444d567b27731d8572ef37697dd12fd1c37c2f24 |
|
01-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 17b8995cf5813d7c027cd7a6884700e791d72392 17b8995 Interworking: Try to use same BSS entry for storing GAS results 3db5439 Optimize Extended Capabilities element to be of minimal length 8cd6b7b hostapd/wpa_s: Use driver's extended capabilities acb5464 Add ctrl_iface command FLUSH for clearing wpa_supplicant state 97236ce WPS: Skip rescanning after provisioning if AP was configured 4342326 Add ignore_old_scan_res configuration parameter 9599ccc WPS: Clear after_wps on new WPS connection 702621e WPS: Use latest updated BSS entry if multiple BSSID matches found ab547b5 WPS: Add more helpful debug for invalid WPS_REG command parsing a679c0f WPS: Allow hostapd process to control independent WPS interfaces ccdff94 WPS AP: Add support for reconfiguration with in-memory config 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested 558d69e P2P: Omit P2P Group Info in case of no connected peers 65a32cd AP: Fix infinite loop in WPA state machine when out of random bytes a5f61b2 Fix OLBC non-HT AP detection to check channel 69554d7 ap_list: Remove unused functions 08c99ca ap_list: Remove unused iteration list pointers 6b16917 ap_list: Remove unused fields 66f1f75 P2P: Fix provision discovery response handling in some cases 2f9b66d Extend ROAM command to handle multiple SSIDs per BSS Change-Id: I46002b1d3bbf6e376c2ae09bcb2c824c54805bbd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
37d4d6a4efea4ef4f864347ac8ed8d62a9e19f90 |
|
18-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 52728dcd25b5074fb7c0493a8155f096089ad6d0 P2P: Stop P2P_PD_DURING_FIND wait on PD Response RX P2P: Postpone P2P scan only if station mode scan is pending Use special scan result processing steps only on requesting interface P2P: Re-start P2P operation if station mode scanning is stopped P2P: Use common function for re-starting P2P scan after station scan Change-Id: I62bb738a912483647606de1a5bd5357346ebd8f9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
700a137ab366edc72e371da68ba187b4717ee660 |
|
15-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 565110cd554801fa301c55010b3e9e14f43d7973 nl80211: Include interface name in more debug prints Convert WPS NFC python scripts from using wpactrl to wpaspy wpa_supplicant: Fix lookup of cached PMKSA Add capability flag for IBSS and add get_capability modes hostapd: Fix client reassociation after disconnect due to ACK failure Fix build with CONFIG_NO_CONFIG_BLOBS Fix build without CONFIG_CTRL_IFACE or CONFIG_NO_STDOUT_DEBUG libtommath: Avoid a compiler warning on unused variable libtommath: Condition fast_s_mp_mul_digs() on LTM_FAST P2P: Remove persistent group peer if it rejects invitation P2P: Allow shared interface channel preference to be ignored P2P: Fix shared frequency preference for concurrent operations P2P: Use best-overall channel in p2p_reselect_channel() P2P: Allow all channels for multi-channel concurrency (no negotiation) TDLS: Disable link to existing peer with lower address Fix compiler warning when CONFIG_IEEE80211R is not included WPS NFC: Fix build without CONFIG_WPS_ER FT: Add support for IEEE 802.11r with driver-based SME Change-Id: I1d5ced870c33d5cb73ecc6f04e272a3cf50f344a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2f023193a0fd630eb82ce6381b80911ad5a3462f |
|
12-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f46fc73a3f8d0eeb1b43d17769464884f467ac47 P2P: Add a peer entry based on Association Request frame P2P: Clear p2p_in_provisioning flag on group removal Allow SME SA Query to be used by all drivers Android: Sync makefile changes for HT/VHT overrides wpa_supplicant: Support VHT capability overrides wpa_supplicant: Parse int values in different bases and reject invalid wpa_supplicant: Reschedule sched scan after network change Remove unnecessary local variable wpa_supplicant: Handle enabling of one or all networks equally wpa_supplicant: Save prev_sched_ssid only if needed wpa_supplicant: Do not allow too short sched scan nl80211: Use helper function for phy_info_freqs() nl80211: Split phy_info_band() into smaller helper functions nl80211: Use helper function for phy_info_handler() nl80211: Split wiphy_info_handler() into smaller helper functions nl80211: Support splitting wiphy information in dumps Synchronize with wireless-testing.git include/uapi/linux/nl80211.h SAE: Add forgotten commit element validation step for FFC groups SAE: Move commit element validation steps into single location Change-Id: I369b6493f03714f6cfb4ed4a8c10ee6e6e71c1f8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7a5e50a0554bee77a9da492ea3d86f46147f1671 |
|
05-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 77e4e85321a0a1255901914d5de916aba050f9e1 P2P: Mark peer authorized for persistent group invitation P2P: Indicate frequency for upper layer invitation processing Allow wpa_supplicant AP mode to configure Beacon interval P2P: Use peer's channel list to limit GO freq on invitation P2P: Allow P2P client to specify preferred group channel P2P: Use shared function for setting up frequencies P2P: Allow all channels in case of multi channel concurrency hostapd: Make VHT IE struct more expressive Change-Id: I6d86d98a10a1a699bb464c5b916ebf21f626558b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
4b9d52f502481b258fec743c03a5e957e5605afc |
|
06-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit cc03d0fef3bf5913f8e11b7e998c10bf36a3c07f Author: Amar Singhal <asinghal@qca.qualcomm.com> Date: Wed Feb 6 00:31:34 2013 +0200 Add "BSS LAST ..." command - Add "BSS LAST ..." command - HS 2.0: Fix IE buffer length for extra scan IEs - TDLS: Several fixes - P2P: Fix P2P-GROUP-STARTED event for p2p_connect-join - P2P: Fix Action frame processing if Interworking is enabled - wpa_supplicant: Fix access to the freed memory when removing all networks - Add driver for OpenBSD net80211 layer - Make wpas_select_network_from_last_scan() static - wpa_supplicant: Implement fast-associate on SelectNetwork - Update scan interval gracefully - eloop: Add a timer cancel that returns the remaining time - nl80211: Do not use void pointer for driver_ops used internally - hostapd: Fix crash when scan fails Change-Id: I083747a0b1f7000730a9ab3ea80f3ee7e6247181 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
12b1cd9e151d1e5c4d35aa38531f38b4ef5cc805 |
|
08-Oct-2012 |
Jeff Johnson <jjohnson@codeaurora.org> |
Support conc_pref when use_p2p_group_interface=0 The original implementation of wpas_p2p_handle_frequency_conflicts() only works correctly when P2P groups use a separate interface (i.e. use_p2p_group_interface=1). Update the implementation so that it also works when the device interfaces is used (i.e. use_p2p_group_interface=0). Bug: 7290509 Change-Id: Icbc489125c5b7bd6e174d6aecd53555cdc9ad99d
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
81931b8bb302c38828763358f9e15af2b22c52c6 |
|
17-Oct-2012 |
Irfan Sheriff <isheriff@google.com> |
Increase channel delay to 100ms There is an inherent flaw in the p2p protocol design where an ACK loss right before channel switch leads to peers being out of sync. A work around of 50ms was added persistent case, but it turns out in heavy lossy conditions that is not enough. Increase it to 100ms. Experimental evaluation showed 100ms improves the reliability of p2p persistence reinvocation. Bug: 7359500 Change-Id: I73ab1b64e32b87101e95b0e487c90818c2c0aaf3
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2c5b17df4c29abdf11a85216c2f6272af796c576 |
|
14-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Improve robustness against lost ctrl::ack P2P includes two use cases where one of the devices is going to start a group and likely change channels immediately after processing a frame. This operation may be fast enough to make the device leave the current channel before the peer has completed layer 2 retransmission of the frame in case the ctrl::ack frame was lost. This can result in the peer not getting TX status success notification. For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround that ignores the TX status failure and will continue with the group formation with the assumption that the peer actually received the frame even though we did not receive ctrl::ack. For Invitation Response frame to re-invoke a persistent group, no such workaround is used in p2p_invitation_resp_cb(). Consequently, TX status failure due to lost ctrl::ack frame results in one of the peers not starting the group. Increase the likelihood of layer 2 retransmission getting acknowledged and ctrl::ack being received by waiting a short duration after having processed the GO Negotiation Confirm and Invitation Response frames for the re-invocation case. For the former, use 20 ms wait since this case has been worked around in deployed devices. For the latter, use 50 ms wait to get even higher likelihood of getting ctrl::ack through since deployed devices (and the current wpa_supplicant implementation) do not have a workaround to ignore TX status failure. 20 ms is long enough to include at least couple of retries and that should increase likelihood of getting ctrl::ack through quite a bit. The longer 50 ms wait is likely to include full set of layer 2 retries. Bug: 7282991 Change-Id: If063895046ff42fb52579bfb386281085bedce58 Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9d71283328fbad680cc74d9b287580e373eb4d6c |
|
05-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Fix network removal to select correct block If wpa_s->current_ssid is not set (e.g., after disconnection that did not result in immediate group removal), an incorrect group could have been removed since the network block iteration here could select the network block that is used to store persistent group credentials. Fix this by verifying that disabled != 2 to avoid picking the network block that could not have been the temporary P2P group. Bug: 7290511 Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
adddfc48d2d7bfa2b1a2405ab8f404b6383ec236 |
|
03-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Fix p2p_cancel processing during group formation The wpa_s->p2p_in_provisioning flag did not get cleared in some cases where p2p_cancel command is used to stop group formation. This can result in some operations (like p2p_find) failing afterwards. Fix this by using wpas_group_formation_completed() when processing p2p_cancel for a group that has not yet completed group formation. Bug: 7280743 Change-Id: I2dea935bd7c0509237de54bd048954f75ce80bfc Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
91c40cdce17424d9a4718876becf0b7811cf68f2 |
|
25-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: P2P-related fixes - P2P: Show own channel list in debug log - P2P: Allow peer to propose channel in invitation process - P2P: Clear sta_scan_pending on group removal - P2P: Fix ignoring of PD Response due to dialog token mismatch BUG: 7226065, 7231289 Change-Id: Iacb0f85d80f63bcdf311ccc0d29d0c282a0c0576 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
aa532510a7b8c4da2d7d6e2c11dda5db840894e4 |
|
24-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: P2P-related fixes - Remove unused function warning in WPS-NFC case - P2P: Fix p2p_ctrl_invite_persistent to parse peer parameter - hostapd: Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y - hostapd: Fix WDS VLAN bridge handling - hostapd: Send EAPOL frames from the VO queue if WMM is active - P2P: Remove channel 14 from supported P2P channels - hostapd: Clear WLAN_STA_ASSOC_REQ_OK if sending the assoc response failed - hostapd: Add check for the wds sta flag before creating 4addr VLANs - nl80211: Use the monitor interface if socket tx status is not supported - wpa_supplicant: Set state to DISCONNECTED on AP creation errors - P2P: Fix p2p_group_idle in no-group-interface P2P client case - P2P: Fix PSK configuration for GO network - Print control interface commands in easier format - Add debug print for no enabled networks case - P2P: Add more debug prints for GO start routines - P2P: Fix pending sta scan processing for concurrent operation cases BUG: 6940646 Change-Id: I1b1c54a08c61ec4af2bfd2274afc93501004eea2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f06196652a3e12af00503f4a548c56d4e60f7246 |
|
24-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Fix build: Add ANDROID_P2P for SCC interop fixes Change-Id: I847b63428b47016cf9a9a0b090636e1d5b9d28b8
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
af84a575044f6556994fcc124a955fc0ac0a6736 |
|
23-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
GC channel fixes for better interop with SCC - Force operating channel as the only channel in channel list attribute for go negotiation and persistence - Force an operating channel in go negotiation response even if the GO indicates a different in negotiation request - Fix a bug with updating peer operating channel based on GO negotiation confirm Bug: 7217600 Change-Id: I6da0dc1a49c1d99ae97dcab8ee9899e07a80a6cb
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
043a5a9d2586bf379a3f3e811c8c64d92050e131 |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Check all interfaces for pending scan for p2p_scan failures Driver could reject the new scan based on any virtual interface running a concurrent scan. As such, mark the pending scan callback for P2P based on any interfaces instead of just the one used for the p2p_scan operation. Signed-hostap: Jouni Malinen <j@w1.fi>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
dc7b71324df9788e194745e8ab9386a4619a623a |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Move p2p_cb_on_scan_complete to global context Since we have a global P2P module, the flag to trigger scan completion events to it needs to be in similar context. The previous design maintained this separately for each virtual interface and if P2P module did not run its scan operation on the virtual interface that completed the scan, P2P module would not be allowed to restart operations properly. Change-Id: I1b5a55c03aede15bbe0ac70dcbe0011a90f69b20 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5887a9d552f3d9d612011daba073e076daab5b2a |
|
14-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Skip unnecessary scan attempts Change-Id: Ieea8843c0fcb063dbb1df56e5cdf3fbdd0590cd4 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2b380488c6b5d21e54e98397c7a8d6a9f16dd8b5 |
|
13-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P: Skip join in case of provision discovery failure Change-Id: I46cb3d2f17a45bf0ff62697040602334b818d805 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f4f5db315918f3f048324ea43dc37a3b0fb31ecc |
|
11-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Improve scan during p2p_find Change-Id: I733b23c2b7a24cfa96fe6593adbcbeb7d0798002 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5a85f720c8e43866880fdf9446dc5ad9f45e9091 |
|
11-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Merge "clear wfd_dev_info_hex before use" into jb-mr1-dev
|
8d96518810ad721dc2f07d3b08a186ce23db06ff |
|
11-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
clear wfd_dev_info_hex before use Change-Id: Ic5cdb4df220834faf9e7da5cc1cc0a4191e6abd1
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a2854abb63b41c123e4c78e5653a55d902f00be6 |
|
11-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Postpone P2P scan if usual scan is in progress BUG: b/7137954 Change-Id: I64ef8dbb51c354b4cdebe490ffcd2cec07995939 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8367dc909f536f600c7474582fe0a96bef7c78fc |
|
10-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Add WFD dev info in device found event Change-Id: If25804d41e7ea1d028a30c180290d8de547f43e8
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5c44edb00c9384534a1b50981071874436aaecd5 |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
P2P: Do not fail p2p_group_remove just based on current_ssid The wpa_s->current_ssid pointer may get cleared, e.g., when disconnected. Commit 30ee769235f3170d9bf6b62c11c6e018e97deb84 made wpas_p2p_group_delete() exit early before removing a P2P interface in this type of case. That can cause number of issues from p2p_group_remove command failing to busy loop when terminating wpa_supplicant if there is a P2P group interface in client mode and that interface happens to be in disconnected state. Fix these issues by allowing wpas_p2p_group_delete() remove the P2P group interface regardless of whether wpa_s->currnt_ssid is set. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
31be0a4b946ecab910c0a9af3837dbccea5d204b |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
P2P: Allow p2p_invite-persistent to specify channel for GO The freq and ht40 parameters can now be used with the p2p_invite command when reinvoking a persistent group as the GO. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2b89da85b8cfe9bb862e8dd334855263c3522c00 |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Fix disconnection event processing Commit 0d30cc240fa36905b034dc9676f9d8da0ac18e56 forced wpa_s->current_ssid and wpa_s->key_mgmt to be cleared in wpa_supplicant_mark_disassoc() which gets called from wpa_supplicant_event_disassoc(). This broke IEEE 802.1X authentication failure processing and P2P deauthentication notification (group termination). Fix this by splitting wpa_supplicant_event_disassoc() into two parts and make wpas_p2p_deauth_notif() indicate whether the interface was removed. If so, the last part of disassocition event processing is skipped. Since the wpa_supplicant_mark_disassoc() call is in the second part, the above mentioned issues are resolved. In addition, this cleans up the P2P group interface removal case by not trying to use fast reconnection mechanism just before the interface gets removed. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
4b86ea55603eded752b5773179884a35e74e1a89 |
|
04-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-38 - Restore p2p_group_formation pointer till the 4-way handshake completes for the p2p client Change-Id: I976659ae5dac4cf01ecdd7995ff9abb6bf914bc1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
ad266fb3da6083126e7619e525153839b918aa44 |
|
25-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-37 - Allow AP_SME support - Do not send disassoc after EAP failure since AP_SME is enabled and del_station will be called - Allow group idle timeout to run during WPS disconnect Change-Id: I7e9e15b9c44804196bc98c01d51a71e24412b91d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
04abaa93653bcee36d59576c90f283d4efdb0a64 |
|
18-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-36 Change-Id: Ic3f1375953f4a7c77d2208f8436d951889093397 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b5e8f06e18446918f6d801566e5709a8c87f1780 |
|
08-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-34 - Remove interface priority - Add action parameter to service discovery functionality Change-Id: Ibc74c4053996e91f2f577b57695c68c86b5603c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
61dc7fcf73a67f1611a17db5b8170fb468e5137b |
|
06-Jun-2012 |
Irfan Sheriff <isheriff@google.com> |
Fix supplicant crash at group removal Bug: 6613470 Change-Id: Ia96694ce906414b3f56cd57416d7c4c6f2030a6e
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
98f9e76624da6bb96edc1982c423e4a119c5170a |
|
30-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.27 from BRCM - Fix crash during TRUE pbc overlap - Fix p2p_stop_find event - Avoid race condition in GO-NEG process if both peers enter p2p_connect at the same time - Retry assoc immediately on ASSOC-REJECT. Previously assoc was retried on authentication timeout (which occurs after 10secs). Now on assoc reject, we cancel the auth timer and then initiate a assoc scan. BUG: 6543705, 6427094 Change-Id: I4489fb14b6cead069f0d14fcbb9e2224f790d77b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2fb777c379ad560c309c54b96c2c13291da23f54 |
|
02-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.26 from BRCM - Add interface command - Improve scan handling during P2P BUG: b/6324527, b/6427094 Change-Id: I4425f44d2a15de0725ba4a1b42cc56e10954b314 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
687922c7347bdc3b4f8c921efe1d1388cb3baac0 |
|
26-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to Version 0.8.24 from BRCM - Add 'conc_priority' command - Fix handling a single channel concurrency case: If conc_priority is not set, advertise the frequency conflict to the framework and disable the new connection attempted - When P2P Interface gets removed due to single channel frequency conflict, show GROUP_REMOVE reason=FREQ_CONFLICT - Fix sched scan processing Change-Id: Ie6fe105cebd379a0a9c49ace62d2e48e71571107 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
fc41cadcff448cdd2b60e376fc6e7378e2e57b5e |
|
28-Sep-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
nl80211: Add get_noa() support for WFD certification (BRCM) BUG: b/5367351 Change-Id: I14ed79e10ade205c5dd4cdc0d2e888ed1279d1bb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
dca3979ccdf869f140f096b83df322a0efc84f22 |
|
06-Sep-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P fixes for BRCM 1. Fix for stopping any on-going P2P-FIND, while doing a P2P-GROUP-ADD. 2. Fix for Supplicant crash. The crash was due to socket being closed during P2P-GROUP-REMOVE. 3. Append P2P DEV ADDR during AP-STA-CONNECTED Event for P2P Devices. For legacy STA, the event format would remain the same. BUG: b/5262575 Change-Id: I8faf2159d35538fd07e42dba82d367b581cf2164 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
44da0253a740e0329b18f60c196e1f2dcacfccea |
|
23-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
BRCM P2P update - IFNAME for monitor interface is changed to m. from mon. This will give extra space for incrementing X in IFNAME (p2p-wlan0-X). Also, we have synced the reset of IFNAME w.r.t. monitor interface name. - Fixed continuous P2P_DEV_FOUND events coming from GO. Removed the BRCM specific change for this. - Fixed STATUS command for p2p interface. Change-Id: I04210dd0b2bdba06b0192c0a61edfa0e5b47ab72 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
e15c7b57cc7a214d5adaa0fc1d7204378eaf62a5 |
|
04-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Send termination message only in case of wpa_supplicant_deinit() call Change-Id: I276e339a35a9b693b604082bd211f6bd7b093808 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
497c1d5e50162d6b3c1cce5dbd9c5fd9da69aaef |
|
22-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Add P2P support for BRCM CFG80211 driver Change-Id: Iafec4bedbd33836d0a64e7ea054d8a46ef8ec204 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
|
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|