Bug#907518: [RFC] Disable TLSv1.0 by default, but allow enabling it

2019-01-05 Thread Jouni Malinen
e And as an example, the following network profile parameters would undo the Debian systemwide restrictions: phase1="tls_disable_tlsv1_0=0 tls_disable_tlsv1_1=0" openssl_ciphers="DEFAULT@SECLEVEL=1" -- Jouni MalinenPGP id EFC895FA

Bug#907518: [RFC] Disable TLSv1.0 by default, but allow enabling it

2018-12-04 Thread Jouni Malinen
hing that EAP world is ready for yet.. Some ciphers might also be possible to disable without losing too much interoperability with currently deployed authentication servers. -- Jouni MalinenPGP id EFC895FA

Bug#287220: wpa_supplicant and unkown open AP

2005-04-03 Thread Jouni Malinen
oth SSID is set and not set cases. In addition, I added code for rejecting APs based on Privacy flag mismatch in order to make this bit more useful in environments where there are more than on AP. The changes are now in wpa_supplicant CVS repository (development bran

Bug#287220: wpa_supplicant and unkown open AP

2005-03-30 Thread Jouni Malinen
On Wed, Mar 30, 2005 at 11:37:18PM +0200, Norbert Preining wrote: > Concerning * vs something else: Does this mean we will have to add > something like > ssid=""; > or leave out the ssid entry completely? Both alternatives would wo

Bug#287220: wpa_supplicant and unkown open AP

2005-03-30 Thread Jouni Malinen
valid SSID, so I'm not going to accept it as a special wildcard for something like this. Trivial change would be to change the test to be ssid_len == 0.. I'll merge this into the wpa_supplicant development tree after a quick test. -- Jouni Malinen

Bug#286726: Firmware theory

2005-01-15 Thread Jouni Malinen
not guaranteed for some cases, e.g., when the card does not have full firmware image in the flash and requires prism2_srec to be called. For these cases, the workaround would be to delay ifrename to happen only after the firmware has been successfully downloaded. -- Jouni Malinen