Jouni Malinen 2e06e9dd6f Fix TLS in/out buffer freeing
The previous version could end leaking memory since os_free() was used
instead of wpabuf_free(). In addition, this could potentially have
triggered a crash if the TLS context were being freed when pending
input data where still in the buffer (though, this may not be possible
to trigger in practice).
2010-02-12 21:13:51 +02:00
2010-01-16 19:04:38 +02:00
2009-07-28 14:34:23 +03:00
2010-02-12 21:13:51 +02:00
2010-01-16 19:04:38 +02:00
2010-01-16 19:04:38 +02:00

wpa_supplicant and hostapd v0.6.x
---------------------------------

Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.

These program is dual-licensed under both the GPL version 2 and BSD
license. Either license may be used at your option.


This package may include either wpa_supplicant, hostapd, or both. See
README file respective subdirectories (wpa_supplicant/README or
hostapd/README) for more details.

Source code files have been moved around in v0.6.x releases and
compared to earlier releases, the programs are now build by first
going to a subdirectory (wpa_supplicant or hostapd) and creating
build configuration (.config) and running 'make' there (for
Linux/BSD/cygwin builds).
Description
FragAttacks: Fragmentation & Aggregation Attacks
Readme 27 MiB
Languages
C 69.9%
Python 27.6%
Makefile 0.9%
C++ 0.8%
Shell 0.4%
Other 0.4%