ebd93af924f6e54fb4982b3312ff875a4896b62b |
|
21-Feb-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 128f6a98b3d4d6ed103db759707309f451db9682 128f6a98b mka: Fix the order of operations in secure channel deletion 213eb1885 dbus: Set mode to mesh in bss properties when mesh is supported 21fda4ee7 RSN: Fix pre-authentication EAPOL-Start startPeriod configuration 3f23260da nl80211: Notify reason for connection timeout failure ca1ab9db2 hostapd: Get vendor HE capabilities 7785c70bb QCA vendor command for fetching HE capabilities d512f406f hostapd: Add IEEE 802.11ax HE IEs into Beacon/Probe Response frames 94380cb40 hostapd: Initial IEEE 802.11ax (HE) definitions 5972dc73c mesh: Use correct rate in VHT and HT mixed environment 84ea61cff mesh: Use correct rate in HT and legacy mixed environment 025c6a47f VHT: Remove a redundant check a7a638c2c hw_features: Move VHT capabilities checks to common e01cf2afc Define eapol_sm_get_eap_proxy_imsi() only with CONFIG_EAP_PROXY=y a8e25deeb FT: Merge similar error paths to use common steps c6c41f6ea FT: Support addition of RIC elements into Reassociation Request frame ecbdc1a1f Mark RSN msg 1/2 key data debug dump as key material 834c5d681 FILS: Fix PMK length for initial connection with FILS SHA384 AKM e491389eb FILS: Fix ifdef for PTK derivation with SHA384-based AKM 62944f7d2 Add HMAC-SHA384 with internal crypto aeecd4eae OpenSSL: Fix hmac_sha384_vector() implementation 5db32adc9 browser-wpadebug: Send HTTP response with HTTP/1.1 header 79329ae0a P2P: Verify local driver preferred frequencies for P2P use cases 3a7819f0a P2P: Add P2P_SET override_pref_op_chan to allow overriding preference c06fca04f Add wpa_supplicant SET get_pref_freq_list_override b4d56efb1 Use throughput estimate-based BSS selection with larger SNR difference 142041487 Drop GREAT_SNR definition from 30 to 25 dB 364c064a4 FT: Check key derivation results explicitly in AP operations b5562a1a6 FILS: Remove CRC32 dependency from build 5cf0930f9 testS: Additional BSS TM error case coverage 885bbd4de WNM: Remove unused code from BSS TM Req generation e7ddd86a9 WNM: Use a common error path in ieee802_11_send_wnmsleep_resp() d6d5970e2 WNM: Fix WNM-Sleep Mode Request parsing for WNM-Sleep element 8492cc79c PeerKey: Remove dead code related to STSL negotiation state e37c0aa5d OSU server: Remove invalid options from documentation 0d6056703 WMM: Fix estimated medium time calculation for some corner cases ae26d3021 Fix "IEEE 802.11: Ignored Action frame" debug message 4ead4c7ec WMM: Remove obsolete TODO comments 577e794eb Sync android.config with wpa_supplicant defconfig changes 784710b7f Add bgscan options to wpa_supplicant defconfig 212a8f487 Fix wpa_supplicant defconfig copy-paste description 57c3a605c Add support to sched scan to report relatively better BSSs 20c846d9e nl80211: sched_scan relative RSSI parameters 37e9f511e mka: Send MKPDUs forever if mode is PSK 76aa31838 EAP: Call deinit_for_reauth() for Phase 2 EAP methods 02156b98b EAP-AKA: Don't use anonymous identity in phase2 9e2afe10e EAP-SIM: Don't use anonymous identity in phase2 ed9b1c16d EAP peer: Cache decrypted requests for EAP-SIM/AKA/AKA' 5f11880f6 SME: Remove null ie param from CTRL-EVENT-AUTH-REJECT 4d70b2a4e RRM: Fix a memory leak in beacon request handling 401243b73 RRM: Fix range request overriding fb81c0a3d RRM: Merge similar error returns to a single one 13b30052d RRM: Fix Range Request max age parsing bd6ec7f7c Fix MAC ACL query freeing on deinit b4fd1f0ed Allow PNO scan also in connection completed state 4c6f450ca Add radio_work_is_connect() helper 85b6b6b6e Serialize scan/p2p-scan if already scheduled on the same interface fcb303a57 P2P: Clear driver scan cache after BSS_FLUSH 0d6dc6830 FILS: Clean up HLP resize check 1d9d21f37 GAS: Add support to randomize transmitter address 8331c9b31 nl80211: Add support for mgmt_tx with random TA 14fa723a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h 65ab7eb1f GAS: Fix OSU Providers List response with invalid configuration f3e157057 VHT: Fill VHT capability with hardware capability 4bb9b674c Add a log message when GTK rekeying failed 41f140d38 Add hostapd options wpa_group_update_count and wpa_pairwise_update_count e54691106 mka: Some bug fixes for MACsec in PSK mode 7faf403f9 mka: Fix an incorrect update of participant->to_use_sak 00e0f0b01 hs20-osu-client: Hide a trivial compiler warning 276e93654 hw_features: Clean center freq for falling back HT40 channels f47f93617 P2P: Override P2P_PEER group_capab with 0 if no matching BSS entry found bcf66493c Fix estimated throughput based skip-roam case 84bb12aa6 FILS: Fix send_assoc_resp() HLP extension to cover sta == NULL 275cc9428 FILS: Stop processing if fils_rmsk_to_pmk() fails caab23f19 Set EAPOL-Key Key Length field to 0 for group message 1/2 in RSN b0fb2be77 Do not send GNonce in EAPOL-Key group message 1/2 3bbc47050 Fix EAPOL-Key Install bit in Group Key 1/2 with FT and FILS auth db5e53cb0 mesh: Fix struct hostapd_data initialization 9b170991a mesh: Fix mesh interface removal fix 945604a35 Update wpaspy.py to be python3 compatible 4d6e79f86 Use defines in hostapd_set_freq_params() 0217b8d87 eloop: Fix comments mismatch eloop_event/timeout_handler definitions 09a97eb27 Update the copyright notice years for QCA vendor definitions 841e9a8c7 QCA vendor command to set the trace levels for the specific QCA module d77f33041 FILS: Fix AES-SIV AAD for (Re)Association Request frame decryption 7a6c3de23 ERP: Use macro for EMSKname length instead of hardcoded integer value bb3ea71a2 ERP: Fix rIK derivation 124ddfa19 FILS: Parse and report received FILS HLP Containers from response 91d91abf6 FILS: DHCP relay for HLP requests 54b04d6f3 FILS: Move HLP request handling into a separate file 5a9d50493 ProxyARP: Use more robust DHCP option parsing e64c13feb Move DHCP definitions into a common file 70407ee5c Add QCA vendor definitions for BSS transition status 53d171440 AP: Check ACL upon association request for 802.11ad 4cc61c386 GAS: Set temporary session timeout bigger than gas_comeback_delay Test: Wifi Suite Change-Id: Id597d7cba5d2b3875f2dbbeb9a10fd5e69a6a7c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
092955c7394ee96d6c8c9724ff46a3c038b36143 |
|
06-Feb-2017 |
Paul Stewart <pstew@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check 89fa633af nl80211: Fix error while enabling AP mode with driver-SME The last change 89fa633af cherrypicks a later change that resolves an issue with starting up AP mode. Bug: 34681709 Test: Wifi Suite Change-Id: Iba8c5824009d6480fb736b274d69243c77aef7fe
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
055a67c81da597ef09906f302da1303c9039fe86 |
|
02-Feb-2017 |
Rebecca Silberstein <silberst@google.com> |
Revert "Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d" This reverts commit bbcc4391bed89e8cd0dd235760cd2983f65721cf. Bug: 34869019 Test: Load image and start soft AP Change-Id: I85f39c134c1321d6a78f9f25a34f71ad7b1173fb
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
bbcc4391bed89e8cd0dd235760cd2983f65721cf |
|
30-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check Bug: 34681709 Test: Wifi Suite Change-Id: Ib7ab577a02a9c499ef6e78a222bb93d811f29d36 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
9839ecd75c832023d4d13fd2917a8c28261ff668 |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: I249f5fec85ad69ce3879247b07f0db84136ab996 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
fe31a9a8fff325bfddbf06fc3e9edaf480824bee |
|
09-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950" This reverts commit 78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb. Test: None
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: If11d88f812812543dab6839879e815892a39f963 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
e4663044d3a689fb5458247e9bc0f8b58cf72fca |
|
04-Apr-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f89c32e63f71e66d7b55e284016762b603ae02db f89c32e Android: Fix max number of sched scan SSIDs based on driver capability f1a5a34 binder: Implement interface add/remove methods 7b4bbb9 binder: Add binder skeletal code for Android 5914ebf Remove struct ieee80211_mgmt::u.probe_req 094e949 atheros: Do not use struct ieee80211_mgmt::u.probe_req c01120a wpa_supplicant: Do not use struct ieee80211_mgmt::u.probe_req e1b9962 AP: Do not use struct ieee80211_mgmt::u.probe_req 5cd317d Do not clear PMKSA entry or EAP session cache if config does not change f933216 Revert "Assign QCA vendor command and attribute for Tx/Rx aggregation" bde9a4e Comment out UDP/UNIX socket code from common ctrl_iface based on build a6fbff2 Fix CONFIG_CTRL_IFACE=udp6/udp6-remote builds 0741c48 SAE: Check SHA256-PRF operation result ea86a34 SAE: Remove dead code in FFC pwd-value derivation 87faf1f nl80211: Fix libnl-tiny build with CONFIG_LIBNL20=y 31afdd2 Use TIOCOUTQ instead of SIOCOUTQ to avoid need for linux/sockios.h 6d07e76 wlantest: Use local ETH_P_IP define instead of linux/if_ether.h 795abc8 Drop USE_KERNEL_HEADERS define 9b7cd57 Use a separate header file for Linux bridge interface definitions c815fab Use own header file for defining Linux VLAN kernel interface 81606ab vlan: Fix musl libc conflict with Linux kernel headers f347429 P2P: Fix persistent group for 60 GHz networks e868599 vlan: Move if_nametoindex() use out of vlan_init.c 7c03c08 vlan: Move ifconfig helpers to a separate file 59d6390 vlan: Move CONFIG_FULL_DYNAMIC_VLAN functionality into a separate file 0fe28dd vlan: Remove unnecessary header includes from netlink implementation 84d6755 vlan: Clean up netlink vs. ioctl API implementation cb38bc8 vlan: Fix musl build error 954e10e Make it a bit easier to roam from 2.4 GHz to 5 GHz within ESS 585141b Fix a typo in a comment 1126c07 nl80211: Ignore deauth/disassoc event during Connect reassociation 6a5ee81 Include previous BSSID in connection request to indicate reassociation 00c3c4a nl80211: Add NL80211_ATTR_PREV_BSSID with Connect command cbc3d6f WNM: Verify BSS TM target match against the current network profile 8854f90 mesh: Simplify wpa_auth_pmksa_set_to_sm() 32d4fe9 privsep: Fix a compiler warning on unsigned/signed comparison 2e997ee Add interface matching support with -M, guarded by CONFIG_MATCH_IFACE 45e3fc7 Find correct driver for interface additions/removals 9037702 wpa_supplicant: Fix CONFIG_IBSS_RSN=y build without CONFIG_AP=y 5ae65de wpa_supplicant: Fix p2p_group_add when UDP-based ctrl_iface is used 24bce46 FST: Fix a compiler warning e567c58 Fix nfc_pw_token build with CONFIG_FST=y d774c46 mesh: Use appropriate BLOCKED state duration 9f2cf23 mesh: Add support for PMKSA caching 4c522c7 PMKSA: Flush AP/mesh PMKSA cache by PMKSA_FLUSH command b8daac1 PMKSA: Show AP/mesh PMKSA list in PMKSA command 2604edb mesh: Add MESH_PEER_ADD command e174ef3 mesh: Add MESH_PEER_REMOVE command f7648c8 P2P: Advertise IP Address Allocation only if it is enabled on GO 7f46ad9 BSD: Only down the interface once we are sure we can work with it 192964d Handle OSEN IE in Assoc Request info if req_ies exists 29eddc3 nl80211: Fix error path in if_indices_reason reallocation ee298f1 nl80211: Do not add NL80211_ATTR_SMPS_MODE attribute if HT is disabled 4ca16b5 Assign QCA vendor command and attribute for Tx/Rx aggregation 64ce590 libxml2: Check for xmlDocDumpFormatMemory() error case 8b827c3 BoringSSL: Keep static analyzers happier with X509_get0_pubkey_bitstr() 42a9553 hs20-osu-client: Fix pol_upd command line parsing ec1eae8 hs20-osu-client: Remove dead code from sub_rem command line parsing c3dc68e Do not invalidate EAP session cache on all network block parameter changes 9231c24 wlantest: Fix bip_protect() memory allocation c6c29be Interworking: Add credential realm to EAP-TLS identity Change-Id: I870f325171d00fed9c4fcd82a695fe5e2efee792 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
57c2d39d85825f38c5fdac9b73bb0088406ffc85 |
|
23-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 077dcfb8c48d2509a6e116c0de3ad57d2fbfe4fe 077dcfb AP: Debug print management frame TX result ca911d6 MBO: Parse non-preferred channel list on the AP 3f48274 WNM: Fix a memory leak on AP error path f5ca176 VLAN: Fix vlan_compare() for tagged VLANs 1260564 hostapd_cli: Add support for RAW command 940491c MBO: Mandate use of PMF for WPA2+MBO association (STA) 4c57228 MBO: Mandate use of PMF for WPA2+MBO association (AP) 8dd49f0 MBO: Update STA cellular data capability based on WNM Notification 6332aaf MBO: Track STA cellular data capability from association request f3cb7a6 WNM: Minimal processing for WNM Notification Request frames on AP e578343 MBO: Indicate WNM-Notification support on AP when MBO is enabled 990b7b6 Simplify hostapd_build_ap_extra_ies() with helper functions d010048 MBO: Expire non-matching bss_tmp_disallowed entries as part of check f4c74e1 MBO: Parse MBO IE in ieee802_11_parse_elems() 016082e MBO: Send WNM-Notification when cellular capabilities change c0e2a17 hostapd: Add MBO IE to BSS Transition Management Request frame fb9a1c3 hostapd: Add MBO IE to Beacon, Probe Response, Association Response c484b19 Move Hotspot 2.0 element in (Re)Association Request frames a0c38e5 Re-order elements in (Re)Association Request frames 9a493fa WNM: Add candidate list to BSS transition query 84d1c0f WNM: Add candidate list to BSS transition response cf11ab7 utils: Derive phy type by frequency and bandwidth c8082d2 MBO: Add MBO IE to BSS Transition Management Response frame dd59990 MBO: Parse MBO IE in BSS Transition Management Request frames 5e57ba2 MBO: Add Supported Operating Classes element to Association Request 7d46f58 MBO: Add global operating class definitions cb06cf3 MBO: Prevent association to APs that explicitly disallow this c5d193d MBO: Add cellular capability to MBO IE 2d5b861 MBO: Send MBO WNM-Notification Request frames to notify changes 92c6e2e MBO: Implement MBO non-preferred channel report in Association Request facf2c7 MBO: Add non-preferred channel configuration in wpa_supplicant 425dd78 MBO: Add Multi Band Operation definitions a159958 ndis: Use the new get_ie() helper to avoid duplicated code 231b04b utils: Share a single helper function to get IE by ID ea69d97 wpa_supplicant: Share a single get_mode() implementation 75cc211 VLAN: Check vlan_desc validity in a failure debug print 43022ab Use 64-bit TX/RX byte counters for statistics 3f81ac0 AP: Set STA assoc flag in the driver before sending Assoc Resp frame bb598c3 AP: Add support for full station state dc55b6b nl80211: Add support for full station state operations 5558b99 EAP-FAST peer: Remove fixed return value from eap_fast_parse_phase1() 4b16c15 EAP-pwd server: Use os_get_random() for unpredictable token 239952b DFS: Remove the os_random() fallback 98a516e WPS: Use only os_get_random() for PIN generation f441e5a Use os_get_random() for Shared Key authentication challenge 8c676b5 Add RADIUS Service-Type attribute with a value of Framed 09d96de mesh: Drop Authentication frames from BLOCKED STA 70c9396 SAE: Fix PMKID calculation for PMKSA cache 1492fbb Print Acct-Session-Id and Acct-Multi-Session-Id 64-bit values e21ceca kqueue: Use 0 instead of NULL for udata 640b0b9 ctype functions require an unsigned char a5a3efc Fix compile on NetBSD for vlan a084c24 wired: Fix compile on NetBSD for wired driver 634e2e2 Add CONFIG_ELOOP_KQUEUE to defconfig 99a94f5 nl80211: Avoid wpa_printf %s call with NULL pointer in set_param() ba91e92 wpa_supplicant: Parse ifname argument from DATA_TEST_CONFIG 8be640b VLAN: Add per-STA vif option d0bdc96 VLAN: Actually add tagged VLANs to AP_VLAN f9c0018 VLAN: Factor out per-vid code in newlink/dellink 8e44c19 radius: Add tagged VLAN parsing 1889af2 VLAN: Separate station grouping and uplink configuration 3a583e0 OpenSSL: Fix PKCS#12 parsing of extra certificates with OpenSSL 1.0.1 ddd0032 wpa_cli: Clean up logical operation 24c382a TDLS: Clean up os_memcmp use 6136d43 trace: Free symbols on program exit 8bcf8de OpenSSL: Fix memory leak in PKCS12 additional certificate parsing 03e3ddf OpenSSL: Fix memory leak in HMAC_CTX compatibility wrapper function d9a0f69 OpenSSL: Fix memory leak in OCSP parsing 29bc76e OpenSSL: Do not use library init/deinit functions with 1.1.0 0f09637 OpenSSL: Fix memory leak in subjectAltName parsing e60913b curl: Fix memory leak in subjectAltName parsing 6014890 OpenSSL: Fix memory leak with EVP_CIPHER_CTX_new() 99a1735 rfkill: Fix a memory leak 1f1e599 OpenSSL: Fix memory leak on error path b907491 wpa_supplicant: Basic support for PBSS/PCP 86b5c40 nl80211: Basic support for PBSS/PCP afa453a Sync with mac80211-next.git include/uapi/linux/nl80211.h d1d8a2b EAP peer: Simplify buildNotify return 1314bc1 Clean up EAP peer PCSC identity functions Change-Id: I9db475a2a4ebc88d2ee024319ed59a850636bb16 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
55840adb6cd32ca52064f327b72a40e769f70661 |
|
14-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 06f14421ea8644d12a7b0be6b583114869f9c451 (DO NOT MERGE) 06f1442 TLS: Parse OCSPResponse to extract BasicOCSPResponse d560288 TLS: Parse CertificateStatus message eeba168 TLS: Add status_request ClientHello extension if OCSP is requested 4303d53 TLS: Parse ServerHello extensions 6b7bb42 TLS: Add minimal support for PKCS #12 5ce2941 TLS: Extend PKCS #5 to support PKCS #12 style key decryption f6a62df TLS: Fix and complete ASN.1 tag list 3c108b7 EAP peer: External server certificate chain validation b6e5e14 EAP-FAST peer: Fix PAC parser error messages 5b904b3 EAP-FAST: Check T-PRF result in MSK/EMSK derivation b1d8c5c EAP-FAST peer: Fix error path handling for Session-Id 36478a1 OpenSSL: Support new API for HMAC/EVP_MD_CTX in OpenSSL 1.1.x-pre1 9257610 FT: Fix FTIE generation for EAPOL-Key msg 3/4 e44bd28 FT: Fix sm->assoc_resp_ftie storing on the AP side 59e78c2 FT: Fix FTIE generation for 4-way handshake after FT protocol run b0ecbd3 AP: Use more readable version of management group cipher in error cases 651c6a8 Add TEST_ASSOC_IE for WPA/RSN IE testing on AP side 58059e6 FST: Print debug entry on MB IE update based on EVENT_AUTH af041f9 dbus: Add support for vendor specific elements 5c8acf7 EAP-IKEv2: Check HMAC SHA1/MD5 result 7b991b4 Use proper build config for parsing proxy_arp 4db29e6 TLS: Add support for PKCS #5 v2.0 PBES2 Change-Id: I10b71e4d3573ef60a52ea6ff56afcd3a06a0b7b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
1d755d025b206e22b06aeb322e25a79f98ca7777 |
|
28-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 01a025937c67f0eca6021d94b8ec3b144f8b1730 01a0259 WPS: Add support for 60 GHz band 0ef1e29 WPS: Fix shorter authentication timeout during no-SelReg iteration 3465176 nl80211: Verify that cipher suite conversion succeeds a250722 Try to set PMK only with key mgmt offload support in the driver 4a7ce98 Make IPv6 NA multicast-to-unicast conversion configurable 9f390f4 Interworking: Fix network selection warning without SIM/USIM support a0ad9e8 Remove WPA per-VLAN groups when no more stations remain 87b5b53 Make VLAN ID available in STA info over control interface 5678a2d P2P: Allow wpa_supplicant to start if social channels are not supported 209214b vlan: Move CONFIG_FULL_DYNAMIC_VLAN includes to proper places a6da824 Do not use C++ reserved words as variable names eaa3728 wpa_gui: Themed icon loader 9a3cb41 Fix wpa_priv (CONFIG_PRIVSEP=y) build 8b423ed Declare all read only data structures as const fd4fb28 OpenSSL: Try to ensure we don't throw away the PIN unnecessarily fabc6dd mesh: Retransmit the last Commit Message in the Committed state 068669f vlan: Verify RADIUS returned VLAN-ID and dynamic_vlan=required 5add410 WPS: Use shorter authentication timeout during no-SelReg iteration e7d2034 WPS: Enforce five second minimum time before AP iteration bd143cc Remove trailing whitespace from Makefile 74802c0 P2P: Do not create a P2P Device interface if P2P is disabled 579674e Document p2p_disabled option in wpa_supplicant.conf 8ea8a89 nl80211: Extend unique MAC address assignment for station iftype Change-Id: I8bc8a63f37c0892b83376b9d5a5859827ae50554 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
dda10c2afb8378747491ea5d329a1de635d6d58e |
|
25-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c41d0840a1ae4d755c525b091a4bf9d740efdb5f c41d084 nl80211: Allow driver-based roam to change ESS 6ba7eba Add OpenSSL 0.9.8zf patch for EAP-FAST support 1de0710 atheros: Clear WPS appie during deinit 857d942 Extend offloaded ACS QCA vendor command to support VHT 0fd52a6 Remove duplicated wpa_s->conf->interworking check ad44309 Add Extended Capabilities element to all Probe Request frames 9bd566a Delay AP selection if all networks are temporarily disabled 701f396 Don't optimize scan frequencies if selected network has changed e9d2805 P2PS: Extend p2p_service_del asp to support 'all' parameter 6dd51ec P2PS: Add P2PS advertisements on ALL_SERVICES ANQP query c40a891 P2PS: Delete ASP advertisements on wpas_p2p_service_flush 2dc422e P2PS: Update SD indicator value on ASP add/del/update 030a3e1 DFS: Fix range availability check 56ef992 DFS: Consider non-contiguous channels 6ceea4c Restart sched_scan on channel list change e7a296b Remove unused shared_freq driver op 58e115b Fix hlr_auc_gw build with OpenSSL 5f9c92f nl80211: Fix vendor command handling 55e8f0e Fix CONFIG_EAP_UNAUTH_TLS without CONFIG_EAP_TLS build 9772af6 Interworking: Prevent scan during ANQP fetch and Interworking select 2c50246 Add a AP mode event message for possible PSK/passphrase mismatch 6784168 Remove SChannel support Change-Id: I21078309f83821d4b685de77c517c0886b3366bd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
7f65602d49069f96a7bb44da8bd79ffe8d4c6a98 |
|
25-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f51f54a007e0de1d413dee3523472d3bbeed2ecc f51f54a nl80211: Resubscribe to nl80211 events on global nl_event socket 48ec694 Fix Linux packet socket workaround to not close the socket too easily 0d2030e Use estimated throughput to improve roaming selection 1d747e2 Add snr and est_throughput to the BSS entries a1b790e Select AP based on estimated maximum throughput ab647ff Add wpa_supplicant Makefile target libwpa_ctrl.a abae2d1 trace: Initialize alloc_list even without os_program_init() call 891dfb3 Add helper function to clear and free wpa_psk list 71d77ad Update current BSS level when signal change event occurs f1609f1 wpa_supplicant: Cancel sched_scan when stopping countermeasures abb8d08 nl80211: Add support for configuring P2P GO CTWindow 0b8bcaa P2P: Allow configuring CTWindow when working as GO c77ffc6 TDLS: Ignore extra padding in all packets 5ce6ac1 Inteworking: Add support to update the ANQP Capability List into the BSS 185ada4 HS 2.0: Add support to update the HS20 Capability List into the BSS 7fe7a3a wpa_gui: Debug enhancement 2b892d4 Add forgotten network profile parameters to config file writing 563ee18 IBSS: Add support for VHT80 configuration ada157f Make hostapd_set_freq_params() common 98479dc IBSS: Update operating frequency if joining an existing IBSS 4d9e6fb IBSS: Add fixed_freq network parameter 6f5e1b0 Use priority list instead of global for PNO 97fc2dc Allow libnl-3.0 include path be specified f92446f P2PS: Add P2PS interface info 59b416c Add optional reassoc-to-same-BSS optimization c4da67d Fix passive_scan config parameter writing 715d5c4 hs20-osu-client: Ensure NULL checks are done before dereferencing 58d405f Fix OCSP debug messages 710dfb4 OpenSSL: Fix OCSP error path bd7bb43 HTTP: Fix OCSP error path 946572c Android: Remove commented out non-Android build parameters 15ada7f Android: Remove libxml2 config defines ebe8d3f Android: Silence unused function parameter warnings dbd10da Android: Fix hs20-osu-client build on Android 5.0 a926295 HS 2.0R2: Fix permissions for SP/<fqdn> directory on Android 480994d nl80211: Allocate QCA vendor subcmds for DFS radar detected and CAC events c165cb4 Drop all hostapd STA entries on interface disabled event 106fa1e nl80211: Indicate interface-down event only for the main netdev eeb1cb2 VLAN: Clean up RTM_NEW/DELLINK processing 47e5fbd hostapd: Avoid sending client probe on removed client 3478273 Re-configure WPA2 group keys on hostapd interface re-enable f33c860 Re-enable beaconing on interface disable+enable fc99fab nl80211: Print a debug log entry on NL80211_CMD_PROBE_CLIENT failures 0d2f324 P2P: Fix send_action_in_progress clearing in corner cases 9ff8dda Add hostapd UPDATE_BEACON ctrl_iface command e0761c5 nl80211: Allocate QCA vendor subcmd for DFS CAC Start event 1db718b nl80211: Test vendor command and event 10263dc Add control interface commands for fetching wpa_config values f91a512 Add INTERWORKING_ADD_NETWORK command c612ae9 AP: Do not reply to Probe Request frames with DS Params mismatch 5b74e08 P2P: Document P2P_CONNECT-auto 99650ca Add STOP_AP control interface command 6b00512 P2P: Add event messages for P2P_CONNECT-fallback-to-GO-Neg b0e669b P2P: Fix P2P_CONNECT-auto fallback to GO Neg with group interface bf51f4f mesh: Fix remaining BLOCKED state after SAE auth failure 79ddb20 mesh: Add a monitor event on SAE authentication getting blocked dd2cbaf mesh: Add a monitor event for SAE authentication failure 0cb5f8d mesh: Fix inactivity timer for 32 bit system 11e2ddb mesh: Remove duplicated no_auto_peer update 1e52983 D-Bus: Fix network block type change 4fada12 Fix HT40 co-ex scanning issue on hostapd error path 23ed011 Fix Linux packat socket regression work around 663ae2f Don't write to wpa_supplicant.conf directly d9a9bc0 IBSS: Do not enable HT with WEP or TKIP 0d7eb43 ACS: Accept channel if any (rather than all) survey results are valid 68fa00c ACS: Allow specific channels to be preferred 6f41a25 ACS: Use weighted average for 2.4 GHz adjacent channel interference Change-Id: Ie1cabd28dcfdefafa02e81477e34badae6f7e629 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
216983bceec7c450951e2fbcd076b5c75d432e57 |
|
06-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2c0efd9e49b15da163cee659409eee85390620c3 2c0efd9 P2P: Fix stopping on search after SD callback db3168d OpenSSL: Use SSL_cache_hit() when available 68ae477 OpenSSL: Use library wrapper functions to access cert store abe96d0 P2P: Clean up Listen channel optimization debug prints d2ca6ba Fix hostapd obss_interval documentation d027c7b Fix 20/40 MHz co-ex report processing with obss_interval=0 93eca61 P2PS: Do not remove pending interface on p2p_stop_find ae2dd83 P2PS: Allow PD retry in SEARCH and LISTEN_ONLY also 87d5ef5 P2PS: Add commands to control interface redir list 0cf12b3 P2PS: Send P2P_FIND_STOPPED event during P2P SD also 306aaf4 P2PS: Start WPS registrar upon GO formation 9e96e46 P2PS: PD Response processing ab8ee77 P2PS: Provision Discovery fail event 1300cc8 P2PS: PD Request processing and PD Response building 5fefce2 P2PS: Callback to send P2PS provisioning events 9a58e52 P2PS: Callback to create pending group after sending PD Response 895d94d P2PS: Callback to remove stale persistent groups f309c18 P2PS: ASP provisioning commands to control interface 6d90851 P2PS: Process P2PS provisioning commands 369678a P2PS: Add P2PS attributes into PD Request if requested 59fec34 P2PS: Allow p2p_build_ssid() to use pre-set SSID d4b43b5 P2PS: Add support to send ASP-RESP events 6df08d0 P2PS: Logic to parse GAS requests for ASP services 5a4102c P2PS: Add support to send ASP service requests 095b3c4 P2PS: Add Application Service Info to device found events 4660e73 P2PS: Add Advertised Service Info into Probe Response frames 9e7321e P2PS: Parse Probe Request frames for matching ASP hashes ae9d45f P2PS: Extend add/del services logic to support ASP ea8e033 P2P: Allow p2p_get_group_num_members() to be called with NULL 4f88fc0 P2PS: WPS changes needed for P2PS default PIN 1a94b0a P2PS: Add service hash to Probe Request frames 5177509 P2PS: Add option to specify seek strings into P2P_FIND 5f18501 P2PS: Helper functions to build new P2P attributes 60d1148 P2PS: Add parsing of new P2P attributes b9348be P2PS: Add new P2P identifier assignments from P2P spec v1.5 c3d6c71 Add helper functions for escaping and unescaping UTF-8 66eaf8a Fix driver-offloaded offchannel TX done processing c5e154c P2P: Add P2P state into p2p_send_action_cb() debug entry f2dc06e P2P: Ignore remain-on-channel callback event if not waiting for one 6a6569b HS 2.0R2: Add password to DB in case of machine managed subscription f0d0a5d Improve BSS selection with default noise floor values 7f7bfba Add an option allow canned EAP-Success for wired IEEE 802.1X 49fcc32 EAP-MSCHAPv2 peer: Add option to disable password retry query 66bc683 hostapd: Simplify vlan_add_dynamic error paths 99805a0 Interworking: Convert wpa_printf() to wpa_msg() b42f539 Add a variable to handle extra CFLAGS values e6dd819 Work around Linux packet socket regression 7650f9e Fix resource leaks on rsn_preauth_init() error paths a565e03 dhcp_snoop: Make IPv4 addresses human readable in debug log 2dd4f3a Fix STA re-bind to another VLAN on reauthentication 4437f8f Free old eap_user_file data on configuration change 1180dd6 WPA auth: Disconnect STA if MSK cannot be fetched 40aaa64 WPA auth: Clear temporary MSK storage from stack explicitly 01b481a Convert couple of remaining printf to wpa_printf in ap_list bfaefd5 EAP-PEAP server: Fix Phase 2 TLV length in error case 745d936 mesh: Create new station entry on popen frames 41bff86 mesh: Always free the station if peering failed 871ff0b mesh: Sync plink state with kernel ba42261 Simplify eapol_sm_notify_pmkid_attempt() 993a865 Add eap_session_id to wpa_supplicant STATUS output f19c907 OpenSSL: Implement aes_wrap() and aes_unwrap() fee31f7 OpenSSL: Remove support for versions older than 0.9.8 8bf3030 OpenSSL: Use a common helper function for HMAC 983c6a6 OpenSSL: Replace internal HMAC-MD5 implementation Change-Id: I5743003f14efae324537f7dc2c5e6ada892a33a7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
807291d85bf857320aff6a8ade38c5f622ab9df8 |
|
27-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36d (DO NOT MERGE) 3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
ff787d557db719adea0fdf2679667500c65cf74d |
|
12-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3e7f1c7980c6e9fc7173f78aa72b2761fcd8924d (DO NOT MERGE) 3e7f1c7 GnuTLS: Add TLS event callbacks for chain success/failure and peer cert 0eb2ed0 GnuTLS: Add support for OCSP stapling as a client cf08e9b Add MESH to modes capabilities db5adfe Add SAE to auth_alg capabilities 0e1bb94 GnuTLS: Verify that server certificate EKU is valid for a server d4d1f5c GnuTLS: Fix tls_disable_time_checks=1 processing 594d1fc GnuTLS: Add support for private_key and client_cert as blobs 79b1dd9 GnuTLS: Fix DER encoding certificate parsing a165145 Add "GET tls_library" to provide information on TLS library and version c3bb84b GnuTLS: Add event callbacks 8ddcd6b GnuTLS: Add support for domain_suffix_match 4bc13bf GnuTLS: Check for any unknown verification failure e0d431a GnuTLS: Add more debug prints for version and session status 65ec7f4 GnuTLS: Move peer certificate validation into callback function 7c82457 GnuTLS: Remove support for versions older than 2.12.x e1d63f6 GnuTLS: Remove old version number checks for 1.3.2 ae0a23a GnuTLS: Remove GNUTLS_INTERNAL_STRUCTURE_HACK db4cf40 GnuTLS: Add support for ca_cert as a blob 224104d TLS: Reject openssl_ciphers parameter in non-OpenSSL cases b09baf3 Work around Windows build issues 6dbbef9 Define host_to_le32() for Windows builds 7d28e46 Fix os_win32 build 0b40247 Remove Network Security Service (NSS) support d166947 schannel: Reject subject_match, altsubject_match, suffix_match 59051f8 TLS: Reject subject_match, altsubject_match, suffix_match f8717ac GnuTLS: Reject subject_match, altsubject_match, suffix_match e24aef1 Fix a typo in domain_suffix_match documentation 394b547 Improve subject_match and domain_suffix_match documentation 8a42a07 trace: Fix out-of-memory testing logic 79cd993 Add address masks to BSSID lists b83e455 Add network specific BSSID black and white lists b3d6a0a Add generic parser for MAC address lists 21c74e8 nl80211: Use a helper function to put mesh_id 85e1fad nl80211: Use a helper function for putting beacon interval 6dfc557 Remove mesh_ht_mode network block parameter 54fe48b mesh: Use the shared function with IBSS to determine channel parameters f7e889f mesh: Convert channel configuration to use common routines 6334330 mesh: Use a separate variable to track whether HT is enabled 1fc4ab2 nl80211: Move debug prints into nl80211_put_freq_params() cae87ab nl80211: Add a helper function for putting basic rates 6b8b077 ibss/mesh: Enable HT40 if supported a828f62 Make check_40mhz_2g4 common fdd989d Make check_20mhz_bss common 0e550fe Make check_40mhz_5g common 6d5d098 Make get_pri_sec_chan() common 5144274 Introduce common allowed_ht40_channel_pair() 5f10b7f Use common hw_get_freq/hw_get_chan helpers in hostapd 269dfe2 Introduce common hw features 1830817 IBSS: Add WPA_DRIVER_FLAGS_HT_IBSS f3b8ad4 SAE: Implement retransmission timer a206e2a SAE: Centralize function for sending initial COMMIT 28c91ee bsd: Fix parsing of ieee80211req_scan_result on FreeBSD and DragonFly 96d1d97 Android: Remove hardcoded ICU include paths from hs20-osu-client a354bcc D-Bus: Use NoMemory error message from CreateInterface 635874b Handle interface disabled/enabled more consistently 8f2cf37 P2P: Indicate reason=UNAVAILABLE for group netdev going down 86a7fbb Verify that eloop_register_read_sock() succeeds for ctrl_iface setup 27d9701 Fix a memory leak on WPA authenticator error path c1c07dc Fix hostapd interface addition error path a156ffd Add support for testing memory allocation failures 52b3943 D-Bus: Fix interface unregistration on error path 96dc9a6 D-Bus (old): Fix interface unregistration on error path ef03557 Fix memory leak on wpa_supplicant_init_wpa() error path 52a8058 TDLS: Fix an interface addition error path f2d5728 D-Bus: Fix string array dict entry parser in out-of-memory case c61bc23 D-Bus: Fix byte array dict entry parser in out-of-memory case dacf605 D-Bus: Fix Introspect() in case of os_strdup() failure 68a8669 D-Bus (old): Fix wpsReg error message f0614bc D-Bus (old): Fix message handler error paths a2af1c7 D-Bus (old): Fix memory leak on error path 3d2e2d5 trace: Fix compiler warning on 32-bit builds with bfd support b9f6560 eloop: Fix WPA_TRACE tracking in case of realloc failure e10422c Fix memory leak on hostapd BSS addition error path 2801659 Fix hostapd initialization error path on allocation failure d58ade2 nl80211: Fix compilation with libnl 1.1 and 2.0 51f3427 crypto: Clear temporary stack buffers after use 77a2c39 crypto: Clear temporary heap allocations before freeing a15a7fc DH: Clear memory explicitly on private key deinit 77c45e2 Add wpabuf_clear_free() to allow clearing of freed memory a90c7d9 OpenSSL: Fix pbkdf2_sha1() wrapper f6ebbcf AES-SIV: Make aes_s2v() static dcf8fbc nl80211: Simplify event processing error paths 38751d8 nl80211: Remove cfg80211 state mismatch workaround for authentication 64ae244 nl80211: Check support for rekey offload on first use Change-Id: Ice94c3cf8e39a6d2cac993aacd0f6d45b31c7c15 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
9ead16e203b81d44a2d84eadc2901ceeb7daf805 |
|
07-Oct-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
c28170251eb54dbf64a9074a07fee377587425b2 |
|
02-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e376290c667e970d751acc916e0efe2ed16292ed e376290 HS 2.0R2: Add update_identifier field to network 5bc2857 Fix some sparse warnings about u16 vs. le16 42619d6 Fix CTRL-EVENT-REGDOM-CHANGE event init= value a520bf4 Mark function static 0cb79d3 dbus: Fix indentation level to match code logic 8f03ac9 Mark functions static 6891f0e Allow SCAN command to specify scan_ssid=1 SSIDs 18389ab WPS: Clear keys/PINs explicitly b7175b4 Clear hostapd configuration keys explicitly d1ecca6 HS 2.0 R2: Clear hs20-osu-client configuration keys explicitly 0a13e06 EAP server: Clear keying material on deinit f534ee0 EAP peer: Clear keying material on deinit 19c48da Clear wpa_supplicant configuration keys explicitly 28bfa29 EAP-AKA: Remove unnecessary dead increment 62493df EAP-GPSK: Avoid dead increment by checking pos pointer 164a453 FT: Debug print extra response data 70bfc77 PCSC: Debug print extra response data 5dbbf36 Interworking: Remove unnecessary dead increment a1e46f3 Check for no key_mgmt/proto/auth_alg entries in config writer 290ea6a Remove unnecessary tracking of first entry d3fa2bb WFD: Explicit limit for subelement length (CID 68127) 745ef18 HS 2.0: Verify assoc_req_ie buffer size for indication elements 0233dca SAE: Use os_memcmp_const() for hash/password comparisons 34ef46c WEP shared key: Use os_memcmp_const() for hash/password comparisons 3e4b77c EAP-GTC: Use os_memcmp_const() for hash/password comparisons a6eae3f EAP-MSCHAPv2: Use os_memcmp_const() for hash/password comparisons 30411b3 EAP-TTLS: Use os_memcmp_const() for hash/password comparisons a564d9c EAP-MD5: Use os_memcmp_const() for hash/password comparisons 4685482 EAP-PSK: Use os_memcmp_const() for hash/password comparisons cba0f86 EAP-PEAP: Use os_memcmp_const() for hash/password comparisons 7b1e745 EAP-LEAP: Use os_memcmp_const() for hash/password comparisons 8f92826 EAP-GPSK: Use os_memcmp_const() for hash/password comparisons e1550d4 EAP-PAX: Use os_memcmp_const() for hash/password comparisons c434503 EAP-FAST: Use os_memcmp_const() for hash/password comparisons dddf7bb EAP-EKE: Use os_memcmp_const() for hash/password comparisons dfb5608 EAP-SAKE: Use os_memcmp_const() for hash/password comparisons 05c79d6 EAP-SIM/AKA: Use os_memcmp_const() for hash/password comparisons 675ddad EAP-IKEv2: Use os_memcmp_const() for hash/password comparisons 2049a3c TLS: Use os_memcmp_const() for hash/password comparisons a79aea5 Milenage: Use os_memcmp_const() for hash/password comparisons 05f916e AES-GCM: Use os_memcmp_const() for hash/password comparisons 87a5c93 AES-CCM: Use os_memcmp_const() for hash/password comparisons 7c24f53 EAPOL supplicant: Use os_memcmp_const() for hash/password comparisons 870834a RSN authenticator: Use os_memcmp_const() for hash/password comparisons 0d15b69 RSN supplicant: Use os_memcmp_const() for hash/password comparisons 72619ce MACsec: Use os_memcmp_const() for hash/password comparisons c237195 RADIUS: Use os_memcmp_const() for hash/password comparisons ce9c9bc WPS: Use os_memcmp_const() for hash/password comparisons afc3c8b Add constant time memory comparison function os_memcmp_const ee352f1 EAP-pwd: Add explicit total length limit b2b8a4c EAP-SIM/AKA: Pass EAP type as argument to eap_sim_msg_finish() f107d00 PeerKey: Clean up EAPOL-Key Key Data processing 010fc5f dbus: Clean up array-array-type property getter Change-Id: I1dbe483be2678a7468e6955d70ea261f8e53b26d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
717574375e969e8272c6d1a26137286eac158abb |
|
02-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 801e117376e13d5b3c50f1627b93a949529fdf99 801e117 Fix validation of RSN EAPOL-Key version for GCMP with PMF 3d4d234 FT: Fix GTK rekeying after FT protocol d3d0483 nl80211: Work around error case prints for nl_recvmsgs on Android 8a387a2 P2P NFC: Fix use of freed memory df48efc Fix external radio work stopping to not read freed memory 13c3303 SAE: Fix memory leak in random number generation d92bdf9 hostapd: Make sure hapd->drv_priv gets cleared on driver deinit 438e133 hostapd: Use helper function to avoid duplicate deinit calls ac1a224 hostapd: Clean up if interface setup fails 81c4fca hostapd: Reset hapd->interface_add properly 3fbd036 hostapd: Prevent double interface disabling from segfaulting ea39367 nl80211: Fix wpa_driver_nl80211_if_add() failure paths b77aeae Interworking: Re-trigger scan if no connect attempt is done b523973 RADIUS client: Trigger failover more quickly if socket is not valid 09844c0 RADIUS client: Do not flush pending messages if server did not change 5d67bf1 hostapd: Fix configuration of multiple RADIUS servers with SET 70d4084 RADIUS client: Fix socket close/re-open on server change d045cc8 RADIUS client: Fix crash issue in radius_client_timer() c1fb75a RADIUS client: Handle ENETUNREACH similarly to other failure cases 9ed4076 RADIUS client: Do not try to send message without socket cc0b7cb hostapd_cli: Fix segmentation fault with interface command 114153b P2P: Debug print channel lists for invitation processing 4eb3b76 OpenSSL: Fix OCSP certificate debug print to use wpa_printf f6fb192 HS 2.0R2: Fix subscr_remediation_method for RADIUS server 74879f3 Remove extra newline from a debug print Change-Id: I82d4f00501fabb8b325e4461178b45e7b2c0178e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
7832adbbd72a1b784b7fb74a71a5d4085b0cb0d3 |
|
29-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c0333c8dd59b9e254d3fc725c984b1c0cd3d496a c0333c8 Check rx_mgmt::frame more consistently against NULL d6c6b1f Make sta NULL-check easier for static analyzers 0bceb8d Make dl_list_first() and dl_list_last() uses easier for static analyzers 5f693cb WPS HTTP: Remove unused assignment ee4fefc Remove duplicated variable zeroing 4a9d0eb Make PMKID check easier for static analyzers 06df2aa Remove floating constant suffix 'd' from test coee 9670f87 ACS: Clean up ifdef CONFIG_ACS to avoid unreachable code ece88f7 Make last_scan_res update easier for static analyzers d06e9ac P2P: Verify operating channel validity for NFC connection handover 13a524a nl80211: Remove unnecessary wpa_driver_nl80211_set_freq() wrapper e87ef75 nl80211: Add support for changing AP mode channel bandwidth 3057518 Sync with mac80211-next.git nl80211.h 5f0bca7 Retry initial 20/40 MHz co-ex scan if the driver is busy 587d60d Add AP mode support for HT 20/40 co-ex Action frame 9c47f6a hostapd: Extend support for HT 20/40 coexistence feature 196c9c7 Make channel parameters available in set_ap() driver operation b7a6702 Indicate disconnection event on interface disabled b89962b Fix wpa_config_read() with existing config block 27b4187 WPS: Print setsockopt() failure in debug log 52cb207 trace: Replace demangle.h with internal defines 0e80ea2 nl80211: Fix some coding style issues a26582c Make qca-vendor.h independent of other header files 4a64d5a nl80211: Allocate QCA vendor subcmd for extended statistics Change-Id: Ibabee77b2b87f04f99d6b1ca0f1ac741cb9222c0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
d11f019d62a42a8fc4c4d1f2ec17cf35b0763153 |
|
24-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 31ded52e7084976c5f84caae6cb55e632dd8b013 31ded52 SME: Add more debug prints for OBSS scans and 20/40 MHz co-ex report 7f8eb34 SME: Fix OBSS scan result processing for 20/40 MHz co-ex report b7a8d67 Allow hostapd to advertise 40 MHz intolerant HT capability 692ec30 FT: Add support for postponing FT response 6ace13a P2P: Clean up channel selection code to use helper functions 70c3523 WPS: Comment out unused AP WEP config write with WPS 2.0 c3ba70f P2P: Update op_reg_class in random social channel case 70634ee hostapd: Check driver DFS offload capability for channel disablement 65d645c nl80211: Fetch DFS offload capability from driver a500f31 WPS: Comment out unused AP WEP config update with WPS 2.0 be4e5af Add SAE and FT-SAE key_mgmt to hostapd GET_CONFIG 1d4fe3b Remove unnecessary parameter validation 94b84bc P2P: Avoid unsafe pre-configured channel as channel preference d3c9c35 Add freq= parameter to 'set pno' command b998236 dbus: Implement P2P Peers info IEs buffer getter c6f356f dbus: Export the peer's device address as a property 442adfd dbus: Declare properly ServiceDiscoveryRequest method 8903741 dbus: Cancelling a service request always reply by an error 13494c4 dbus: Remove duplicate signal declaration 513dcec Don't overwrite channel on hostapd config reload 5eae87a P2P: Fix GO failed interface init c46235a wpa_supplicant: Fix radio_remove_interface 2ce7e4f Android: Enable CONFIG_EAP_AKA_PRIME option 95bf699 Add get_radio_name() driver wrapper for wpa_supplicant d06ecab D-Bus: Make p2p_no_group_iface configurable 8b6b6d8 Fix hostapd.conf description of HT40+ Change-Id: I5e776f71050a106195a39e96d0c38930a387a806 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
b36ed7cd946148d829f311de8fe53ea3ffaaffe3 |
|
17-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4e3860f8a770a0db3816196c77baf894c7ccc1e f4e3860 Fix AP mode default TXOP Limit values for AC_VI and AC_VO 47bd94a TLS testing: Add new test cases for RSA-DHE primes f5bbb2f TLS client: Reject RSA-DHE prime if it shorter than 768 bits 817742f TLS testing: Fix test_flags check for ApplData report 1120e45 Allow config blobs to be set through ctrl_iface c3722e1 ACS: Fix VHT20 49b7443 Fix HT40 co-ex scan for some pri/sec channel switches 5bdac4a Remove unused STA entry information c9d9ee9 Fix hostapd_add_iface error path to deinit partially initialized BSS 6829da3 Fix external radio_work deinit path 8dd9f9c Allow management group cipher to be configured 67d39cf P2P: Do not create another group interface on NFC Token enable 6aa1cd4 wpa_supplicant: Apply VHT_OVERRIDES to wpas_start_assoc_cb() db63757 hostapd: Supply default parameters for OBSS scan 6e9375e TDLS: Add get_capability tdls command 67e1a40 hostapd: For VHT 20/40, allow center segment 0 to be zero d0bf06f GAS server: Remove incomplete remote ANQP processing fdb4535 WPS: Extend per-station PSK to support ER case as well 9a1a538 wpa_supplicant AP: Allow PMF to be enabled with ieee80211w ce6b9cd Allow reason code to be specified for DEAUTH/DISASSOC test frame dda8be7 TDLS: Use QoS info from WMM IE obtained in TDLS frames daa70bd Fix CONFIG_NO_SCAN_PROCESSING=y build 3a8ec73 P2P: Report dev_found event (if not yet done) from GO Neg Req RX 0f23a5e Mark AP disabled if initialization steps fail Change-Id: I7e499241552147c734fec9b77351b47ffd6e3a7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
9866086a955d00e237cc8df3722e7dff75c02532 |
|
12-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 99cd77a8c50413d44f1ebead917310468a8406de 99cd77a tests: Verify reassociate-to-same-BSS commands e8d70a7 nl80211: Hide deauth event due to forced deauth-during-auth 0f44ec8 Add a reattach command for fast reassociate-back-to-same-BSS cfc393a hostapd: Document interworking realm EAP Method types 7450c12 DFS: Add extra debugging messages 5d0d72a wpa_supplicant: Put upper bound on initial scan time delay 8c06db7 nl80211: Fix P2P Device handling when starting with RF-kill blocked 5e3ddf4 PNO: Change sched_scan_stopped event to handle pending PNO properly 737e7a0 PNO: Move and rename pno_start()/pno_stop() 1d91f50 hostapd: Process management frames only once per BSS e070051 hostapd: Allow to switch to usable DFS channels 01b9999 hostapd: Allow to switch to DFS channels if available 70ee1be hostapd: Add config option chanlist for DFS channels 09eef14 Use internal FIPS 186-2 PRF if needed 3b9c517 Fix PTK derivation for CCMP-256 and GCMP-256 e6ef73f nl80211: Add debug print of KEY_DATA and KEY_SEQ b465f5d Remove unused hostapd_wep_key_cmp() 4fb363c Fix error path handling on radius_accept_attr Change-Id: I28ecac6cbcc6f71f19a051c12b54668ca6a66e2a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
f21452aea786ac056eb01f1cbba4f553bd502747 |
|
26-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5e32f8256f5fcce8b70a95e070375ac549ac935a 5e32f82 tests: Verify HS 2.0R2 deauthentication request b61e70c HS 2.0R2: Add WFA server-only EAP-TLS server method 8d2a992 HS 2.0R2: RADIUS server support to request Subscr Remediation ae6d15c HS 2.0R2 AP: Add OSU Providers list ANQP element f7bd7a0 HS 2.0R2 AP: Add Icon Request and Icon binary File ANQP elements 97596f8 HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP 8e1146d HS 2.0R2 AP: Add support for deauthentication request a14896e HS 2.0R2 AP: Add OSEN implementation 6ca0853 HS 2.0R2 AP: Use Subscr Remediation request from RADIUS server 7bc9c25 HS 2.0R2 AP: Add STA's Hotspot 2.0 Release Number into Access-Request 76579ec HS 2.0R2 AP: Add AP Hotspot 2.0 Release Number as WFA RADIUS VSA 0dd100f HS 2.0R2 AP: Add definition and helper function for WFA RADIUS VSA 3fb17a9 HS 2.0R2 AP: Add WNM-Notification Request for Subscription Remediation d5d2478 HS 2.0R2 AP: Update HS 2.0 Indication element to Release 2 a6739e1 HS 2.0R2: Try to scan multiple times for OSU providers cf6d08a Interworking: Add OCSP parameter to the cred block 6402f2f Interworking: Add more debug info on roaming partner preferences 7479489 Interworking: Add sp_priority cred parameter 751ac99 Interworking: Use a helper function to compare cred priority aff419f Interworking: Remove separate credential priority tracking 533536d HS 2.0R2: Disable full ESS for as a workaround for per-BSS issues 8a77f1b HS 2.0R2: Slow down connection attempts on EAP failures 76a55a8 HS 2.0R2: Add more debug to network selection 8b4b9fb HS 2.0R2: Fix bandwidth policy BSS selection 28f2a7c HS 2.0R2: Allow excluded network to be selected based on user override 33fb8c5 HS 2.0R2: Add support for Policy/RequiredProtoPortTuple a45b2dc HS 2.0R2: Add support for Policy/MaximumBSSLoadValue 4cad9df HS 2.0R2: Add support for Policy/MinBackhaulThreshold aa26ba6 HS 2.0R2: Add tracking of provisioning SP 8e5fdfa HS 2.0R2: Add WFA server-only EAP-TLS peer method df0f01d HS 2.0R2: Add OSEN client implementation a5d7563 HS 2.0R2: Add common OSEN definitions 230e373 HS 2.0R2: Add GAS operation duration statistics into debug b572df8 HS 2.0R2: Add routine for fetching OSU provider information 1d2215f HS 2.0R2: Add OSU Providers list ANQP element 184e110 HS 2.0R2: Add Icon Request and Icon binary File ANQP elements 7ef6947 HS 2.0R2: Add STA support for Deauthentication Request notification 95a3ea9 HS 2.0R2: Add WNM-Notification Request for Subscription Remediation f9cd147 HS 2.0R2: Update Indication element to Release 2 bc00053 Interworking: Allow roaming partner configuration ae6f927 nl80211: Add driver capability for GTK_NOT_USED 2c49d04 Do not clear global pmf setting on FLUSH eef7235 Only try fast reconnect if network is not disabled 3d910ef Interworking: Prefer last added network during network selection 2a33687 P2P: Remove unnecessary ifdef CONFIG_NO_CONFIG_WRITE 050d8b5 Fix documentation for wpa_supplicant_global_ctrl_iface_process() 8c9cb81 DFS: Fix coding style (missing whitespace) 4f1e01b DFS: Add VHT160 available channels b8058a6 hostapd: DFS allow mixed channels 4db216f wpa_supplicant: Add support for IPv6 with UDP ctrl_iface e2364d1 hostapd: Deauthenticate clients forbidden by maclist changes 1748f1d hostapd: Make it possible to remove addresses from maclists 064eb05 Add os_remove_in_array() c1151e4 Force OFDM/HT/VHT to be disabled on channel 14 bfb79dd nl80211: Show regulatory rule flags in debug output 3d7ad2f hostapd: Configure spectrum management capability e0392f8 hostapd: Add Power Constraint element 891330f Fix spelling s/algorith/algorithm/ f0e30c8 Do not start another connect work while one is pending 3290398 WPS: Fix UNSUBSCRIBE error returns if NT or CALLBACK header is used f34df28 WPS: Fix UNSUBSCRIBE to return 412 if no SID match found 80f256a WPS: Remove unnecessary filename NULL check Change-Id: I7dc25a8bb0074f4970ade8d42dfa60da166baf96 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
cf32e60fa7e0d33fe1551a6dba8dcbbec47ea50e |
|
28-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2e988392436227c51002b573ee27a8cee37f70e9 2e98839 P2P: Disable DNS server from dnsmasq c07f261 P2P NFC: Add script for connection handover with nfcpy 12288d8 WPS NFC: Protect nfcpy pretty print calls against exceptions c209dd1 WPS NFC: nfcpy script to use new connection handover design 6202500 WPS NFC: Logging level configuration to wps-nfc.py and wps-ap-nfc.py 1f1b5b3 WPS NFC: Clean up nfcpy script no-wait operations 79ede5a WPS NFC: Validate ctrl_iface response before decoding it ab1db08 WPS NFC: Use argparse in the nfcpy scripts 6f8fa6e WPS NFC: Update wps-nfc.py and wps-ap-nfc.py to use new nfcpy API b56f6c8 P2P NFC: Add support for freq option in NFC ctrl_iface commands 91a6501 WPS NFC: Use BSSID and AP Channel from handover select 91226e0 WPS: Add testing option to corrupt public key hash 7312776 WPS NFC: add more debug prints for connection handover report 5cd4f66 WPS NFC: Use AP Channel information from credential container d2f1837 WPS NFC: Add BSSID and AP channel info to Configuration Token 75dbf98 WPS-STRICT: Update valid Device Password ID and Config Error range 5cd4740 P2P NFC: WPA state machine config with driver-based BSS selection 8e9f53c P2P NFC: Static handover with NFC Tag on client dd87677 P2P NFC: Enable own NFC Tag on GO Registrar abe44e3 P2P NFC: Add GO info into handover message when in client role 23318be P2P NFC: Optimize join-a-group operation based on NFC information 86e3208 P2P NFC: Copy DH parameters to a separate group interface d4b4d7f WPS NFC: Update DH keys for ER operations ac08752 WPS NFC: Use pubkey mismatch config error from Enrollee 59b45d1 P2P NFC: Add processing of P2P client while NFC handover case 74df9ec P2P NFC: Do not try to join peer if both devices are already GO 201b0f5 P2P: Add test option to disable IP address assignment request 25ef852 P2P: Add support for IP address assignment in 4-way handshake fdd48ff P2P NFC: Optimize GO Negotiation retries c4f87a7 P2P NFC: Add NFC tag enabling for static handover dd37a93 P2P NFC: Report handover select from tag for static handover db6ae69 P2P NFC: Report connection handover as trigger for P2P 9358878 P2P NFC: Build connection handover messages c00ab85 P2P NFC: Define WPS_NFC config method 0deab08 P2P NFC: Allow separate WPS/P2P IES to be parsed fca9958 P2P NFC: Pass OOB Dev Password through P2P parser ab9e344 P2P NFC: Pass OOB Device Password ID to P2P 5154689 P2P NFC: Add WPS attribute building for P2P NFC 01afd8d P2P NFC: Add NDEF helpers for P2P connection handover messages 9e323a2 P2P NFC: Add OOB GO Negotiation Channel attribute 14d8645 WPS NFC: Allow BSSID and channel to be included in handover select 50d1f89 NFC: Update WPS ER to use the new connection handover design d950793 WPS NFC: Add support for wpa_supplicant AP/GO mode to use handover fa4c298 WPS NFC: Process new style handover select 068cdb1 WPS NFC: New style connection handover select from AP/Registrar 3189ca0 WPS NFC: Add AP mode connection handover report 41f9ffb WPS NFC: Build new style carrier record for connection handover request 3f1639d WPS NFC: Split DH key generation to a separate function 9754917 WPS NFC: Update NFC connection handover design 34b6795 WPS NFC: Use abbreviated handshake if both PK hashes delivered OOB 57630e6 WPS: Preparations for allowing SSID filtering for provisioning step 5f45455 WPS NFC: Validate peer public key hash on Enrollee ff40cd6 WPS NFC: Send M2D with config error 20 on pkhash mismatch e435417 WPS: Remove Version attribute from NFC messages 72403ec WPS: Add builder functions for AP Channel and RF Bands attributes ea43ad9 P2P: Make group operating channel available 9f7cd9a P2P: Split add-group-info into a helper function 253f2e3 P2P: Apply unsafe frequency rules to available channels 1682c62 Add a header file defining QCA OUI and vendor extensions Change-Id: Ia7604d018e1ffb25e06bdc01ce258fc4a0569245 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
|
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
68d0e3ed07847339aedfac8e02f50db68c702e52 |
|
29-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 32b62704fac6af74f60b2effb173474e11ff089d 32b6270 Android: Fix ARRAY_SIZE() compilation 7617388 Interworking: Report STATUS:sp_type even if domain is not configured c20bc9d P2P: Remove compiler warning without CONFIG_IEEE80211N ca9bc5b P2P: Add VHT support 20ea1ca P2P: Add VHT parameter to P2P operations 53cfad4 nl80211: Mark VHT 80 MHz channels f2112b2 wpa_supplicant: Add CONFIG_IEEE80211AC 6b02335 hostapd: Mask out not-supported VHT capabilities 7f0303d hostapd: Verify VHT 160/80+80 MHz driver support c781eb8 hostapd: Verify VHT capabilities are supported by driver b29b012 Fix some VHT Capabilities definitions 7066a8e hostapd: Fix wrong VHT configuration capabilities flags 6651f1f nl80211: Use max tx power from regulatory domain 7ac3616 nl80211: Replace perror() and printf() calls with wpa_printf() 4d9fb08 WPS: Clear known_wps_freq in addition to after_wps d20c340 Interworking: Clear known_wps_freq for network selection f3be6ee tests: Allow test case descriptions to be written into database 1bd05d0 Interworking: Force normal scan for network selection 51e9f22 P2P: Add option to allow additional client channels 556b30d P2P: Add option to remove channels from GO use e7ecab4 Use ARRAY_SIZE() macro 39044a7 Introduce ARRAY_SIZE() macro 2e94624 DFS: Handle radar event when CAC actived correctly 5eaf240 DFS: Fix overlapped() function to check only DFS channels 345276a DFS: Adjust center freq correctly for VHT20/VHT40 1dc17db DFS: Fix available channels list for VHT80 34068ac nl80211: Add debug prints on nl_recvmsgs() failure 10b8592 nl80211: Make eloop sockets non-blocking 5f65e9f nl80211: Abstract handling of sockets on eloop e8d1168 nl80211: Register for IBSS auth frames before eloop 03610ad Clean up get_seqnum() use for IPN 29179b8 Stop ctrl_iface monitor send loop on reinit failure a2a535f Remove unnecessary wpa_s->conf checks 3318376 Add explicit buffer length checks for p2p_build_wps_ie() 0f01201 Verify that readlink() did not truncate result f5eb9da nl80211: Clean up if_add() for hostapd use a288da6 OpenSSL: Fix memory leak on error path 6cb4f11 nl80211: Fix strerror() value in P2P Dev debug messages 35f8363 DFS: Add forgotten break statement 2f243b8 Remove os_strncpy() 24f051e Replace remainining strncpy() uses with strlcpy() 41c526f P2P: Fix snprintf buffer length for group ifname backup Change-Id: I2e1506cb9219a5a37efbb2ae0dc180fb081c809f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
f7e0a9905988e62e4f70fed8b795722abeab719b |
|
23-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 376204934db44d45f798bdde4db005bc88d666f0 3762049 wpa_cli: Support tab completion with ifname= prefix 13b11ba wpa_cli: Allow IFNAME= prefix to be used ae8535b WNM: Make ESS Disassoc Imminent event more convenient to use 6df634f WNM: Do not reject ESS Disassoc Imminent 7b53acd WNM: Use defines for BSS Trans Mgmt field values 8e1bc70 WNM: Fix ess_disassoc timeout to be specified in TBTTs 901d1fe WNM: Remove PMKSA cache entry on ESS disassoc imminent notification dad153d Try to use fast-associate on ENABLE_NETWORK b068001 Fix already-associated detection with driver-based BSS selection 72728c6 P2P: Relax channel forcing for invitation processing with MCC support 4033935 Fix OKC-based PMKSA cache entry clearing 1045ec3 nl80211: Add couple of additional iftypes to debug prints 2cadc8e TDLS: Retry TDLS Setup Response more quickly Change-Id: Ib02db74ca336a4d2da66c21d361c5529ee85f864 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
51b6ea882f234c14cd1fe1332a3840cf61fafcca |
|
08-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 6ea1f4135b72199988393f34dd7f5ad8040b7a42 6ea1f41 Try to set WPA-None key after IBSS-joined event 66562e9 Use cached driver capabilities instead of new fetch for each operation 55293aa TDLS: Do not overwrite the reason code in the Tear Down Request 4aa8186 Add a configration parameter for sched_scan interval 03565bc Synchronize with wireless-testing.git include/uapi/linux/nl80211.h f11b72c TDLS: Move AID=1 workaround into driver_nl80211.c 7853369 TDLS: Pass peer's AID information to kernel 55a2df4 HS 2.0: Include HS 2.0 Indication element only for HS 2.0 association ad0685e edit: Fix history processing on running old command 9be3714 wpa_cli: Fetch the current BSSID list when starting interactive mode 69aa334 wpa_cli: Add BSSID tab completion for set bssid_filter 2156587 wpa_cli: Replace set command help with completion routine f1fb042 wpa_cli: Allow space in the set command value f5ffc34 wpa_supplicant: Allow global scan frequencies configuration abfc3ad Synchronize build config comments for wpa_supplicant a01e10d Android: Enable WPS ER and NFC support in the build 11e5a49 WPS: Do not use void* in arithmetic 0f105f9 HS 2.0: Move Probe Request Indication IE addition to proper place 8543ed8 WPA: Print pairwise EAPOL-Key flag as a bool 7af092a hostapd: Add Key MIC in group EAPOL-Key frames corruption test option b691dcb nl80211: Fix max_remain_on_chan capability reading 41b1a76 P2P: Clone beacon_int when initializing new group interface 741ed9f WPS: Remove duplicate networks after WPS Change-Id: I9a2a0cb2acf87dfd7548318d2bda5f342b815884 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
444d567b27731d8572ef37697dd12fd1c37c2f24 |
|
01-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 17b8995cf5813d7c027cd7a6884700e791d72392 17b8995 Interworking: Try to use same BSS entry for storing GAS results 3db5439 Optimize Extended Capabilities element to be of minimal length 8cd6b7b hostapd/wpa_s: Use driver's extended capabilities acb5464 Add ctrl_iface command FLUSH for clearing wpa_supplicant state 97236ce WPS: Skip rescanning after provisioning if AP was configured 4342326 Add ignore_old_scan_res configuration parameter 9599ccc WPS: Clear after_wps on new WPS connection 702621e WPS: Use latest updated BSS entry if multiple BSSID matches found ab547b5 WPS: Add more helpful debug for invalid WPS_REG command parsing a679c0f WPS: Allow hostapd process to control independent WPS interfaces ccdff94 WPS AP: Add support for reconfiguration with in-memory config 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested 558d69e P2P: Omit P2P Group Info in case of no connected peers 65a32cd AP: Fix infinite loop in WPA state machine when out of random bytes a5f61b2 Fix OLBC non-HT AP detection to check channel 69554d7 ap_list: Remove unused functions 08c99ca ap_list: Remove unused iteration list pointers 6b16917 ap_list: Remove unused fields 66f1f75 P2P: Fix provision discovery response handling in some cases 2f9b66d Extend ROAM command to handle multiple SSIDs per BSS Change-Id: I46002b1d3bbf6e376c2ae09bcb2c824c54805bbd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
|
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
44da0253a740e0329b18f60c196e1f2dcacfccea |
|
23-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
BRCM P2P update - IFNAME for monitor interface is changed to m. from mon. This will give extra space for incrementing X in IFNAME (p2p-wlan0-X). Also, we have synced the reset of IFNAME w.r.t. monitor interface name. - Fixed continuous P2P_DEV_FOUND events coming from GO. Removed the BRCM specific change for this. - Fixed STATUS command for p2p interface. Change-Id: I04210dd0b2bdba06b0192c0a61edfa0e5b47ab72 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
c55524ad84d13014e8019491c2b17e5dcf13545a |
|
07-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Fix D-Bus build without CONFIG_P2P=y nl80211: Allow AP mode to be started without monitor interface nl80211: Process association/disassociation events in AP mode DBus/P2P: Adding decl for PersistentGroupRemoved signal DBus/P2P: Rectified type of SecondaryDeviceTypes in device property Get P2P: Only call dev_lost() for devices that have been dev_found() wpa_cli: Add missing parameter for P2P_GROUP_ADD command wpa_supplicant: Respect PKG_CONFIG variable if set in the environment TLS: Add support for tls_disable_time_checks=1 in client mode hostapd: Clear keys configured when hostapd reloads configuration Add dbus signal for information about server certification Move peer certificate wpa_msg() calls to notify.c wpa_supplicant AP: Disable AP mode on disassoc paths wpa_s AP mode: Enable HT20 if driver supports it Allow PMKSA caching to be disabled on Authenticator FT: Disable PMKSA cache for FT-IEEE8021X FT: Clear SME ft_used/ft_ies when disconnecting 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Change-Id: I6ae333196c36ffa7589662d5269fabfc3b994605 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/wpa_auth.c
|