849734c8d1847920ed7042463f7480b1e0c1dfea |
|
27-May-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8960afa4bfa423774a8ca58cc21a4a7c1ab6089e 8960afa wpa_cli: Run action file in case of an AP event 1cece2f OpenSSL: Comment out tls_connection_get_eap_fast_key without EAP-FAST 7358170 TLS: Split tls_connection_prf() into two functions f150db6 OpenSSL: Remove two more accesses of ssl_ctx->cert_store 6dc3206 scan: Fix a memory leak on an error path 9ce3e61 nl80211: Add TEST_FAIL() to nl80211_set_mac_addr() 8880240 scan: Clean up code a bit - phase1 is used in all WPS cases e1ae287 scan: Clean up code a bit - ssid cannot be NULL here a170394 Update ChangeLog files for v2.6 a26c9c2 Fix sending non-Public Action frames over P2P Device interface 4d916ed nl80211: Register for only for specific Action frames in AP mode 31d7fb1 P2PS: Allow P2P_CONNECT command for P2PS connection with/without PIN 467fc14 P2PS: Correct config_methods for different P2P cases 9d136b0 EAP-SAKE: Do not debug print result if eap_sake_compute_mic() fails 0884633 EAP-PAX: Do not debug print result if eap_pax_mac() fails 92abe37 EAP-FAST: Check sha1_t_prf() result in eap_fast_get_cmk() 636a238 WPS: Check sha256_vector() result in wps_build_oob_dev_pw() 2c3d95c Check md5_vector() result in decrypt_ms_key() 38eee0f Check hmac_md5() result in radius_msg_verify_msg_auth() 05dad94 Check md5_vector() result in radius_msg_verify() aae125e WPS: Fix debug prints in wps_derive_psk() error case 7d1007a Fix external radio work debug printing on removal b6317b4 wpa_supplicant: Add wps_disabled parameter to network block 23d71a0 Set wpa_psk_set in wpa_supplicant AP mode is PSK is available 6641954 Fix AP mode key_mgmt configuration in wpa_supplicant default case ad6cee3 P2P: Do not enable P2P group processing for non-P2P AP mode a185e9b tests/remote: Add hwsim wrapper ff9bb8a tests/remote: Add test_example.py a73fa13 tests/remote: Add utils file ede4719 tests/remote: Add monitor.py 3b11ad3 Send CTRL-EVENT-REGDOM-CHANGE event on the parent interface 4de70e2 Add MGMT_RX_PROCESS test command for wpa_supplicant f42c3ce mesh: Calculate MTK before sending it to MAC in case Open is dropped baa1213 mesh: Add missing action to cancel timer e8a1b6b D-Bus: Check driver capability for IBSS in Modes property of Capabilities 7a1887f wpa_cli: Add backspace key process for some terminal 3dd0e9e wpa_supplicant: Fix CONFIG_AP build without CTRL_IFACE d58b60d drivers: Add NEED_RADIOTAP 6a9681e OpenSSL: Make dh5_init() match the generic implementation 46bac65 WPS: Fix segmentation fault in new DH key derivation e447133 OpenSSL: BoringSSL has SSL_get_client_random(), etc. 03626e9 Skip connection attempt for non-RSN networks if PMF is set to required 2295004 Ignore pmf=1/2 parameter for non-RSN networks 2a3f565 Reject SET commands with newline characters in the string values b166cd8 Reject SET_CRED commands with newline characters in the string values 0fe5a23 Remove newlines from wpa_supplicant config network output 73e4abb Reject psk parameter set with invalid passphrase character ecbb0b3 WPS: Reject a Credential with invalid passphrase f4830be nl80211: Try running without mgmt frame subscription (driver AP SME) df5bde8 Android: Remove EAP-FAST option 60d9f67 WPS: Explicitly clear wpabuf memory with key information 9b377be P2P: Copy config from p2pdev when not using dedicated group interface 3c88d26 P2P: Fix wpas_p2p_nfc_auth_join() 2f19563 WNM: Fetch scan results before checking transition candidates 4ac3398 Use a shared helper function for parsing hostapd.conf IEs a911227 Add assocresp_elements parameter for hostapd 49fe2ad OpenSSL: Support OpenSSL 1.1.0 DH opacity b92d2a5 FT: Fix RRB for FT over-the-air case 9e5a5de systemd: Update service files according to D-Bus interface version ac7aea8 Assign QCA vendor command/attributes for set/get wifi configuration 57b3888 P2P: Add P2P_GROUP_MEMBER command to fetch client interface address 0ee8925 P2P: Trigger event when invitation is accepted bd86ea0 nl80211: Get rid of unused assignment warning 18ae3a6 bsd: Set level correctly for non FreeBSD systems cf667c6 RRM: Modify the processing of a received neighbor report 00ed0aa SME: Add support for global RRM flag b5d172e nl80211: Add support for global RRM flag a7f0bb7 driver: Add global RRM support flag 864b952 nl80211: Register to receive Radio Measurement Request frames 4a74201 wpa_supplicant: Handle LCI request 220754c hostapd: Add FTM range request f4f185a hostapd: Add LCI request 629e180 hostapd: Save RM enabled capability of station 2572df3 hostapd: Handle Neighbor Report Request frame 061269b hostapd: Add own neighbor report data to neighbor database 9b4b226 hostapd: Add a database of neighboring APs 0101821 hostapd: Extend the configuration of RRM capabilities 6a4f0ed Fix spelling of "neighbor" in a function name d41a535 wpa_supplicant: Add LCI and civic request to Neighbor Report Request 624b8a0 utils: Add ssid_parse() function e4fbc8d Add measurement and neighbor report definitions 9d955f7 utils: Rename hostapd_parse_bin to wpabuf_parse_bin and move it 74e982d hostapd: Set LCI and Location Civic information in configuration 1854eec Add POLL_STA command to check connectivity in AP mode 3dbfb28 Allow AP to disconnect STA without sending Deauth/Disassoc frame de92314 Add inactive_msec into STA output 61c1011 Extend VENDOR_ELEM parameters to cover non-P2P Probe Request frame 6922d44 nl80211: Implement configure_data_frame_filters() callback ece4ac5 HS 2.0: Add support for configuring frame filters e42adb9 driver: Add a packet filtering function declaration ae33239 AP: Pass station P2P PS capabilities info during station add/set 7405bb0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 90f1496 wpa_supplicant: "don't care" value for pbss in ssid structure e52a698 RADIUS: Fix a possible memory leak on an error path f1863f2 RADIUS: Fix possible memory leak when parsing per-STA passphrase 3433721 P2P: Continue p2p_find after sending non-success Invitation Response 0f34665 Mark wpa_supplicant_{start,stop}_sched_scan() static Also reverting: c7f648c wpa_supplicant_8: Add a temporary hack to work around BoringSSL incompatibility 1e1c48d2 Update AP IE regardless WPA_DRIVER_FLAGS_BSS_SELECTION flag Change-Id: Idb9bfa80e9d9a4d10323dab5ce2bb24f4baf550c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
de47be75037bccd4a11b62eedb3d4aed1b36fa67 |
|
07-Jan-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 21cb63fffd1e766c8b989125394ed0bfb05e5a4b 21cb63f OpenSSL: Fix client certificate chain building after PKCS#12 use 12a81b6 ACS: Remove unreachable case from a debug print 896607d Remove a pointer check that can never be true a95cc47 ACS: Be more consistent with iface->current_mode checks 6014e59 P2P: Print find_start in debug log when ignoring old scan results 64845c1 l2_packet: Extend bridge workaround RX processing to cover two frames 4a539ab l2_packet: Improve bridge workaround RX processing 7a36f11 EAP-PAX: Check hmac_sha1_vector() return value 1d20c66 P2P: Clear groups first on FLUSH command 27446e4 mesh: Do not force another peering exchange on driver event cc64fe7 mesh: Do not clear link state on driver event if exchange was started b5f5c32 mesh: Add some more details to MPM debug messages 7d41907 nl80211: Add a missing space to a debug message 6174de6 mesh: Connection and group started/removed events into debug log 2da4a56 Add more hostapd.conf documentation for hw_mode with HT/VHT acc3943 EAP-PEAP peer: Cryptobinding in fast-reconnect case with inner EAP cba9ebf P2P: Try SD Query with each non-ACK peer only once per search iteration e9ccfc3 Clear wpa_supplicant state to DISCONNECTED on FLUSH command aeb408f HS 2.0: Add some documentation for OSEN and network block use 4f6cd3f Fix wpa_supplicant AP mode P2P IE handling if P2P is disabled 92acb40 Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 15c5606 Update copyright notices for the new year 2016 6e379c6 WPS: Testing mechanism to force auth/encr type flags ea31912 WPS: Add a workaround for WPA2PSK missing from Enrollee auth flags db671e0 WPS: Do not build Credential with unsupported encr combination on AP d7c3347 HS 2.0: Postpone WNM-Notification sending by 100 ms 750f5d9 EAP-FAST: Enable AES256-based TLS cipher suites with OpenSSL 1ebb24b OpenSSL: Share a single openssl_tls_prf() implementation dea2051 OpenSSL: Clean up function to fetch client/server random 9a42d85 OpenSSL: Drop support for OpenSSL 1.0.0 de213e8 OpenSSL: Drop support for OpenSSL 0.9.8 e79eb0c P2P: Fix P2P_FIND while waiting for listen ROC to start in the driver 944f693 P2P: Stop offchannel TX wait on P2P_STOP_FIND/P2P_LISTEN 8edd9f1 P2P: Add an option to specify group SSID in P2P_CONNECT join case 70e0cb3 P2P: Provide group SSID, if specified, to P2P Client join step 438be60 P2P: Do not accept any GO BSS entry if SSID is specified for join 35510d5 P2P: Use join SSID in the skip-PD cases 8b8d4f4 P2P: Do not accept any BSS entry for join if SSID is already known b875276 P2P: Use group SSID, if known, for join operation even if no BSS entry aa256cb P2PS: Add group SSID, if known, to the P2PS-PROV-DONE event 071e3bf FST: Fix handling of Rx FST Setup Request when session already exists Change-Id: Ia48764e8663232291160fb24153fa367b9ed3015 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
9d9e60286e05ae45025b672636490bd12586138d |
|
23-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit ca68a8b561c48393c8ba25055ce294caaa3ac008 ca68a8b WPS: Explicitly reject Public Key attribute with unexpected length 6b94f71 WPS: Truncate variable length string attributes to maximum length f4b64c6 Simplify VHT Operation element parsing d6fefd6 Simplify HT Operation element parsing 40baac0 Simplify VHT Capabilities element parsing baae4cb Simplify HT Capabilities element parsing b39a059 Simplify Timeout Interval element parsing e8997b9 Simplify ERP element parsing f87c99c Simplify DSSS Parameter Set element parsing ae7a42b FT: Check FT, MD, and Timeout Interval length in the parser c9bf7b6 Fix a memory leak on mesh_attr_text() error path 2531036 FT: Fix WMM TSPEC validation in driver-based AP MLME case 632931c P2P: Use WPS_SEC_DEV_TYPE_MAX_LEN in P2P array definition 0f5acfb Use common is_ctrl_char() helper function 5a041ac WPS: Ignore too long SSID attribute d6c3067 Replace SSID_LEN with SSID_MAX_LEN eaa8eef Replace MAX_SSID_LEN with SSID_MAX_LEN 81847c2 Replace HOSTAPD_MAX_SSID_LEN with SSID_MAX_LEN 6fb761c Replace WPA_MAX_SSID_LEN with SSID_MAX_LEN d9d1b95 Use SSID_MAX_LEN define instead of value 32 when comparing SSID length 65b1025 WPS: Ignore too long Device Name attribute cc6f243 Add WPS_DEV_NAME_MAX_LEN define and use it when comparing length dd3d857 P2PS: Check for maximum SSID length in Persistent Group Info 05e46a9 Ignore too long SSID element value in parser 90758f0 Mark QCA vendor command id 53 reserved, but not used anymore f41ded6 Remove unused leftover from multi-SSID design cb71a83 OpenSSL: Clean up TLS PRF implementation 7f90a23 Add QCA vendor subcmd for OCB 897418a eap_example: Fix configuration by added DH parameters Change-Id: If688231edfce41163ef0c1f0ad75291a9bdfbe81 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/wps/wps.c
|
c28170251eb54dbf64a9074a07fee377587425b2 |
|
02-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e376290c667e970d751acc916e0efe2ed16292ed e376290 HS 2.0R2: Add update_identifier field to network 5bc2857 Fix some sparse warnings about u16 vs. le16 42619d6 Fix CTRL-EVENT-REGDOM-CHANGE event init= value a520bf4 Mark function static 0cb79d3 dbus: Fix indentation level to match code logic 8f03ac9 Mark functions static 6891f0e Allow SCAN command to specify scan_ssid=1 SSIDs 18389ab WPS: Clear keys/PINs explicitly b7175b4 Clear hostapd configuration keys explicitly d1ecca6 HS 2.0 R2: Clear hs20-osu-client configuration keys explicitly 0a13e06 EAP server: Clear keying material on deinit f534ee0 EAP peer: Clear keying material on deinit 19c48da Clear wpa_supplicant configuration keys explicitly 28bfa29 EAP-AKA: Remove unnecessary dead increment 62493df EAP-GPSK: Avoid dead increment by checking pos pointer 164a453 FT: Debug print extra response data 70bfc77 PCSC: Debug print extra response data 5dbbf36 Interworking: Remove unnecessary dead increment a1e46f3 Check for no key_mgmt/proto/auth_alg entries in config writer 290ea6a Remove unnecessary tracking of first entry d3fa2bb WFD: Explicit limit for subelement length (CID 68127) 745ef18 HS 2.0: Verify assoc_req_ie buffer size for indication elements 0233dca SAE: Use os_memcmp_const() for hash/password comparisons 34ef46c WEP shared key: Use os_memcmp_const() for hash/password comparisons 3e4b77c EAP-GTC: Use os_memcmp_const() for hash/password comparisons a6eae3f EAP-MSCHAPv2: Use os_memcmp_const() for hash/password comparisons 30411b3 EAP-TTLS: Use os_memcmp_const() for hash/password comparisons a564d9c EAP-MD5: Use os_memcmp_const() for hash/password comparisons 4685482 EAP-PSK: Use os_memcmp_const() for hash/password comparisons cba0f86 EAP-PEAP: Use os_memcmp_const() for hash/password comparisons 7b1e745 EAP-LEAP: Use os_memcmp_const() for hash/password comparisons 8f92826 EAP-GPSK: Use os_memcmp_const() for hash/password comparisons e1550d4 EAP-PAX: Use os_memcmp_const() for hash/password comparisons c434503 EAP-FAST: Use os_memcmp_const() for hash/password comparisons dddf7bb EAP-EKE: Use os_memcmp_const() for hash/password comparisons dfb5608 EAP-SAKE: Use os_memcmp_const() for hash/password comparisons 05c79d6 EAP-SIM/AKA: Use os_memcmp_const() for hash/password comparisons 675ddad EAP-IKEv2: Use os_memcmp_const() for hash/password comparisons 2049a3c TLS: Use os_memcmp_const() for hash/password comparisons a79aea5 Milenage: Use os_memcmp_const() for hash/password comparisons 05f916e AES-GCM: Use os_memcmp_const() for hash/password comparisons 87a5c93 AES-CCM: Use os_memcmp_const() for hash/password comparisons 7c24f53 EAPOL supplicant: Use os_memcmp_const() for hash/password comparisons 870834a RSN authenticator: Use os_memcmp_const() for hash/password comparisons 0d15b69 RSN supplicant: Use os_memcmp_const() for hash/password comparisons 72619ce MACsec: Use os_memcmp_const() for hash/password comparisons c237195 RADIUS: Use os_memcmp_const() for hash/password comparisons ce9c9bc WPS: Use os_memcmp_const() for hash/password comparisons afc3c8b Add constant time memory comparison function os_memcmp_const ee352f1 EAP-pwd: Add explicit total length limit b2b8a4c EAP-SIM/AKA: Pass EAP type as argument to eap_sim_msg_finish() f107d00 PeerKey: Clean up EAPOL-Key Key Data processing 010fc5f dbus: Clean up array-array-type property getter Change-Id: I1dbe483be2678a7468e6955d70ea261f8e53b26d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
15907098d1f67c24bb000e593e279af173cf57d7 |
|
25-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit cf28c66bcb8883e6be921d6406a534e4a5b45b96 cf28c66 HS 2.0: Extend ANQP_GET to accept Hotspot 2.0 subtypes 163f801 nl80211: Indicate HS 2.0 OSEN AKM in connect/associate command c201f93 WPS: Enable WSC 2.0 support unconditionally 91364b7 P2P: Set a timeout for a persistent reinvoke on a P2P Client 41d5ce9 P2P: Optimize scan for GO during persistent group invocation 4d1e38b ACS: Fix number of error path issues Change-Id: I31a51d3dba055d1a906516bb08894effec327da9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
cf32e60fa7e0d33fe1551a6dba8dcbbec47ea50e |
|
28-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2e988392436227c51002b573ee27a8cee37f70e9 2e98839 P2P: Disable DNS server from dnsmasq c07f261 P2P NFC: Add script for connection handover with nfcpy 12288d8 WPS NFC: Protect nfcpy pretty print calls against exceptions c209dd1 WPS NFC: nfcpy script to use new connection handover design 6202500 WPS NFC: Logging level configuration to wps-nfc.py and wps-ap-nfc.py 1f1b5b3 WPS NFC: Clean up nfcpy script no-wait operations 79ede5a WPS NFC: Validate ctrl_iface response before decoding it ab1db08 WPS NFC: Use argparse in the nfcpy scripts 6f8fa6e WPS NFC: Update wps-nfc.py and wps-ap-nfc.py to use new nfcpy API b56f6c8 P2P NFC: Add support for freq option in NFC ctrl_iface commands 91a6501 WPS NFC: Use BSSID and AP Channel from handover select 91226e0 WPS: Add testing option to corrupt public key hash 7312776 WPS NFC: add more debug prints for connection handover report 5cd4f66 WPS NFC: Use AP Channel information from credential container d2f1837 WPS NFC: Add BSSID and AP channel info to Configuration Token 75dbf98 WPS-STRICT: Update valid Device Password ID and Config Error range 5cd4740 P2P NFC: WPA state machine config with driver-based BSS selection 8e9f53c P2P NFC: Static handover with NFC Tag on client dd87677 P2P NFC: Enable own NFC Tag on GO Registrar abe44e3 P2P NFC: Add GO info into handover message when in client role 23318be P2P NFC: Optimize join-a-group operation based on NFC information 86e3208 P2P NFC: Copy DH parameters to a separate group interface d4b4d7f WPS NFC: Update DH keys for ER operations ac08752 WPS NFC: Use pubkey mismatch config error from Enrollee 59b45d1 P2P NFC: Add processing of P2P client while NFC handover case 74df9ec P2P NFC: Do not try to join peer if both devices are already GO 201b0f5 P2P: Add test option to disable IP address assignment request 25ef852 P2P: Add support for IP address assignment in 4-way handshake fdd48ff P2P NFC: Optimize GO Negotiation retries c4f87a7 P2P NFC: Add NFC tag enabling for static handover dd37a93 P2P NFC: Report handover select from tag for static handover db6ae69 P2P NFC: Report connection handover as trigger for P2P 9358878 P2P NFC: Build connection handover messages c00ab85 P2P NFC: Define WPS_NFC config method 0deab08 P2P NFC: Allow separate WPS/P2P IES to be parsed fca9958 P2P NFC: Pass OOB Dev Password through P2P parser ab9e344 P2P NFC: Pass OOB Device Password ID to P2P 5154689 P2P NFC: Add WPS attribute building for P2P NFC 01afd8d P2P NFC: Add NDEF helpers for P2P connection handover messages 9e323a2 P2P NFC: Add OOB GO Negotiation Channel attribute 14d8645 WPS NFC: Allow BSSID and channel to be included in handover select 50d1f89 NFC: Update WPS ER to use the new connection handover design d950793 WPS NFC: Add support for wpa_supplicant AP/GO mode to use handover fa4c298 WPS NFC: Process new style handover select 068cdb1 WPS NFC: New style connection handover select from AP/Registrar 3189ca0 WPS NFC: Add AP mode connection handover report 41f9ffb WPS NFC: Build new style carrier record for connection handover request 3f1639d WPS NFC: Split DH key generation to a separate function 9754917 WPS NFC: Update NFC connection handover design 34b6795 WPS NFC: Use abbreviated handshake if both PK hashes delivered OOB 57630e6 WPS: Preparations for allowing SSID filtering for provisioning step 5f45455 WPS NFC: Validate peer public key hash on Enrollee ff40cd6 WPS NFC: Send M2D with config error 20 on pkhash mismatch e435417 WPS: Remove Version attribute from NFC messages 72403ec WPS: Add builder functions for AP Channel and RF Bands attributes ea43ad9 P2P: Make group operating channel available 9f7cd9a P2P: Split add-group-info into a helper function 253f2e3 P2P: Apply unsafe frequency rules to available channels 1682c62 Add a header file defining QCA OUI and vendor extensions Change-Id: Ia7604d018e1ffb25e06bdc01ce258fc4a0569245 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
b7b4d0ec07161a6d76c40ba7ef1306e82fbb7e15 |
|
26-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 853b49a030c00fd6b2dde14e183ca2bf108eaa16 853b49a tests: Increase test_ap_wps_init connection timeout 28de68a P2P: Update peer operating channel from GO Negotiation Confirm 6701fdc P2P: Use the first pref_chan entry as operating channel preference 99d7c76 P2P: Add more debug info on operating channel selection 8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event 2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message 4c55901 P2P: Add state info to global STATUS command ae8c27f Add STATUS command to global control interface 42868f1 Add SAVE_CONFIG command to global control interface 1b9b31c Add SET command for global control interface 0185007 hostapd: Add survey dump support 245e026 hostapd: Split up channel checking into helpers ba873bd wired: Wait for the link to become active before sending packets d393de1 P2P: Validate the freq in p2p_group_add 973622c wpa_supplicant: Fix AP mode frequency initialization d99ca89 P2P: Skip non-P2P interface in p2p_group_remove * 239abaf WPS: Set currently used RF band in RF Bands attribute bf83eab nl80211: Start P2P Device when rfkill is unblocked 60b13c2 nl80211: Do not change type to station on P2P interfaces e0591c3 wpa_supplicant: Reduce wait time for control interfaces 5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs 5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket a235aca Fix DETACH command debug prints to avoid use of freed memory 8d6e035 Make global UNIX socket non-blocking for ctrl_iface 86bd141 Change WEP network selection to reject WPA/WPA2 APs 2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged 3351a38 WPS: Add control interface command for fetching latest status e96872a WPS: Track peer MAC address from the last operations ae23935 WPS: Track PBC status 61b6520 WPS: Track result of the latest WPS operation 50396e2 WPS: Add PBC mode activated/disabled events 961750c WPS: Share a common function for error strings 30158a0 nl80211: Update the assoc_freq during connect 83e7bb0 nl80211: Add more debug prints for DEL_STATION commands Bug: 9056601 Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/src/wps/wps.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/wps/wps.c
|