391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
b7b4d0ec07161a6d76c40ba7ef1306e82fbb7e15 |
|
26-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 853b49a030c00fd6b2dde14e183ca2bf108eaa16 853b49a tests: Increase test_ap_wps_init connection timeout 28de68a P2P: Update peer operating channel from GO Negotiation Confirm 6701fdc P2P: Use the first pref_chan entry as operating channel preference 99d7c76 P2P: Add more debug info on operating channel selection 8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event 2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message 4c55901 P2P: Add state info to global STATUS command ae8c27f Add STATUS command to global control interface 42868f1 Add SAVE_CONFIG command to global control interface 1b9b31c Add SET command for global control interface 0185007 hostapd: Add survey dump support 245e026 hostapd: Split up channel checking into helpers ba873bd wired: Wait for the link to become active before sending packets d393de1 P2P: Validate the freq in p2p_group_add 973622c wpa_supplicant: Fix AP mode frequency initialization d99ca89 P2P: Skip non-P2P interface in p2p_group_remove * 239abaf WPS: Set currently used RF band in RF Bands attribute bf83eab nl80211: Start P2P Device when rfkill is unblocked 60b13c2 nl80211: Do not change type to station on P2P interfaces e0591c3 wpa_supplicant: Reduce wait time for control interfaces 5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs 5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket a235aca Fix DETACH command debug prints to avoid use of freed memory 8d6e035 Make global UNIX socket non-blocking for ctrl_iface 86bd141 Change WEP network selection to reject WPA/WPA2 APs 2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged 3351a38 WPS: Add control interface command for fetching latest status e96872a WPS: Track peer MAC address from the last operations ae23935 WPS: Track PBC status 61b6520 WPS: Track result of the latest WPS operation 50396e2 WPS: Add PBC mode activated/disabled events 961750c WPS: Share a common function for error strings 30158a0 nl80211: Update the assoc_freq during connect 83e7bb0 nl80211: Add more debug prints for DEL_STATION commands Bug: 9056601 Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
|
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/src/ap/hw_features.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/hw_features.c
|