34af306c42b7ccf956508e7cd23f0ba90606e360 |
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap.h
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_methods.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_eke.c
/external/wpa_supplicant_8/src/eap_server/eap_server_gpsk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ikev2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_mschapv2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_psk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sake.c
|
4b06059785b935dd1f4f09314e4e12c417d2c6a4 |
30-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b57b560034f1bb1ad3a3892228940dde97323c0e b57b560 wpa_supplicant: Default to nl80211 instead of wext ee28f08 hostapd: Add more messages for error paths 61d2ce2 hostapd: Reject configuration file without interface parameter a8a7890 Clear extra_blacklist_count on FLUSH command c646862 WPS ER: Allow UPnP interface to be forced 728d971 Use status code 17 (unable to handle new STA) on max-STA limitation 5e24dc8 Add dup_binstr() to help common binary string tasks 8b44ad7 Use os_zalloc() instead of os_malloc() + os_memset() 2c48211 FT RRB: Validate os_malloc() return value before using it 7ca902b Make vlan_file optional if dynamic_vlan is used bdb112d Add bitfield routines 04382f7 NFC: Add no waiting and no multiple operations options for scripts fe90496 WPS: Fix AP auto configuration on config token generation 28fcfb6 NFC: Increase wpa_cli command buffer size 8f7a6dd WPS NFC: Allow Device Password ID override for selected registrar aaecb69 WPS: Use generic MAC Address attribute builder 9ccd916 P2P: Clean up channel--frequency conversion functions e864c0a Use a common frequency to channel conversion function 02db75b FT: Reset FT flag upon STA deauthentication 7800d45 P2P: Set P2P_DEV_PEER_WAITING_RESPONSE from TX status callback d78d3c6 EAP peer: Add check before calling getSessionId method dd57970 Disable network temporarily on repeated connection failures Change-Id: If8078d5c1ff40ea806e844543cf6f2bf9d24b7ac Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/tncs.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/ikev2.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sim.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls_common.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sim.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.h
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_methods.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_md5.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls_common.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tnc.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ttls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_vendor_test.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/eap_tls_common.h
|
04949598a23f501be6eec21697465fd46a28840a |
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pwd.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sim.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.h
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap.h
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_methods.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_fast.c
/external/wpa_supplicant_8/src/eap_server/eap_server_gpsk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_gtc.c
/external/wpa_supplicant_8/src/eap_server/eap_server_identity.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ikev2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_md5.c
/external/wpa_supplicant_8/src/eap_server/eap_server_methods.c
/external/wpa_supplicant_8/src/eap_server/eap_server_mschapv2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pax.c
/external/wpa_supplicant_8/src/eap_server/eap_server_peap.c
/external/wpa_supplicant_8/src/eap_server/eap_server_psk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pwd.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sake.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sim.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls_common.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tnc.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ttls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_vendor_test.c
/external/wpa_supplicant_8/src/eap_server/eap_server_wsc.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.h
/external/wpa_supplicant_8/src/eap_server/eap_tls_common.h
/external/wpa_supplicant_8/src/eap_server/ikev2.c
/external/wpa_supplicant_8/src/eap_server/ikev2.h
/external/wpa_supplicant_8/src/eap_server/tncs.c
/external/wpa_supplicant_8/src/eap_server/tncs.h
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/eap.h
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_methods.c
/external/wpa_supplicant_8/src/eap_server/eap_server_mschapv2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_peap.c
/external/wpa_supplicant_8/src/eap_server/eap_server_psk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pwd.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls_common.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ttls.c
/external/wpa_supplicant_8/src/eap_server/ikev2.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/src/eap_server/eap.h
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_wsc.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_server/Makefile
/external/wpa_supplicant_8/src/eap_server/eap.h
/external/wpa_supplicant_8/src/eap_server/eap_i.h
/external/wpa_supplicant_8/src/eap_server/eap_methods.h
/external/wpa_supplicant_8/src/eap_server/eap_server.c
/external/wpa_supplicant_8/src/eap_server/eap_server_aka.c
/external/wpa_supplicant_8/src/eap_server/eap_server_fast.c
/external/wpa_supplicant_8/src/eap_server/eap_server_gpsk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_gtc.c
/external/wpa_supplicant_8/src/eap_server/eap_server_identity.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ikev2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_md5.c
/external/wpa_supplicant_8/src/eap_server/eap_server_methods.c
/external/wpa_supplicant_8/src/eap_server/eap_server_mschapv2.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pax.c
/external/wpa_supplicant_8/src/eap_server/eap_server_peap.c
/external/wpa_supplicant_8/src/eap_server/eap_server_psk.c
/external/wpa_supplicant_8/src/eap_server/eap_server_pwd.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sake.c
/external/wpa_supplicant_8/src/eap_server/eap_server_sim.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tls_common.c
/external/wpa_supplicant_8/src/eap_server/eap_server_tnc.c
/external/wpa_supplicant_8/src/eap_server/eap_server_ttls.c
/external/wpa_supplicant_8/src/eap_server/eap_server_vendor_test.c
/external/wpa_supplicant_8/src/eap_server/eap_server_wsc.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.c
/external/wpa_supplicant_8/src/eap_server/eap_sim_db.h
/external/wpa_supplicant_8/src/eap_server/eap_tls_common.h
/external/wpa_supplicant_8/src/eap_server/ikev2.c
/external/wpa_supplicant_8/src/eap_server/ikev2.h
/external/wpa_supplicant_8/src/eap_server/tncs.c
/external/wpa_supplicant_8/src/eap_server/tncs.h
|