/wpa_supplicant/tests/test_sha1.c
  vendor/wpa/dist/wpa_supplicant/tests/test_sha256.c
  vendor/wpa/dist/wpa_supplicant/tests/test_x509v3.c
  vendor/wpa/dist/wpa_supplicant/tests/test_x509v3_nist.sh
  vendor/wpa/dist/wpa_supplicant/tests/test_x509v3_nist2.sh
Modified:
  vendor/wpa/dist/src/Makefile
  vendor/wpa/dist/src/common/Makefile
  vendor/wpa/dist/src/common/defs.h
  vendor/wpa/dist/src/common/ieee802_11_common.c
  vendor/wpa/dist/src/common/ieee802_11_common.h
  vendor/wpa/dist/src/common/ieee802_11_defs.h
  vendor/wpa/dist/src/common/privsep_commands.h
  vendor/wpa/dist/src/common/version.h
  vendor/wpa/dist/src/common/wpa_common.c
  vendor/wpa/dist/src/common/wpa_common.h
  vendor/wpa/dist/src/common/wpa_ctrl.h
  vendor/wpa/dist/src/crypto/Makefile
  vendor/wpa/dist/src/crypto/aes.h
  vendor/wpa/dist/src/crypto/crypto.h
  vendor/wpa/dist/src/crypto/crypto_cryptoapi.c
  vendor/wpa/dist/src/crypto/crypto_gnutls.c
  vendor/wpa/dist/src/crypto/crypto_internal.c
  vendor/wpa/dist/src/crypto/crypto_libtomcrypt.c
  vendor/wpa/dist/src/crypto/crypto_none.c
  vendor/wpa/dist/src/crypto/crypto_openssl.c
  vendor/wpa/dist/src/crypto/dh_groups.c
  vendor/wpa/dist/src/crypto/md5.c
  vendor/wpa/dist/src/crypto/md5.h
  vendor/wpa/dist/src/crypto/ms_funcs.c
  vendor/wpa/dist/src/crypto/ms_funcs.h
  vendor/wpa/dist/src/crypto/rc4.c
  vendor/wpa/dist/src/crypto/sha1.c
  vendor/wpa/dist/src/crypto/sha1.h
  vendor/wpa/dist/src/crypto/sha256.c
  vendor/wpa/dist/src/crypto/tls.h
  vendor/wpa/dist/src/crypto/tls_gnutls.c
  vendor/wpa/dist/src/crypto/tls_internal.c
  vendor/wpa/dist/src/crypto/tls_none.c
  vendor/wpa/dist/src/crypto/tls_openssl.c
  vendor/wpa/dist/src/crypto/tls_schannel.c
  vendor/wpa/dist/src/drivers/Makefile
  vendor/wpa/dist/src/drivers/driver.h
  vendor/wpa/dist/src/drivers/driver_atmel.c
  vendor/wpa/dist/src/drivers/driver_broadcom.c
  vendor/wpa/dist/src/drivers/driver_bsd.c
  vendor/wpa/dist/src/drivers/driver_hostap.c
  vendor/wpa/dist/src/drivers/driver_hostap.h
  vendor/wpa/dist/src/drivers/driver_iphone.m
  vendor/wpa/dist/src/drivers/driver_ipw.c
  vendor/wpa/dist/src/drivers/driver_madwifi.c
  vendor/wpa/dist/src/drivers/driver_ndis.c
  vendor/wpa/dist/src/drivers/driver_ndis.h
  vendor/wpa/dist/src/drivers/driver_ndiswrapper.c
  vendor/wpa/dist/src/drivers/driver_nl80211.c
  vendor/wpa/dist/src/drivers/driver_osx.m
  vendor/wpa/dist/src/drivers/driver_privsep.c
  vendor/wpa/dist/src/drivers/driver_ralink.c
  vendor/wpa/dist/src/drivers/driver_ralink.h
  vendor/wpa/dist/src/drivers/driver_roboswitch.c
  vendor/wpa/dist/src/drivers/driver_test.c
  vendor/wpa/dist/src/drivers/driver_wext.c
  vendor/wpa/dist/src/drivers/driver_wext.h
  vendor/wpa/dist/src/drivers/driver_wired.c
  vendor/wpa/dist/src/drivers/drivers.c
  vendor/wpa/dist/src/drivers/priv_netlink.h
  vendor/wpa/dist/src/eap_common/Makefile
  vendor/wpa/dist/src/eap_common/chap.c
  vendor/wpa/dist/src/eap_common/chap.h
  vendor/wpa/dist/src/eap_common/eap_fast_common.c
  vendor/wpa/dist/src/eap_common/eap_gpsk_common.c
  vendor/wpa/dist/src/eap_common/eap_pax_common.c
  vendor/wpa/dist/src/eap_common/eap_peap_common.c
  vendor/wpa/dist/src/eap_common/eap_psk_common.c
  vendor/wpa/dist/src/eap_common/eap_sake_common.c
  vendor/wpa/dist/src/eap_common/eap_sim_common.c
  vendor/wpa/dist/src/eap_common/eap_sim_common.h
  vendor/wpa/dist/src/eap_common/ikev2_common.c
  vendor/wpa/dist/src/eap_peer/Makefile
  vendor/wpa/dist/src/eap_peer/eap.c
  vendor/wpa/dist/src/eap_peer/eap.h
  vendor/wpa/dist/src/eap_peer/eap_aka.c
  vendor/wpa/dist/src/eap_peer/eap_config.h
  vendor/wpa/dist/src/eap_peer/eap_fast.c
  vendor/wpa/dist/src/eap_peer/eap_fast_pac.c
  vendor/wpa/dist/src/eap_peer/eap_leap.c
  vendor/wpa/dist/src/eap_peer/eap_md5.c
  vendor/wpa/dist/src/eap_peer/eap_methods.c
  vendor/wpa/dist/src/eap_peer/eap_methods.h
  vendor/wpa/dist/src/eap_peer/eap_mschapv2.c
  vendor/wpa/dist/src/eap_peer/eap_pax.c
  vendor/wpa/dist/src/eap_peer/eap_peap.c
  vendor/wpa/dist/src/eap_peer/eap_psk.c
  vendor/wpa/dist/src/eap_peer/eap_sim.c
  vendor/wpa/dist/src/eap_peer/eap_tls.c
  vendor/wpa/dist/src/eap_peer/eap_tls_common.c
  vendor/wpa/dist/src/eap_peer/eap_tls_common.h
  vendor/wpa/dist/src/eap_peer/eap_tnc.c
  vendor/wpa/dist/src/eap_peer/eap_ttls.c
  vendor/wpa/dist/src/eap_peer/eap_wsc.c
  vendor/wpa/dist/src/eap_peer/ikev2.c
  vendor/wpa/dist/src/eap_peer/mschapv2.c
  vendor/wpa/dist/src/eap_peer/mschapv2.h
  vendor/wpa/dist/src/eap_server/Makefile
  vendor/wpa/dist/src/eap_server/eap.h
  vendor/wpa/dist/src/eap_server/eap_i.h
  vendor/wpa/dist/src/eap_server/eap_methods.h
  vendor/wpa/dist/src/eap_server/eap_sim_db.c
  vendor/wpa/dist/src/eap_server/eap_sim_db.h
  vendor/wpa/dist/src/eap_server/eap_tls_common.h
  vendor/wpa/dist/src/eap_server/ikev2.c
  vendor/wpa/dist/src/eap_server/tncs.c
  vendor/wpa/dist/src/eapol_supp/Makefile
  vendor/wpa/dist/src/eapol_supp/eapol_supp_sm.c
  vendor/wpa/dist/src/eapol_supp/eapol_supp_sm.h
  vendor/wpa/dist/src/l2_packet/Makefile
  vendor/wpa/dist/src/l2_packet/l2_packet_freebsd.c
  vendor/wpa/dist/src/l2_packet/l2_packet_ndis.c
  vendor/wpa/dist/src/l2_packet/l2_packet_privsep.c
  vendor/wpa/dist/src/radius/Makefile
  vendor/wpa/dist/src/radius/radius.c
  vendor/wpa/dist/src/radius/radius.h
  vendor/wpa/dist/src/radius/radius_client.c
  vendor/wpa/dist/src/radius/radius_client.h
  vendor/wpa/dist/src/radius/radius_server.c
  vendor/wpa/dist/src/radius/radius_server.h
  vendor/wpa/dist/src/rsn_supp/Makefile
  vendor/wpa/dist/src/rsn_supp/peerkey.c
  vendor/wpa/dist/src/rsn_supp/pmksa_cache.c
  vendor/wpa/dist/src/rsn_supp/pmksa_cache.h
  vendor/wpa/dist/src/rsn_supp/preauth.c
  vendor/wpa/dist/src/rsn_supp/preauth.h
  vendor/wpa/dist/src/rsn_supp/wpa.c
  vendor/wpa/dist/src/rsn_supp/wpa.h
  vendor/wpa/dist/src/rsn_supp/wpa_ft.c
  vendor/wpa/dist/src/rsn_supp/wpa_i.h
  vendor/wpa/dist/src/rsn_supp/wpa_ie.c
  vendor/wpa/dist/src/rsn_supp/wpa_ie.h
  vendor/wpa/dist/src/tls/Makefile
  vendor/wpa/dist/src/tls/asn1.c
  vendor/wpa/dist/src/tls/asn1.h
  vendor/wpa/dist/src/tls/rsa.c
  vendor/wpa/dist/src/tls/tlsv1_client.c
  vendor/wpa/dist/src/tls/tlsv1_client_read.c
  vendor/wpa/dist/src/tls/tlsv1_client_write.c
  vendor/wpa/dist/src/tls/tlsv1_common.h
  vendor/wpa/dist/src/tls/tlsv1_cred.c
  vendor/wpa/dist/src/tls/tlsv1_record.c
  vendor/wpa/dist/src/tls/tlsv1_record.h
  vendor/wpa/dist/src/tls/tlsv1_server.c
  vendor/wpa/dist/src/tls/tlsv1_server_read.c
  vendor/wpa/dist/src/tls/tlsv1_server_write.c
  vendor/wpa/dist/src/tls/x509v3.c
  vendor/wpa/dist/src/tls/x509v3.h
  vendor/wpa/dist/src/utils/Makefile
  vendor/wpa/dist/src/utils/base64.c
  vendor/wpa/dist/src/utils/build_config.h
  vendor/wpa/dist/src/utils/common.c
  vendor/wpa/dist/src/utils/common.h
  vendor/wpa/dist/src/utils/eloop.c
  vendor/wpa/dist/src/utils/eloop.h
  vendor/wpa/dist/src/utils/eloop_none.c
  vendor/wpa/dist/src/utils/eloop_win.c
  vendor/wpa/dist/src/utils/ip_addr.h
  vendor/wpa/dist/src/utils/os.h
  vendor/wpa/dist/src/utils/os_internal.c
  vendor/wpa/dist/src/utils/os_unix.c
  vendor/wpa/dist/src/utils/uuid.c
  vendor/wpa/dist/src/utils/uuid.h
  vendor/wpa/dist/src/utils/wpa_debug.c
  vendor/wpa/dist/src/utils/wpa_debug.h
  vendor/wpa/dist/src/utils/wpabuf.c
  vendor/wpa/dist/src/utils/wpabuf.h
  vendor/wpa/dist/src/wps/Makefile
  vendor/wpa/dist/src/wps/httpread.c
  vendor/wpa/dist/src/wps/httpread.h
  vendor/wpa/dist/src/wps/wps.c
  vendor/wpa/dist/src/wps/wps.h
  vendor/wpa/dist/src/wps/wps_attr_build.c
  vendor/wpa/dist/src/wps/wps_attr_parse.c
  vendor/wpa/dist/src/wps/wps_attr_process.c
  vendor/wpa/dist/src/wps/wps_common.c
  vendor/wpa/dist/src/wps/wps_defs.h
  vendor/wpa/dist/src/wps/wps_dev_attr.c
  vendor/wpa/dist/src/wps/wps_enrollee.c
  vendor/wpa/dist/src/wps/wps_i.h
  vendor/wpa/dist/src/wps/wps_registrar.c
  vendor/wpa/dist/src/wps/wps_upnp.c
  vendor/wpa/dist/src/wps/wps_upnp.h
  vendor/wpa/dist/src/wps/wps_upnp_event.c
  vendor/wpa/dist/src/wps/wps_upnp_i.h
  vendor/wpa/dist/src/wps/wps_upnp_ssdp.c
  vendor/wpa/dist/src/wps/wps_upnp_web.c
  vendor/wpa/dist/wpa_supplicant/ChangeLog
  vendor/wpa/dist/wpa_supplicant/Makefile
  vendor/wpa/dist/wpa_supplicant/README
  vendor/wpa/dist/wpa_supplicant/README-WPS
  vendor/wpa/dist/wpa_supplicant/config.c
  vendor/wpa/dist/wpa_supplicant/config.h
  vendor/wpa/dist/wpa_supplicant/config_file.c
  vendor/wpa/dist/wpa_supplicant/config_ssid.h
  vendor/wpa/dist/wpa_supplicant/config_winreg.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_named_pipe.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_udp.c
  vendor/wpa/dist/wpa_supplicant/ctrl_iface_unix.c
  vendor/wpa/dist/wpa_supplicant/defconfig
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_background.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_cli.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_gui.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_passphrase.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_priv.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_supplicant.8
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_supplicant.conf.5
  vendor/wpa/dist/wpa_supplicant/doc/docbook/wpa_supplicant.sgml
  vendor/wpa/dist/wpa_supplicant/eapol_test.c
  vendor/wpa/dist/wpa_supplicant/events.c
  vendor/wpa/dist/wpa_supplicant/main.c
  vendor/wpa/dist/wpa_supplicant/mlme.c
  vendor/wpa/dist/wpa_supplicant/mlme.h
  vendor/wpa/dist/wpa_supplicant/nmake.mak
  vendor/wpa/dist/wpa_supplicant/preauth_test.c
  vendor/wpa/dist/wpa_supplicant/scan.c
  vendor/wpa/dist/wpa_supplicant/symbian/wpa_supplicant.mmp
  vendor/wpa/dist/wpa_supplicant/tests/test_eap_sim_common.c
  vendor/wpa/dist/wpa_supplicant/tests/test_wpa.c
  vendor/wpa/dist/wpa_supplicant/todo.txt
  vendor/wpa/dist/wpa_supplicant/vs2005/eapol_test/eapol_test.vcproj
  vendor/wpa/dist/wpa_supplicant/vs2005/wpa_cli/wpa_cli.vcproj
  vendor/wpa/dist/wpa_supplicant/vs2005/wpa_passphrase/wpa_passphrase.vcproj
  vendor/wpa/dist/wpa_supplicant/vs2005/wpa_supplicant/wpa_supplicant.vcproj
  vendor/wpa/dist/wpa_supplicant/vs2005/wpasvc/wpasvc.vcproj
  vendor/wpa/dist/wpa_supplicant/wpa_cli.c
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/addinterface.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/eventhistory.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons.qrc
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons/Makefile
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons/README
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/icons_png.qrc
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/main.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/networkconfig.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/networkconfig.ui
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/userdatarequest.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/wpa_gui.pro
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/wpagui.cpp
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/wpagui.h
  vendor/wpa/dist/wpa_supplicant/wpa_gui-qt4/wpagui.ui
  vendor/wpa/dist/wpa_supplicant/wpa_gui/scanresults.ui
  vendor/wpa/dist/wpa_supplicant/wpa_gui/userdatarequest.ui
  vendor/wpa/dist/wpa_supplicant/wpa_gui/wpa_gui.pro
  vendor/wpa/dist/wpa_supplicant/wpa_gui/wpagui.ui
  vendor/wpa/dist/wpa_supplicant/wpa_passphrase.c
  vendor/wpa/dist/wpa_supplicant/wpa_priv.c
  vendor/wpa/dist/wpa_supplicant/wpa_supplicant.c
  vendor/wpa/dist/wpa_supplicant/wpa_supplicant.conf
  vendor/wpa/dist/wpa_supplicant/wpa_supplicant.nsi
  vendor/wpa/dist/wpa_supplicant/wpa_supplicant_i.h
  vendor/wpa/dist/wpa_supplicant/wpas_glue.c
  vendor/wpa/dist/wpa_supplicant/wps_supplicant.c
  vendor/wpa/dist/wpa_supplicant/wps_supplicant.h

Added: vendor/wpa/dist/patches/openssl-0.9.8-tls-extensions.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ vendor/wpa/dist/patches/openssl-0.9.8-tls-extensions.patch	Fri Oct 29 08:01:21 2010	(r214501)
@@ -0,0 +1,429 @@
+This patch is adding support for TLS hello extensions and externally
+generated pre-shared key material to OpenSSL 0.9.8. This is
+based on the patch from Alexey Kobozev <akobozev@cisco.com>
+(sent to openssl-dev mailing list on Tue, 07 Jun 2005 15:40:58 +0300).
+
+
+
+diff -uprN openssl-0.9.8.orig/include/openssl/ssl.h openssl-0.9.8/include/openssl/ssl.h
+--- openssl-0.9.8.orig/include/openssl/ssl.h	2005-06-10 12:51:16.000000000 -0700
++++ openssl-0.9.8/include/openssl/ssl.h	2005-07-19 20:02:15.000000000 -0700
+@@ -340,6 +340,7 @@ extern "C" {
+  * 'struct ssl_st *' function parameters used to prototype callbacks
+  * in SSL_CTX. */
+ typedef struct ssl_st *ssl_crock_st;
++typedef struct tls_extension_st TLS_EXTENSION;
+ 
+ /* used to hold info on the particular ciphers used */
+ typedef struct ssl_cipher_st
+@@ -361,6 +362,8 @@ DECLARE_STACK_OF(SSL_CIPHER)
+ typedef struct ssl_st SSL;
+ typedef struct ssl_ctx_st SSL_CTX;
+ 
++typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
++
+ /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */
+ typedef struct ssl_method_st
+ 	{
+@@ -968,6 +971,15 @@ struct ssl_st
+ 	int first_packet;
+ 	int client_version;	/* what was passed, used for
+ 				 * SSLv3/TLS rollback check */
++
++	/* TLS externsions */
++	TLS_EXTENSION *tls_extension;
++	int (*tls_extension_cb)(SSL *s, TLS_EXTENSION *tls_ext, void *arg);
++	void *tls_extension_cb_arg;
++
++	/* TLS pre-shared secret session resumption */
++	tls_session_secret_cb_fn tls_session_secret_cb;
++	void *tls_session_secret_cb_arg;
+ 	};
+ 
+ #ifdef __cplusplus
+@@ -1533,6 +1545,13 @@ void *SSL_COMP_get_compression_methods(v
+ int SSL_COMP_add_compression_method(int id,void *cm);
+ #endif
+ 
++/* TLS extensions functions */
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len);
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg);
++
++/* Pre-shared secret session resumption functions */
++int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
++
+ /* BEGIN ERROR CODES */
+ /* The following lines are auto generated by the script mkerr.pl. Any changes
+  * made after this point may be overwritten when the script is next run.
+@@ -1714,6 +1733,7 @@ void ERR_load_SSL_strings(void);
+ #define SSL_F_TLS1_ENC					 210
+ #define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
+ #define SSL_F_WRITE_PENDING				 212
++#define SSL_F_SSL_SET_HELLO_EXTENSION	 213
+ 
+ /* Reason codes. */
+ #define SSL_R_APP_DATA_IN_HANDSHAKE			 100
+diff -uprN openssl-0.9.8.orig/include/openssl/tls1.h openssl-0.9.8/include/openssl/tls1.h
+--- openssl-0.9.8.orig/include/openssl/tls1.h	2003-07-22 05:34:21.000000000 -0700
++++ openssl-0.9.8/include/openssl/tls1.h	2005-07-19 20:02:15.000000000 -0700
+@@ -282,6 +282,14 @@ extern "C" {
+ #define TLS_MD_MASTER_SECRET_CONST    "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74"  /*master secret*/
+ #endif
+ 
++/* TLS extension struct */
++struct tls_extension_st
++{
++	unsigned short type;
++	unsigned short length;
++	void *data;
++};
++
+ #ifdef  __cplusplus
+ }
+ #endif
+diff -uprN openssl-0.9.8.orig/ssl/Makefile openssl-0.9.8/ssl/Makefile
+--- openssl-0.9.8.orig/ssl/Makefile	2005-05-30 16:20:30.000000000 -0700
++++ openssl-0.9.8/ssl/Makefile	2005-07-19 20:02:15.000000000 -0700
+@@ -24,7 +24,7 @@ LIBSRC=	\
+ 	s2_meth.c   s2_srvr.c s2_clnt.c  s2_lib.c  s2_enc.c s2_pkt.c \
+ 	s3_meth.c   s3_srvr.c s3_clnt.c  s3_lib.c  s3_enc.c s3_pkt.c s3_both.c \
+ 	s23_meth.c s23_srvr.c s23_clnt.c s23_lib.c          s23_pkt.c \
+-	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c \
++	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c                    t1_ext.c \
+ 	d1_meth.c   d1_srvr.c d1_clnt.c  d1_lib.c  d1_pkt.c \
+ 	d1_both.c d1_enc.c \
+ 	ssl_lib.c ssl_err2.c ssl_cert.c ssl_sess.c \
+@@ -35,7 +35,7 @@ LIBOBJ= \
+ 	s2_meth.o  s2_srvr.o  s2_clnt.o  s2_lib.o  s2_enc.o s2_pkt.o \
+ 	s3_meth.o  s3_srvr.o  s3_clnt.o  s3_lib.o  s3_enc.o s3_pkt.o s3_both.o \
+ 	s23_meth.o s23_srvr.o s23_clnt.o s23_lib.o          s23_pkt.o \
+-	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o \
++	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o                    t1_ext.o \
+ 	d1_meth.o   d1_srvr.o d1_clnt.o  d1_lib.o  d1_pkt.o \
+ 	d1_both.o d1_enc.o \
+ 	ssl_lib.o ssl_err2.o ssl_cert.o ssl_sess.o \
+@@ -968,3 +968,4 @@ t1_srvr.o: ../include/openssl/ssl23.h ..
+ t1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
+ t1_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
+ t1_srvr.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_srvr.c
++t1_ext.o: t1_ext.c ssl_locl.h
+diff -uprN openssl-0.9.8.orig/ssl/s3_clnt.c openssl-0.9.8/ssl/s3_clnt.c
+--- openssl-0.9.8.orig/ssl/s3_clnt.c	2005-05-16 03:11:03.000000000 -0700
++++ openssl-0.9.8/ssl/s3_clnt.c	2005-07-19 20:02:15.000000000 -0700
+@@ -606,6 +606,20 @@ int ssl3_client_hello(SSL *s)
+ 			}
+ 		*(p++)=0; /* Add the NULL method */
+ 		
++		/* send client hello extensions if any */
++		if (s->version >= TLS1_VERSION && s->tls_extension)
++		{
++			// set the total extensions length
++			s2n(s->tls_extension->length + 4, p);
++
++			// put the extensions with type and length
++			s2n(s->tls_extension->type, p);
++			s2n(s->tls_extension->length, p);
++			
++			memcpy(p, s->tls_extension->data, s->tls_extension->length);
++			p+=s->tls_extension->length;
++		}
++
+ 		l=(p-d);
+ 		d=buf;
+ 		*(d++)=SSL3_MT_CLIENT_HELLO;
+@@ -628,7 +642,7 @@ int ssl3_get_server_hello(SSL *s)
+ 	STACK_OF(SSL_CIPHER) *sk;
+ 	SSL_CIPHER *c;
+ 	unsigned char *p,*d;
+-	int i,al,ok;
++	int i,al,ok,pre_shared;
+ 	unsigned int j;
+ 	long n;
+ 	SSL_COMP *comp;
+@@ -693,7 +707,24 @@ int ssl3_get_server_hello(SSL *s)
+ 		goto f_err;
+ 		}
+ 
+-	if (j != 0 && j == s->session->session_id_length
++	/* check if we want to resume the session based on external pre-shared secret */
++	pre_shared = 0;
++	if (s->version >= TLS1_VERSION && s->tls_session_secret_cb)
++	{
++		SSL_CIPHER *pref_cipher=NULL;
++		s->session->master_key_length=sizeof(s->session->master_key);
++		if (s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length,
++			NULL, &pref_cipher, s->tls_session_secret_cb_arg))
++		{
++			s->hit=1;
++			s->session->cipher=pref_cipher ? pref_cipher : ssl_get_cipher_by_char(s,p+j);
++			s->session->session_id_length = j;
++			memcpy(s->session->session_id, p, j);
++			pre_shared = 1;
++		}
++	}
++
++	if ((pre_shared || j != 0) && j == s->session->session_id_length
+ 	    && memcmp(p,s->session->session_id,j) == 0)
+ 	    {
+ 	    if(s->sid_ctx_length != s->session->sid_ctx_length
+diff -uprN openssl-0.9.8.orig/ssl/s3_srvr.c openssl-0.9.8/ssl/s3_srvr.c
+--- openssl-0.9.8.orig/ssl/s3_srvr.c	2005-05-22 17:32:55.000000000 -0700
++++ openssl-0.9.8/ssl/s3_srvr.c	2005-07-19 20:02:15.000000000 -0700
+@@ -955,6 +955,75 @@ int ssl3_get_client_hello(SSL *s)
+ 		}
+ #endif
+ 
++	/* Check for TLS client hello extension here */
++	if (p < (d+n) && s->version >= TLS1_VERSION)
++	{
++		if (s->tls_extension_cb)
++		{
++			TLS_EXTENSION tls_ext;
++			unsigned short ext_total_len;
++			
++			n2s(p, ext_total_len);
++			n2s(p, tls_ext.type);
++			n2s(p, tls_ext.length);
++
++			// sanity check in TLS extension len
++			if (tls_ext.length > (d+n) - p)
++			{
++				// just cut the lenth to packet border
++				tls_ext.length = (d+n) - p;
++			}
++
++			tls_ext.data = p;
++
++			// returns an alert code or 0
++			al = s->tls_extension_cb(s, &tls_ext, s->tls_extension_cb_arg);
++			if (al != 0)
++			{
++				SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_PEER_ERROR);
++				goto f_err;
++			}
++		}
++	}
++
++	/* Check if we want to use external pre-shared secret for this handshake */
++	/* for not reused session only */
++	if (!s->hit && s->version >= TLS1_VERSION && s->tls_session_secret_cb)
++	{
++		SSL_CIPHER *pref_cipher=NULL;
++
++		s->session->master_key_length=sizeof(s->session->master_key);
++		if(s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length, 
++			ciphers, &pref_cipher, s->tls_session_secret_cb_arg))
++		{
++			s->hit=1;
++			s->session->ciphers=ciphers;
++			s->session->verify_result=X509_V_OK;
++			
++			ciphers=NULL;
++			
++			/* check if some cipher was preferred by call back */
++			pref_cipher=pref_cipher ? pref_cipher : ssl3_choose_cipher(s, s->session->ciphers, SSL_get_ciphers(s));
++			if (pref_cipher == NULL)
++				{
++				al=SSL_AD_HANDSHAKE_FAILURE;
++				SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_NO_SHARED_CIPHER);
++				goto f_err;
++				}
++
++			s->session->cipher=pref_cipher;
++
++			if (s->cipher_list)
++				sk_SSL_CIPHER_free(s->cipher_list);
++
++			if (s->cipher_list_by_id)
++				sk_SSL_CIPHER_free(s->cipher_list_by_id);
++
++			s->cipher_list = sk_SSL_CIPHER_dup(s->session->ciphers);
++			s->cipher_list_by_id = sk_SSL_CIPHER_dup(s->session->ciphers);
++		}
++	}
++
+ 	/* Given s->session->ciphers and SSL_get_ciphers, we must
+ 	 * pick a cipher */
+ 
+diff -uprN openssl-0.9.8.orig/ssl/ssl_err.c openssl-0.9.8/ssl/ssl_err.c
+--- openssl-0.9.8.orig/ssl/ssl_err.c	2005-06-10 12:51:16.000000000 -0700
++++ openssl-0.9.8/ssl/ssl_err.c	2005-07-19 20:02:15.000000000 -0700
+@@ -242,6 +242,7 @@ static ERR_STRING_DATA SSL_str_functs[]=
+ {ERR_FUNC(SSL_F_TLS1_ENC),	"TLS1_ENC"},
+ {ERR_FUNC(SSL_F_TLS1_SETUP_KEY_BLOCK),	"TLS1_SETUP_KEY_BLOCK"},
+ {ERR_FUNC(SSL_F_WRITE_PENDING),	"WRITE_PENDING"},
++{ERR_FUNC(SSL_F_SSL_SET_HELLO_EXTENSION), "SSL_set_hello_extension"},
+ {0,NULL}
+ 	};
+ 
+diff -uprN openssl-0.9.8.orig/ssl/ssl.h openssl-0.9.8/ssl/ssl.h
+--- openssl-0.9.8.orig/ssl/ssl.h	2005-06-10 12:51:16.000000000 -0700
++++ openssl-0.9.8/ssl/ssl.h	2005-07-19 20:02:15.000000000 -0700
+@@ -340,6 +340,7 @@ extern "C" {
+  * 'struct ssl_st *' function parameters used to prototype callbacks
+  * in SSL_CTX. */
+ typedef struct ssl_st *ssl_crock_st;
++typedef struct tls_extension_st TLS_EXTENSION;
+ 
+ /* used to hold info on the particular ciphers used */
+ typedef struct ssl_cipher_st
+@@ -361,6 +362,8 @@ DECLARE_STACK_OF(SSL_CIPHER)
+ typedef struct ssl_st SSL;
+ typedef struct ssl_ctx_st SSL_CTX;
+ 
++typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
++
+ /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */
+ typedef struct ssl_method_st
+ 	{
+@@ -968,6 +971,15 @@ struct ssl_st
+ 	int first_packet;
+ 	int client_version;	/* what was passed, used for
+ 				 * SSLv3/TLS rollback check */
++
++	/* TLS externsions */
++	TLS_EXTENSION *tls_extension;
++	int (*tls_extension_cb)(SSL *s, TLS_EXTENSION *tls_ext, void *arg);
++	void *tls_extension_cb_arg;
++
++	/* TLS pre-shared secret session resumption */
++	tls_session_secret_cb_fn tls_session_secret_cb;
++	void *tls_session_secret_cb_arg;
+ 	};
+ 
+ #ifdef __cplusplus
+@@ -1533,6 +1545,13 @@ void *SSL_COMP_get_compression_methods(v
+ int SSL_COMP_add_compression_method(int id,void *cm);
+ #endif
+ 
++/* TLS extensions functions */
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len);
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg);
++
++/* Pre-shared secret session resumption functions */
++int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
++
+ /* BEGIN ERROR CODES */
+ /* The following lines are auto generated by the script mkerr.pl. Any changes
+  * made after this point may be overwritten when the script is next run.
+@@ -1714,6 +1733,7 @@ void ERR_load_SSL_strings(void);
+ #define SSL_F_TLS1_ENC					 210
+ #define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
+ #define SSL_F_WRITE_PENDING				 212
++#define SSL_F_SSL_SET_HELLO_EXTENSION	 213
+ 
+ /* Reason codes. */
+ #define SSL_R_APP_DATA_IN_HANDSHAKE			 100
+diff -uprN openssl-0.9.8.orig/ssl/ssl_sess.c openssl-0.9.8/ssl/ssl_sess.c
+--- openssl-0.9.8.orig/ssl/ssl_sess.c	2005-04-29 13:10:06.000000000 -0700
++++ openssl-0.9.8/ssl/ssl_sess.c	2005-07-19 20:02:15.000000000 -0700
+@@ -656,6 +656,15 @@ long SSL_CTX_get_timeout(const SSL_CTX *
+ 	return(s->session_timeout);
+ 	}
+ 
++int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, 
++	STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg)
++{
++	if (s == NULL) return(0);
++	s->tls_session_secret_cb = tls_session_secret_cb;
++	s->tls_session_secret_cb_arg = arg;
++	return(1);
++}
++
+ typedef struct timeout_param_st
+ 	{
+ 	SSL_CTX *ctx;
+diff -uprN openssl-0.9.8.orig/ssl/t1_ext.c openssl-0.9.8/ssl/t1_ext.c
+--- openssl-0.9.8.orig/ssl/t1_ext.c	1969-12-31 16:00:00.000000000 -0800
++++ openssl-0.9.8/ssl/t1_ext.c	2005-07-19 20:03:29.000000000 -0700
+@@ -0,0 +1,48 @@
++
++#include <stdio.h>
++#include "ssl_locl.h"
++
++
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len)
++{
++	if(s->version >= TLS1_VERSION)
++	{
++		if(s->tls_extension)
++		{
++			OPENSSL_free(s->tls_extension);
++			s->tls_extension = NULL;
++		}
++
++		if(ext_data)
++		{
++			s->tls_extension = OPENSSL_malloc(sizeof(TLS_EXTENSION) + ext_len);
++			if(!s->tls_extension)
++			{
++				SSLerr(SSL_F_SSL_SET_HELLO_EXTENSION, ERR_R_MALLOC_FAILURE);
++				return 0;
++			}
++
++			s->tls_extension->type = ext_type;
++			s->tls_extension->length = ext_len;
++			s->tls_extension->data = s->tls_extension + 1;
++			memcpy(s->tls_extension->data, ext_data, ext_len);
++		}
++
++		return 1;
++	}
++
++	return 0;
++}
++
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg)
++{
++	if(s->version >= TLS1_VERSION)
++	{
++		s->tls_extension_cb = cb;
++		s->tls_extension_cb_arg = arg;
++
++		return 1;
++	}
++
++	return 0;
++}
+diff -uprN openssl-0.9.8.orig/ssl/t1_lib.c openssl-0.9.8/ssl/t1_lib.c
+--- openssl-0.9.8.orig/ssl/t1_lib.c	2005-04-26 09:02:40.000000000 -0700
++++ openssl-0.9.8/ssl/t1_lib.c	2005-07-19 20:02:15.000000000 -0700
+@@ -131,6 +131,10 @@ int tls1_new(SSL *s)
+ 
+ void tls1_free(SSL *s)
+ 	{
++	if(s->tls_extension)
++	{
++		OPENSSL_free(s->tls_extension);
++	}
+ 	ssl3_free(s);
+ 	}
+ 
+diff -uprN openssl-0.9.8.orig/ssl/tls1.h openssl-0.9.8/ssl/tls1.h
+--- openssl-0.9.8.orig/ssl/tls1.h	2003-07-22 05:34:21.000000000 -0700
++++ openssl-0.9.8/ssl/tls1.h	2005-07-19 20:02:15.000000000 -0700
+@@ -282,6 +282,14 @@ extern "C" {
+ #define TLS_MD_MASTER_SECRET_CONST    "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74"  /*master secret*/
+ #endif
+ 
++/* TLS extension struct */
++struct tls_extension_st
++{
++	unsigned short type;
++	unsigned short length;
++	void *data;
++};
++
+ #ifdef  __cplusplus
+ }
+ #endif
+diff -uprN openssl-0.9.8.orig/util/ssleay.num openssl-0.9.8/util/ssleay.num
+--- openssl-0.9.8.orig/util/ssleay.num	2005-05-08 17:22:02.000000000 -0700
++++ openssl-0.9.8/util/ssleay.num	2005-07-19 20:02:15.000000000 -0700
+@@ -226,3 +226,6 @@ DTLSv1_server_method                    
+ SSL_COMP_get_compression_methods        276	EXIST:!VMS:FUNCTION:COMP
+ SSL_COMP_get_compress_methods           276	EXIST:VMS:FUNCTION:COMP
+ SSL_SESSION_get_id                      277	EXIST::FUNCTION:
++SSL_set_hello_extension			278	EXIST::FUNCTION:
++SSL_set_hello_extension_cb		279	EXIST::FUNCTION:
++SSL_set_session_secret_cb		280	EXIST::FUNCTION:

Added: vendor/wpa/dist/patches/openssl-0.9.8d-tls-extensions.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ vendor/wpa/dist/patches/openssl-0.9.8d-tls-extensions.patch	Fri Oct 29 08:01:21 2010	(r214501)
@@ -0,0 +1,429 @@
+This patch is adding support for TLS hello extensions and externally
+generated pre-shared key material to OpenSSL 0.9.8d. This is
+based on the patch from Alexey Kobozev <akobozev@cisco.com>
+(sent to openssl-dev mailing list on Tue, 07 Jun 2005 15:40:58 +0300).
+
+
+
+diff -uprN openssl-0.9.8d.orig/include/openssl/ssl.h openssl-0.9.8d/include/openssl/ssl.h
+--- openssl-0.9.8d.orig/include/openssl/ssl.h	2006-06-14 06:52:49.000000000 -0700
++++ openssl-0.9.8d/include/openssl/ssl.h	2006-12-10 08:20:02.000000000 -0800
+@@ -345,6 +345,7 @@ extern "C" {
+  * 'struct ssl_st *' function parameters used to prototype callbacks
+  * in SSL_CTX. */
+ typedef struct ssl_st *ssl_crock_st;
++typedef struct tls_extension_st TLS_EXTENSION;
+ 
+ /* used to hold info on the particular ciphers used */
+ typedef struct ssl_cipher_st
+@@ -366,6 +367,8 @@ DECLARE_STACK_OF(SSL_CIPHER)
+ typedef struct ssl_st SSL;
+ typedef struct ssl_ctx_st SSL_CTX;
+ 
++typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
++
+ /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */
+ typedef struct ssl_method_st
+ 	{
+@@ -973,6 +976,15 @@ struct ssl_st
+ 	int first_packet;
+ 	int client_version;	/* what was passed, used for
+ 				 * SSLv3/TLS rollback check */
++
++	/* TLS externsions */
++	TLS_EXTENSION *tls_extension;
++	int (*tls_extension_cb)(SSL *s, TLS_EXTENSION *tls_ext, void *arg);
++	void *tls_extension_cb_arg;
++
++	/* TLS pre-shared secret session resumption */
++	tls_session_secret_cb_fn tls_session_secret_cb;
++	void *tls_session_secret_cb_arg;
+ 	};
+ 
+ #ifdef __cplusplus
+@@ -1538,6 +1550,13 @@ void *SSL_COMP_get_compression_methods(v
+ int SSL_COMP_add_compression_method(int id,void *cm);
+ #endif
+ 
++/* TLS extensions functions */
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len);
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg);
++
++/* Pre-shared secret session resumption functions */
++int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
++
+ /* BEGIN ERROR CODES */
+ /* The following lines are auto generated by the script mkerr.pl. Any changes
+  * made after this point may be overwritten when the script is next run.
+@@ -1719,6 +1738,7 @@ void ERR_load_SSL_strings(void);
+ #define SSL_F_TLS1_ENC					 210
+ #define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
+ #define SSL_F_WRITE_PENDING				 212
++#define SSL_F_SSL_SET_HELLO_EXTENSION	 213
+ 
+ /* Reason codes. */
+ #define SSL_R_APP_DATA_IN_HANDSHAKE			 100
+diff -uprN openssl-0.9.8d.orig/include/openssl/tls1.h openssl-0.9.8d/include/openssl/tls1.h
+--- openssl-0.9.8d.orig/include/openssl/tls1.h	2006-06-14 10:52:01.000000000 -0700
++++ openssl-0.9.8d/include/openssl/tls1.h	2006-12-10 08:20:02.000000000 -0800
+@@ -296,6 +296,14 @@ extern "C" {
+ #define TLS_MD_MASTER_SECRET_CONST    "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74"  /*master secret*/
+ #endif
+ 
++/* TLS extension struct */
++struct tls_extension_st
++{
++	unsigned short type;
++	unsigned short length;
++	void *data;
++};
++
+ #ifdef  __cplusplus
+ }
+ #endif
+diff -uprN openssl-0.9.8d.orig/ssl/Makefile openssl-0.9.8d/ssl/Makefile
+--- openssl-0.9.8d.orig/ssl/Makefile	2006-02-03 17:49:35.000000000 -0800
++++ openssl-0.9.8d/ssl/Makefile	2006-12-10 08:20:02.000000000 -0800
+@@ -24,7 +24,7 @@ LIBSRC=	\
+ 	s2_meth.c   s2_srvr.c s2_clnt.c  s2_lib.c  s2_enc.c s2_pkt.c \
+ 	s3_meth.c   s3_srvr.c s3_clnt.c  s3_lib.c  s3_enc.c s3_pkt.c s3_both.c \
+ 	s23_meth.c s23_srvr.c s23_clnt.c s23_lib.c          s23_pkt.c \
+-	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c \
++	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c                    t1_ext.c \
+ 	d1_meth.c   d1_srvr.c d1_clnt.c  d1_lib.c  d1_pkt.c \
+ 	d1_both.c d1_enc.c \
+ 	ssl_lib.c ssl_err2.c ssl_cert.c ssl_sess.c \
+@@ -35,7 +35,7 @@ LIBOBJ= \
+ 	s2_meth.o  s2_srvr.o  s2_clnt.o  s2_lib.o  s2_enc.o s2_pkt.o \
+ 	s3_meth.o  s3_srvr.o  s3_clnt.o  s3_lib.o  s3_enc.o s3_pkt.o s3_both.o \
+ 	s23_meth.o s23_srvr.o s23_clnt.o s23_lib.o          s23_pkt.o \
+-	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o \
++	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o                    t1_ext.o \
+ 	d1_meth.o   d1_srvr.o d1_clnt.o  d1_lib.o  d1_pkt.o \
+ 	d1_both.o d1_enc.o \
+ 	ssl_lib.o ssl_err2.o ssl_cert.o ssl_sess.o \
+@@ -968,3 +968,4 @@ t1_srvr.o: ../include/openssl/ssl23.h ..
+ t1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
+ t1_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
+ t1_srvr.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_srvr.c
++t1_ext.o: t1_ext.c ssl_locl.h
+diff -uprN openssl-0.9.8d.orig/ssl/s3_clnt.c openssl-0.9.8d/ssl/s3_clnt.c
+--- openssl-0.9.8d.orig/ssl/s3_clnt.c	2005-12-12 23:41:46.000000000 -0800
++++ openssl-0.9.8d/ssl/s3_clnt.c	2006-12-10 08:20:02.000000000 -0800
+@@ -601,6 +601,20 @@ int ssl3_client_hello(SSL *s)
+ #endif
+ 		*(p++)=0; /* Add the NULL method */
+ 		
++		/* send client hello extensions if any */
++		if (s->version >= TLS1_VERSION && s->tls_extension)
++		{
++			// set the total extensions length
++			s2n(s->tls_extension->length + 4, p);
++
++			// put the extensions with type and length
++			s2n(s->tls_extension->type, p);
++			s2n(s->tls_extension->length, p);
++			
++			memcpy(p, s->tls_extension->data, s->tls_extension->length);
++			p+=s->tls_extension->length;
++		}
++
+ 		l=(p-d);
+ 		d=buf;
+ 		*(d++)=SSL3_MT_CLIENT_HELLO;
+@@ -623,7 +637,7 @@ int ssl3_get_server_hello(SSL *s)
+ 	STACK_OF(SSL_CIPHER) *sk;
+ 	SSL_CIPHER *c;
+ 	unsigned char *p,*d;
+-	int i,al,ok;
++	int i,al,ok,pre_shared;
+ 	unsigned int j;
+ 	long n;
+ #ifndef OPENSSL_NO_COMP
+@@ -690,7 +704,24 @@ int ssl3_get_server_hello(SSL *s)
+ 		goto f_err;
+ 		}
+ 
+-	if (j != 0 && j == s->session->session_id_length
++	/* check if we want to resume the session based on external pre-shared secret */
++	pre_shared = 0;
++	if (s->version >= TLS1_VERSION && s->tls_session_secret_cb)
++	{
++		SSL_CIPHER *pref_cipher=NULL;
++		s->session->master_key_length=sizeof(s->session->master_key);
++		if (s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length,
++			NULL, &pref_cipher, s->tls_session_secret_cb_arg))
++		{
++			s->hit=1;
++			s->session->cipher=pref_cipher ? pref_cipher : ssl_get_cipher_by_char(s,p+j);
++			s->session->session_id_length = j;
++			memcpy(s->session->session_id, p, j);
++			pre_shared = 1;
++		}
++	}
++
++	if ((pre_shared || j != 0) && j == s->session->session_id_length
+ 	    && memcmp(p,s->session->session_id,j) == 0)
+ 	    {
+ 	    if(s->sid_ctx_length != s->session->sid_ctx_length
+diff -uprN openssl-0.9.8d.orig/ssl/s3_srvr.c openssl-0.9.8d/ssl/s3_srvr.c
+--- openssl-0.9.8d.orig/ssl/s3_srvr.c	2006-09-28 04:29:03.000000000 -0700
++++ openssl-0.9.8d/ssl/s3_srvr.c	2006-12-10 08:20:02.000000000 -0800
+@@ -943,6 +943,75 @@ int ssl3_get_client_hello(SSL *s)
+ 		}
+ #endif
+ 
++	/* Check for TLS client hello extension here */
++	if (p < (d+n) && s->version >= TLS1_VERSION)
++	{
++		if (s->tls_extension_cb)
++		{
++			TLS_EXTENSION tls_ext;
++			unsigned short ext_total_len;
++			
++			n2s(p, ext_total_len);
++			n2s(p, tls_ext.type);
++			n2s(p, tls_ext.length);
++
++			// sanity check in TLS extension len
++			if (tls_ext.length > (d+n) - p)
++			{
++				// just cut the lenth to packet border
++				tls_ext.length = (d+n) - p;
++			}
++
++			tls_ext.data = p;
++
++			// returns an alert code or 0
++			al = s->tls_extension_cb(s, &tls_ext, s->tls_extension_cb_arg);
++			if (al != 0)
++			{
++				SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_PEER_ERROR);
++				goto f_err;
++			}
++		}
++	}
++
++	/* Check if we want to use external pre-shared secret for this handshake */
++	/* for not reused session only */
++	if (!s->hit && s->version >= TLS1_VERSION && s->tls_session_secret_cb)
++	{
++		SSL_CIPHER *pref_cipher=NULL;
++
++		s->session->master_key_length=sizeof(s->session->master_key);
++		if(s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length, 
++			ciphers, &pref_cipher, s->tls_session_secret_cb_arg))
++		{
++			s->hit=1;
++			s->session->ciphers=ciphers;
++			s->session->verify_result=X509_V_OK;
++			
++			ciphers=NULL;
++			
++			/* check if some cipher was preferred by call back */
++			pref_cipher=pref_cipher ? pref_cipher : ssl3_choose_cipher(s, s->session->ciphers, SSL_get_ciphers(s));
++			if (pref_cipher == NULL)
++				{
++				al=SSL_AD_HANDSHAKE_FAILURE;
++				SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_NO_SHARED_CIPHER);
++				goto f_err;
++				}
++
++			s->session->cipher=pref_cipher;
++
++			if (s->cipher_list)
++				sk_SSL_CIPHER_free(s->cipher_list);
++
++			if (s->cipher_list_by_id)
++				sk_SSL_CIPHER_free(s->cipher_list_by_id);
++
++			s->cipher_list = sk_SSL_CIPHER_dup(s->session->ciphers);
++			s->cipher_list_by_id = sk_SSL_CIPHER_dup(s->session->ciphers);
++		}
++	}
++
+ 	/* Given s->session->ciphers and SSL_get_ciphers, we must
+ 	 * pick a cipher */
+ 
+diff -uprN openssl-0.9.8d.orig/ssl/ssl.h openssl-0.9.8d/ssl/ssl.h
+--- openssl-0.9.8d.orig/ssl/ssl.h	2006-06-14 06:52:49.000000000 -0700
++++ openssl-0.9.8d/ssl/ssl.h	2006-12-10 08:20:02.000000000 -0800
+@@ -345,6 +345,7 @@ extern "C" {
+  * 'struct ssl_st *' function parameters used to prototype callbacks
+  * in SSL_CTX. */
+ typedef struct ssl_st *ssl_crock_st;
++typedef struct tls_extension_st TLS_EXTENSION;
+ 
+ /* used to hold info on the particular ciphers used */
+ typedef struct ssl_cipher_st
+@@ -366,6 +367,8 @@ DECLARE_STACK_OF(SSL_CIPHER)
+ typedef struct ssl_st SSL;
+ typedef struct ssl_ctx_st SSL_CTX;
+ 
++typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
++
+ /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */
+ typedef struct ssl_method_st
+ 	{
+@@ -973,6 +976,15 @@ struct ssl_st
+ 	int first_packet;
+ 	int client_version;	/* what was passed, used for
+ 				 * SSLv3/TLS rollback check */
++
++	/* TLS externsions */
++	TLS_EXTENSION *tls_extension;
++	int (*tls_extension_cb)(SSL *s, TLS_EXTENSION *tls_ext, void *arg);
++	void *tls_extension_cb_arg;
++
++	/* TLS pre-shared secret session resumption */
++	tls_session_secret_cb_fn tls_session_secret_cb;
++	void *tls_session_secret_cb_arg;
+ 	};
+ 
+ #ifdef __cplusplus
+@@ -1538,6 +1550,13 @@ void *SSL_COMP_get_compression_methods(v
+ int SSL_COMP_add_compression_method(int id,void *cm);
+ #endif
+ 
++/* TLS extensions functions */
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len);
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg);
++
++/* Pre-shared secret session resumption functions */
++int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
++
+ /* BEGIN ERROR CODES */
+ /* The following lines are auto generated by the script mkerr.pl. Any changes
+  * made after this point may be overwritten when the script is next run.
+@@ -1719,6 +1738,7 @@ void ERR_load_SSL_strings(void);
+ #define SSL_F_TLS1_ENC					 210
+ #define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
+ #define SSL_F_WRITE_PENDING				 212
++#define SSL_F_SSL_SET_HELLO_EXTENSION	 213
+ 
+ /* Reason codes. */
+ #define SSL_R_APP_DATA_IN_HANDSHAKE			 100
+diff -uprN openssl-0.9.8d.orig/ssl/ssl_err.c openssl-0.9.8d/ssl/ssl_err.c
+--- openssl-0.9.8d.orig/ssl/ssl_err.c	2006-01-08 13:52:46.000000000 -0800
++++ openssl-0.9.8d/ssl/ssl_err.c	2006-12-10 08:20:02.000000000 -0800
+@@ -242,6 +242,7 @@ static ERR_STRING_DATA SSL_str_functs[]=
+ {ERR_FUNC(SSL_F_TLS1_ENC),	"TLS1_ENC"},
+ {ERR_FUNC(SSL_F_TLS1_SETUP_KEY_BLOCK),	"TLS1_SETUP_KEY_BLOCK"},
+ {ERR_FUNC(SSL_F_WRITE_PENDING),	"WRITE_PENDING"},
++{ERR_FUNC(SSL_F_SSL_SET_HELLO_EXTENSION), "SSL_set_hello_extension"},
+ {0,NULL}
+ 	};
+ 
+diff -uprN openssl-0.9.8d.orig/ssl/ssl_sess.c openssl-0.9.8d/ssl/ssl_sess.c
+--- openssl-0.9.8d.orig/ssl/ssl_sess.c	2005-12-30 15:51:57.000000000 -0800
++++ openssl-0.9.8d/ssl/ssl_sess.c	2006-12-10 08:20:02.000000000 -0800
+@@ -656,6 +656,15 @@ long SSL_CTX_get_timeout(const SSL_CTX *
+ 	return(s->session_timeout);
+ 	}
+ 
++int SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb)(SSL *s, void *secret, int *secret_len, 
++	STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg)
++{
++	if (s == NULL) return(0);
++	s->tls_session_secret_cb = tls_session_secret_cb;
++	s->tls_session_secret_cb_arg = arg;
++	return(1);
++}
++
+ typedef struct timeout_param_st
+ 	{
+ 	SSL_CTX *ctx;
+diff -uprN openssl-0.9.8d.orig/ssl/t1_ext.c openssl-0.9.8d/ssl/t1_ext.c
+--- openssl-0.9.8d.orig/ssl/t1_ext.c	1969-12-31 16:00:00.000000000 -0800
++++ openssl-0.9.8d/ssl/t1_ext.c	2006-12-10 08:20:02.000000000 -0800
+@@ -0,0 +1,48 @@
++
++#include <stdio.h>
++#include "ssl_locl.h"
++
++
++int SSL_set_hello_extension(SSL *s, int ext_type, void *ext_data, int ext_len)
++{
++	if(s->version >= TLS1_VERSION)
++	{
++		if(s->tls_extension)
++		{
++			OPENSSL_free(s->tls_extension);
++			s->tls_extension = NULL;
++		}
++
++		if(ext_data)
++		{
++			s->tls_extension = OPENSSL_malloc(sizeof(TLS_EXTENSION) + ext_len);
++			if(!s->tls_extension)
++			{
++				SSLerr(SSL_F_SSL_SET_HELLO_EXTENSION, ERR_R_MALLOC_FAILURE);
++				return 0;
++			}
++
++			s->tls_extension->type = ext_type;
++			s->tls_extension->length = ext_len;
++			s->tls_extension->data = s->tls_extension + 1;
++			memcpy(s->tls_extension->data, ext_data, ext_len);
++		}
++
++		return 1;
++	}
++
++	return 0;
++}
++
++int SSL_set_hello_extension_cb(SSL *s, int (*cb)(SSL *, TLS_EXTENSION *, void *), void *arg)
++{
++	if(s->version >= TLS1_VERSION)
++	{
++		s->tls_extension_cb = cb;
++		s->tls_extension_cb_arg = arg;
++
++		return 1;
++	}
++
++	return 0;
++}
+diff -uprN openssl-0.9.8d.orig/ssl/t1_lib.c openssl-0.9.8d/ssl/t1_lib.c
+--- openssl-0.9.8d.orig/ssl/t1_lib.c	2005-08-05 16:52:07.000000000 -0700
++++ openssl-0.9.8d/ssl/t1_lib.c	2006-12-10 08:20:02.000000000 -0800
+@@ -97,6 +97,10 @@ int tls1_new(SSL *s)
+ 
+ void tls1_free(SSL *s)
+ 	{
++	if(s->tls_extension)
++	{
++		OPENSSL_free(s->tls_extension);
++	}
+ 	ssl3_free(s);
+ 	}
+ 
+diff -uprN openssl-0.9.8d.orig/ssl/tls1.h openssl-0.9.8d/ssl/tls1.h
+--- openssl-0.9.8d.orig/ssl/tls1.h	2006-06-14 10:52:01.000000000 -0700
++++ openssl-0.9.8d/ssl/tls1.h	2006-12-10 08:20:02.000000000 -0800
+@@ -296,6 +296,14 @@ extern "C" {
+ #define TLS_MD_MASTER_SECRET_CONST    "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74"  /*master secret*/
+ #endif
+ 
++/* TLS extension struct */
++struct tls_extension_st
++{
++	unsigned short type;
++	unsigned short length;
++	void *data;
++};
++
+ #ifdef  __cplusplus
+ }
+ #endif
+diff -uprN openssl-0.9.8d.orig/util/ssleay.num openssl-0.9.8d/util/ssleay.num
+--- openssl-0.9.8d.orig/util/ssleay.num	2005-05-08 17:22:02.000000000 -0700
++++ openssl-0.9.8d/util/ssleay.num	2006-12-10 08:20:02.000000000 -0800
+@@ -226,3 +226,6 @@ DTLSv1_server_method                    
+ SSL_COMP_get_compression_methods        276	EXIST:!VMS:FUNCTION:COMP
+ SSL_COMP_get_compress_methods           276	EXIST:VMS:FUNCTION:COMP
+ SSL_SESSION_get_id                      277	EXIST::FUNCTION:
++SSL_set_hello_extension			278	EXIST::FUNCTION:
++SSL_set_hello_extension_cb		279	EXIST::FUNCTION:
++SSL_set_session_secret_cb		280	EXIST::FUNCTION:

Added: vendor/wpa/dist/patches/openssl-0.9.8e-tls-extensions.patch
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ vendor/wpa/dist/patches/openssl-0.9.8e-tls-extensions.patch	Fri Oct 29 08:01:21 2010	(r214501)
@@ -0,0 +1,353 @@
+This patch is adding support for TLS hello extensions and externally
+generated pre-shared key material to OpenSSL 0.9.8e. This is
+based on the patch from Alexey Kobozev <akobozev@cisco.com>
+(sent to openssl-dev mailing list on Tue, 07 Jun 2005 15:40:58 +0300).
+
+
+
+diff -uprN openssl-0.9.8e.orig/ssl/Makefile openssl-0.9.8e/ssl/Makefile
+--- openssl-0.9.8e.orig/ssl/Makefile	2006-02-03 17:49:35.000000000 -0800
++++ openssl-0.9.8e/ssl/Makefile	2007-03-22 20:23:19.000000000 -0700
+@@ -24,7 +24,7 @@ LIBSRC=	\
+ 	s2_meth.c   s2_srvr.c s2_clnt.c  s2_lib.c  s2_enc.c s2_pkt.c \
+ 	s3_meth.c   s3_srvr.c s3_clnt.c  s3_lib.c  s3_enc.c s3_pkt.c s3_both.c \
+ 	s23_meth.c s23_srvr.c s23_clnt.c s23_lib.c          s23_pkt.c \
+-	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c \
++	t1_meth.c   t1_srvr.c t1_clnt.c  t1_lib.c  t1_enc.c                    t1_ext.c \
+ 	d1_meth.c   d1_srvr.c d1_clnt.c  d1_lib.c  d1_pkt.c \
+ 	d1_both.c d1_enc.c \
+ 	ssl_lib.c ssl_err2.c ssl_cert.c ssl_sess.c \
+@@ -35,7 +35,7 @@ LIBOBJ= \
+ 	s2_meth.o  s2_srvr.o  s2_clnt.o  s2_lib.o  s2_enc.o s2_pkt.o \
+ 	s3_meth.o  s3_srvr.o  s3_clnt.o  s3_lib.o  s3_enc.o s3_pkt.o s3_both.o \
+ 	s23_meth.o s23_srvr.o s23_clnt.o s23_lib.o          s23_pkt.o \
+-	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o \
++	t1_meth.o   t1_srvr.o t1_clnt.o  t1_lib.o  t1_enc.o                    t1_ext.o \
+ 	d1_meth.o   d1_srvr.o d1_clnt.o  d1_lib.o  d1_pkt.o \
+ 	d1_both.o d1_enc.o \
+ 	ssl_lib.o ssl_err2.o ssl_cert.o ssl_sess.o \
+@@ -968,3 +968,4 @@ t1_srvr.o: ../include/openssl/ssl23.h ..
+ t1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
+ t1_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
+ t1_srvr.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_srvr.c
++t1_ext.o: t1_ext.c ssl_locl.h
+diff -uprN openssl-0.9.8e.orig/ssl/s3_clnt.c openssl-0.9.8e/ssl/s3_clnt.c
+--- openssl-0.9.8e.orig/ssl/s3_clnt.c	2006-09-28 05:23:15.000000000 -0700
++++ openssl-0.9.8e/ssl/s3_clnt.c	2007-03-22 20:23:19.000000000 -0700
+@@ -601,6 +601,20 @@ int ssl3_client_hello(SSL *s)
+ #endif
+ 		*(p++)=0; /* Add the NULL method */
+ 		
++		/* send client hello extensions if any */
++		if (s->version >= TLS1_VERSION && s->tls_extension)
++		{
++			// set the total extensions length
++			s2n(s->tls_extension->length + 4, p);
++
++			// put the extensions with type and length
++			s2n(s->tls_extension->type, p);
++			s2n(s->tls_extension->length, p);
++			
++			memcpy(p, s->tls_extension->data, s->tls_extension->length);
++			p+=s->tls_extension->length;
++		}
++
+ 		l=(p-d);
+ 		d=buf;
+ 		*(d++)=SSL3_MT_CLIENT_HELLO;
+@@ -623,7 +637,7 @@ int ssl3_get_server_hello(SSL *s)
+ 	STACK_OF(SSL_CIPHER) *sk;
+ 	SSL_CIPHER *c;
+ 	unsigned char *p,*d;
+-	int i,al,ok;
++	int i,al,ok,pre_shared;
+ 	unsigned int j;
+ 	long n;
+ #ifndef OPENSSL_NO_COMP
+@@ -690,7 +704,24 @@ int ssl3_get_server_hello(SSL *s)
+ 		goto f_err;
+ 		}
+ 
+-	if (j != 0 && j == s->session->session_id_length
++	/* check if we want to resume the session based on external pre-shared secret */
++	pre_shared = 0;
++	if (s->version >= TLS1_VERSION && s->tls_session_secret_cb)
++	{
++		SSL_CIPHER *pref_cipher=NULL;
++		s->session->master_key_length=sizeof(s->session->master_key);
++		if (s->tls_session_secret_cb(s, s->session->master_key, &s->session->master_key_length,
++			NULL, &pref_cipher, s->tls_session_secret_cb_arg))
++		{
++			s->hit=1;
++			s->session->cipher=pref_cipher ? pref_cipher : ssl_get_cipher_by_char(s,p+j);
++			s->session->session_id_length = j;
++			memcpy(s->session->session_id, p, j);
++			pre_shared = 1;
++		}
++	}
++
++	if ((pre_shared || j != 0) && j == s->session->session_id_length
+ 	    && memcmp(p,s->session->session_id,j) == 0)
+ 	    {
+ 	    if(s->sid_ctx_length != s->session->sid_ctx_length
+diff -uprN openssl-0.9.8e.orig/ssl/s3_srvr.c openssl-0.9.8e/ssl/s3_srvr.c
+--- openssl-0.9.8e.orig/ssl/s3_srvr.c	2007-02-07 12:36:40.000000000 -0800
++++ openssl-0.9.8e/ssl/s3_srvr.c	2007-03-22 20:23:19.000000000 -0700
+@@ -945,6 +945,75 @@ int ssl3_get_client_hello(SSL *s)
+ 		}
+ #endif
+ 
++	/* Check for TLS client hello extension here */
++	if (p < (d+n) && s->version >= TLS1_VERSION)
++	{
++		if (s->tls_extension_cb)
++		{
++			TLS_EXTENSION tls_ext;
++			unsigned short ext_total_len;
++			
++			n2s(p, ext_total_len);
++			n2s(p, tls_ext.type);
++			n2s(p, tls_ext.length);
++
++			// sanity check in TLS extension len
++			if (tls_ext.length > (d+n) - p)
++			{
++				// just cut the lenth to packet border
++				tls_ext.length = (d+n) - p;
++			}
++
++			tls_ext.data = p;
++
++			// returns an alert code or 0
++			al = s->tls_extension_cb(s, &tls_ext, s->tls_extension_cb_arg);
++			if (al != 0)
++			{
++				SSLerr(SSL_F_SSL3_GET_CLIENT_HELLO,SSL_R_PEER_ERROR);
++				goto f_err;
++			}
++		}
++	}
++
++	/* Check if we want to use external pre-shared secret for this handshake */
++	/* for not reused session only */
++	if (!s->hit && s->version >= TLS1_VERSION && s->tls_session_secret_cb)

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201010290801.o9T81MdV075661>