9ead16e203b81d44a2d84eadc2901ceeb7daf805 |
07-Oct-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-unwrap.c
/external/wpa_supplicant_8/src/crypto/aes-wrap.c
/external/wpa_supplicant_8/src/crypto/aes_wrap.h
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
661b4f78e48c697429dc46154a4125892c001718 |
29-Sep-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a313d17de943cbaf12cbf67d666af14791be8ad2 a313d17 Extend random MAC address support to allow OUI to be kept 1cbdb9d Add helper function for generating random MAC addresses with same OUI 97ed9a0 nl80211: Remove bridge FDB entry upon sta_remove() 39323bc AP: hostapd_setup_bss() code clean-up 1595eb9 P2P: Add support for 60 GHz social channel b6ebdfb Extend STATUS command with frequency information 375f4a3 hostapd: Avoid dead code with P2P not enabled 6a60488 dbus: Add a global property to set or unset WFD IEs 4bd7e16 wifi_display: Add a utility function to set WFD subelements from IEs d417744 wifi_display: Add a utility function to get the sub-elements as IEs a8833b8 util: Don't use "\e" 8c6f4a5 ap_config.c: fix typo for "capabilities" 6e252b0 WPS: Fix WPS-in-search check when STA_AUTOCONNECT is disabled e5fdc05 P2P: Remove unecessary sanity check for global p2p ee285df P2P: Flush services based on global p2p init and not p2p ifaces 7139cf4 P2P: Decrement sd_pending_bcast_queries when sd returns success dbdc9a1 nl80211: Fix memory leak on start radar detection error path ed8e005 hostap: nl80211 use nl80211_put_freq_params c267753 Add support for using random local MAC address 4d8fb63 Add helper function for generating random MAC addresses fee354c nl80211: Add command for changing local MAC address e49cabc P2P: Set timeout when starting GO Negotiation from Probe Req RX 7549c17 P2P: Clear pending_listen_freq when starting GO Neg/Invite b497a21 nl80211: Ignore auth/assoc events when testing driver-SME 79e2b1c Add PMKSA_FLUSH ctrl_iface command 55c2bfa wpa_cli: Support action scripts with global ctrl_iface 063f850 wpa_cli: Increase event buffer size to 4096 bytes fa0e917 wpa_cli: Fix PING in interactive mode with ifname_prefix c53a9bf Check for driver's DFS offload capability before handling DFS 068e387 STA: Update scan results for ap_scan=1 skip-selection case also 7a4a93b dbus: Add SignalPoll() method to report current signal properties a6ab82d Android: Add NO_EVENTS parameter to status command df2508d P2P: Check os_get_random() return value more consistently 54461f3 RADIUS server: Remove unreachable code e4474c1 FT: Fix hostapd with driver-based SME to authorize the STA 0800f9e nl80211: Add roaming policy update using QCA vendor command 0ef023e Add support for driver command to update roaming policy 0cd9846 nl80211: Print debug info on STA flag changes 17e2091 P2P: Fix radio work issue with wait-for-peer GO Negotiation 76db5b6 Work around broken AP PMKSA caching implementation b08d5fa WPS: Set EAPOL workarounds dynamically based on association 8511a0f WPS: Extend internal entropy pool help for key/snonce derivation abc0553 Remove WPA_EVENT_SCAN_STARTED message from MSG_INFO log c45dabb P2P: Deauth p2p client just after dbus notify 3ee1856 nl80211: Register eloop after hs20 action frame 3bd3257 dbus: add BSS Age property to indicate last-seen time 5c61d21 openssl: Fix memory leak in openssl ec deinit 10e7948 Fix hostapd GET_CONFIG wpa_pairwise_cipher value 3a413e0 RADIUS client: Check getsockname() return value 9c196f7 HTTP: Fix OCSP status check cb5ef95 SME: Verify that os_get_random() succeeds for SA Query c9cd78e RADIUS server: Fix IPv6 radiusAuthClientAddress mask 5e62cfd P2P: Verify that os_get_random() succeeds 6473e80 EAP-PAX server: Add explicit CID length limit 6a6566c Remove unnecessarily shadowed local variable df756b3 hostapd: Remove unused variable assignment e47abdb TDLS: Decline Setup Request with status code 37 if BSSID does not match ce2002a TDLS: Add RSN and Timeout interval IEs in TDLS Discovery Response frame 1c2aa04 P2P: Do not add P2P IEs on P2P disabled interface f2e9083 nl80211: Add more RTM_NEWLINK/DELLINK debug messages 728ff2f nl80211: Fix RTM_DELLINK processing for bridge events e5a4b85 WPS: Merge mixed-WPA/WPA2 credentials if received in same session db9418b Add printf NULL checks to silence static analyzer 4e53675 P2P: Overwrite pending interface only after verifying BSS entry 04a258e hostapd: Check that EVENT_ASSOC data is present before using it 1cc0d6a wpa_supplicant: Use freq_list scan filtar in sched_scan Change-Id: Ibc18f6761b3ccfe8fb4479f26f53e70942068bc8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
|
7f0b69e88015ca077ef7a417fde0a76c10df23a5 |
28-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e8c08c9a363340c45baf8e13c758c99078bc0d8b e8c08c9 EAP-FAST server: Fix potential read-after-buffer (by one byte) 8b65fef Interworking: Remove unnecessary placeholder for PAME-BI 27a725c EAP: Do not allow fast session resumption with different network block 52f4abf P2P: Remove PSK/passphrase from P2P-GROUP-STARTED debug log entry f8723e1 P2P: Use a helper function for P2P_EVENT_GROUP_STARTED events 905c722 Add wpa_msg_global_ctrl() 1f1fe19 EAP-pwd: Clear identity string and temporary buffer explicitly f119d66 EAP-pwd: Verify BN_rand_range return code 5197f03 EAP-pwd: Use os_memcmp_const() for hash comparisons 26c10f7 OpenSSL: Use EC_POINT_clear_free instead of EC_POINT_free 3248071 OpenSSL: Use BN_clear_free instead of BN_free 870dfe9 EAP-TTLS: Remove FreeRADIUS workaround for EAP-TTLS/MSCHAPv2 Bug: 15615050, 16493485 Change-Id: I7028a61ad6dbda1f336376cc0568b81046045725 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
|
c28170251eb54dbf64a9074a07fee377587425b2 |
02-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e376290c667e970d751acc916e0efe2ed16292ed e376290 HS 2.0R2: Add update_identifier field to network 5bc2857 Fix some sparse warnings about u16 vs. le16 42619d6 Fix CTRL-EVENT-REGDOM-CHANGE event init= value a520bf4 Mark function static 0cb79d3 dbus: Fix indentation level to match code logic 8f03ac9 Mark functions static 6891f0e Allow SCAN command to specify scan_ssid=1 SSIDs 18389ab WPS: Clear keys/PINs explicitly b7175b4 Clear hostapd configuration keys explicitly d1ecca6 HS 2.0 R2: Clear hs20-osu-client configuration keys explicitly 0a13e06 EAP server: Clear keying material on deinit f534ee0 EAP peer: Clear keying material on deinit 19c48da Clear wpa_supplicant configuration keys explicitly 28bfa29 EAP-AKA: Remove unnecessary dead increment 62493df EAP-GPSK: Avoid dead increment by checking pos pointer 164a453 FT: Debug print extra response data 70bfc77 PCSC: Debug print extra response data 5dbbf36 Interworking: Remove unnecessary dead increment a1e46f3 Check for no key_mgmt/proto/auth_alg entries in config writer 290ea6a Remove unnecessary tracking of first entry d3fa2bb WFD: Explicit limit for subelement length (CID 68127) 745ef18 HS 2.0: Verify assoc_req_ie buffer size for indication elements 0233dca SAE: Use os_memcmp_const() for hash/password comparisons 34ef46c WEP shared key: Use os_memcmp_const() for hash/password comparisons 3e4b77c EAP-GTC: Use os_memcmp_const() for hash/password comparisons a6eae3f EAP-MSCHAPv2: Use os_memcmp_const() for hash/password comparisons 30411b3 EAP-TTLS: Use os_memcmp_const() for hash/password comparisons a564d9c EAP-MD5: Use os_memcmp_const() for hash/password comparisons 4685482 EAP-PSK: Use os_memcmp_const() for hash/password comparisons cba0f86 EAP-PEAP: Use os_memcmp_const() for hash/password comparisons 7b1e745 EAP-LEAP: Use os_memcmp_const() for hash/password comparisons 8f92826 EAP-GPSK: Use os_memcmp_const() for hash/password comparisons e1550d4 EAP-PAX: Use os_memcmp_const() for hash/password comparisons c434503 EAP-FAST: Use os_memcmp_const() for hash/password comparisons dddf7bb EAP-EKE: Use os_memcmp_const() for hash/password comparisons dfb5608 EAP-SAKE: Use os_memcmp_const() for hash/password comparisons 05c79d6 EAP-SIM/AKA: Use os_memcmp_const() for hash/password comparisons 675ddad EAP-IKEv2: Use os_memcmp_const() for hash/password comparisons 2049a3c TLS: Use os_memcmp_const() for hash/password comparisons a79aea5 Milenage: Use os_memcmp_const() for hash/password comparisons 05f916e AES-GCM: Use os_memcmp_const() for hash/password comparisons 87a5c93 AES-CCM: Use os_memcmp_const() for hash/password comparisons 7c24f53 EAPOL supplicant: Use os_memcmp_const() for hash/password comparisons 870834a RSN authenticator: Use os_memcmp_const() for hash/password comparisons 0d15b69 RSN supplicant: Use os_memcmp_const() for hash/password comparisons 72619ce MACsec: Use os_memcmp_const() for hash/password comparisons c237195 RADIUS: Use os_memcmp_const() for hash/password comparisons ce9c9bc WPS: Use os_memcmp_const() for hash/password comparisons afc3c8b Add constant time memory comparison function os_memcmp_const ee352f1 EAP-pwd: Add explicit total length limit b2b8a4c EAP-SIM/AKA: Pass EAP type as argument to eap_sim_msg_finish() f107d00 PeerKey: Clean up EAPOL-Key Key Data processing 010fc5f dbus: Clean up array-array-type property getter Change-Id: I1dbe483be2678a7468e6955d70ea261f8e53b26d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-ccm.c
/external/wpa_supplicant_8/src/crypto/aes-gcm.c
/external/wpa_supplicant_8/src/crypto/milenage.c
|
717574375e969e8272c6d1a26137286eac158abb |
02-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 801e117376e13d5b3c50f1627b93a949529fdf99 801e117 Fix validation of RSN EAPOL-Key version for GCMP with PMF 3d4d234 FT: Fix GTK rekeying after FT protocol d3d0483 nl80211: Work around error case prints for nl_recvmsgs on Android 8a387a2 P2P NFC: Fix use of freed memory df48efc Fix external radio work stopping to not read freed memory 13c3303 SAE: Fix memory leak in random number generation d92bdf9 hostapd: Make sure hapd->drv_priv gets cleared on driver deinit 438e133 hostapd: Use helper function to avoid duplicate deinit calls ac1a224 hostapd: Clean up if interface setup fails 81c4fca hostapd: Reset hapd->interface_add properly 3fbd036 hostapd: Prevent double interface disabling from segfaulting ea39367 nl80211: Fix wpa_driver_nl80211_if_add() failure paths b77aeae Interworking: Re-trigger scan if no connect attempt is done b523973 RADIUS client: Trigger failover more quickly if socket is not valid 09844c0 RADIUS client: Do not flush pending messages if server did not change 5d67bf1 hostapd: Fix configuration of multiple RADIUS servers with SET 70d4084 RADIUS client: Fix socket close/re-open on server change d045cc8 RADIUS client: Fix crash issue in radius_client_timer() c1fb75a RADIUS client: Handle ENETUNREACH similarly to other failure cases 9ed4076 RADIUS client: Do not try to send message without socket cc0b7cb hostapd_cli: Fix segmentation fault with interface command 114153b P2P: Debug print channel lists for invitation processing 4eb3b76 OpenSSL: Fix OCSP certificate debug print to use wpa_printf f6fb192 HS 2.0R2: Fix subscr_remediation_method for RADIUS server 74879f3 Remove extra newline from a debug print Change-Id: I82d4f00501fabb8b325e4461178b45e7b2c0178e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
50b691dc36a8075e8f594e8bea93cb524fa6b1d2 |
21-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 54ac6ff8c4a20f8c3678e0c610716ce7795b8320 54ac6ff PKCS 1: Add function for checking v1.5 RSA signature d381184 RSA: Add OID definitions and helper function for hash algorithms ab6d047 Add function for building RSA public key from n and e parameters 6c5be11 PKCS #1: Enforce minimum padding for decryption in internal TLS e6d83cc PKCS #1: Allow only BT=01 for signature in internal TLS 9c29d48 X.509: Fix internal TLS/X.509 validation of PKCS#1 signature 10b58b5 TNC: Allow TNC to be enabled dynamically 0a626a5 TNC: Move common definitions into a shared header file 4075e4e TNC: Allow tnc_config file path to be replaced f0356ec eloop: Add epoll option for better performance da96a6f eloop: Separate event loop select/poll implementation 68d2700 dbus: No need to recompute group object path on GroupStarted signal f3734e2 dbus: Provide the P2P Device Address from the relevant structure e956b83 dbus: Fix interface DeviceFound signal specification fc591a7 dbus: Declare GONegotiation signals properly Change-Id: I54a598ae249ca569f15eaef8f728985897e1b2f0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_internal-rsa.c
|
26af48b2fcdee1b88e4092a9078cb7c9bf79da6e |
09-Apr-2014 |
Jouni Malinen <jouni@qca.qualcomm.com> |
OpenSSL: Detect and prevent TLS heartbeat attack Some OpenSSL versions have vulnerability in TLS heartbeat request processing. Check the processed message to determine if the attack has been used and if so, do not send the response to the peer. This does not prevent the buffer read overflow within OpenSSL, but this prevents the attacker from receiving the information. This change is an additional layer of protection if some yet to be identified paths were to expose this OpenSSL vulnerability. However, the way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant was already rejecting the messages before the response goes out and as such, this additional change is unlikely to be needed to avoid the issue. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
b36ed7cd946148d829f311de8fe53ea3ffaaffe3 |
17-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4e3860f8a770a0db3816196c77baf894c7ccc1e f4e3860 Fix AP mode default TXOP Limit values for AC_VI and AC_VO 47bd94a TLS testing: Add new test cases for RSA-DHE primes f5bbb2f TLS client: Reject RSA-DHE prime if it shorter than 768 bits 817742f TLS testing: Fix test_flags check for ApplData report 1120e45 Allow config blobs to be set through ctrl_iface c3722e1 ACS: Fix VHT20 49b7443 Fix HT40 co-ex scan for some pri/sec channel switches 5bdac4a Remove unused STA entry information c9d9ee9 Fix hostapd_add_iface error path to deinit partially initialized BSS 6829da3 Fix external radio_work deinit path 8dd9f9c Allow management group cipher to be configured 67d39cf P2P: Do not create another group interface on NFC Token enable 6aa1cd4 wpa_supplicant: Apply VHT_OVERRIDES to wpas_start_assoc_cb() db63757 hostapd: Supply default parameters for OBSS scan 6e9375e TDLS: Add get_capability tdls command 67e1a40 hostapd: For VHT 20/40, allow center segment 0 to be zero d0bf06f GAS server: Remove incomplete remote ANQP processing fdb4535 WPS: Extend per-station PSK to support ER case as well 9a1a538 wpa_supplicant AP: Allow PMF to be enabled with ieee80211w ce6b9cd Allow reason code to be specified for DEAUTH/DISASSOC test frame dda8be7 TDLS: Use QoS info from WMM IE obtained in TDLS frames daa70bd Fix CONFIG_NO_SCAN_PROCESSING=y build 3a8ec73 P2P: Report dev_found event (if not yet done) from GO Neg Req RX 0f23a5e Mark AP disabled if initialization steps fail Change-Id: I7e499241552147c734fec9b77351b47ffd6e3a7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
|
9866086a955d00e237cc8df3722e7dff75c02532 |
12-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 99cd77a8c50413d44f1ebead917310468a8406de 99cd77a tests: Verify reassociate-to-same-BSS commands e8d70a7 nl80211: Hide deauth event due to forced deauth-during-auth 0f44ec8 Add a reattach command for fast reassociate-back-to-same-BSS cfc393a hostapd: Document interworking realm EAP Method types 7450c12 DFS: Add extra debugging messages 5d0d72a wpa_supplicant: Put upper bound on initial scan time delay 8c06db7 nl80211: Fix P2P Device handling when starting with RF-kill blocked 5e3ddf4 PNO: Change sched_scan_stopped event to handle pending PNO properly 737e7a0 PNO: Move and rename pno_start()/pno_stop() 1d91f50 hostapd: Process management frames only once per BSS e070051 hostapd: Allow to switch to usable DFS channels 01b9999 hostapd: Allow to switch to DFS channels if available 70ee1be hostapd: Add config option chanlist for DFS channels 09eef14 Use internal FIPS 186-2 PRF if needed 3b9c517 Fix PTK derivation for CCMP-256 and GCMP-256 e6ef73f nl80211: Add debug print of KEY_DATA and KEY_SEQ b465f5d Remove unused hostapd_wep_key_cmp() 4fb363c Fix error path handling on radius_accept_attr Change-Id: I28ecac6cbcc6f71f19a051c12b54668ca6a66e2a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/Makefile
/external/wpa_supplicant_8/src/crypto/fips_prf_cryptoapi.c
/external/wpa_supplicant_8/src/crypto/fips_prf_gnutls.c
/external/wpa_supplicant_8/src/crypto/fips_prf_nss.c
/external/wpa_supplicant_8/src/crypto/sha1-internal.c
|
818ea489ef32dcdc7c098d8a336d6e1dd8996112 |
10-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 390b92913a9a1b3a6aaf70e8b5971a7b7c76cabc 390b929 TLS testing: Allow hostapd to be used as a TLS testing tool 994afe3 RADIUS server: Allow TLS implementation add log entries 01f7fe1 RADIUS server: Allow EAP methods to log into SQLite DB 8a57da7 RADIUS server: Add option for storing log information to SQLite DB f3ef7a2 TLS client: Send decrypt_error on verify_data validation error 129b9b9 TLS: Share a helper function for verifying Signature 6531963 TLS: Use a helper function for calculating ServerKeyExchange hash 65074a2 TLS: Add support for DHE-RSA cipher suites 41ebfe9 TLS server: Enable SHA256-based cipher suites 60b893d wpa_supplicant: Allow external management frame processing for testing ec33bc6 Enable RADIUS message dumps with excessive debug verbosity 226e357 Revert "bridge: Track inter-BSS usage" d0ee16e Allow arbitrary RADIUS attributes to be added into Access-Accept 0ac3876 Fix PMF protect disconnection on session timeout 49021c1 Fix hostapd error path regression Change-Id: Ie0710c036cca2fb370d28684cc5a5d28a075dfc1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_internal.c
|
7d5c8f257a74ac0d12828962a492e8b84ef83923 |
03-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5f7e1c06cd428888a2ed4fa763c5da37a873e422 5f7e1c0 Redirect more frames with ext_mgmt_frame_handling=1 7738163 RADIUS server: Copy IPv4 address only when IPv6 is not used 508e24c dbus: Clean up error reporting for TDLS peer address parsing 3b6170b WPS: Remove duplicate variable setting 78789d9 Remove unnecessary variable initialization a7c37d9 dbus: Remove duplicated variable assignment e997bc7 Remove a static analyzer warning about unused variable write ea3b8c1 Do not use a separate variable for tracking first entry in a list 8a4ce28 WPA: Clean up cipher suite counting in write routines 6ed626d Remove unused gid_str pointer update 749fa14 Debug print trailing WPA/RSN IE bytes, if any a5802c0 OpenSSL: Avoid never-used analyzer warning 7b6e815 Clean up hostapd add_iface error path operations 67adcd2 WNM: Check wpa_s->current_bss more consistently 3ff8073 EAP-FAST: Use clear eap_get_config() result validation a8716d1 roboswitch: Verify that register read succeeds before comparing res 3d91a04 DFS: Make sure center frequency is always initialized for VHT fa0a9f5 trace: Fix memory use on no-function name path bd27b13 Make code path easier for static analyzers 64abb72 nl80211: Allow old r-o-c offchannel TX to be tested fa72a88 P2P: Fix validation on Invitation Request error path ca412c7 Remove unreachable return statement 2af4d87 GAS: Fix additional comeback delay with status code 95 07d462c Interworking: Remove unused password setting for SIM credential 3141b82 Add OSEN to proto config field writer b908c50 Clear hostapd bss entry to NULL on add-interface-failure 0052ce4 atheros: Add support for OSEN Change-Id: Ifd78a8f8259e5b0f654d3dbadd24c9ab029d3afb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
745be3f298f4a0899238a99d96b7ed804edd3329 |
20-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: Remove explicit SSL_OP_NO_TLSv1_1 and SSL_OP_NO_TLSv1_2 Now wpa_supplicant allows to set these options dynamically per network by adding to 'phase1' "tls_disable_tlsv1_1=1" or "tls_disable_tlsv1_2=1" Change-Id: I954af5356833bed5b78c4ebf4a50c788ba984114 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
13ca8d8ea51a1aa5e24c6c956473a11b0c7daed4 |
20-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 848905b12abf2df650c43cb821d36a13246baacb 848905b Avoid undefined references with CONFIG_WPA_TRACE_BFD=y 9e38836 wpa_debug: Remove 2048 byte message length limit f667e03 P2P: Address few issues seen with P2P SD e9a6f18 TLS: Add tls_disable_tlsv1_1 and tls_disable_tlsv1_2 phase1 params cb10c7d RADIUS DAS: Add support for NAS identification attributes 0d7c5e1 RADIUS DAS: Remove PMKSA entry on Disconnect-Request d87a6ac WPS: Fix STA state validation when processing PutWLANResponse Change-Id: I4799cad2fe661db567eb3a92af2b3eefb7c96dab Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
ec58b164a608cbc1d99e71bb3d86ef4b263377dc |
19-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit ac494fcce4270dbd076ab1d167dbffd6e0f7060b ac494fc Android: Use external libnl 2.0 dynamic library b7cac41 Fix hostapd and wpa_supplicant build with binutils >= 2.24.x b62d5b5 Revert "OpenSSL: Do not accept SSL Client certificate for server" 94a3df5 P2P: Enable U-APSD support on GO automatically a5527a4 P2P: Add more debug prints for Probe Request processing Change-Id: Ic3354f72b7399b8de86c74018de7a8c1275d893a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
bd14a57187b024f49f5b9ace55ef457d8d04650a |
18-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b3253ebb73d6d52ac636c5cc6d958955a5a98fca b3253eb wpa_supplicant: Complete radio works on disable event 38ecb06 Convert RADIUS debug dumps to use wpa_printf() a0ac572 EAP-SIM DB: Remove client socket file on connect() error a1dd890 RADIUS: Add minimal accounting server support 22dd2d7 Fix MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding 9aab811 Fix nt_password_hash build a9b08ad Remove unused crypto_bignum_rshift() 2dff9e8 Remove unused NFC_RX_HANDOVER_REQ be24917 nl80211: Use nl80211_set_iface_id() to get hw features data 8a45811 hostapd: Add Operating Mode Notification support d9dd86b Enable IEEE 802.11w in defconfig Change-Id: I6bf13cd0b7e3cb3c3550b87a77a035340e9d0a6b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/ms_funcs.c
|
96be6222df414a7dde5c5b1b72df22e67b1a77fc |
13-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7ae7a84eefd43ed9385e2f8f520a918468f87178 7ae7a84 NFC: Workaround nfcpy message debug exception 6ceb95c Avoid NULL dereference in ieee802_1x_get_mib_sta() printf 97efe70 wpa_supplicant: Fix NULL dereference in tls_verify_cb() c0c11af wpa_supplicant: Fix NULL dereference in eap_fast_parse_end() 93a1cae Remove unnecessary NULL check 1e2ffc6 Fix theoretical NULL dereference in debug printf cbf21c7 P2P: Avoid compiler warning in p2p_supplicant.c 5479ff9 DFS: Avoid compiler warnings in src/ap/dfs.c 5e6aa04 wpa_supplicant: Fix memory leak in wfd_subelems error path 88853ae Fix CONFIG_WPS_NFC=y build without CONFIG_P2P=y 7ac7fd4 Add bssid/freq hint for driver-based BSS selection 92484e2 Start using unodified Developer Certificate of Origin v1.1 56ec49c Sync with wireless-testing.git include/uapi/linux/nl80211.h b64afe2 Fix SAE state validation on AP d6bfaaa NFC: Add summary and success file options for nfcpy scripts 25cfc6f P2P NFC: Add p2p-nfc.py --handover-only option 7bea076 P2P NFC: Clean up p2p-nfc.py error handling b0d18bc WPS: Make UUID-from-MAC Address easily available 825fb6b P2P: Do not indicate P2P_FIND failure if p2p_scan is in progress 8c18fcc WPS: Add more debug information to M7 AP Settings d7a15d5 WPS: Indicate current AP settings in M7 in unconfigurated state d55fc03 P2P: Handle unexpected GO Neg Req reject message more cleanly 062a7c0 Fix persistent P2P connection failure in case channel list changes Change-Id: I5c400a6503f9f00d259ff225999593958322a1ba Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_gnutls.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
01904cfafd75a70b9f29c0220b90bdef45595491 |
05-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 0ad3b9c402ee92863b720bc01f882ebcb1bd42c8 0ad3b9c Use wpa_radio data for get_shared_radio_freqs() 1b544ff Use wpa_radio data for wpas_wpa_is_in_progress() 5b81927 Use wpa_radio data for wpas_p2p_search_delay() c67e7e2 Use wpa_radio data for channel list updates f88f19b Use wpa_radio data for scan result updates 202dec2 Add shared per-radio structure for wpa_supplicant 73c00fd Move wpa_supplicant driver initialization into a helper function 7feff06 Add CONFIG_CODE_COVERAGE=y option for gcov d9c753b EAP server: Handle EAP method initialization failures more cleanly 59d3438 EAP server: Initialize TLS context based on private_key 6b417a1 Reject TLS-based EAP server method if TLS context not initialized 158b090 nl80211: Fix regression in P2P group interface removal 6f72577 P2P: Handle INTERFACE_DISABLED event on a P2P GO interface 336167c AP: Fix inactivity STA timer trigger for driver offload case 1245503 Restore scan_req if sta scan is rescheduled in the scan results event bdec7ee D-Bus: Add support to set pkcs11_{engine,module}_path 80ed037 Clear beacon_data before usage Change-Id: I1a87557ad09419b88b993ba13f58359121e3543b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/Makefile
|
fa3fc4a1ac08ad14272301c7f6f01b362997c3e4 |
21-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 594516b4c28a94ca686b17f1e463dfd6712b75a7 594516b Use monotonic clock for relative time for eloop if available 461e3eb Fix and work around some MinGW compilation issues 81cbc04 Fix compiler warning for OpenSSL without HAVE_OCSP 68d628a hostapd: Fix interface enabling/disabling and DFS 1cba9be STA: Cancel sched_scan while initiating wps_reassoc 215a02f Add Wi-Fi Direct to the build configuration example ca9c14f dbus_new: Add documentation for D-Bus TDLS methods 6fc4848 P2P: Short scan wait to speed up the group re-invocation 93a06fe Fix QoS Map Configure frame use Change-Id: Id76002ca7fa742b6533e7e592ffd3867886dc50e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
ff07917b8921a2a178ed9188a63b166af144ae53 |
08-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: Minor sync with mainstream code Change-Id: Ia7b165534577394e0117318e6655d14a3a1d9d2d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
68d0e3ed07847339aedfac8e02f50db68c702e52 |
29-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 32b62704fac6af74f60b2effb173474e11ff089d 32b6270 Android: Fix ARRAY_SIZE() compilation 7617388 Interworking: Report STATUS:sp_type even if domain is not configured c20bc9d P2P: Remove compiler warning without CONFIG_IEEE80211N ca9bc5b P2P: Add VHT support 20ea1ca P2P: Add VHT parameter to P2P operations 53cfad4 nl80211: Mark VHT 80 MHz channels f2112b2 wpa_supplicant: Add CONFIG_IEEE80211AC 6b02335 hostapd: Mask out not-supported VHT capabilities 7f0303d hostapd: Verify VHT 160/80+80 MHz driver support c781eb8 hostapd: Verify VHT capabilities are supported by driver b29b012 Fix some VHT Capabilities definitions 7066a8e hostapd: Fix wrong VHT configuration capabilities flags 6651f1f nl80211: Use max tx power from regulatory domain 7ac3616 nl80211: Replace perror() and printf() calls with wpa_printf() 4d9fb08 WPS: Clear known_wps_freq in addition to after_wps d20c340 Interworking: Clear known_wps_freq for network selection f3be6ee tests: Allow test case descriptions to be written into database 1bd05d0 Interworking: Force normal scan for network selection 51e9f22 P2P: Add option to allow additional client channels 556b30d P2P: Add option to remove channels from GO use e7ecab4 Use ARRAY_SIZE() macro 39044a7 Introduce ARRAY_SIZE() macro 2e94624 DFS: Handle radar event when CAC actived correctly 5eaf240 DFS: Fix overlapped() function to check only DFS channels 345276a DFS: Adjust center freq correctly for VHT20/VHT40 1dc17db DFS: Fix available channels list for VHT80 34068ac nl80211: Add debug prints on nl_recvmsgs() failure 10b8592 nl80211: Make eloop sockets non-blocking 5f65e9f nl80211: Abstract handling of sockets on eloop e8d1168 nl80211: Register for IBSS auth frames before eloop 03610ad Clean up get_seqnum() use for IPN 29179b8 Stop ctrl_iface monitor send loop on reinit failure a2a535f Remove unnecessary wpa_s->conf checks 3318376 Add explicit buffer length checks for p2p_build_wps_ie() 0f01201 Verify that readlink() did not truncate result f5eb9da nl80211: Clean up if_add() for hostapd use a288da6 OpenSSL: Fix memory leak on error path 6cb4f11 nl80211: Fix strerror() value in P2P Dev debug messages 35f8363 DFS: Add forgotten break statement 2f243b8 Remove os_strncpy() 24f051e Replace remainining strncpy() uses with strlcpy() 41c526f P2P: Fix snprintf buffer length for group ifname backup Change-Id: I2e1506cb9219a5a37efbb2ae0dc180fb081c809f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/dh_groups.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
5605286c30e1701491bd3af974ae423727750edd |
04-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b3b803ab9fe69650da7e3b2ee9e44f0f054ee0a 8b3b803 Include Extended Capabilities element based on scan results 6903ee6 P2P Extend postponing of concurrent scans for persistent GO 77e3094 hlr_auc_gw: Fix max_chal value validation 3e6547b hlr_auc_gw: Add support for processing command line operations 2b5b875 EAP-AKA server: Fix AUTS processing 9a50ee6 hlr_auc_gw: Update file comments to mention Milenage 5388dc9 Document use of Linux capabilities instead of privileged process a771c07 Add driver status information to control interface 739faee nl80211: Add some more debug prints for mgmt frame TX f78f278 nl80211: Fix off-channel Action frame TX from GO with use_monitor 298f518 Get rid of compiler warning in no-CONFIG_CTRL_IFACE builds ea61aa1 Add no_ctrl_interface config param to clear ctrl_interface 25b65a1 Make sure updated BSS entry does not get added twice to the list bbc6c72 P2P: Use group formation timeout on persistent group GO 41f8532 P2P: Extend group formation timeout on GO to first data connection 20625e9 P2P: Remove P2P groups on process termination 76fe79e Register wpa_msg callback even if only global ctrl_iface is used af96448 nl80211: Add more debug prints for send_mlme operations 5d4c78f nl80211: Reset nlmode to station on leaving IBSS 0249c12 Avoid compiler warning with CONFIG_NO_STDOUT_DEBUG=y ed1bf01 Allow hostapd config file for dynamically added interface 97bacf7 Do not clear hostapd configuration parameters on disable-iface 66f4dd1 hostapd: Fix couple of deinit path cases to clear pointers f18b781 nl80211: Print more debug info on management frame RX information 89286e9 Re-open ctrl_iface socket on some failure cases as a workaround 3ca96df atheros: Compile fix for driver code not defining IEEE80211_APPIE_FRAME_WNM 762c92a OpenSSL: Split OCSP peer_cert/peer_issuer debug output into parts f224cf0 HS 2.0: Allow printf format parsing with language:name strings 913c19c Fix wpa_config_parse_string() to null terminate printf decoded values 04e533e Fix language string length validation in parse_lang_string() 742e715 Simplify ctrl_iface sendto() use 6668efd Clear frequency list on empty value 1a9f247 Make scan_freq field to be saved by save_config aa78cd3 Drop EAP packet with code 10 before EAPOL state machine processing 3cc247a Use configured sched_scan interval for the PNO scan d047ae6 WPS: Ignore PBC-to-PIN change from M1 to M2 as a workaround 79986bf Print ctrl_iface sendto() failures into debug log eab2b50 P2P: Cancel group formation timeout on client connection 00eb299 P2P: Fix operation channel configuration update Change-Id: I9269e23bc8019b951c2a2d3c707562b2e006148b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
0d16a24facb038db649f4baeb6e6709880adfd98 |
12-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Merge "Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b"
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
e6cf61356701e87728df492dee978eb08c994ca0 |
27-Jun-2013 |
Kenny Root <kroot@google.com> |
am 65699d14: am 499d6840: Merge "Remove obsolete keystore path" * commit '65699d14fab37ab374ce46c6192d4e9b56ec26c1': Remove obsolete keystore path
|
65699d14fab37ab374ce46c6192d4e9b56ec26c1 |
27-Jun-2013 |
Kenny Root <kroot@google.com> |
am 499d6840: Merge "Remove obsolete keystore path" * commit '499d68402f55bd1b8aa1a0d9c6966c7392704fba': Remove obsolete keystore path
|
7f401806ed4775e4230dc3265d2c70b61c7c7e4e |
26-Jun-2013 |
Kenny Root <kroot@google.com> |
Remove obsolete keystore path It's not possible to get a raw private key from keystore anymore, so this would fail every time anyway. Remove it so it doesn't confuse anyone that looks at this code. Change-Id: I021fc1707b16474d8698c85055a6fcc4095cd215
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
ea69e84a6f4455c59348485895d3d5e3af77a65b |
13-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 455299fb40d79bcbeaedcfbc04d00ac8330bbbdd 455299f nl80211: Fix foreign address filtering for MLME frame events e679f14 Mark interface disconnected on removal request 3636b89 Do not try auto connect mechanism in disconnected state 0cdb93f Do not add BSS to blacklist on local disconnection request 36b9883 Defer scan if connection is in progress on any of the shared interfaces 7c0e1e2 tls_openssl: Store TLS context per-connection 732118e Rename hostapd_parse_rates() to a more generic int list parser b113a17 DFS: Add ieee80211h hostapd configuration parameter 695c703 nl80211: Add driver_ops for stopping AP beaconing f90e9c1 nl80211: Add driver_ops for starting radar detection fc96522 nl80211: Add channel flags for DFS state information f295d0c nl80211: Add driver capability flag for radar detection 04be54f nl80211: Add driver events for radar detection a7505b1 eloop: Allow to run event loop multiple times in a row 6124e85 wpa_supplicant: Allow vifs to scan only current channel 893a0a5 systemd: Fix systemd interface alias Change-Id: I0a39a6868562cd458202285fed8986ac81a0cef2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/dh_groups.c
/external/wpa_supplicant_8/src/crypto/dh_groups.h
/external/wpa_supplicant_8/src/crypto/sha256-prf.c
/external/wpa_supplicant_8/src/crypto/sha256.h
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/md5-internal.c
|
3f3ca3bb849b192d41b99aae775f6fc52f67118d |
13-Nov-2012 |
Kenny Root <kroot@google.com> |
Switch keystore to binder Change-Id: Idfcff5f2799863075160cc6c2565f2fe774c2552
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
9bce59c7fef20e34a05f04d1e33a4076083dca0c |
12-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 10-Sep-2012 TOT commit 762b99db7a76803d1ad274e87caa6fe870d47441 Author: Jouni Malinen <j@w1.fi> Date: Mon Sep 10 12:33:29 2012 +0200 Fix last_scan_res update existing BSS entry is update Change-Id: I03f933bf6d7f7e36b0f8ac410fbc37990f127c18 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/Makefile
/external/wpa_supplicant_8/src/crypto/aes-ccm.c
/external/wpa_supplicant_8/src/crypto/aes-gcm.c
/external/wpa_supplicant_8/src/crypto/aes-internal-dec.c
/external/wpa_supplicant_8/src/crypto/aes-internal-enc.c
/external/wpa_supplicant_8/src/crypto/aes-internal.c
/external/wpa_supplicant_8/src/crypto/aes_i.h
/external/wpa_supplicant_8/src/crypto/aes_wrap.h
/external/wpa_supplicant_8/src/crypto/crypto_internal-cipher.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/Makefile
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/fips_prf_openssl.c
/external/wpa_supplicant_8/src/crypto/md5-non-fips.c
/external/wpa_supplicant_8/src/crypto/md5.h
/external/wpa_supplicant_8/src/crypto/ms_funcs.c
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/sha1-pbkdf2.c
/external/wpa_supplicant_8/src/crypto/sha1-prf.c
/external/wpa_supplicant_8/src/crypto/sha1-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha1.c
/external/wpa_supplicant_8/src/crypto/sha1.h
/external/wpa_supplicant_8/src/crypto/sha256-prf.c
/external/wpa_supplicant_8/src/crypto/sha256.c
/external/wpa_supplicant_8/src/crypto/sha256.h
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
21a1e4c6e69742ba96f610b4b0db2e5a2d95528a |
27-Jul-2012 |
Brian Carlstrom <bdc@google.com> |
am 27bf1073: Use SSL_OP_NO_TLSv1_1 SSL_OP_NO_TLSv1_2 SSL_OP_NO_TICKET for better wpa_supplicant_8 interoperability * commit '27bf1073abe534644cc1146397082cc78873f516': Use SSL_OP_NO_TLSv1_1 SSL_OP_NO_TLSv1_2 SSL_OP_NO_TICKET for better wpa_supplicant_8 interoperability
|
27bf1073abe534644cc1146397082cc78873f516 |
26-Jul-2012 |
Brian Carlstrom <bdc@google.com> |
Use SSL_OP_NO_TLSv1_1 SSL_OP_NO_TLSv1_2 SSL_OP_NO_TICKET for better wpa_supplicant_8 interoperability Bug: https://bugs.launchpad.net/ubuntu/+source/wpasupplicant/+bug/969343/comments/72 Bug: http://w1.fi/bugz/show_bug.cgi?id=447#c7 Bug: http://code.google.com/p/android/issues/detail?id=34212 Bug: 6883259 Change-Id: Ib53326cc8cd40e800454b7b92586c052bc910ba8
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
04949598a23f501be6eec21697465fd46a28840a |
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/dh_group5.c
/external/wpa_supplicant_8/src/crypto/dh_group5.h
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
db3c5a43353099fd4771f3b7a13efae905878ce9 |
21-Mar-2012 |
Kenny Root <kroot@google.com> |
Use keystore ENGINE for private key operations The new keystore ENGINE is usable to perform private key operations when we can't get the actual private key data. This is the case when hardware crypto is enabled: the private key never leaves the hardware. Subsequently, we need to be able to talk to OpenSSL ENGINEs that aren't PKCS#11 or OpenSC. This just changes a few #define variables to allow us to talk to our keystore engine without having one of those enabled and without using a PIN. Change-Id: Iabab5077c3d167a1e13bc8ef8745dc59ad4d62f7
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-cbc.c
/external/wpa_supplicant_8/src/crypto/aes-ctr.c
/external/wpa_supplicant_8/src/crypto/aes-eax.c
/external/wpa_supplicant_8/src/crypto/aes-encblock.c
/external/wpa_supplicant_8/src/crypto/aes-internal-dec.c
/external/wpa_supplicant_8/src/crypto/aes-internal-enc.c
/external/wpa_supplicant_8/src/crypto/aes-internal.c
/external/wpa_supplicant_8/src/crypto/aes-omac1.c
/external/wpa_supplicant_8/src/crypto/aes-unwrap.c
/external/wpa_supplicant_8/src/crypto/aes-wrap.c
/external/wpa_supplicant_8/src/crypto/aes.h
/external/wpa_supplicant_8/src/crypto/aes_i.h
/external/wpa_supplicant_8/src/crypto/aes_wrap.h
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_cryptoapi.c
/external/wpa_supplicant_8/src/crypto/crypto_gnutls.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-cipher.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-modexp.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-rsa.c
/external/wpa_supplicant_8/src/crypto/crypto_internal.c
/external/wpa_supplicant_8/src/crypto/crypto_libtomcrypt.c
/external/wpa_supplicant_8/src/crypto/crypto_none.c
/external/wpa_supplicant_8/src/crypto/crypto_nss.c
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/des-internal.c
/external/wpa_supplicant_8/src/crypto/des_i.h
/external/wpa_supplicant_8/src/crypto/dh_group5.c
/external/wpa_supplicant_8/src/crypto/dh_group5.h
/external/wpa_supplicant_8/src/crypto/dh_groups.c
/external/wpa_supplicant_8/src/crypto/dh_groups.h
/external/wpa_supplicant_8/src/crypto/fips_prf_cryptoapi.c
/external/wpa_supplicant_8/src/crypto/fips_prf_gnutls.c
/external/wpa_supplicant_8/src/crypto/fips_prf_internal.c
/external/wpa_supplicant_8/src/crypto/fips_prf_nss.c
/external/wpa_supplicant_8/src/crypto/fips_prf_openssl.c
/external/wpa_supplicant_8/src/crypto/md4-internal.c
/external/wpa_supplicant_8/src/crypto/md5-internal.c
/external/wpa_supplicant_8/src/crypto/md5-non-fips.c
/external/wpa_supplicant_8/src/crypto/md5.c
/external/wpa_supplicant_8/src/crypto/md5.h
/external/wpa_supplicant_8/src/crypto/md5_i.h
/external/wpa_supplicant_8/src/crypto/milenage.c
/external/wpa_supplicant_8/src/crypto/milenage.h
/external/wpa_supplicant_8/src/crypto/ms_funcs.c
/external/wpa_supplicant_8/src/crypto/ms_funcs.h
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/random.h
/external/wpa_supplicant_8/src/crypto/rc4.c
/external/wpa_supplicant_8/src/crypto/sha1-internal.c
/external/wpa_supplicant_8/src/crypto/sha1-pbkdf2.c
/external/wpa_supplicant_8/src/crypto/sha1-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha1-tprf.c
/external/wpa_supplicant_8/src/crypto/sha1.c
/external/wpa_supplicant_8/src/crypto/sha1.h
/external/wpa_supplicant_8/src/crypto/sha1_i.h
/external/wpa_supplicant_8/src/crypto/sha256-internal.c
/external/wpa_supplicant_8/src/crypto/sha256-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha256.c
/external/wpa_supplicant_8/src/crypto/sha256.h
/external/wpa_supplicant_8/src/crypto/sha256_i.h
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_gnutls.c
/external/wpa_supplicant_8/src/crypto/tls_internal.c
/external/wpa_supplicant_8/src/crypto/tls_none.c
/external/wpa_supplicant_8/src/crypto/tls_nss.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
/external/wpa_supplicant_8/src/crypto/tls_schannel.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/Makefile
/external/wpa_supplicant_8/src/crypto/aes-internal-dec.c
/external/wpa_supplicant_8/src/crypto/aes-internal-enc.c
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_internal-rsa.c
/external/wpa_supplicant_8/src/crypto/crypto_internal.c
/external/wpa_supplicant_8/src/crypto/dh_group5.c
/external/wpa_supplicant_8/src/crypto/fips_prf_internal.c
/external/wpa_supplicant_8/src/crypto/md5-internal.c
/external/wpa_supplicant_8/src/crypto/ms_funcs.c
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/sha1-pbkdf2.c
/external/wpa_supplicant_8/src/crypto/sha1-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha1.h
/external/wpa_supplicant_8/src/crypto/sha256-internal.c
/external/wpa_supplicant_8/src/crypto/sha256-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha256.h
/external/wpa_supplicant_8/src/crypto/sha256_i.h
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_gnutls.c
/external/wpa_supplicant_8/src/crypto/tls_internal.c
/external/wpa_supplicant_8/src/crypto/tls_none.c
/external/wpa_supplicant_8/src/crypto/tls_nss.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
/external/wpa_supplicant_8/src/crypto/tls_schannel.c
|
c55524ad84d13014e8019491c2b17e5dcf13545a |
07-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Fix D-Bus build without CONFIG_P2P=y nl80211: Allow AP mode to be started without monitor interface nl80211: Process association/disassociation events in AP mode DBus/P2P: Adding decl for PersistentGroupRemoved signal DBus/P2P: Rectified type of SecondaryDeviceTypes in device property Get P2P: Only call dev_lost() for devices that have been dev_found() wpa_cli: Add missing parameter for P2P_GROUP_ADD command wpa_supplicant: Respect PKG_CONFIG variable if set in the environment TLS: Add support for tls_disable_time_checks=1 in client mode hostapd: Clear keys configured when hostapd reloads configuration Add dbus signal for information about server certification Move peer certificate wpa_msg() calls to notify.c wpa_supplicant AP: Disable AP mode on disassoc paths wpa_s AP mode: Enable HT20 if driver supports it Allow PMKSA caching to be disabled on Authenticator FT: Disable PMKSA cache for FT-IEEE8021X FT: Clear SME ft_used/ft_ies when disconnecting 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Change-Id: I6ae333196c36ffa7589662d5269fabfc3b994605 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/tls_internal.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/random.h
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/.gitignore
/external/wpa_supplicant_8/src/crypto/Makefile
/external/wpa_supplicant_8/src/crypto/aes-cbc.c
/external/wpa_supplicant_8/src/crypto/aes-ctr.c
/external/wpa_supplicant_8/src/crypto/aes-eax.c
/external/wpa_supplicant_8/src/crypto/aes-encblock.c
/external/wpa_supplicant_8/src/crypto/aes-internal-dec.c
/external/wpa_supplicant_8/src/crypto/aes-internal-enc.c
/external/wpa_supplicant_8/src/crypto/aes-internal.c
/external/wpa_supplicant_8/src/crypto/aes-omac1.c
/external/wpa_supplicant_8/src/crypto/aes-unwrap.c
/external/wpa_supplicant_8/src/crypto/aes-wrap.c
/external/wpa_supplicant_8/src/crypto/aes.h
/external/wpa_supplicant_8/src/crypto/aes_i.h
/external/wpa_supplicant_8/src/crypto/aes_wrap.h
/external/wpa_supplicant_8/src/crypto/crypto.h
/external/wpa_supplicant_8/src/crypto/crypto_cryptoapi.c
/external/wpa_supplicant_8/src/crypto/crypto_gnutls.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-cipher.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-modexp.c
/external/wpa_supplicant_8/src/crypto/crypto_internal-rsa.c
/external/wpa_supplicant_8/src/crypto/crypto_internal.c
/external/wpa_supplicant_8/src/crypto/crypto_libtomcrypt.c
/external/wpa_supplicant_8/src/crypto/crypto_none.c
/external/wpa_supplicant_8/src/crypto/crypto_nss.c
/external/wpa_supplicant_8/src/crypto/crypto_openssl.c
/external/wpa_supplicant_8/src/crypto/des-internal.c
/external/wpa_supplicant_8/src/crypto/des_i.h
/external/wpa_supplicant_8/src/crypto/dh_group5.c
/external/wpa_supplicant_8/src/crypto/dh_group5.h
/external/wpa_supplicant_8/src/crypto/dh_groups.c
/external/wpa_supplicant_8/src/crypto/dh_groups.h
/external/wpa_supplicant_8/src/crypto/fips_prf_cryptoapi.c
/external/wpa_supplicant_8/src/crypto/fips_prf_gnutls.c
/external/wpa_supplicant_8/src/crypto/fips_prf_internal.c
/external/wpa_supplicant_8/src/crypto/fips_prf_nss.c
/external/wpa_supplicant_8/src/crypto/fips_prf_openssl.c
/external/wpa_supplicant_8/src/crypto/md4-internal.c
/external/wpa_supplicant_8/src/crypto/md5-internal.c
/external/wpa_supplicant_8/src/crypto/md5-non-fips.c
/external/wpa_supplicant_8/src/crypto/md5.c
/external/wpa_supplicant_8/src/crypto/md5.h
/external/wpa_supplicant_8/src/crypto/md5_i.h
/external/wpa_supplicant_8/src/crypto/milenage.c
/external/wpa_supplicant_8/src/crypto/milenage.h
/external/wpa_supplicant_8/src/crypto/ms_funcs.c
/external/wpa_supplicant_8/src/crypto/ms_funcs.h
/external/wpa_supplicant_8/src/crypto/random.c
/external/wpa_supplicant_8/src/crypto/random.h
/external/wpa_supplicant_8/src/crypto/rc4.c
/external/wpa_supplicant_8/src/crypto/sha1-internal.c
/external/wpa_supplicant_8/src/crypto/sha1-pbkdf2.c
/external/wpa_supplicant_8/src/crypto/sha1-tlsprf.c
/external/wpa_supplicant_8/src/crypto/sha1-tprf.c
/external/wpa_supplicant_8/src/crypto/sha1.c
/external/wpa_supplicant_8/src/crypto/sha1.h
/external/wpa_supplicant_8/src/crypto/sha1_i.h
/external/wpa_supplicant_8/src/crypto/sha256-internal.c
/external/wpa_supplicant_8/src/crypto/sha256.c
/external/wpa_supplicant_8/src/crypto/sha256.h
/external/wpa_supplicant_8/src/crypto/tls.h
/external/wpa_supplicant_8/src/crypto/tls_gnutls.c
/external/wpa_supplicant_8/src/crypto/tls_internal.c
/external/wpa_supplicant_8/src/crypto/tls_none.c
/external/wpa_supplicant_8/src/crypto/tls_nss.c
/external/wpa_supplicant_8/src/crypto/tls_openssl.c
/external/wpa_supplicant_8/src/crypto/tls_schannel.c
|