1b46775bb44f06b3cc285481ff5f7a673559ed7d |
|
14-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 06f14421ea8644d12a7b0be6b583114869f9c451 06f1442 TLS: Parse OCSPResponse to extract BasicOCSPResponse d560288 TLS: Parse CertificateStatus message eeba168 TLS: Add status_request ClientHello extension if OCSP is requested 4303d53 TLS: Parse ServerHello extensions 6b7bb42 TLS: Add minimal support for PKCS #12 5ce2941 TLS: Extend PKCS #5 to support PKCS #12 style key decryption f6a62df TLS: Fix and complete ASN.1 tag list 3c108b7 EAP peer: External server certificate chain validation b6e5e14 EAP-FAST peer: Fix PAC parser error messages 5b904b3 EAP-FAST: Check T-PRF result in MSK/EMSK derivation b1d8c5c EAP-FAST peer: Fix error path handling for Session-Id 36478a1 OpenSSL: Support new API for HMAC/EVP_MD_CTX in OpenSSL 1.1.x-pre1 9257610 FT: Fix FTIE generation for EAPOL-Key msg 3/4 e44bd28 FT: Fix sm->assoc_resp_ftie storing on the AP side 59e78c2 FT: Fix FTIE generation for 4-way handshake after FT protocol run b0ecbd3 AP: Use more readable version of management group cipher in error cases 651c6a8 Add TEST_ASSOC_IE for WPA/RSN IE testing on AP side 58059e6 FST: Print debug entry on MB IE update based on EVENT_AUTH af041f9 dbus: Add support for vendor specific elements 5c8acf7 EAP-IKEv2: Check HMAC SHA1/MD5 result 7b991b4 Use proper build config for parsing proxy_arp 4db29e6 TLS: Add support for PKCS #5 v2.0 PBES2 Change-Id: I10b71e4d3573ef60a52ea6ff56afcd3a06a0b7b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
d7ff03d48f825360eec2a371e3361306f2fd721b |
|
04-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit bf3214b59321f67375df1ee85722b2beb74e1f7a bf3214b P2P: Fix re-invoked client interface completion on data connection 63502c6 P2P: Fix P2P_CANCEL for p2p_in_invitation case e007d53 EST: Comment out X509_REQ_print calls on Android with BoringSSL e6f4832 EST: Add CSR generation support with BoringSSL ed2566a EST: Implement pkcs7_to_cert() with BoringSSL 8d27efa HTTP (curl): OCSP with BoringSSL 213e158 BoringSSL: Move OCSP implementation into a separate file f846211 BoringSSL: Support new SHA_CTX definition for EAP-SIM PRF b34c623 OpenSSL: Fix build with current OpenSSL master branch snapshot 759a8a3 nl80211: Cancel all pending TX frame cookies 9ea91cd EAP-EKE peer: Fix memory leak on error path 328f49a P2P: Complete group formation on client data connection 0e559dc WPS: Support parallel UPnP WPS protocol runs bea48f7 Allow sched_scan_plans to be updated at runtime 32c0226 Add support for configuring scheduled scan plans 09ea430 nl80211: Add support for multiple scan plans for scheduled scan dd895e9 P2P: Make p2p_go_configured() more robust against unexpected calls 8811988 TLS client: Fix session_resumed status after TLS session ticket use 7fff91a Fix tls_connection_prf() regression with CONFIG_TLS=internal 1adf262 TLS: Add support for extKeyUsage X.509v3 extension 0755577 Add TEST_FAIL() support for internal hash functions 4104267 Fix memory leak on NFC DH generation error path c5864dc TLS client: Add certificate chain validation failure callbacks 896a97d TLS client: Add support for disabling TLS versions 0cbc22b TLS client: Use TLS_CONN_* flags 20804fe TLS: Add support for tls_get_version() f2a6ad0 TLS client: Add support for server certificate probing b115eeb TLS: Add TLS v1.2 signature algorithm support for SHA384 and SHA512 c0acec3 crypto: Add CRYPTO_HASH_ALG_SHA384 and CRYPTO_HASH_ALG_SHA512 0aed915 TLS client: Add signature_algorithms extension into ClientHello 9e8809a TLS client: Validate certificates with SHA384 and SHA512 hashes 6bb6a9c Add SHA384 and SHA512 implementations from LibTomCrypt library fdc1614 TLS client: Add support for validating server certificate hash 3665776 TLS client: Do not verify CA certificates when ca_cert is not specified 11c9ddb Add TEST_FAIL() condition to aes_128_cbc_encrypt/decrypt() ea52a46 EAP-SIM peer: Fix memory leak on reauth error path 1a33c94 EAP-SAKE: Fix a typo in attribute parser debug print 53401e9 Abort ongoing scans on FLUSH command e929eb3 wlantest: Add -N command line argument to remove write buffering 3c41749 hostapd: Add Transmit Power Envelope IE when VHT is enabled 2ea2166 Add control interface command for aborting an ongoing scan 4ead7cf Abort an ongoing scan before connect 4f30add nl80211: Add support for aborting an ongoing scan 5ef0b84 Sync with mac80211-next.git include/uapi/linux/nl80211.h 0530eb1 mesh: Clear wpa_s cipher selection on starting mesh 1d6955e nl80211: Fix SIGNAL_POLL in IBSS and mesh 0f29bc6 IBSS/mesh: Add support for VHT80P80 configuration c27f4c9 P2P: Add support for VHT 80+80 MHz and 160 MHz bee5d8e nl80211: Add VHT 160 MHz channel flags 5e1da9c P2P: Define operating classes for VHT 80+80 and 160 ea70811 FST: Improve parsing of Multiband IEs b47d05a FST: Make FST peer connection check more permissive in hostapd 39c3c9b Remove wpa_supplicant/tests 9b635d0 Remove link_test and test_wpa 9e68742 Fix CONFIG_NO_WPA=y build eb926f1 Comment out wpas_reenabled_network_time with CONFIG_NO_SCAN_PROCESSING f231b3d FST: Fix STA MB IEs creation ed7820b P2P: Add a testing option to force P2P GO CSA 6cbbae2 P2P: Set p2p_go_wait_client in invitation_result() cb 83702b6 Android: Give user the option for selecting browser for HS 2.0 OSU cadffac wpa_cli: Add an option to set created interface type 0f039e3 Add an option to create interface of a certain type with INTERFACE_ADD d8a3b66 driver: Make setting up AP optional when creating AP interface 36e8206 Check for LIBRESSL_VERSION_NUMBER in tls_openssl.c 2c51c0b P2P: Clear send action work without waiting on find/stop/listen 6bdc43c AP: Avoid 20/40 MHz co-ex scan if PRI/SEC switch is not allowed 757785d nl80211: Clear ignore_next_local_deauth flag cb2a926 nl80211: Clear ignore_next_local_deauth and ignore_deauth_event f32227e Add QCA vendor attribute and event to indicate subnet change status d38c7be Skip SELECT_NETWORK steps only if already connected or connecting 25eb7fc Fix EAPOL reauth after FT protocol or offloaded PMKSA cache use f68d491 FT auth: Fix EAPOL reauthentication after FT protocol run a65efbf Add VHT support for Mesh a73c984 Set WMM flag to Mesh STA by default 9a8d9f7 Assign QCA vendor command and attribute for Tx power reduction in dB 747ba10 nl80211: Do not return incomplete hw capability info 5e238cc WPS: Reconnect for a failed data connection when STA_AUTOCONNECT is 0 442cc8c dbus: Fix memory leak in sending InvitationReceived signal 0603bcb hostapd: Process MAC ACLs on a station association event (SME in driver) 89a11ad RSN: Remove check for proactive_key_caching while setting PMK offload d381963 Extend QCA roam event with subnet change indication Change-Id: I122220f59ef56e25ed2749a37370a40afafa177a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
1d755d025b206e22b06aeb322e25a79f98ca7777 |
|
28-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 01a025937c67f0eca6021d94b8ec3b144f8b1730 01a0259 WPS: Add support for 60 GHz band 0ef1e29 WPS: Fix shorter authentication timeout during no-SelReg iteration 3465176 nl80211: Verify that cipher suite conversion succeeds a250722 Try to set PMK only with key mgmt offload support in the driver 4a7ce98 Make IPv6 NA multicast-to-unicast conversion configurable 9f390f4 Interworking: Fix network selection warning without SIM/USIM support a0ad9e8 Remove WPA per-VLAN groups when no more stations remain 87b5b53 Make VLAN ID available in STA info over control interface 5678a2d P2P: Allow wpa_supplicant to start if social channels are not supported 209214b vlan: Move CONFIG_FULL_DYNAMIC_VLAN includes to proper places a6da824 Do not use C++ reserved words as variable names eaa3728 wpa_gui: Themed icon loader 9a3cb41 Fix wpa_priv (CONFIG_PRIVSEP=y) build 8b423ed Declare all read only data structures as const fd4fb28 OpenSSL: Try to ensure we don't throw away the PIN unnecessarily fabc6dd mesh: Retransmit the last Commit Message in the Committed state 068669f vlan: Verify RADIUS returned VLAN-ID and dynamic_vlan=required 5add410 WPS: Use shorter authentication timeout during no-SelReg iteration e7d2034 WPS: Enforce five second minimum time before AP iteration bd143cc Remove trailing whitespace from Makefile 74802c0 P2P: Do not create a P2P Device interface if P2P is disabled 579674e Document p2p_disabled option in wpa_supplicant.conf 8ea8a89 nl80211: Extend unique MAC address assignment for station iftype Change-Id: I8bc8a63f37c0892b83376b9d5a5859827ae50554 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
912c6ecf72fb2c84fbf17dbd0666492778dbd9fc |
|
30-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 989e784601887734e696b3fac0ad6d101badd7ea 989e784 P2P: Optimize scan frequencies list when re-joining a persistent group 154a1d5 hostapd: Fix some compilation errors ce18c10 Add support for CONFIG_NO_ROAMING to Makefile 65a7b21 OpenSSL: Implement AES-128 CBC using EVP API 22ba05c Explicitly clear temporary stack buffers in tls_prf_sha1_md5() 940a4db Explicitly clear temporary stack buffer in sha1_t_prf() eccca10 Explicitly clear temporary stack buffer in hmac_sha256_kdf() e8e365d wext: Add support for renamed Host AP driver ifname fc48d33 Improve error messages related to EAP DB c469d62 Error out if user configures SQLite DB without CONFIG_SQLITE 270427e HS 2.0R2: Add more logging for hs20-osu-client icon matching 8e31cd2 OSU server: Improve logging for SPP schema validation failures 23dd15a http-curl: Improve log messages e7d285c OSU server: Print out signup ID if there is some problem with it 1b45006 HS 2.0R2: Remove unused argument identifier from hs20-osu-client 2e7a228 HS 2.0R2: Allow custom libcurl linkage for hs20-osu-client a52410c Allow PSK/passphrase to be set only when needed 3e808b8 EAP-pwd peer: Add support for hashed password e4840b3 EAP-pwd server: Add support for hashed password 2bd2ed2 EAP-pwd: Mark helper function arguments const when appropriate 9ccc10f wpa_cli: Use tab as only word separator for networks 5a997b2 wpa_cli: Completion routine for dup_network command 1ca6c0f wpa_cli: Completion for remove, select, disable, enable network 7e6cc90 wpa_cli: Implement completion routine for get_network/set_network 32a097f wpa_cli: Keep track of available networks 94dc0e9 wpa_cli: Allow tab as alternative separator for cli_txt_list words efa232f Add support for virtual interface creation/deletion ba87329 wpa_cli: Use .wpa_cli_history under Android 0f8385e Show OSEN key management properly in scan results e7b4cd0 wpa_gui: Add tray icon based signal strength meter 54d3dc9 AP: Unset HT capabilities for an HT association request without WMM Change-Id: I71425b8e20fe1dfdb777592257dc4e4063da8d85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
203eadb9eda41a1dde4a583edb4684319e3f399e |
|
05-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6e9023ea499ea9a89b0e858c85e32b455d57264c 6e9023e DFS: Allow wpa_supplicant AP mode to use non-offloaded DFS 02e42ab nl80211: Add vendor event parsing for DFS offload events bd0f68c DFS: wpa_supplicant event processing d7f1aa8 DFS offload: P2P changes for autonomous GO 1e2aaff DFS offload: Indicate AP-CSA-FINISHED for DFS offloaded case c13578c DFS offload: Add main DFS handler for offloaded case 5de81d7 DFS offload: Skip user space processing for CAC operations 192ad3d Interworking: Clear SCANNING state if no match found 95d7b86 P2P: Consider 5 GHz channels also for auto GO a51c40a P2P: Fix regression in start-GO/AP through a "fake" scan dd5c155 eap_proxy: Callback to notify any updates from eap_proxy 9a05d98 atheros: Add a new flag for OSEN support 9feadba Remove unnecessary NULL check to make function more consistent 1772d34 P2P: Fix interface deinit for failed group interface initialization 3f9ebc4 P2P: Allow AP/GO interface to be started while P2P-in-progress b4a9292 RADIUS client: Fix server failover on return-to-primary on error case 9836cb5 Add option to force a specific RADIUS client address to be used 1a7ed38 RADIUS client: Fix a copy-paste error in accounting server failover de7c06e P2P: Continue find in GO-Neg-Resp-fail status corner cases c280590 Do not add blacklist entries based on normal disconnect request cases bdf0518 P2P: Direct P2P_CONNECT command to proper interface 44b9ea5 P2P: Do not allow scan or normal association on cfg80211 P2P Device 9542f21 Clean up p2p_find command parsing and execution fa9f381 P2P: Allow a specific channel to be specified in P2P_FIND eb78a8d P2P: Restore P2P_SCAN_SPECIFIC d988ff7 hostapd: Disable VHT caps for STAs when no valid VHT MCS found 70fd828 RADIUS client: Fix previous failover change c3dabf5 Fix merge issue with IBSS VHT support 8b2b718 Fix minor issue in HT40 max rate determination 347c55e RADIUS client: Re-try connection if socket is closed on retransmit 94b39e5 RADIUS client: Fix server connection recovery after initial failure bbee36e Allow RADIUS server address to be replaced efb4008 TLS: Remove placeholders for SIGN_ALG_DSA support Change-Id: I8e5d0dfd5fddb6de2f8d8211b708c3bb6674098b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
807291d85bf857320aff6a8ade38c5f622ab9df8 |
|
27-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36d (DO NOT MERGE) 3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
ff787d557db719adea0fdf2679667500c65cf74d |
|
12-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3e7f1c7980c6e9fc7173f78aa72b2761fcd8924d (DO NOT MERGE) 3e7f1c7 GnuTLS: Add TLS event callbacks for chain success/failure and peer cert 0eb2ed0 GnuTLS: Add support for OCSP stapling as a client cf08e9b Add MESH to modes capabilities db5adfe Add SAE to auth_alg capabilities 0e1bb94 GnuTLS: Verify that server certificate EKU is valid for a server d4d1f5c GnuTLS: Fix tls_disable_time_checks=1 processing 594d1fc GnuTLS: Add support for private_key and client_cert as blobs 79b1dd9 GnuTLS: Fix DER encoding certificate parsing a165145 Add "GET tls_library" to provide information on TLS library and version c3bb84b GnuTLS: Add event callbacks 8ddcd6b GnuTLS: Add support for domain_suffix_match 4bc13bf GnuTLS: Check for any unknown verification failure e0d431a GnuTLS: Add more debug prints for version and session status 65ec7f4 GnuTLS: Move peer certificate validation into callback function 7c82457 GnuTLS: Remove support for versions older than 2.12.x e1d63f6 GnuTLS: Remove old version number checks for 1.3.2 ae0a23a GnuTLS: Remove GNUTLS_INTERNAL_STRUCTURE_HACK db4cf40 GnuTLS: Add support for ca_cert as a blob 224104d TLS: Reject openssl_ciphers parameter in non-OpenSSL cases b09baf3 Work around Windows build issues 6dbbef9 Define host_to_le32() for Windows builds 7d28e46 Fix os_win32 build 0b40247 Remove Network Security Service (NSS) support d166947 schannel: Reject subject_match, altsubject_match, suffix_match 59051f8 TLS: Reject subject_match, altsubject_match, suffix_match f8717ac GnuTLS: Reject subject_match, altsubject_match, suffix_match e24aef1 Fix a typo in domain_suffix_match documentation 394b547 Improve subject_match and domain_suffix_match documentation 8a42a07 trace: Fix out-of-memory testing logic 79cd993 Add address masks to BSSID lists b83e455 Add network specific BSSID black and white lists b3d6a0a Add generic parser for MAC address lists 21c74e8 nl80211: Use a helper function to put mesh_id 85e1fad nl80211: Use a helper function for putting beacon interval 6dfc557 Remove mesh_ht_mode network block parameter 54fe48b mesh: Use the shared function with IBSS to determine channel parameters f7e889f mesh: Convert channel configuration to use common routines 6334330 mesh: Use a separate variable to track whether HT is enabled 1fc4ab2 nl80211: Move debug prints into nl80211_put_freq_params() cae87ab nl80211: Add a helper function for putting basic rates 6b8b077 ibss/mesh: Enable HT40 if supported a828f62 Make check_40mhz_2g4 common fdd989d Make check_20mhz_bss common 0e550fe Make check_40mhz_5g common 6d5d098 Make get_pri_sec_chan() common 5144274 Introduce common allowed_ht40_channel_pair() 5f10b7f Use common hw_get_freq/hw_get_chan helpers in hostapd 269dfe2 Introduce common hw features 1830817 IBSS: Add WPA_DRIVER_FLAGS_HT_IBSS f3b8ad4 SAE: Implement retransmission timer a206e2a SAE: Centralize function for sending initial COMMIT 28c91ee bsd: Fix parsing of ieee80211req_scan_result on FreeBSD and DragonFly 96d1d97 Android: Remove hardcoded ICU include paths from hs20-osu-client a354bcc D-Bus: Use NoMemory error message from CreateInterface 635874b Handle interface disabled/enabled more consistently 8f2cf37 P2P: Indicate reason=UNAVAILABLE for group netdev going down 86a7fbb Verify that eloop_register_read_sock() succeeds for ctrl_iface setup 27d9701 Fix a memory leak on WPA authenticator error path c1c07dc Fix hostapd interface addition error path a156ffd Add support for testing memory allocation failures 52b3943 D-Bus: Fix interface unregistration on error path 96dc9a6 D-Bus (old): Fix interface unregistration on error path ef03557 Fix memory leak on wpa_supplicant_init_wpa() error path 52a8058 TDLS: Fix an interface addition error path f2d5728 D-Bus: Fix string array dict entry parser in out-of-memory case c61bc23 D-Bus: Fix byte array dict entry parser in out-of-memory case dacf605 D-Bus: Fix Introspect() in case of os_strdup() failure 68a8669 D-Bus (old): Fix wpsReg error message f0614bc D-Bus (old): Fix message handler error paths a2af1c7 D-Bus (old): Fix memory leak on error path 3d2e2d5 trace: Fix compiler warning on 32-bit builds with bfd support b9f6560 eloop: Fix WPA_TRACE tracking in case of realloc failure e10422c Fix memory leak on hostapd BSS addition error path 2801659 Fix hostapd initialization error path on allocation failure d58ade2 nl80211: Fix compilation with libnl 1.1 and 2.0 51f3427 crypto: Clear temporary stack buffers after use 77a2c39 crypto: Clear temporary heap allocations before freeing a15a7fc DH: Clear memory explicitly on private key deinit 77c45e2 Add wpabuf_clear_free() to allow clearing of freed memory a90c7d9 OpenSSL: Fix pbkdf2_sha1() wrapper f6ebbcf AES-SIV: Make aes_s2v() static dcf8fbc nl80211: Simplify event processing error paths 38751d8 nl80211: Remove cfg80211 state mismatch workaround for authentication 64ae244 nl80211: Check support for rekey offload on first use Change-Id: Ice94c3cf8e39a6d2cac993aacd0f6d45b31c7c15 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
9ead16e203b81d44a2d84eadc2901ceeb7daf805 |
|
07-Oct-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
661b4f78e48c697429dc46154a4125892c001718 |
|
29-Sep-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a313d17de943cbaf12cbf67d666af14791be8ad2 a313d17 Extend random MAC address support to allow OUI to be kept 1cbdb9d Add helper function for generating random MAC addresses with same OUI 97ed9a0 nl80211: Remove bridge FDB entry upon sta_remove() 39323bc AP: hostapd_setup_bss() code clean-up 1595eb9 P2P: Add support for 60 GHz social channel b6ebdfb Extend STATUS command with frequency information 375f4a3 hostapd: Avoid dead code with P2P not enabled 6a60488 dbus: Add a global property to set or unset WFD IEs 4bd7e16 wifi_display: Add a utility function to set WFD subelements from IEs d417744 wifi_display: Add a utility function to get the sub-elements as IEs a8833b8 util: Don't use "\e" 8c6f4a5 ap_config.c: fix typo for "capabilities" 6e252b0 WPS: Fix WPS-in-search check when STA_AUTOCONNECT is disabled e5fdc05 P2P: Remove unecessary sanity check for global p2p ee285df P2P: Flush services based on global p2p init and not p2p ifaces 7139cf4 P2P: Decrement sd_pending_bcast_queries when sd returns success dbdc9a1 nl80211: Fix memory leak on start radar detection error path ed8e005 hostap: nl80211 use nl80211_put_freq_params c267753 Add support for using random local MAC address 4d8fb63 Add helper function for generating random MAC addresses fee354c nl80211: Add command for changing local MAC address e49cabc P2P: Set timeout when starting GO Negotiation from Probe Req RX 7549c17 P2P: Clear pending_listen_freq when starting GO Neg/Invite b497a21 nl80211: Ignore auth/assoc events when testing driver-SME 79e2b1c Add PMKSA_FLUSH ctrl_iface command 55c2bfa wpa_cli: Support action scripts with global ctrl_iface 063f850 wpa_cli: Increase event buffer size to 4096 bytes fa0e917 wpa_cli: Fix PING in interactive mode with ifname_prefix c53a9bf Check for driver's DFS offload capability before handling DFS 068e387 STA: Update scan results for ap_scan=1 skip-selection case also 7a4a93b dbus: Add SignalPoll() method to report current signal properties a6ab82d Android: Add NO_EVENTS parameter to status command df2508d P2P: Check os_get_random() return value more consistently 54461f3 RADIUS server: Remove unreachable code e4474c1 FT: Fix hostapd with driver-based SME to authorize the STA 0800f9e nl80211: Add roaming policy update using QCA vendor command 0ef023e Add support for driver command to update roaming policy 0cd9846 nl80211: Print debug info on STA flag changes 17e2091 P2P: Fix radio work issue with wait-for-peer GO Negotiation 76db5b6 Work around broken AP PMKSA caching implementation b08d5fa WPS: Set EAPOL workarounds dynamically based on association 8511a0f WPS: Extend internal entropy pool help for key/snonce derivation abc0553 Remove WPA_EVENT_SCAN_STARTED message from MSG_INFO log c45dabb P2P: Deauth p2p client just after dbus notify 3ee1856 nl80211: Register eloop after hs20 action frame 3bd3257 dbus: add BSS Age property to indicate last-seen time 5c61d21 openssl: Fix memory leak in openssl ec deinit 10e7948 Fix hostapd GET_CONFIG wpa_pairwise_cipher value 3a413e0 RADIUS client: Check getsockname() return value 9c196f7 HTTP: Fix OCSP status check cb5ef95 SME: Verify that os_get_random() succeeds for SA Query c9cd78e RADIUS server: Fix IPv6 radiusAuthClientAddress mask 5e62cfd P2P: Verify that os_get_random() succeeds 6473e80 EAP-PAX server: Add explicit CID length limit 6a6566c Remove unnecessarily shadowed local variable df756b3 hostapd: Remove unused variable assignment e47abdb TDLS: Decline Setup Request with status code 37 if BSSID does not match ce2002a TDLS: Add RSN and Timeout interval IEs in TDLS Discovery Response frame 1c2aa04 P2P: Do not add P2P IEs on P2P disabled interface f2e9083 nl80211: Add more RTM_NEWLINK/DELLINK debug messages 728ff2f nl80211: Fix RTM_DELLINK processing for bridge events e5a4b85 WPS: Merge mixed-WPA/WPA2 credentials if received in same session db9418b Add printf NULL checks to silence static analyzer 4e53675 P2P: Overwrite pending interface only after verifying BSS entry 04a258e hostapd: Check that EVENT_ASSOC data is present before using it 1cc0d6a wpa_supplicant: Use freq_list scan filtar in sched_scan Change-Id: Ibc18f6761b3ccfe8fb4479f26f53e70942068bc8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
5a1480c7c46c4236d93bfd303dde32062bee04ac |
|
12-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4626235de4b6d19c7399a2522241f7c43e0caf6 f462623 EAP-pwd server: Allow fragment_size to be configured c876dcd EAP-IKEv2: Allow frag ack without integrity checksum 0f73c64 EAP-pwd: Fix processing of group setup failure 13e2574 EAP-pwd peer: Export Session-Id through getSessionId callback cfdb32e eapol_test: Check EAP-Key-Name 251c53e RADIUS: Define EAP-Key-Name 04cad50 EAP-SIM peer: Fix counter-too-small message building 270c9a4 Interworking: Allow FT to be used for connection 81ed499 Remove duplicated ibss_rsn_deinit() call 144f104 X.509: Fix v3 parsing with issuerUniqueID/subjectUniqueID present 0f1034e P2P: Refrain from performing extended listen during P2P connection 8d0dd4e Add macsec_qca driver wrapper dd10abc MACsec: wpa_supplicant integration 887d9d0 MACsec: Add PAE implementation 7baec80 MACsec: Add driver_ops 4e9528c MACsec: Add common IEEE 802.1X definitions 3bcfab8 MACsec: Add define for EAPOL type MKA 0836c04 MACsec: Allow EAPOL version 3 to be configured 49be483 Add function to fetch EAP Session-Id from EAPOL supplicant ea40a57 nl80211: Use max associated STAs information in AP mode Change-Id: I0e37a10ca58d0dc1be95a0088d6a4c37b2505ad4 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
df5a7e4c5c64890c2425bb47d665bbce4992b676 |
|
02-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 39a5800f7c2a9de743c673a78929ac46a099b1a4 39a5800 wpa_supplicant: Allow disabling LDPC 7230040 Interworking: Read IMSI if not read at supplicant start 62f736d Interworking: Init scard when a credential requires SIM access 729897a Interworking: Fix incorrect compile PCSC flag 21611ea edit: Increase buffer size to 4096 bytes 0b2c59e OSU server: Add example scripts for Hotspot 2.0 PKI 0f27c20 HS 2.0R2: Add example OSU SPP server implementation 1e03c6c XML: Remove forgotten, unused definition of debug_print_func 5cfc87b Make hs20_wan_metrics parser error print more helpful 4be20bf Fix validation of anqp_3gpp_cell_net configuration parameter 23587e3 Remove duplicated vht_capab parser entry 18a8e55 Notify STA of disconnection based on ACL change 8943cc9 RADIUS server: Add support for MAC ACL dc87541 Clean up debug print for PSK file search bbbacbf DFS: Print CAC info in ctrl_iface STATUS command ace0fbd P2P: Fix segfault when PBC overlap is detected cf15b15 Add writing of network block ocsp parameter 5c9da16 nl80211: Set all BSS interfaces down when tearing down AP in MBSS mode f1c4dbf wpa_supplicant: Remove pending sme-connect radio work 4f560cd wpa_supplicant: Override HT A-MPDU size if VHT A-MPDU was overridden 3ae8b7b hostapd: Add vendor command support 782e2f7 P2P: Do not initiate scan on P2P Device when enabled 74a1319 Fix issue with incorrect secondary_channel in HT40/HT80 96ecea5 Pass TDLS peer capability information in tdls_mgmt 78cd7e6 Sync with wireless-testing.git include/uapi/linux/nl80211.h b36935b nl80211: Fix EAPOL frames not being delivered 6997f8b nl80211: Set interface address even if using old interface 9b4d9c8 nl80211: Print if_indices list in debug log 762c41a eloop: Add assert() on negative fd when using select() code path 978c673 Add a note on using 'iw list' to determine multi-BSS support Change-Id: I89af7f8d92ed706c8909ed3cc9c49d6e1277a2b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
cf32e60fa7e0d33fe1551a6dba8dcbbec47ea50e |
|
28-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2e988392436227c51002b573ee27a8cee37f70e9 2e98839 P2P: Disable DNS server from dnsmasq c07f261 P2P NFC: Add script for connection handover with nfcpy 12288d8 WPS NFC: Protect nfcpy pretty print calls against exceptions c209dd1 WPS NFC: nfcpy script to use new connection handover design 6202500 WPS NFC: Logging level configuration to wps-nfc.py and wps-ap-nfc.py 1f1b5b3 WPS NFC: Clean up nfcpy script no-wait operations 79ede5a WPS NFC: Validate ctrl_iface response before decoding it ab1db08 WPS NFC: Use argparse in the nfcpy scripts 6f8fa6e WPS NFC: Update wps-nfc.py and wps-ap-nfc.py to use new nfcpy API b56f6c8 P2P NFC: Add support for freq option in NFC ctrl_iface commands 91a6501 WPS NFC: Use BSSID and AP Channel from handover select 91226e0 WPS: Add testing option to corrupt public key hash 7312776 WPS NFC: add more debug prints for connection handover report 5cd4f66 WPS NFC: Use AP Channel information from credential container d2f1837 WPS NFC: Add BSSID and AP channel info to Configuration Token 75dbf98 WPS-STRICT: Update valid Device Password ID and Config Error range 5cd4740 P2P NFC: WPA state machine config with driver-based BSS selection 8e9f53c P2P NFC: Static handover with NFC Tag on client dd87677 P2P NFC: Enable own NFC Tag on GO Registrar abe44e3 P2P NFC: Add GO info into handover message when in client role 23318be P2P NFC: Optimize join-a-group operation based on NFC information 86e3208 P2P NFC: Copy DH parameters to a separate group interface d4b4d7f WPS NFC: Update DH keys for ER operations ac08752 WPS NFC: Use pubkey mismatch config error from Enrollee 59b45d1 P2P NFC: Add processing of P2P client while NFC handover case 74df9ec P2P NFC: Do not try to join peer if both devices are already GO 201b0f5 P2P: Add test option to disable IP address assignment request 25ef852 P2P: Add support for IP address assignment in 4-way handshake fdd48ff P2P NFC: Optimize GO Negotiation retries c4f87a7 P2P NFC: Add NFC tag enabling for static handover dd37a93 P2P NFC: Report handover select from tag for static handover db6ae69 P2P NFC: Report connection handover as trigger for P2P 9358878 P2P NFC: Build connection handover messages c00ab85 P2P NFC: Define WPS_NFC config method 0deab08 P2P NFC: Allow separate WPS/P2P IES to be parsed fca9958 P2P NFC: Pass OOB Dev Password through P2P parser ab9e344 P2P NFC: Pass OOB Device Password ID to P2P 5154689 P2P NFC: Add WPS attribute building for P2P NFC 01afd8d P2P NFC: Add NDEF helpers for P2P connection handover messages 9e323a2 P2P NFC: Add OOB GO Negotiation Channel attribute 14d8645 WPS NFC: Allow BSSID and channel to be included in handover select 50d1f89 NFC: Update WPS ER to use the new connection handover design d950793 WPS NFC: Add support for wpa_supplicant AP/GO mode to use handover fa4c298 WPS NFC: Process new style handover select 068cdb1 WPS NFC: New style connection handover select from AP/Registrar 3189ca0 WPS NFC: Add AP mode connection handover report 41f9ffb WPS NFC: Build new style carrier record for connection handover request 3f1639d WPS NFC: Split DH key generation to a separate function 9754917 WPS NFC: Update NFC connection handover design 34b6795 WPS NFC: Use abbreviated handshake if both PK hashes delivered OOB 57630e6 WPS: Preparations for allowing SSID filtering for provisioning step 5f45455 WPS NFC: Validate peer public key hash on Enrollee ff40cd6 WPS NFC: Send M2D with config error 20 on pkhash mismatch e435417 WPS: Remove Version attribute from NFC messages 72403ec WPS: Add builder functions for AP Channel and RF Bands attributes ea43ad9 P2P: Make group operating channel available 9f7cd9a P2P: Split add-group-info into a helper function 253f2e3 P2P: Apply unsafe frequency rules to available channels 1682c62 Add a header file defining QCA OUI and vendor extensions Change-Id: Ia7604d018e1ffb25e06bdc01ce258fc4a0569245 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
344abd362cfe2d03ed956666527352826b67bde5 |
|
14-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit efc64886b8a285440e9954b5395a5370d8c5f84f efc6488 nl80211: Pass station supported channel and oper class info 3ed9727 TDLS: Pass peer's Supported channel and oper class info during sta_add eed65aa hostapd: DFS setup seg0 correctly for HT40- 25592b2 hostapd: DFS/CSA check if CSA in progress b19ef32 Android: Remove hostapd dump_file functionality c48414a P2P: Limit join-a-group scans based on SSID from invitation 78f0c93 Flush secondary device types on FLUSH command 2b38410 P2P: Allow requested device type to be specified with p2p_find d9bb282 Clear configuration blobs on FLUSH command c60ba9f Skip network disabling on expected EAP failure 7185e16 EAP-FAST peer: Make debug clearer on missing pac_file configuration 7b88b64 EXT PW: Fix hash return in password fetching 08081ad hostapd: Skip full AP configuration validation on SET command 1785d2e P2P: Wait on GO Negotiation Confirm transmit 472fa21 P2P: Cancel action frame offchan wait after recv GO Neg Conf bfdc2a3 bsd: Fix NULL pointer dereference on error path 38bbd06 bsd: Prepare event buffer on init process 3043b4f nl80211: Document how to configure for libnl 2.0 and 3.2 Change-Id: Ia592bc948eaa43dbfaf0b4a20231efca61acb11f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
|
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
|
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
b6e9aaf735990dc64cdb6efccc03d076768eabf3 |
|
20-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit d5b559b6418c2bd09663e0d09e93a6592357fdce d5b559b WNM: Add disassociation timeout processing for ESS_DISASSOC f65f539 GAS: Reduce query timeout to two seconds 7a56af5 GAS: Assign new dialog token even if previous one is free 9e1ecab GAS: Ignore replays if previous frag_id without dropping GAS session fa7ae95 Add test code for fetching the last configured GTK 576bce9 P2P: Direct global ctrl_iface commands automatically for P2P c4bf83a P2P: No duplicate AP-STA-CONNECTED/DISCONNECTED as global event 7793c95 Clean up AP-STA-CONNECTED/DISCONNECTED prints 92c4465 P2P: Mark P2P events global (not specific to interface) ed496f1 P2P: Clean up debug prints 710ae9a P2P: Move p2p_find stopped event message into p2p_supplicant.c 47bfe49 Add wpa_msg_global() for global events 214e428 Allow global ctrl_iface monitors 89c7ac5 wpa_cli: Set buffer length the same as in wpa_supplicant_ctrl_iface_process() faf9a85 Add band option (2.4 vs. 5) for filtering scans b83b1b2 Android: Clarify keystore include directories 6f1127c Android: Add a top level Android.mk d2a9e2c Abstract and Android sockets for global ctrl_iface 6fd5cea wpa_cli: Allow global interface to be used in interactive mode 2925756 wpa_supplicant: Add -G argument to specify global ctrl group cf3bebf Allow global ctrl_iface to be used for per-interface commands 058c863 FT RRB: Fix a memory leak on error path Change-Id: I32a4afb43894167a30c4b0df18fd4846a2945c7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
51b6ea882f234c14cd1fe1332a3840cf61fafcca |
|
08-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 6ea1f4135b72199988393f34dd7f5ad8040b7a42 6ea1f41 Try to set WPA-None key after IBSS-joined event 66562e9 Use cached driver capabilities instead of new fetch for each operation 55293aa TDLS: Do not overwrite the reason code in the Tear Down Request 4aa8186 Add a configration parameter for sched_scan interval 03565bc Synchronize with wireless-testing.git include/uapi/linux/nl80211.h f11b72c TDLS: Move AID=1 workaround into driver_nl80211.c 7853369 TDLS: Pass peer's AID information to kernel 55a2df4 HS 2.0: Include HS 2.0 Indication element only for HS 2.0 association ad0685e edit: Fix history processing on running old command 9be3714 wpa_cli: Fetch the current BSSID list when starting interactive mode 69aa334 wpa_cli: Add BSSID tab completion for set bssid_filter 2156587 wpa_cli: Replace set command help with completion routine f1fb042 wpa_cli: Allow space in the set command value f5ffc34 wpa_supplicant: Allow global scan frequencies configuration abfc3ad Synchronize build config comments for wpa_supplicant a01e10d Android: Enable WPS ER and NFC support in the build 11e5a49 WPS: Do not use void* in arithmetic 0f105f9 HS 2.0: Move Probe Request Indication IE addition to proper place 8543ed8 WPA: Print pairwise EAPOL-Key flag as a bool 7af092a hostapd: Add Key MIC in group EAPOL-Key frames corruption test option b691dcb nl80211: Fix max_remain_on_chan capability reading 41b1a76 P2P: Clone beacon_int when initializing new group interface 741ed9f WPS: Remove duplicate networks after WPS Change-Id: I9a2a0cb2acf87dfd7548318d2bda5f342b815884 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
700a137ab366edc72e371da68ba187b4717ee660 |
|
15-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 565110cd554801fa301c55010b3e9e14f43d7973 nl80211: Include interface name in more debug prints Convert WPS NFC python scripts from using wpactrl to wpaspy wpa_supplicant: Fix lookup of cached PMKSA Add capability flag for IBSS and add get_capability modes hostapd: Fix client reassociation after disconnect due to ACK failure Fix build with CONFIG_NO_CONFIG_BLOBS Fix build without CONFIG_CTRL_IFACE or CONFIG_NO_STDOUT_DEBUG libtommath: Avoid a compiler warning on unused variable libtommath: Condition fast_s_mp_mul_digs() on LTM_FAST P2P: Remove persistent group peer if it rejects invitation P2P: Allow shared interface channel preference to be ignored P2P: Fix shared frequency preference for concurrent operations P2P: Use best-overall channel in p2p_reselect_channel() P2P: Allow all channels for multi-channel concurrency (no negotiation) TDLS: Disable link to existing peer with lower address Fix compiler warning when CONFIG_IEEE80211R is not included WPS NFC: Fix build without CONFIG_WPS_ER FT: Add support for IEEE 802.11r with driver-based SME Change-Id: I1d5ced870c33d5cb73ecc6f04e272a3cf50f344a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
33e38bfa7159cef089d6ee0d904778e184c72c47 |
|
27-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f8361e3d681e55efead2aac79fedf4b232d533fb TDLS: Pass peer's VHT Capability information during sta_add WPS: Clear sent_carrier to avoid errors in python script WPS: Fix OOB Device Password use in PSK1,PSK1 derivation WPS: Add AP mode NFC connection handover with wpa_supplicant/nfcpy WPS NFC: Add connection handover support for ER WPS: Add wps-er-config command for writing config token from ER Change-Id: I8934dcffb9f66bd3a2f840b78d72c9dd6cecf61d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
|
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
c55524ad84d13014e8019491c2b17e5dcf13545a |
|
07-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Fix D-Bus build without CONFIG_P2P=y nl80211: Allow AP mode to be started without monitor interface nl80211: Process association/disassociation events in AP mode DBus/P2P: Adding decl for PersistentGroupRemoved signal DBus/P2P: Rectified type of SecondaryDeviceTypes in device property Get P2P: Only call dev_lost() for devices that have been dev_found() wpa_cli: Add missing parameter for P2P_GROUP_ADD command wpa_supplicant: Respect PKG_CONFIG variable if set in the environment TLS: Add support for tls_disable_time_checks=1 in client mode hostapd: Clear keys configured when hostapd reloads configuration Add dbus signal for information about server certification Move peer certificate wpa_msg() calls to notify.c wpa_supplicant AP: Disable AP mode on disassoc paths wpa_s AP mode: Enable HT20 if driver supports it Allow PMKSA caching to be disabled on Authenticator FT: Disable PMKSA cache for FT-IEEE8021X FT: Clear SME ft_used/ft_ies when disconnecting 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Change-Id: I6ae333196c36ffa7589662d5269fabfc3b994605 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/wpas_glue.c
|