849734c8d1847920ed7042463f7480b1e0c1dfea |
|
27-May-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8960afa4bfa423774a8ca58cc21a4a7c1ab6089e 8960afa wpa_cli: Run action file in case of an AP event 1cece2f OpenSSL: Comment out tls_connection_get_eap_fast_key without EAP-FAST 7358170 TLS: Split tls_connection_prf() into two functions f150db6 OpenSSL: Remove two more accesses of ssl_ctx->cert_store 6dc3206 scan: Fix a memory leak on an error path 9ce3e61 nl80211: Add TEST_FAIL() to nl80211_set_mac_addr() 8880240 scan: Clean up code a bit - phase1 is used in all WPS cases e1ae287 scan: Clean up code a bit - ssid cannot be NULL here a170394 Update ChangeLog files for v2.6 a26c9c2 Fix sending non-Public Action frames over P2P Device interface 4d916ed nl80211: Register for only for specific Action frames in AP mode 31d7fb1 P2PS: Allow P2P_CONNECT command for P2PS connection with/without PIN 467fc14 P2PS: Correct config_methods for different P2P cases 9d136b0 EAP-SAKE: Do not debug print result if eap_sake_compute_mic() fails 0884633 EAP-PAX: Do not debug print result if eap_pax_mac() fails 92abe37 EAP-FAST: Check sha1_t_prf() result in eap_fast_get_cmk() 636a238 WPS: Check sha256_vector() result in wps_build_oob_dev_pw() 2c3d95c Check md5_vector() result in decrypt_ms_key() 38eee0f Check hmac_md5() result in radius_msg_verify_msg_auth() 05dad94 Check md5_vector() result in radius_msg_verify() aae125e WPS: Fix debug prints in wps_derive_psk() error case 7d1007a Fix external radio work debug printing on removal b6317b4 wpa_supplicant: Add wps_disabled parameter to network block 23d71a0 Set wpa_psk_set in wpa_supplicant AP mode is PSK is available 6641954 Fix AP mode key_mgmt configuration in wpa_supplicant default case ad6cee3 P2P: Do not enable P2P group processing for non-P2P AP mode a185e9b tests/remote: Add hwsim wrapper ff9bb8a tests/remote: Add test_example.py a73fa13 tests/remote: Add utils file ede4719 tests/remote: Add monitor.py 3b11ad3 Send CTRL-EVENT-REGDOM-CHANGE event on the parent interface 4de70e2 Add MGMT_RX_PROCESS test command for wpa_supplicant f42c3ce mesh: Calculate MTK before sending it to MAC in case Open is dropped baa1213 mesh: Add missing action to cancel timer e8a1b6b D-Bus: Check driver capability for IBSS in Modes property of Capabilities 7a1887f wpa_cli: Add backspace key process for some terminal 3dd0e9e wpa_supplicant: Fix CONFIG_AP build without CTRL_IFACE d58b60d drivers: Add NEED_RADIOTAP 6a9681e OpenSSL: Make dh5_init() match the generic implementation 46bac65 WPS: Fix segmentation fault in new DH key derivation e447133 OpenSSL: BoringSSL has SSL_get_client_random(), etc. 03626e9 Skip connection attempt for non-RSN networks if PMF is set to required 2295004 Ignore pmf=1/2 parameter for non-RSN networks 2a3f565 Reject SET commands with newline characters in the string values b166cd8 Reject SET_CRED commands with newline characters in the string values 0fe5a23 Remove newlines from wpa_supplicant config network output 73e4abb Reject psk parameter set with invalid passphrase character ecbb0b3 WPS: Reject a Credential with invalid passphrase f4830be nl80211: Try running without mgmt frame subscription (driver AP SME) df5bde8 Android: Remove EAP-FAST option 60d9f67 WPS: Explicitly clear wpabuf memory with key information 9b377be P2P: Copy config from p2pdev when not using dedicated group interface 3c88d26 P2P: Fix wpas_p2p_nfc_auth_join() 2f19563 WNM: Fetch scan results before checking transition candidates 4ac3398 Use a shared helper function for parsing hostapd.conf IEs a911227 Add assocresp_elements parameter for hostapd 49fe2ad OpenSSL: Support OpenSSL 1.1.0 DH opacity b92d2a5 FT: Fix RRB for FT over-the-air case 9e5a5de systemd: Update service files according to D-Bus interface version ac7aea8 Assign QCA vendor command/attributes for set/get wifi configuration 57b3888 P2P: Add P2P_GROUP_MEMBER command to fetch client interface address 0ee8925 P2P: Trigger event when invitation is accepted bd86ea0 nl80211: Get rid of unused assignment warning 18ae3a6 bsd: Set level correctly for non FreeBSD systems cf667c6 RRM: Modify the processing of a received neighbor report 00ed0aa SME: Add support for global RRM flag b5d172e nl80211: Add support for global RRM flag a7f0bb7 driver: Add global RRM support flag 864b952 nl80211: Register to receive Radio Measurement Request frames 4a74201 wpa_supplicant: Handle LCI request 220754c hostapd: Add FTM range request f4f185a hostapd: Add LCI request 629e180 hostapd: Save RM enabled capability of station 2572df3 hostapd: Handle Neighbor Report Request frame 061269b hostapd: Add own neighbor report data to neighbor database 9b4b226 hostapd: Add a database of neighboring APs 0101821 hostapd: Extend the configuration of RRM capabilities 6a4f0ed Fix spelling of "neighbor" in a function name d41a535 wpa_supplicant: Add LCI and civic request to Neighbor Report Request 624b8a0 utils: Add ssid_parse() function e4fbc8d Add measurement and neighbor report definitions 9d955f7 utils: Rename hostapd_parse_bin to wpabuf_parse_bin and move it 74e982d hostapd: Set LCI and Location Civic information in configuration 1854eec Add POLL_STA command to check connectivity in AP mode 3dbfb28 Allow AP to disconnect STA without sending Deauth/Disassoc frame de92314 Add inactive_msec into STA output 61c1011 Extend VENDOR_ELEM parameters to cover non-P2P Probe Request frame 6922d44 nl80211: Implement configure_data_frame_filters() callback ece4ac5 HS 2.0: Add support for configuring frame filters e42adb9 driver: Add a packet filtering function declaration ae33239 AP: Pass station P2P PS capabilities info during station add/set 7405bb0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 90f1496 wpa_supplicant: "don't care" value for pbss in ssid structure e52a698 RADIUS: Fix a possible memory leak on an error path f1863f2 RADIUS: Fix possible memory leak when parsing per-STA passphrase 3433721 P2P: Continue p2p_find after sending non-success Invitation Response 0f34665 Mark wpa_supplicant_{start,stop}_sched_scan() static Also reverting: c7f648c wpa_supplicant_8: Add a temporary hack to work around BoringSSL incompatibility 1e1c48d2 Update AP IE regardless WPA_DRIVER_FLAGS_BSS_SELECTION flag Change-Id: Idb9bfa80e9d9a4d10323dab5ce2bb24f4baf550c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
d97138ded63ac5388da3a2b63dea563c8b44c8ec |
|
28-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 324ade51e168f28430f4429849becd0f08d507c0 324ade5 TLS: Make tls_cert_chain_failure_event() more robust c6231b5 TLS: Remove storing of never-read value 15a6813 Remove unnecessary cleanup assignment in SHA1Final() ef3866a nl80211: Don't call linux_iface_up() for a dedicated P2P Device c2ed779 mesh: Document Mesh Peering Management element structure in more detail b2817cd mesh: Check PMKID in AMPE Action frames 6c33eed mesh: Fix PMKID to match the standard ede7770 wpa_supplicant: Do not wait for monitor on P2P Device interface 1c94570 Do not wait for monitor to attach if no control interface f98674a Clone default LIBS value to LIBS_* for other tools 7d2f674 Add "GET_CAPABILITY acs" to allow ACS build option to be detected d990971 wpa_supplicant: Enable Automatic Channel Selection support for AP mode 96bc508 Handle survey event properly in wpa_supplicant d39f796 EAP-TNC peer: Remove dead code related to fragmentation 662512e P2PS: Remove dead code abbbaa4 TNC: Print received IF-TNCCS message as debug ASCII hexdump d745f02 EAP-TNC peer: Allow fragment_size to be configured a67e7e5 RADIUS: Add EACCES to list of recognized send() errno values 5bd9be4 Fix RADIUS Called-Station-Id to not escape SSID 0764dd6 TLS client: Multi-OCSP check to cover intermediate CAs d6b536f Add ocsp=3 configuration parameter for multi-OCSP 0268383 TLS: Move variable declaration to the beginning of the block b567775 TLS client: OCSP stapling with ocsp_multi option (RFC 6961) 8ea6a27 TLS server: OCSP stapling with ocsp_multi option (RFC 6961) 5addb0d Server configuration for OCSP stapling with ocsp_multi (RFC 6961) bca0872 TLS server: OCSP stapling 9532bd2 GnuTLS: OCSP stapling on the server side 6241766 Use wpa_msg() for the "RSN: PMKID mismatch" message e161451 EAP-EKE: Merge identical error return paths 13cb0a6 EAP-EKE: Reject too long Prot() data when building a frame 0ab0de8 Document previously missing key_mgmt values Change-Id: I9ac7d0da03d8baf4542e276ab20cb56e44bfa33c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
0e58d9be2680098adccaadeadf31375ca54b7256 |
|
22-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c24f8e8e75b46f0b191cca788b6f4c10bed81861 c24f8e8 GAS: Do not cancel initial offchannel wait with comeback delay 1 364282c GAS: Retry full GAS query if comeback response is not received a587666 GAS server: Replenish temporary STA entry timeout on comeback request 8fb718a GAS: Shorten the duration of the wait for GAS comeback response c012567 GAS: Clear offchannel_tx_started when ending remain-on-channel cb73008 EAP-TTLS/PEAP/FAST: Reject unsupported Phase 2 method in configuration 18704f6 EAP-TLS: Merge common error paths 4f5c86e EAP-PEAP peer: Fix a memory leak on an error path e7160bd Drop any pending EAPOL RX frame when starting a new connection cd5895e WPA: Explicitly clear the buffer used for decrypting Key Data 4b90fcd EAP-PEAP peer: Check SHA1 result when deriving Compond_MAC 6ca5838 EAP-PEAP server: Add support for fast-connect crypto binding 6560caf EAP-PEAP peer: Remove unused return value and error path 61f25f8 HS 2.0: Remove duplicate icon entries ca9968a HS 2.0: Convert icon storage to use dl_list 8dd5c1b HS 2.0: Add a command to retrieve icon with in-memory storage 0e92fb8 rfkill: Match only the correct expected wiphy rfkill 6da504a nl80211: Handle rfkill for P2P Device interface 96e8d83 wpa_supplicant: Add SIGNAL_MONITOR command 2c0d0ae GAS: End remain-on-channel due to delayed GAS comeback request dabdef9 TDLS: Ignore incoming TDLS Setup Response retries 0fc5707 hlr_auc_gw: Simplify string parsers with str_token() d67e63d hlr_auc_gw: Fix a typo in an error message 59e7120 hlr_auc_gw: Remove unnecessary assignment 685ea2f wpa_cli: Send ALL_STA command to the correct interface 0e6a2cf Disconnect before trying to switch to a different network 706e11a Avoid network selection from scan during connection 819ad5b utils: Fix NULL pointer dereference with unexpected kernel behavior 1b3dd69 P2P: Fix possible NULL pointer dereference f24e488 EAP-TTLS peer: Fix parsing auth= and autheap= phase2 params 47c1de2 atheros: Unify memory processing functions d06a350 mesh: Fix VHT Operation information in peering messages 8ba8c01 TLS: Report OCSP rejection cases when no valid response if found f163ed8 TLS: Process OCSP SingleResponse(s) 8e3271d TLS: Store DER encoded version of Subject DN for X.509 certificates 32ce690 TLS: Share digest OID checkers from X.509 b72a367 TLS: Support longer X.509 serialNumber values af4eba1 TLS: Parse and validate BasicOCSPResponse Change-Id: I0fadef8993a548d64a4280372bc105fefa11e62a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
1b46775bb44f06b3cc285481ff5f7a673559ed7d |
|
14-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 06f14421ea8644d12a7b0be6b583114869f9c451 06f1442 TLS: Parse OCSPResponse to extract BasicOCSPResponse d560288 TLS: Parse CertificateStatus message eeba168 TLS: Add status_request ClientHello extension if OCSP is requested 4303d53 TLS: Parse ServerHello extensions 6b7bb42 TLS: Add minimal support for PKCS #12 5ce2941 TLS: Extend PKCS #5 to support PKCS #12 style key decryption f6a62df TLS: Fix and complete ASN.1 tag list 3c108b7 EAP peer: External server certificate chain validation b6e5e14 EAP-FAST peer: Fix PAC parser error messages 5b904b3 EAP-FAST: Check T-PRF result in MSK/EMSK derivation b1d8c5c EAP-FAST peer: Fix error path handling for Session-Id 36478a1 OpenSSL: Support new API for HMAC/EVP_MD_CTX in OpenSSL 1.1.x-pre1 9257610 FT: Fix FTIE generation for EAPOL-Key msg 3/4 e44bd28 FT: Fix sm->assoc_resp_ftie storing on the AP side 59e78c2 FT: Fix FTIE generation for 4-way handshake after FT protocol run b0ecbd3 AP: Use more readable version of management group cipher in error cases 651c6a8 Add TEST_ASSOC_IE for WPA/RSN IE testing on AP side 58059e6 FST: Print debug entry on MB IE update based on EVENT_AUTH af041f9 dbus: Add support for vendor specific elements 5c8acf7 EAP-IKEv2: Check HMAC SHA1/MD5 result 7b991b4 Use proper build config for parsing proxy_arp 4db29e6 TLS: Add support for PKCS #5 v2.0 PBES2 Change-Id: I10b71e4d3573ef60a52ea6ff56afcd3a06a0b7b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
cc00d5dc8483e32158b2ba61ea44b0c38d790ed7 |
|
04-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit 58606fd98722e92aaa4c2c7b8cb99cc92bd4308c 58606fd EAP-pwd server: Make sure in_frag_pos is cleared to zero on allocation 6aa5d95 EAP-pwd peer: Make sure in_frag_pos is cleared to zero on allocation 28a069a EAP-pwd peer: Fix asymmetric fragmentation behavior 3035cc2 EAP-pwd server: Fix Total-Length parsing for fragment reassembly 477c743 EAP-pwd peer: Fix Total-Length parsing for fragment reassembly e28a58b EAP-pwd server: Fix payload length validation for Commit and Confirm dd2f043 EAP-pwd peer: Fix payload length validation for Commit and Confirm ef566a4 AP WMM: Fix integer underflow in WMM Action frame parser 8640cf7 WPS: Add more debug prints to httpread 1bd0d57 WPS: Replace the httpread_debug design with standard debug prints 7da4f4b WPS: Check maximum HTTP body length earlier in the process af185d0 WPS: Extra validation step for HTTP reader 5acd23f WPS: Fix HTTP chunked transfer encoding parser a5da657 dbus: Stop ongoing scheduled scan when scan is requested 0c28071 Fix sending ANQP request to an unknown BSS while associated 74197e0 wpa_cli: Fix memory leak when tracking networks 4504621 TDLS: Add TDLS_LINK_STATUS command to the control interface 01e87ef IBSS: Check ibss_rsn init before starting new IBSS authentication 74d912f libtommath: Fix check mp_init_multi() result fd66aa6 Check Public Action length explicitly before reading Action Code ff4a6d4 EAP-SIM/AKA: Explicitly check for header to include Reserved field f5ed400 EAP-SAKE: Make attribute parser more readable 0dfb7be EAP-SAKE: Pass EAP identifier instead of full request 354e3f7 TLS: Fix debug dump of X.509 certificate 87fcb5a EAP-PAX: Fix PAX_STD-1 and PAX_STD-3 payload length validation c3c5615 EAP-GPSK: Pass EAP identifier instead of full request d36c803 EAP-TLS/PEAP/TTLS/FAST: Move more towards using struct wpabuf 8d9f3b8 EAP-FAST: Do not use type cast to remove const specification 07f9034 EAP-FAST: Pass EAP identifier instead of full request f153e41 EAP-EKE: Do not pass full request to eap_eke_build_fail() 53f376c Fix a typo in function documentation 5aeebc4 D-Bus Fix network_is_persistent_group() for P2P operations 5441da2 Fix wpas_notify_network_removed() e8181e2 dbus: Add a debug print on fill_dict_with_properties() getter failures 8a78e22 D-Bus: Fix operations when P2P management interface is used dea0d8e RADIUS: Fix a copy-paste error in variable name Change-Id: Ib70bf513c1f6c17974ef135806e44e120a5d5709 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
1d755d025b206e22b06aeb322e25a79f98ca7777 |
|
28-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 01a025937c67f0eca6021d94b8ec3b144f8b1730 01a0259 WPS: Add support for 60 GHz band 0ef1e29 WPS: Fix shorter authentication timeout during no-SelReg iteration 3465176 nl80211: Verify that cipher suite conversion succeeds a250722 Try to set PMK only with key mgmt offload support in the driver 4a7ce98 Make IPv6 NA multicast-to-unicast conversion configurable 9f390f4 Interworking: Fix network selection warning without SIM/USIM support a0ad9e8 Remove WPA per-VLAN groups when no more stations remain 87b5b53 Make VLAN ID available in STA info over control interface 5678a2d P2P: Allow wpa_supplicant to start if social channels are not supported 209214b vlan: Move CONFIG_FULL_DYNAMIC_VLAN includes to proper places a6da824 Do not use C++ reserved words as variable names eaa3728 wpa_gui: Themed icon loader 9a3cb41 Fix wpa_priv (CONFIG_PRIVSEP=y) build 8b423ed Declare all read only data structures as const fd4fb28 OpenSSL: Try to ensure we don't throw away the PIN unnecessarily fabc6dd mesh: Retransmit the last Commit Message in the Committed state 068669f vlan: Verify RADIUS returned VLAN-ID and dynamic_vlan=required 5add410 WPS: Use shorter authentication timeout during no-SelReg iteration e7d2034 WPS: Enforce five second minimum time before AP iteration bd143cc Remove trailing whitespace from Makefile 74802c0 P2P: Do not create a P2P Device interface if P2P is disabled 579674e Document p2p_disabled option in wpa_supplicant.conf 8ea8a89 nl80211: Extend unique MAC address assignment for station iftype Change-Id: I8bc8a63f37c0892b83376b9d5a5859827ae50554 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
af9da3180dc20f57df1fc1e1811f3df9fa9e6ab5 |
|
03-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 681278246232029c334117bd6dc7e74c6b179f96 6812782 hlr_auc_gw: Allow Milenage RES length to be reduced 4839f7c wpa_cli: Fix a typo in usage text a20a361 wpa_supplicant: Clear blacklist on connect 0144ecb Android: wpa_ctrl missing include for sys/stat.h 0bb20ef HS 2.0R2: Allow user to specify spp.xsd file location 97c9991 HS 2.0R2: Add more debugging messages to hs20-osu-client 93c2e60 HS 2.0R2 CA: Improve setup.sh and .conf for more flexibility 02e122a Reschedule scan from wpas_stop_pno if it was postponed 80fd9c3 EAP-PEAP server: Add support for negotiating vendor for Phase 2 a867082 EAP peer: Use 32-bit EAP method type for Phase 2 processing 56dfc49 Fix a typo in configuration parameter documentation c4b45c6 TLS: Fix memory leaks on tls_connection_set_params() error paths af85191 Make tls_connection_get_keyblock_size() internal to tls_*.c 94f1fe6 Remove master key extraction from tls_connection_get_keys() fa0e715 Use tls_connection_prf() for all EAP TLS-based key derivation df8191d Rename HT 20/40 coex variable to be more descriptive 1d0f42a EAP server: Add debug prints to help asleap testing 2c1cf90 Add wpa_snprintf_hex_sep() 5955cfa ms_funcs: Make challenge_hash() non-static Change-Id: I0f3e5e5170a61e458949a675641946d95598dc5d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
f21452aea786ac056eb01f1cbba4f553bd502747 |
|
26-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5e32f8256f5fcce8b70a95e070375ac549ac935a 5e32f82 tests: Verify HS 2.0R2 deauthentication request b61e70c HS 2.0R2: Add WFA server-only EAP-TLS server method 8d2a992 HS 2.0R2: RADIUS server support to request Subscr Remediation ae6d15c HS 2.0R2 AP: Add OSU Providers list ANQP element f7bd7a0 HS 2.0R2 AP: Add Icon Request and Icon binary File ANQP elements 97596f8 HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP 8e1146d HS 2.0R2 AP: Add support for deauthentication request a14896e HS 2.0R2 AP: Add OSEN implementation 6ca0853 HS 2.0R2 AP: Use Subscr Remediation request from RADIUS server 7bc9c25 HS 2.0R2 AP: Add STA's Hotspot 2.0 Release Number into Access-Request 76579ec HS 2.0R2 AP: Add AP Hotspot 2.0 Release Number as WFA RADIUS VSA 0dd100f HS 2.0R2 AP: Add definition and helper function for WFA RADIUS VSA 3fb17a9 HS 2.0R2 AP: Add WNM-Notification Request for Subscription Remediation d5d2478 HS 2.0R2 AP: Update HS 2.0 Indication element to Release 2 a6739e1 HS 2.0R2: Try to scan multiple times for OSU providers cf6d08a Interworking: Add OCSP parameter to the cred block 6402f2f Interworking: Add more debug info on roaming partner preferences 7479489 Interworking: Add sp_priority cred parameter 751ac99 Interworking: Use a helper function to compare cred priority aff419f Interworking: Remove separate credential priority tracking 533536d HS 2.0R2: Disable full ESS for as a workaround for per-BSS issues 8a77f1b HS 2.0R2: Slow down connection attempts on EAP failures 76a55a8 HS 2.0R2: Add more debug to network selection 8b4b9fb HS 2.0R2: Fix bandwidth policy BSS selection 28f2a7c HS 2.0R2: Allow excluded network to be selected based on user override 33fb8c5 HS 2.0R2: Add support for Policy/RequiredProtoPortTuple a45b2dc HS 2.0R2: Add support for Policy/MaximumBSSLoadValue 4cad9df HS 2.0R2: Add support for Policy/MinBackhaulThreshold aa26ba6 HS 2.0R2: Add tracking of provisioning SP 8e5fdfa HS 2.0R2: Add WFA server-only EAP-TLS peer method df0f01d HS 2.0R2: Add OSEN client implementation a5d7563 HS 2.0R2: Add common OSEN definitions 230e373 HS 2.0R2: Add GAS operation duration statistics into debug b572df8 HS 2.0R2: Add routine for fetching OSU provider information 1d2215f HS 2.0R2: Add OSU Providers list ANQP element 184e110 HS 2.0R2: Add Icon Request and Icon binary File ANQP elements 7ef6947 HS 2.0R2: Add STA support for Deauthentication Request notification 95a3ea9 HS 2.0R2: Add WNM-Notification Request for Subscription Remediation f9cd147 HS 2.0R2: Update Indication element to Release 2 bc00053 Interworking: Allow roaming partner configuration ae6f927 nl80211: Add driver capability for GTK_NOT_USED 2c49d04 Do not clear global pmf setting on FLUSH eef7235 Only try fast reconnect if network is not disabled 3d910ef Interworking: Prefer last added network during network selection 2a33687 P2P: Remove unnecessary ifdef CONFIG_NO_CONFIG_WRITE 050d8b5 Fix documentation for wpa_supplicant_global_ctrl_iface_process() 8c9cb81 DFS: Fix coding style (missing whitespace) 4f1e01b DFS: Add VHT160 available channels b8058a6 hostapd: DFS allow mixed channels 4db216f wpa_supplicant: Add support for IPv6 with UDP ctrl_iface e2364d1 hostapd: Deauthenticate clients forbidden by maclist changes 1748f1d hostapd: Make it possible to remove addresses from maclists 064eb05 Add os_remove_in_array() c1151e4 Force OFDM/HT/VHT to be disabled on channel 14 bfb79dd nl80211: Show regulatory rule flags in debug output 3d7ad2f hostapd: Configure spectrum management capability e0392f8 hostapd: Add Power Constraint element 891330f Fix spelling s/algorith/algorithm/ f0e30c8 Do not start another connect work while one is pending 3290398 WPS: Fix UNSUBSCRIBE error returns if NT or CALLBACK header is used f34df28 WPS: Fix UNSUBSCRIBE to return 412 if no SID match found 80f256a WPS: Remove unnecessary filename NULL check Change-Id: I7dc25a8bb0074f4970ade8d42dfa60da166baf96 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
13ca8d8ea51a1aa5e24c6c956473a11b0c7daed4 |
|
20-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 848905b12abf2df650c43cb821d36a13246baacb 848905b Avoid undefined references with CONFIG_WPA_TRACE_BFD=y 9e38836 wpa_debug: Remove 2048 byte message length limit f667e03 P2P: Address few issues seen with P2P SD e9a6f18 TLS: Add tls_disable_tlsv1_1 and tls_disable_tlsv1_2 phase1 params cb10c7d RADIUS DAS: Add support for NAS identification attributes 0d7c5e1 RADIUS DAS: Remove PMKSA entry on Disconnect-Request d87a6ac WPS: Fix STA state validation when processing PutWLANResponse Change-Id: I4799cad2fe661db567eb3a92af2b3eefb7c96dab Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
|
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
|
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_tls_common.c
|