TESTING! hostapd: update to hostap_2_9-542-g33c8a10498c1
Contains following notable fixes:
aa663baf4528 Fix QCA_WLAN_VENDOR_ATTR_ACS_VHT_SEG1_CENTER_CHANNEL NULL check
297d69161b01 OpenSSL: Fix memory leak in TOD policy validation
8296ee18053c RSN IBSS: Fix EAPOL TX using control port
c8eb7fe66cb3 Fix signal_poll based roaming skip
22319c7fed8f RADIUS client: fix extra retry before failover
963681723f3b Fix possible memory leak of RADIUS data in handle_auth()
4834c6869d55 FT: Fix hostapd_wpa_auth_oui_iter() iteration for multicast packets
974f84bb73a9 Fix ignore_broadcast_ssid behavior with SSID List and Short SSID List
41b06b065e6f mesh: Fix race condition in mesh mpm new peer handling
3626e72c8dc1 l2_packet: Fix bridge workaround for repeater configuration
4cfa8b92baf6 Fix wpa_insert_pmkid() when buffer includes extra IEs
2ba6aa60458f Fix memory leak in case allocation of token fails during JSON parsing
78d338d1b120 DPP: Fix a memory leak on an error path
e3c476bd8c88 SAE H2E: Fix RSNXE override in EAPOL-Key msg 2/4 for testing purposes
c88e01e1b69e SAE H2E: Fix validation of rejected groups list
23acdd9f33ac Fix memory leak in ACS offload operation
f3c077929f0d P2P: Fix listen state machine getting stuck in send_action() scheduled case
93ba13bcfdb4 Fix status code in SAE/DPP association PMKID mismatch (driver-AP-SME)
1030dec1facb JSON: Fix escaping of characters that have MSB=1 with signed char
305369038bf5 wpa_supplicant: Fix arithmetic on void pointer
00ddc1cc21a8 common: Fix same expression checked twice in fils_key_auth_sk()
d7678a084206 Fix AP Extended Capability length determination
1766e608ba11 wolfSSL: Fix crypto_bignum_sub()
e0d22c842a34 FILS+FT: Fix MFPR flag in RSNE during FILS exchange for FT
3a6736fe87ae DPP2: Fix a memory leak on error path for Config Result
0229261874c8 DFS offload: Fix hostapd state and CAC info in STATUS output
0497e4148197 HE: Fix HE Capabilities element size
71419119f4b9 EAP-TEAP peer: Fix protected indication of inner EAP method failure
a00cb1b1f592 EAP-TEAP server: Fix eap_teap_pac_no_inner configuration
986033ff3db7 EAP-TEAP server: Fix Crypto-Binding check in PAC no-inner-auth case
a66e53c419b1 EAP-TEAP: Fix TLS-PRF for TLS ciphersuites that use SHA384
ded56f2fafb0 FT: Fix MFPR flag in RSNE during FT protocol
Not forward ported following hopefuly just mesh functionality related
patches:
004-mesh-use-setup-completion-callback-to-complete-mesh-.patch
005-mesh-update-ssid-frequency-as-pri-sec-channel-switch.patch
006-mesh-inform-kernel-driver-DFS-handler-in-userspace.patch
007-mesh-apply-channel-attributes-before-running-Mesh.patch
011-mesh-Allow-DFS-channels-to-be-selected-if-dfs-is-ena.patch
013-mesh-do-not-allow-pri-sec-channel-switch.patch
015-mesh-do-not-use-offchan-mgmt-tx-on-DFS.patch
016-mesh-fix-channel-switch-error-during-CAC.patch
018-mesh-make-forwarding-configurable.patch
051-wpa_supplicant-fix-race-condition-in-mesh-mpm-new-pe.patch
301-mesh-noscan.patch
Removed patch already available in upstream version:
067-0001-AP-Silently-ignore-management-frame-from-unexpected-.patch
Signed-off-by:
Petr Štetiar <ynezz@true.cz>