de47be75037bccd4a11b62eedb3d4aed1b36fa67 |
|
07-Jan-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 21cb63fffd1e766c8b989125394ed0bfb05e5a4b 21cb63f OpenSSL: Fix client certificate chain building after PKCS#12 use 12a81b6 ACS: Remove unreachable case from a debug print 896607d Remove a pointer check that can never be true a95cc47 ACS: Be more consistent with iface->current_mode checks 6014e59 P2P: Print find_start in debug log when ignoring old scan results 64845c1 l2_packet: Extend bridge workaround RX processing to cover two frames 4a539ab l2_packet: Improve bridge workaround RX processing 7a36f11 EAP-PAX: Check hmac_sha1_vector() return value 1d20c66 P2P: Clear groups first on FLUSH command 27446e4 mesh: Do not force another peering exchange on driver event cc64fe7 mesh: Do not clear link state on driver event if exchange was started b5f5c32 mesh: Add some more details to MPM debug messages 7d41907 nl80211: Add a missing space to a debug message 6174de6 mesh: Connection and group started/removed events into debug log 2da4a56 Add more hostapd.conf documentation for hw_mode with HT/VHT acc3943 EAP-PEAP peer: Cryptobinding in fast-reconnect case with inner EAP cba9ebf P2P: Try SD Query with each non-ACK peer only once per search iteration e9ccfc3 Clear wpa_supplicant state to DISCONNECTED on FLUSH command aeb408f HS 2.0: Add some documentation for OSEN and network block use 4f6cd3f Fix wpa_supplicant AP mode P2P IE handling if P2P is disabled 92acb40 Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 15c5606 Update copyright notices for the new year 2016 6e379c6 WPS: Testing mechanism to force auth/encr type flags ea31912 WPS: Add a workaround for WPA2PSK missing from Enrollee auth flags db671e0 WPS: Do not build Credential with unsupported encr combination on AP d7c3347 HS 2.0: Postpone WNM-Notification sending by 100 ms 750f5d9 EAP-FAST: Enable AES256-based TLS cipher suites with OpenSSL 1ebb24b OpenSSL: Share a single openssl_tls_prf() implementation dea2051 OpenSSL: Clean up function to fetch client/server random 9a42d85 OpenSSL: Drop support for OpenSSL 1.0.0 de213e8 OpenSSL: Drop support for OpenSSL 0.9.8 e79eb0c P2P: Fix P2P_FIND while waiting for listen ROC to start in the driver 944f693 P2P: Stop offchannel TX wait on P2P_STOP_FIND/P2P_LISTEN 8edd9f1 P2P: Add an option to specify group SSID in P2P_CONNECT join case 70e0cb3 P2P: Provide group SSID, if specified, to P2P Client join step 438be60 P2P: Do not accept any GO BSS entry if SSID is specified for join 35510d5 P2P: Use join SSID in the skip-PD cases 8b8d4f4 P2P: Do not accept any BSS entry for join if SSID is already known b875276 P2P: Use group SSID, if known, for join operation even if no BSS entry aa256cb P2PS: Add group SSID, if known, to the P2PS-PROV-DONE event 071e3bf FST: Fix handling of Rx FST Setup Request when session already exists Change-Id: Ia48764e8663232291160fb24153fa367b9ed3015 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
8bd70b7d6ba220544ee2f0e201e5df23e277fa1d |
|
27-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b4342ca4d8f21af51d4923ca15910d3211bfdc7e b4342ca P2P: Use p2p_init_wpa_s for P2P command redirection over D-Bus 96512a0 P2P: Fix D-Bus PresenceRequest to use group interface b740401 P2P: Fix wpas_remove_persistent_peer() to use P2P mgmt interface 1e0a029 P2P: Fix wpas_p2p_add_persistent_group_client() to use P2P mgmt interface 86b91c8 P2P: Fix wpas_p2p_set_own_freq_preference() to use P2P mgmt interface 4367749 P2P: Use the P2P Device management interface in wpas_p2p_remove_client() 7b642dc P2P: Add D-Bus FindStopped to notify P2P-FIND-STOPPED event d63f141 P2P: Advertize cross connection to WLAN AP on a non-P2P interface ca24117 EAP-EKE: Add Session-Id 7f2f3a6 Increase DH key size in the hostapd.conf example 567098e ACS: Scan only channels specified in the channel list c7dafdf WPS: Fix build without CONFIG_WPS=y Change-Id: I7bcd69f71b239e7f907eccdb925bd954e72d8758 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
dda10c2afb8378747491ea5d329a1de635d6d58e |
|
25-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c41d0840a1ae4d755c525b091a4bf9d740efdb5f c41d084 nl80211: Allow driver-based roam to change ESS 6ba7eba Add OpenSSL 0.9.8zf patch for EAP-FAST support 1de0710 atheros: Clear WPS appie during deinit 857d942 Extend offloaded ACS QCA vendor command to support VHT 0fd52a6 Remove duplicated wpa_s->conf->interworking check ad44309 Add Extended Capabilities element to all Probe Request frames 9bd566a Delay AP selection if all networks are temporarily disabled 701f396 Don't optimize scan frequencies if selected network has changed e9d2805 P2PS: Extend p2p_service_del asp to support 'all' parameter 6dd51ec P2PS: Add P2PS advertisements on ALL_SERVICES ANQP query c40a891 P2PS: Delete ASP advertisements on wpas_p2p_service_flush 2dc422e P2PS: Update SD indicator value on ASP add/del/update 030a3e1 DFS: Fix range availability check 56ef992 DFS: Consider non-contiguous channels 6ceea4c Restart sched_scan on channel list change e7a296b Remove unused shared_freq driver op 58e115b Fix hlr_auc_gw build with OpenSSL 5f9c92f nl80211: Fix vendor command handling 55e8f0e Fix CONFIG_EAP_UNAUTH_TLS without CONFIG_EAP_TLS build 9772af6 Interworking: Prevent scan during ANQP fetch and Interworking select 2c50246 Add a AP mode event message for possible PSK/passphrase mismatch 6784168 Remove SChannel support Change-Id: I21078309f83821d4b685de77c517c0886b3366bd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
7f65602d49069f96a7bb44da8bd79ffe8d4c6a98 |
|
25-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f51f54a007e0de1d413dee3523472d3bbeed2ecc f51f54a nl80211: Resubscribe to nl80211 events on global nl_event socket 48ec694 Fix Linux packet socket workaround to not close the socket too easily 0d2030e Use estimated throughput to improve roaming selection 1d747e2 Add snr and est_throughput to the BSS entries a1b790e Select AP based on estimated maximum throughput ab647ff Add wpa_supplicant Makefile target libwpa_ctrl.a abae2d1 trace: Initialize alloc_list even without os_program_init() call 891dfb3 Add helper function to clear and free wpa_psk list 71d77ad Update current BSS level when signal change event occurs f1609f1 wpa_supplicant: Cancel sched_scan when stopping countermeasures abb8d08 nl80211: Add support for configuring P2P GO CTWindow 0b8bcaa P2P: Allow configuring CTWindow when working as GO c77ffc6 TDLS: Ignore extra padding in all packets 5ce6ac1 Inteworking: Add support to update the ANQP Capability List into the BSS 185ada4 HS 2.0: Add support to update the HS20 Capability List into the BSS 7fe7a3a wpa_gui: Debug enhancement 2b892d4 Add forgotten network profile parameters to config file writing 563ee18 IBSS: Add support for VHT80 configuration ada157f Make hostapd_set_freq_params() common 98479dc IBSS: Update operating frequency if joining an existing IBSS 4d9e6fb IBSS: Add fixed_freq network parameter 6f5e1b0 Use priority list instead of global for PNO 97fc2dc Allow libnl-3.0 include path be specified f92446f P2PS: Add P2PS interface info 59b416c Add optional reassoc-to-same-BSS optimization c4da67d Fix passive_scan config parameter writing 715d5c4 hs20-osu-client: Ensure NULL checks are done before dereferencing 58d405f Fix OCSP debug messages 710dfb4 OpenSSL: Fix OCSP error path bd7bb43 HTTP: Fix OCSP error path 946572c Android: Remove commented out non-Android build parameters 15ada7f Android: Remove libxml2 config defines ebe8d3f Android: Silence unused function parameter warnings dbd10da Android: Fix hs20-osu-client build on Android 5.0 a926295 HS 2.0R2: Fix permissions for SP/<fqdn> directory on Android 480994d nl80211: Allocate QCA vendor subcmds for DFS radar detected and CAC events c165cb4 Drop all hostapd STA entries on interface disabled event 106fa1e nl80211: Indicate interface-down event only for the main netdev eeb1cb2 VLAN: Clean up RTM_NEW/DELLINK processing 47e5fbd hostapd: Avoid sending client probe on removed client 3478273 Re-configure WPA2 group keys on hostapd interface re-enable f33c860 Re-enable beaconing on interface disable+enable fc99fab nl80211: Print a debug log entry on NL80211_CMD_PROBE_CLIENT failures 0d2f324 P2P: Fix send_action_in_progress clearing in corner cases 9ff8dda Add hostapd UPDATE_BEACON ctrl_iface command e0761c5 nl80211: Allocate QCA vendor subcmd for DFS CAC Start event 1db718b nl80211: Test vendor command and event 10263dc Add control interface commands for fetching wpa_config values f91a512 Add INTERWORKING_ADD_NETWORK command c612ae9 AP: Do not reply to Probe Request frames with DS Params mismatch 5b74e08 P2P: Document P2P_CONNECT-auto 99650ca Add STOP_AP control interface command 6b00512 P2P: Add event messages for P2P_CONNECT-fallback-to-GO-Neg b0e669b P2P: Fix P2P_CONNECT-auto fallback to GO Neg with group interface bf51f4f mesh: Fix remaining BLOCKED state after SAE auth failure 79ddb20 mesh: Add a monitor event on SAE authentication getting blocked dd2cbaf mesh: Add a monitor event for SAE authentication failure 0cb5f8d mesh: Fix inactivity timer for 32 bit system 11e2ddb mesh: Remove duplicated no_auto_peer update 1e52983 D-Bus: Fix network block type change 4fada12 Fix HT40 co-ex scanning issue on hostapd error path 23ed011 Fix Linux packat socket regression work around 663ae2f Don't write to wpa_supplicant.conf directly d9a9bc0 IBSS: Do not enable HT with WEP or TKIP 0d7eb43 ACS: Accept channel if any (rather than all) survey results are valid 68fa00c ACS: Allow specific channels to be preferred 6f41a25 ACS: Use weighted average for 2.4 GHz adjacent channel interference Change-Id: Ie1cabd28dcfdefafa02e81477e34badae6f7e629 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/ap/acs.c
|
15907098d1f67c24bb000e593e279af173cf57d7 |
|
25-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit cf28c66bcb8883e6be921d6406a534e4a5b45b96 cf28c66 HS 2.0: Extend ANQP_GET to accept Hotspot 2.0 subtypes 163f801 nl80211: Indicate HS 2.0 OSEN AKM in connect/associate command c201f93 WPS: Enable WSC 2.0 support unconditionally 91364b7 P2P: Set a timeout for a persistent reinvoke on a P2P Client 41d5ce9 P2P: Optimize scan for GO during persistent group invocation 4d1e38b ACS: Fix number of error path issues Change-Id: I31a51d3dba055d1a906516bb08894effec327da9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
b36ed7cd946148d829f311de8fe53ea3ffaaffe3 |
|
17-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4e3860f8a770a0db3816196c77baf894c7ccc1e f4e3860 Fix AP mode default TXOP Limit values for AC_VI and AC_VO 47bd94a TLS testing: Add new test cases for RSA-DHE primes f5bbb2f TLS client: Reject RSA-DHE prime if it shorter than 768 bits 817742f TLS testing: Fix test_flags check for ApplData report 1120e45 Allow config blobs to be set through ctrl_iface c3722e1 ACS: Fix VHT20 49b7443 Fix HT40 co-ex scan for some pri/sec channel switches 5bdac4a Remove unused STA entry information c9d9ee9 Fix hostapd_add_iface error path to deinit partially initialized BSS 6829da3 Fix external radio_work deinit path 8dd9f9c Allow management group cipher to be configured 67d39cf P2P: Do not create another group interface on NFC Token enable 6aa1cd4 wpa_supplicant: Apply VHT_OVERRIDES to wpas_start_assoc_cb() db63757 hostapd: Supply default parameters for OBSS scan 6e9375e TDLS: Add get_capability tdls command 67e1a40 hostapd: For VHT 20/40, allow center segment 0 to be zero d0bf06f GAS server: Remove incomplete remote ANQP processing fdb4535 WPS: Extend per-station PSK to support ER case as well 9a1a538 wpa_supplicant AP: Allow PMF to be enabled with ieee80211w ce6b9cd Allow reason code to be specified for DEAUTH/DISASSOC test frame dda8be7 TDLS: Use QoS info from WMM IE obtained in TDLS frames daa70bd Fix CONFIG_NO_SCAN_PROCESSING=y build 3a8ec73 P2P: Report dev_found event (if not yet done) from GO Neg Req RX 0f23a5e Mark AP disabled if initialization steps fail Change-Id: I7e499241552147c734fec9b77351b47ffd6e3a7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
2ac5f6049e74103a8fe8e9c78b330020081d7df4 |
|
07-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c16a7590cfe76d5895ac70ef711e5b0b384f7aa6 c16a759 wpa_supplicant: Add a configuration file for the P2P_DEVICE parameters 185677b Disable interface if ACS fails 8f05577 Configure beacon interval for IBSS command 95faa36 HS 2.0R2: Check for OSEN when determining whether to authorize STA 113318a Set the station to authorized on assoc event for open authentication Change-Id: Id8111b6475bf93a0600a431708cb16120d380e24 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
a38abf9af7bec7e89dbfb39ac7bb77223fe47c72 |
|
06-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 905828fea4b95a6d48ce86e1b5272c25a618b3d8 905828f hostapd: Fix vht_capab 'Maximum A-MPDU Length Exponent' handling 89de64c ACS: Fix VHT80 segment picking 1f37483 DFS: Print error in case CAC fails 354c903 AP/GO interface teardown optimization 8bc4372 Use P2P_IE_VENDOR_TYPE more consistently 8714caa WPS: Parse Registrar Configuration Methods 6b9f7af nl80211: Extend the new vendor command for testing nl80211 3a94adb P2P: Do not start scan for P2P Device interfaces at driver init aa10983 P2P: Do not initialize bgscan on P2P interfaces 819f096 nl80211: Fix RTM event handling for dynamic interfaces 54ac5aa config: Add bgscan option when saving global configuration 268043d bgscan: Do not initialize bgscan if disabled by user adef894 nl80211: Add vendor command support d0595b2 nl80211: Fix tearing down WDS STA interfaces Change-Id: I6d49f445692b71a4cd324f517eba651518ee14bb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
|
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
cce06667447b5aec83452adb0c15100ada531095 |
|
05-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d4f1a347ceca31fd9cf14070fd000235d5f4e9c1 d4f1a34 Allow AP mode configuration with VHT enabled on 2.4 GHz bb337dd DFS: Do not use cf1 to override freq for 20 MHz channels 0dfd2c6 Document AP mode startup functions fee947b hostapd: Use correct wpa_printf verbosity level for message 2fe210c hostapd: Fix multi-BSS configuration file parsing regression e4ba031 hostapd: Use start_ctrl_iface() from hostapd_add_iface() bf7f09b Fix AP mode QoS Map configuration to be per-BSS dc036d9 DFS: Convert hostapd_data use to hostapd_iface 2db938e hostapd: Fill in phyname automatically 5ae6449 hostapd: Add ctrl_iface STATUS command afadaff Optimize 40 MHz HT co-ex scan on AP 7d6d737 hostapd: Add AP-ENABLED/DISABLED ctrl_iface events e1c5faf hostapd: Track interface state f0793bf hostapd: Wait for channel list update after country code change ae134e1 hostapd: Add ctrl_iface events for ACS ad08e14 hostapd: Move ctrl_iface initialization to happen earlier c20cb02 hostapd: Remove hostapd_interface_init2() 4a5deb9 hostapd: Simplify interface initialization 186c905 DFS: Add control interface events for various DFS events ddf5517 hostapd: Add control interface test commands for radar detection 884f1a3 nl80211: Verify radar event attributes exist before using them 71cdf6b hostapd: Fix ENABLE failure to not remove interface 18ca733 SAE: Fix group selection 65015b2 Replace unnecessary UTF-8 characters with ASCII versions 61323e7 Convert perror/printf calls to wpa_printf 3f134b4 hostapd: Accept RELOG from global control interface b253e6f hostapd: Use wpa_printf() for hostapd_logger() to stdout c092d83 P2P: Clear pending group formation data on group removal 9100b66 P2P: Debug print reason for specific SSID for scan 2aec4f3 Allow add-BSS operation to re-use existing netdev 5592065 hostapd: Allow a single BSS to be removed from an interface 2e2fff3 hostapd: Allow a single BSS to be added to an interface a1fb569 hostapd: Make hostapd_interface_init_bss() available externally 66936c6 hostapd: Make hostapd_init() available externally 390e489 hostapd: Allow the first BSS in a multi-BSS setup to be removed 834ee56 nl80211: Make wpa_driver_nl80211_data::first_bss pointer 748c0ac nl80211: Fix monitor interface reference counting 08e55eb nl80211: Add a debug print for DEL_BEACON 33b0b33 hostapd: Fix error path in hostapd_add_iface() 770ecdf ACS: Do not get stuck while failing to do a subsequent scan 813d4ba DFS: Add support for multi-BSS 954e71d DFS: Reset cac_started properly 6a398dd DFS: Sanitize channel availability checks 32595da DFS: Fix HT40/VHT calculation 0648c3b hostapd: Add -T Linux tracing option 392e68e Set GTK rekey offload information after initial group key handshake bbc706a nl80211: Add debug prints for NL80211_CMD_SET_STATION 731ca63 Update regulatory change to all virtual interface for the phy 6f2db2f hostapd: Validate configuration parameters on RELOAD command eff0fd1 hostapd: Move generic configuration functions into src/ap 5afaa06 hostapd: Allow per-BSS (vif) configuration files ebd79f0 hostapd: Make hostapd_config::bss array of pointers a781e21 hostapd: Force PSK to be derived again on BSS reload 9f104b0 hostapd: Reuse hostapd_clear_old() for RELOAD command Change-Id: I7fbb26cbd4a2960af66a4373c0e6bbe5390a4940 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
68d0e3ed07847339aedfac8e02f50db68c702e52 |
|
29-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 32b62704fac6af74f60b2effb173474e11ff089d 32b6270 Android: Fix ARRAY_SIZE() compilation 7617388 Interworking: Report STATUS:sp_type even if domain is not configured c20bc9d P2P: Remove compiler warning without CONFIG_IEEE80211N ca9bc5b P2P: Add VHT support 20ea1ca P2P: Add VHT parameter to P2P operations 53cfad4 nl80211: Mark VHT 80 MHz channels f2112b2 wpa_supplicant: Add CONFIG_IEEE80211AC 6b02335 hostapd: Mask out not-supported VHT capabilities 7f0303d hostapd: Verify VHT 160/80+80 MHz driver support c781eb8 hostapd: Verify VHT capabilities are supported by driver b29b012 Fix some VHT Capabilities definitions 7066a8e hostapd: Fix wrong VHT configuration capabilities flags 6651f1f nl80211: Use max tx power from regulatory domain 7ac3616 nl80211: Replace perror() and printf() calls with wpa_printf() 4d9fb08 WPS: Clear known_wps_freq in addition to after_wps d20c340 Interworking: Clear known_wps_freq for network selection f3be6ee tests: Allow test case descriptions to be written into database 1bd05d0 Interworking: Force normal scan for network selection 51e9f22 P2P: Add option to allow additional client channels 556b30d P2P: Add option to remove channels from GO use e7ecab4 Use ARRAY_SIZE() macro 39044a7 Introduce ARRAY_SIZE() macro 2e94624 DFS: Handle radar event when CAC actived correctly 5eaf240 DFS: Fix overlapped() function to check only DFS channels 345276a DFS: Adjust center freq correctly for VHT20/VHT40 1dc17db DFS: Fix available channels list for VHT80 34068ac nl80211: Add debug prints on nl_recvmsgs() failure 10b8592 nl80211: Make eloop sockets non-blocking 5f65e9f nl80211: Abstract handling of sockets on eloop e8d1168 nl80211: Register for IBSS auth frames before eloop 03610ad Clean up get_seqnum() use for IPN 29179b8 Stop ctrl_iface monitor send loop on reinit failure a2a535f Remove unnecessary wpa_s->conf checks 3318376 Add explicit buffer length checks for p2p_build_wps_ie() 0f01201 Verify that readlink() did not truncate result f5eb9da nl80211: Clean up if_add() for hostapd use a288da6 OpenSSL: Fix memory leak on error path 6cb4f11 nl80211: Fix strerror() value in P2P Dev debug messages 35f8363 DFS: Add forgotten break statement 2f243b8 Remove os_strncpy() 24f051e Replace remainining strncpy() uses with strlcpy() 41c526f P2P: Fix snprintf buffer length for group ifname backup Change-Id: I2e1506cb9219a5a37efbb2ae0dc180fb081c809f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
4ce9c87407c036fc83eb5a6044ddf976c86f53fc |
|
24-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fa56315cfc9ebaff2b210ed99d43dda9b16bdf56 fa56315 eap_proxy: Add context data pointer to the get_imsi call 07041c6 eap_proxy: Confirm eap_proxy initialization before reading SIM info 47d986e P2P: Check Action frame payload match before accepted TX status d259249 Fix ENABLE_NETWORK not to reconnect in disconnected state 677cf19 hostapd: Select any supported channel if ACS fails 20f9cb1 hostapd: Allow ACS to deal with partial survey data 3645fd5 hostapd: Propagate ACS errors to iface setup 0e1d0b3 hostapd: Don't get stuck after failed ACS af8a827 Make frequency range list routines more general 941dae0 P2P: Add more user friendly debug print of channel lists Change-Id: I942dbbc0cb92f4e09626ec6ea17f6ea583c17f1a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|
391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/acs.c
|