6a9f522e56dae5b1fff00642e27b82e82772dcf7 |
|
30-Sep-2013 |
Sunil Dutt <c_duttus@qti.qualcomm.com> |
TDLS: Clean up wpa_tdls_teardown_link() uses Making this function be used only for external setup case simplifies the implementation and makes core wpa_supplicant calls in ctrl_iface.c and events.c consistent. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
b7b4d0ec07161a6d76c40ba7ef1306e82fbb7e15 |
|
26-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 853b49a030c00fd6b2dde14e183ca2bf108eaa16 853b49a tests: Increase test_ap_wps_init connection timeout 28de68a P2P: Update peer operating channel from GO Negotiation Confirm 6701fdc P2P: Use the first pref_chan entry as operating channel preference 99d7c76 P2P: Add more debug info on operating channel selection 8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event 2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message 4c55901 P2P: Add state info to global STATUS command ae8c27f Add STATUS command to global control interface 42868f1 Add SAVE_CONFIG command to global control interface 1b9b31c Add SET command for global control interface 0185007 hostapd: Add survey dump support 245e026 hostapd: Split up channel checking into helpers ba873bd wired: Wait for the link to become active before sending packets d393de1 P2P: Validate the freq in p2p_group_add 973622c wpa_supplicant: Fix AP mode frequency initialization d99ca89 P2P: Skip non-P2P interface in p2p_group_remove * 239abaf WPS: Set currently used RF band in RF Bands attribute bf83eab nl80211: Start P2P Device when rfkill is unblocked 60b13c2 nl80211: Do not change type to station on P2P interfaces e0591c3 wpa_supplicant: Reduce wait time for control interfaces 5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs 5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket a235aca Fix DETACH command debug prints to avoid use of freed memory 8d6e035 Make global UNIX socket non-blocking for ctrl_iface 86bd141 Change WEP network selection to reject WPA/WPA2 APs 2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged 3351a38 WPS: Add control interface command for fetching latest status e96872a WPS: Track peer MAC address from the last operations ae23935 WPS: Track PBC status 61b6520 WPS: Track result of the latest WPS operation 50396e2 WPS: Add PBC mode activated/disabled events 961750c WPS: Share a common function for error strings 30158a0 nl80211: Update the assoc_freq during connect 83e7bb0 nl80211: Add more debug prints for DEL_STATION commands Bug: 9056601 Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
c2ebb4b85d69b65f552fee71ac68f44e8d87b39e |
|
24-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 932659696e2755bb1ecd6a27e1968fd27eef4948 9326596 nl80211: Remove unused WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT 0d08efa P2P: Use the number of concurrent channels in P2P flows a21816a Use wpa_drv_shared_freq() if get_radio_name() is not supported 53c5dfc Change share_vif_oper_freq() to handle multiple freqs 4752147 nl80211: Report the number of concurrent support channels d7df0fa Clean up wpa_supplicant_event() with deauth/disassoc helper functions fd9f170 Remove unnecessary nested ifdef CONFIG_AP 13adc57 IBSS RSN: Add peer restart detection b21990b nl80211: Register for AUTH frames when joining an IBSS network c91f796 nl80211: Support not specifying the frame frequency ec384c5 IBSS RSN: Fix disconnect() with internal SME ed07764 nl80211: Remove redundant assignment of ifindex 4ed8d95 TDLS: Tear down TDLS using wpas_drv_tlds_oper() if not external 831770b Cancel delayed scheduled scan when wpa_supplicant cleans up 69dd296 WDS: Fix WEP usage with nl80211 wds_sta=1 c8ebeda wpa_supplicant: Add support for VHT BSS membership selector 3f9a813 hostapd: Add a config option to control beaconing 182b2e5 Add missing host_to_le32() for big endian hosts 3f53c00 nl80211: Ignore disconnect event in case of locally generated request Change-Id: Ia7368e71ae40966a92970ac82b002c09a7971d41 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
|
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
f7e0a9905988e62e4f70fed8b795722abeab719b |
|
23-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 376204934db44d45f798bdde4db005bc88d666f0 3762049 wpa_cli: Support tab completion with ifname= prefix 13b11ba wpa_cli: Allow IFNAME= prefix to be used ae8535b WNM: Make ESS Disassoc Imminent event more convenient to use 6df634f WNM: Do not reject ESS Disassoc Imminent 7b53acd WNM: Use defines for BSS Trans Mgmt field values 8e1bc70 WNM: Fix ess_disassoc timeout to be specified in TBTTs 901d1fe WNM: Remove PMKSA cache entry on ESS disassoc imminent notification dad153d Try to use fast-associate on ENABLE_NETWORK b068001 Fix already-associated detection with driver-based BSS selection 72728c6 P2P: Relax channel forcing for invitation processing with MCC support 4033935 Fix OKC-based PMKSA cache entry clearing 1045ec3 nl80211: Add couple of additional iftypes to debug prints 2cadc8e TDLS: Retry TDLS Setup Response more quickly Change-Id: Ib02db74ca336a4d2da66c21d361c5529ee85f864 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
ea69e84a6f4455c59348485895d3d5e3af77a65b |
|
13-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 455299fb40d79bcbeaedcfbc04d00ac8330bbbdd 455299f nl80211: Fix foreign address filtering for MLME frame events e679f14 Mark interface disconnected on removal request 3636b89 Do not try auto connect mechanism in disconnected state 0cdb93f Do not add BSS to blacklist on local disconnection request 36b9883 Defer scan if connection is in progress on any of the shared interfaces 7c0e1e2 tls_openssl: Store TLS context per-connection 732118e Rename hostapd_parse_rates() to a more generic int list parser b113a17 DFS: Add ieee80211h hostapd configuration parameter 695c703 nl80211: Add driver_ops for stopping AP beaconing f90e9c1 nl80211: Add driver_ops for starting radar detection fc96522 nl80211: Add channel flags for DFS state information f295d0c nl80211: Add driver capability flag for radar detection 04be54f nl80211: Add driver events for radar detection a7505b1 eloop: Allow to run event loop multiple times in a row 6124e85 wpa_supplicant: Allow vifs to scan only current channel 893a0a5 systemd: Fix systemd interface alias Change-Id: I0a39a6868562cd458202285fed8986ac81a0cef2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
51b6ea882f234c14cd1fe1332a3840cf61fafcca |
|
08-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 6ea1f4135b72199988393f34dd7f5ad8040b7a42 6ea1f41 Try to set WPA-None key after IBSS-joined event 66562e9 Use cached driver capabilities instead of new fetch for each operation 55293aa TDLS: Do not overwrite the reason code in the Tear Down Request 4aa8186 Add a configration parameter for sched_scan interval 03565bc Synchronize with wireless-testing.git include/uapi/linux/nl80211.h f11b72c TDLS: Move AID=1 workaround into driver_nl80211.c 7853369 TDLS: Pass peer's AID information to kernel 55a2df4 HS 2.0: Include HS 2.0 Indication element only for HS 2.0 association ad0685e edit: Fix history processing on running old command 9be3714 wpa_cli: Fetch the current BSSID list when starting interactive mode 69aa334 wpa_cli: Add BSSID tab completion for set bssid_filter 2156587 wpa_cli: Replace set command help with completion routine f1fb042 wpa_cli: Allow space in the set command value f5ffc34 wpa_supplicant: Allow global scan frequencies configuration abfc3ad Synchronize build config comments for wpa_supplicant a01e10d Android: Enable WPS ER and NFC support in the build 11e5a49 WPS: Do not use void* in arithmetic 0f105f9 HS 2.0: Move Probe Request Indication IE addition to proper place 8543ed8 WPA: Print pairwise EAPOL-Key flag as a bool 7af092a hostapd: Add Key MIC in group EAPOL-Key frames corruption test option b691dcb nl80211: Fix max_remain_on_chan capability reading 41b1a76 P2P: Clone beacon_int when initializing new group interface 741ed9f WPS: Remove duplicate networks after WPS Change-Id: I9a2a0cb2acf87dfd7548318d2bda5f342b815884 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
4b06059785b935dd1f4f09314e4e12c417d2c6a4 |
|
30-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b57b560034f1bb1ad3a3892228940dde97323c0e b57b560 wpa_supplicant: Default to nl80211 instead of wext ee28f08 hostapd: Add more messages for error paths 61d2ce2 hostapd: Reject configuration file without interface parameter a8a7890 Clear extra_blacklist_count on FLUSH command c646862 WPS ER: Allow UPnP interface to be forced 728d971 Use status code 17 (unable to handle new STA) on max-STA limitation 5e24dc8 Add dup_binstr() to help common binary string tasks 8b44ad7 Use os_zalloc() instead of os_malloc() + os_memset() 2c48211 FT RRB: Validate os_malloc() return value before using it 7ca902b Make vlan_file optional if dynamic_vlan is used bdb112d Add bitfield routines 04382f7 NFC: Add no waiting and no multiple operations options for scripts fe90496 WPS: Fix AP auto configuration on config token generation 28fcfb6 NFC: Increase wpa_cli command buffer size 8f7a6dd WPS NFC: Allow Device Password ID override for selected registrar aaecb69 WPS: Use generic MAC Address attribute builder 9ccd916 P2P: Clean up channel--frequency conversion functions e864c0a Use a common frequency to channel conversion function 02db75b FT: Reset FT flag upon STA deauthentication 7800d45 P2P: Set P2P_DEV_PEER_WAITING_RESPONSE from TX status callback d78d3c6 EAP peer: Add check before calling getSessionId method dd57970 Disable network temporarily on repeated connection failures Change-Id: If8078d5c1ff40ea806e844543cf6f2bf9d24b7ac Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
8da800a193fb6f8832218715f82a7b4e2d2ad338 |
|
24-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 97279d8d1ad40bd7d884af8e2fc26dff0163331a 97279d8 nl80211: Drop frame events that are for foreign address cc2ada8 nl80211: Reduce debug on Probe Request frames 63a965c P2P: Fix after_scan_tx processing during ongoing operations 06b7f58 RSN: Update preauth scan results only based on new scan results 18e00b5 Move wpa_s freeing into wpa_supplicant_deinit_iface() 754632c dbus_new: Add EAP logon/logoff c2aff6b hostapd: Add some testing options adc96dc nl80211: Fix nla_nest_start conversion 0606052 wpa_supplicant: Add get_capability freq c7a39ba Provide TLS alerts to CLI/UI over control interface 2a07a27 P2P: Increase GTK rekeying period to 24 hours 75fa7d1 TDLS: Fix key configuration with current mac80211 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested Change-Id: Ic4b568c341657d266b7759513230d4ef206d75b1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
444d567b27731d8572ef37697dd12fd1c37c2f24 |
|
01-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 17b8995cf5813d7c027cd7a6884700e791d72392 17b8995 Interworking: Try to use same BSS entry for storing GAS results 3db5439 Optimize Extended Capabilities element to be of minimal length 8cd6b7b hostapd/wpa_s: Use driver's extended capabilities acb5464 Add ctrl_iface command FLUSH for clearing wpa_supplicant state 97236ce WPS: Skip rescanning after provisioning if AP was configured 4342326 Add ignore_old_scan_res configuration parameter 9599ccc WPS: Clear after_wps on new WPS connection 702621e WPS: Use latest updated BSS entry if multiple BSSID matches found ab547b5 WPS: Add more helpful debug for invalid WPS_REG command parsing a679c0f WPS: Allow hostapd process to control independent WPS interfaces ccdff94 WPS AP: Add support for reconfiguration with in-memory config 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested 558d69e P2P: Omit P2P Group Info in case of no connected peers 65a32cd AP: Fix infinite loop in WPA state machine when out of random bytes a5f61b2 Fix OLBC non-HT AP detection to check channel 69554d7 ap_list: Remove unused functions 08c99ca ap_list: Remove unused iteration list pointers 6b16917 ap_list: Remove unused fields 66f1f75 P2P: Fix provision discovery response handling in some cases 2f9b66d Extend ROAM command to handle multiple SSIDs per BSS Change-Id: I46002b1d3bbf6e376c2ae09bcb2c824c54805bbd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
37d4d6a4efea4ef4f864347ac8ed8d62a9e19f90 |
|
18-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 52728dcd25b5074fb7c0493a8155f096089ad6d0 P2P: Stop P2P_PD_DURING_FIND wait on PD Response RX P2P: Postpone P2P scan only if station mode scan is pending Use special scan result processing steps only on requesting interface P2P: Re-start P2P operation if station mode scanning is stopped P2P: Use common function for re-starting P2P scan after station scan Change-Id: I62bb738a912483647606de1a5bd5357346ebd8f9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
700a137ab366edc72e371da68ba187b4717ee660 |
|
15-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 565110cd554801fa301c55010b3e9e14f43d7973 nl80211: Include interface name in more debug prints Convert WPS NFC python scripts from using wpactrl to wpaspy wpa_supplicant: Fix lookup of cached PMKSA Add capability flag for IBSS and add get_capability modes hostapd: Fix client reassociation after disconnect due to ACK failure Fix build with CONFIG_NO_CONFIG_BLOBS Fix build without CONFIG_CTRL_IFACE or CONFIG_NO_STDOUT_DEBUG libtommath: Avoid a compiler warning on unused variable libtommath: Condition fast_s_mp_mul_digs() on LTM_FAST P2P: Remove persistent group peer if it rejects invitation P2P: Allow shared interface channel preference to be ignored P2P: Fix shared frequency preference for concurrent operations P2P: Use best-overall channel in p2p_reselect_channel() P2P: Allow all channels for multi-channel concurrency (no negotiation) TDLS: Disable link to existing peer with lower address Fix compiler warning when CONFIG_IEEE80211R is not included WPS NFC: Fix build without CONFIG_WPS_ER FT: Add support for IEEE 802.11r with driver-based SME Change-Id: I1d5ced870c33d5cb73ecc6f04e272a3cf50f344a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
1e1c48d2b342d4945d600ddb650bd2925822d1bb |
|
15-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Update AP IE regardless WPA_DRIVER_FLAGS_BSS_SELECTION flag Change-Id: Ia2b0aea81e250cfd989861ed37551ca8c41f7a66 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
4b9d52f502481b258fec743c03a5e957e5605afc |
|
06-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit cc03d0fef3bf5913f8e11b7e998c10bf36a3c07f Author: Amar Singhal <asinghal@qca.qualcomm.com> Date: Wed Feb 6 00:31:34 2013 +0200 Add "BSS LAST ..." command - Add "BSS LAST ..." command - HS 2.0: Fix IE buffer length for extra scan IEs - TDLS: Several fixes - P2P: Fix P2P-GROUP-STARTED event for p2p_connect-join - P2P: Fix Action frame processing if Interworking is enabled - wpa_supplicant: Fix access to the freed memory when removing all networks - Add driver for OpenBSD net80211 layer - Make wpas_select_network_from_last_scan() static - wpa_supplicant: Implement fast-associate on SelectNetwork - Update scan interval gracefully - eloop: Add a timer cancel that returns the remaining time - nl80211: Do not use void pointer for driver_ops used internally - hostapd: Fix crash when scan fails Change-Id: I083747a0b1f7000730a9ab3ea80f3ee7e6247181 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
3a787e6f7c987ba5a9a56a2066467d20ab40ec58 |
|
17-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Add 'SCAN TYPE=ONLY' functionality Usual manual scan request may cause reassociation due to several reasons. New command is intended to perform pure scan. Change-Id: I5f517a9f50f286482290e76ca1088abf6a1aeff9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
a05074ca1abe62b3fd8a8c30a5558e044b1356d5 |
|
21-Dec-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Extend EAPOL frames processing workaround for roaming cases Commit 1ff733383f3d5c73233ef452a738765667021609 added a mechanism to work around issues due to association events and EAPOL RX events being getting reordered. However, this applied only for the case where wpa_supplicant is not in associated state. The same issue can happen in roaming case with drivers that perform BSS selection internally (or in firmware). Handle that case similarly by delaying received EAPOL frame processing if the source address of the EAPOL frame does not match the current BSSID. Since wired IEEE 802.1X do not have BSSID, make this additional workaround conditional on BSSID match having been observed during the previous association. This fixes issues where the initial EAPOL frame after reassociation was either dropped (e.g., due to replay counter not increasing) or replied to with incorrect destination address (the BSSID of the old AP). This can result in significantly more robust roaming behavior with drivers that do not use wpa_supplicant for BSS selection. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
54cb0f6fef5a8ffe2dc7ed98b274fe81ca84c431 |
|
29-Oct-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Try to reject proper BSSID even if not set by the driver Bug: 7423119 Change-Id: Id0266274c9c60f8eea872ca3cfa5ad40d9180789 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
b485b188f853a4ec5342c2ea49705b545b2caf3d |
|
22-Oct-2012 |
Jeff Johnson <jjohnson@qca.qualcomm.com> |
Add better handling of CTRL-EVENT-ASSOC-REJECT In an enterprise environment a given Access Point (AP) may reject an association request due to load balancing. In an enterprise with a congested Wi-Fi network we may have to connect to many APs before we find one that will accept the connection. Currently when the wpa_supplicant receives a CTRL-EVENT-ASSOC-REJECT it will continue to count down the 10 second authentication timer, and doesn't realize that it should now attempt to find a different AP. Fix this issue in multiple ways. First, we increase the number of association rejects we handle before we disable the network. This will allow us more opportunity to authenticate with other APs which are sharing the same SSID. Second, when we are rejected we immediately blacklist the AP and rescan so that we can immediately attempt to connect to other APs. Bug: 7329568 Change-Id: I0ff66a0e05e6d4a9dec3dea98eccd850ecd5e343
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
aa532510a7b8c4da2d7d6e2c11dda5db840894e4 |
|
24-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: P2P-related fixes - Remove unused function warning in WPS-NFC case - P2P: Fix p2p_ctrl_invite_persistent to parse peer parameter - hostapd: Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y - hostapd: Fix WDS VLAN bridge handling - hostapd: Send EAPOL frames from the VO queue if WMM is active - P2P: Remove channel 14 from supported P2P channels - hostapd: Clear WLAN_STA_ASSOC_REQ_OK if sending the assoc response failed - hostapd: Add check for the wds sta flag before creating 4addr VLANs - nl80211: Use the monitor interface if socket tx status is not supported - wpa_supplicant: Set state to DISCONNECTED on AP creation errors - P2P: Fix p2p_group_idle in no-group-interface P2P client case - P2P: Fix PSK configuration for GO network - Print control interface commands in easier format - Add debug print for no enabled networks case - P2P: Add more debug prints for GO start routines - P2P: Fix pending sta scan processing for concurrent operation cases BUG: 6940646 Change-Id: I1b1c54a08c61ec4af2bfd2274afc93501004eea2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
89ca702e8ed3247d7007dbdebe531036671c34af |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
Do not inform other virtual interfaces of scan results in all cases If a connection operation is started on an interface based on scan results, other virtual interfaces should not be information about the results to avoid potential concurrent operations during the association steps. Since the sibling notification of scan results received was added as an optimization, skipping it for this type of cases is the simplest way of avoiding unnecessary concurrent operations. Change-Id: I145b4237074a97cc75fd68933fff7ed99b850630 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
fa08f9eb31989e0973eb8ed0bd14c238be19ab0b |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Schedule new scan if P2P operation delays scan This makes sure that the interrupted station mode scan can be completed after the P2P operations have had their chance of using the radio. Signed-hostap: Jouni Malinen <j@w1.fi>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
dc7b71324df9788e194745e8ab9386a4619a623a |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Move p2p_cb_on_scan_complete to global context Since we have a global P2P module, the flag to trigger scan completion events to it needs to be in similar context. The previous design maintained this separately for each virtual interface and if P2P module did not run its scan operation on the virtual interface that completed the scan, P2P module would not be allowed to restart operations properly. Change-Id: I1b5a55c03aede15bbe0ac70dcbe0011a90f69b20 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
9bce59c7fef20e34a05f04d1e33a4076083dca0c |
|
12-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 10-Sep-2012 TOT commit 762b99db7a76803d1ad274e87caa6fe870d47441 Author: Jouni Malinen <j@w1.fi> Date: Mon Sep 10 12:33:29 2012 +0200 Fix last_scan_res update existing BSS entry is update Change-Id: I03f933bf6d7f7e36b0f8ac410fbc37990f127c18 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
f4f5db315918f3f048324ea43dc37a3b0fb31ecc |
|
11-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Improve scan during p2p_find Change-Id: I733b23c2b7a24cfa96fe6593adbcbeb7d0798002 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
|
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
f8a26a8e6e081a2c576568198d0bcb4f976258ac |
|
01-Sep-2012 |
Jouni Malinen <j@w1.fi> |
SME: Fix disconnec-while-authenticating Commit 0d30cc240fa36905b034dc9676f9d8da0ac18e56 forced wpa_s->current_ssid to be cleared in wpa_supplicant_mark_disassoc() which gets called from wpa_supplicant_event_disassoc(). This broke SME disassoc-while-authenticating workaround for cfg80211. Fix this by restoring wpa_s->current_ssid in case SME authentication is in progress. Signed-hostap: Jouni Malinen <j@w1.fi>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
2b89da85b8cfe9bb862e8dd334855263c3522c00 |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Fix disconnection event processing Commit 0d30cc240fa36905b034dc9676f9d8da0ac18e56 forced wpa_s->current_ssid and wpa_s->key_mgmt to be cleared in wpa_supplicant_mark_disassoc() which gets called from wpa_supplicant_event_disassoc(). This broke IEEE 802.1X authentication failure processing and P2P deauthentication notification (group termination). Fix this by splitting wpa_supplicant_event_disassoc() into two parts and make wpas_p2p_deauth_notif() indicate whether the interface was removed. If so, the last part of disassocition event processing is skipped. Since the wpa_supplicant_mark_disassoc() call is in the second part, the above mentioned issues are resolved. In addition, this cleans up the P2P group interface removal case by not trying to use fast reconnection mechanism just before the interface gets removed. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
2fb835aa12088072a839be109acf0f11153857f8 |
|
18-Jun-2012 |
Irfan Sheriff <isheriff@google.com> |
Restore STA reconnection behavior Have the customized retry behavior only for P2P & do group failure indication beyond 5 retries Bug: b/6674338, b/6910598 Change-Id: I58cba356ebdb7fc4eaa9bedfa417b7d5d35bb306 Conflicts: wpa_supplicant/events.c
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
7db4ef75f0190d98dbc84f8968ede3ac0ae29571 |
|
18-Jun-2012 |
Irfan Sheriff <isheriff@google.com> |
Restore STA reconnection behavior Have the customized retry behavior only for P2P & do group failure indication beyond 5 retries Bug: 6674338 Change-Id: I58cba356ebdb7fc4eaa9bedfa417b7d5d35bb306
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
98f9e76624da6bb96edc1982c423e4a119c5170a |
|
30-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.27 from BRCM - Fix crash during TRUE pbc overlap - Fix p2p_stop_find event - Avoid race condition in GO-NEG process if both peers enter p2p_connect at the same time - Retry assoc immediately on ASSOC-REJECT. Previously assoc was retried on authentication timeout (which occurs after 10secs). Now on assoc reject, we cancel the auth timer and then initiate a assoc scan. BUG: 6543705, 6427094 Change-Id: I4489fb14b6cead069f0d14fcbb9e2224f790d77b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
2fb777c379ad560c309c54b96c2c13291da23f54 |
|
02-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.26 from BRCM - Add interface command - Improve scan handling during P2P BUG: b/6324527, b/6427094 Change-Id: I4425f44d2a15de0725ba4a1b42cc56e10954b314 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
9e07767d5d76159ef38a241da00eb0d9f3bc6420 |
|
13-Apr-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Fix CONFIG_NO_ROAMING option Change-Id: I9d4c2c59179f92c82b4a6d8a5b503db8dd859e2c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
006dedfbfff3ecae6996e5eb85240e42b0e6a7a4 |
|
22-Feb-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Change option CONFIG_ROAMING to CONFIG_NO_ROAMING Change-Id: I188968c04cd1fc2c4e6d424bec8aab8003be235e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
f6c92c4dd33d21c040e51bcb30beac24173a62b9 |
|
26-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.17 from BRCM - Suppress scan results notification during p2p_search_in_progress Change-Id: I971bbfb15983c83d51d050791f58244ecf7050af Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
44da0253a740e0329b18f60c196e1f2dcacfccea |
|
23-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
BRCM P2P update - IFNAME for monitor interface is changed to m. from mon. This will give extra space for incrementing X in IFNAME (p2p-wlan0-X). Also, we have synced the reset of IFNAME w.r.t. monitor interface name. - Fixed continuous P2P_DEV_FOUND events coming from GO. Removed the BRCM specific change for this. - Fixed STATUS command for p2p interface. Change-Id: I04210dd0b2bdba06b0192c0a61edfa0e5b47ab72 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
efdec2efdda2f534d84b32f2737ca3d8a00fdf02 |
|
16-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Add CONFIG_ROAMING option (off by default) Change-Id: I846edd8a48e6c5e948732f28caf821055490d320 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
497c1d5e50162d6b3c1cce5dbd9c5fd9da69aaef |
|
22-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Add P2P support for BRCM CFG80211 driver Change-Id: Iafec4bedbd33836d0a64e7ea054d8a46ef8ec204 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
c55524ad84d13014e8019491c2b17e5dcf13545a |
|
07-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Fix D-Bus build without CONFIG_P2P=y nl80211: Allow AP mode to be started without monitor interface nl80211: Process association/disassociation events in AP mode DBus/P2P: Adding decl for PersistentGroupRemoved signal DBus/P2P: Rectified type of SecondaryDeviceTypes in device property Get P2P: Only call dev_lost() for devices that have been dev_found() wpa_cli: Add missing parameter for P2P_GROUP_ADD command wpa_supplicant: Respect PKG_CONFIG variable if set in the environment TLS: Add support for tls_disable_time_checks=1 in client mode hostapd: Clear keys configured when hostapd reloads configuration Add dbus signal for information about server certification Move peer certificate wpa_msg() calls to notify.c wpa_supplicant AP: Disable AP mode on disassoc paths wpa_s AP mode: Enable HT20 if driver supports it Allow PMKSA caching to be disabled on Authenticator FT: Disable PMKSA cache for FT-IEEE8021X FT: Clear SME ft_used/ft_ies when disconnecting 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Change-Id: I6ae333196c36ffa7589662d5269fabfc3b994605 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
|
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
43007fd3a75a07189a11510e131216284b48e098 |
|
12-Apr-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Set ap_scan to default in case of disassociation Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/events.c
|