ebd93af924f6e54fb4982b3312ff875a4896b62b |
|
21-Feb-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 128f6a98b3d4d6ed103db759707309f451db9682 128f6a98b mka: Fix the order of operations in secure channel deletion 213eb1885 dbus: Set mode to mesh in bss properties when mesh is supported 21fda4ee7 RSN: Fix pre-authentication EAPOL-Start startPeriod configuration 3f23260da nl80211: Notify reason for connection timeout failure ca1ab9db2 hostapd: Get vendor HE capabilities 7785c70bb QCA vendor command for fetching HE capabilities d512f406f hostapd: Add IEEE 802.11ax HE IEs into Beacon/Probe Response frames 94380cb40 hostapd: Initial IEEE 802.11ax (HE) definitions 5972dc73c mesh: Use correct rate in VHT and HT mixed environment 84ea61cff mesh: Use correct rate in HT and legacy mixed environment 025c6a47f VHT: Remove a redundant check a7a638c2c hw_features: Move VHT capabilities checks to common e01cf2afc Define eapol_sm_get_eap_proxy_imsi() only with CONFIG_EAP_PROXY=y a8e25deeb FT: Merge similar error paths to use common steps c6c41f6ea FT: Support addition of RIC elements into Reassociation Request frame ecbdc1a1f Mark RSN msg 1/2 key data debug dump as key material 834c5d681 FILS: Fix PMK length for initial connection with FILS SHA384 AKM e491389eb FILS: Fix ifdef for PTK derivation with SHA384-based AKM 62944f7d2 Add HMAC-SHA384 with internal crypto aeecd4eae OpenSSL: Fix hmac_sha384_vector() implementation 5db32adc9 browser-wpadebug: Send HTTP response with HTTP/1.1 header 79329ae0a P2P: Verify local driver preferred frequencies for P2P use cases 3a7819f0a P2P: Add P2P_SET override_pref_op_chan to allow overriding preference c06fca04f Add wpa_supplicant SET get_pref_freq_list_override b4d56efb1 Use throughput estimate-based BSS selection with larger SNR difference 142041487 Drop GREAT_SNR definition from 30 to 25 dB 364c064a4 FT: Check key derivation results explicitly in AP operations b5562a1a6 FILS: Remove CRC32 dependency from build 5cf0930f9 testS: Additional BSS TM error case coverage 885bbd4de WNM: Remove unused code from BSS TM Req generation e7ddd86a9 WNM: Use a common error path in ieee802_11_send_wnmsleep_resp() d6d5970e2 WNM: Fix WNM-Sleep Mode Request parsing for WNM-Sleep element 8492cc79c PeerKey: Remove dead code related to STSL negotiation state e37c0aa5d OSU server: Remove invalid options from documentation 0d6056703 WMM: Fix estimated medium time calculation for some corner cases ae26d3021 Fix "IEEE 802.11: Ignored Action frame" debug message 4ead4c7ec WMM: Remove obsolete TODO comments 577e794eb Sync android.config with wpa_supplicant defconfig changes 784710b7f Add bgscan options to wpa_supplicant defconfig 212a8f487 Fix wpa_supplicant defconfig copy-paste description 57c3a605c Add support to sched scan to report relatively better BSSs 20c846d9e nl80211: sched_scan relative RSSI parameters 37e9f511e mka: Send MKPDUs forever if mode is PSK 76aa31838 EAP: Call deinit_for_reauth() for Phase 2 EAP methods 02156b98b EAP-AKA: Don't use anonymous identity in phase2 9e2afe10e EAP-SIM: Don't use anonymous identity in phase2 ed9b1c16d EAP peer: Cache decrypted requests for EAP-SIM/AKA/AKA' 5f11880f6 SME: Remove null ie param from CTRL-EVENT-AUTH-REJECT 4d70b2a4e RRM: Fix a memory leak in beacon request handling 401243b73 RRM: Fix range request overriding fb81c0a3d RRM: Merge similar error returns to a single one 13b30052d RRM: Fix Range Request max age parsing bd6ec7f7c Fix MAC ACL query freeing on deinit b4fd1f0ed Allow PNO scan also in connection completed state 4c6f450ca Add radio_work_is_connect() helper 85b6b6b6e Serialize scan/p2p-scan if already scheduled on the same interface fcb303a57 P2P: Clear driver scan cache after BSS_FLUSH 0d6dc6830 FILS: Clean up HLP resize check 1d9d21f37 GAS: Add support to randomize transmitter address 8331c9b31 nl80211: Add support for mgmt_tx with random TA 14fa723a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h 65ab7eb1f GAS: Fix OSU Providers List response with invalid configuration f3e157057 VHT: Fill VHT capability with hardware capability 4bb9b674c Add a log message when GTK rekeying failed 41f140d38 Add hostapd options wpa_group_update_count and wpa_pairwise_update_count e54691106 mka: Some bug fixes for MACsec in PSK mode 7faf403f9 mka: Fix an incorrect update of participant->to_use_sak 00e0f0b01 hs20-osu-client: Hide a trivial compiler warning 276e93654 hw_features: Clean center freq for falling back HT40 channels f47f93617 P2P: Override P2P_PEER group_capab with 0 if no matching BSS entry found bcf66493c Fix estimated throughput based skip-roam case 84bb12aa6 FILS: Fix send_assoc_resp() HLP extension to cover sta == NULL 275cc9428 FILS: Stop processing if fils_rmsk_to_pmk() fails caab23f19 Set EAPOL-Key Key Length field to 0 for group message 1/2 in RSN b0fb2be77 Do not send GNonce in EAPOL-Key group message 1/2 3bbc47050 Fix EAPOL-Key Install bit in Group Key 1/2 with FT and FILS auth db5e53cb0 mesh: Fix struct hostapd_data initialization 9b170991a mesh: Fix mesh interface removal fix 945604a35 Update wpaspy.py to be python3 compatible 4d6e79f86 Use defines in hostapd_set_freq_params() 0217b8d87 eloop: Fix comments mismatch eloop_event/timeout_handler definitions 09a97eb27 Update the copyright notice years for QCA vendor definitions 841e9a8c7 QCA vendor command to set the trace levels for the specific QCA module d77f33041 FILS: Fix AES-SIV AAD for (Re)Association Request frame decryption 7a6c3de23 ERP: Use macro for EMSKname length instead of hardcoded integer value bb3ea71a2 ERP: Fix rIK derivation 124ddfa19 FILS: Parse and report received FILS HLP Containers from response 91d91abf6 FILS: DHCP relay for HLP requests 54b04d6f3 FILS: Move HLP request handling into a separate file 5a9d50493 ProxyARP: Use more robust DHCP option parsing e64c13feb Move DHCP definitions into a common file 70407ee5c Add QCA vendor definitions for BSS transition status 53d171440 AP: Check ACL upon association request for 802.11ad 4cc61c386 GAS: Set temporary session timeout bigger than gas_comeback_delay Test: Wifi Suite Change-Id: Id597d7cba5d2b3875f2dbbeb9a10fd5e69a6a7c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
092955c7394ee96d6c8c9724ff46a3c038b36143 |
|
06-Feb-2017 |
Paul Stewart <pstew@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check 89fa633af nl80211: Fix error while enabling AP mode with driver-SME The last change 89fa633af cherrypicks a later change that resolves an issue with starting up AP mode. Bug: 34681709 Test: Wifi Suite Change-Id: Iba8c5824009d6480fb736b274d69243c77aef7fe
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
055a67c81da597ef09906f302da1303c9039fe86 |
|
02-Feb-2017 |
Rebecca Silberstein <silberst@google.com> |
Revert "Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d" This reverts commit bbcc4391bed89e8cd0dd235760cd2983f65721cf. Bug: 34869019 Test: Load image and start soft AP Change-Id: I85f39c134c1321d6a78f9f25a34f71ad7b1173fb
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
bbcc4391bed89e8cd0dd235760cd2983f65721cf |
|
30-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check Bug: 34681709 Test: Wifi Suite Change-Id: Ib7ab577a02a9c499ef6e78a222bb93d811f29d36 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
293335998d38c497293b1c41f7ad8342b507d458 |
|
09-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 05e5e615e6a26d7a9f5bd0569a0baeae1bcdee49 05e5e615e AP: Skip authentication/deauthentication phase for DMG/IEEE 802.11ad 0c4b9025c AP: Do not look for supported rates in DMG/IEEE 802.11ad e72faadb4 bgscan_simple: Fix short_scan_count comparison 517b5f928 nl80211: Zero num_modes if nl80211_get_hw_feature_data() fails 39c5da328 nl80211: Use correct attribute for scan flags in vendor scan c167662d7 eap_proxy: On SIM error flush PMKSAs only for SIM/AKA/AKA' networks 6657bb158 Fix OOM handling in neighbor report response handling 7187e2093 Allow LCI request with no subelements d73420143 RRM: Enable beacon report with active/passive scan for all drivers ec45927b8 Report received beacon report with BEACON-RESP-RX event f3383366a Report beacon request TX status as control interface event 90d9d7c32 Beacon request through hostapd control interface 73a27a634 Add hostapd configuration parameter rrm_beacon_report de6ec8b55 Enable Beacon Report using beacon table for all drivers 6774c6a9f Update copyright notices for the new year 2017 f56877414 Do not add own BSS in neighbor report with invalid op_class/channel aeff0645d FILS: Fix FILS Realm Information ANQP-element construction 76196ddb2 wpa_supplicant: Add support for Beacon Report Radio Measurement b3060bf99 common: Add helper function to convert RSSI to RCPI 1ac4dba31 wpa_supplicant: Extend verify_channel() and make it global c9ff8e5f6 common: Add function to get an operating class by its number and country e4f1d879c common: Add non-global to global operating classes conversion 96a5f14ee nl80211: Add support for additional scan parameters for beacon report c16b9f8d3 driver: Add scan support to beacon report 3c716fdbd wpa_supplicant: Refactor wpas_rrm_build_lci_report() e1b96e112 wpa_supplicant: Send rejection for unsupported radio measurements 0c73e410d wpa_supplicant: Limit RRM response size to MMPDU size 9664ab8b7 wpa_supplicant: Refactor Radio Measurement Request handling 332bf5d3f wpa_supplicant: Validate RRM request frame format ec493469f wpa_supplicant: Move RRM implementation to a dedicated file d1c74f8c9 Add RRM definitions for beacon report measurement 6a31440b8 Fix LCI request subelement processing ce691a8d9 Add CONFIG_MESH into wpa_supplicant defconfig 67129ab9e wpa_cli: Add commands to use PMKSA_GET/ADD bbad185c1 P2P: Fix compilation warning in p2p_add_device() 2977f5193 GAS: Remove unnecessarily duplicate gas_frag_limit configuration 1940559ea FT: Drop FT Action frames if ft_over_ds=0 d8de90487 Remove deprecated tx_queue_* params from hostapd.conf notes 78022c836 Fix memory leak on hostapd eap_user_file parsing error paths 02f999c6d hostapd: Remove unnecessary NULL check from parser functions fd5f29e7e Fix memory leak in hostapd BSS_TM_REQ error path handling 95de34a10 Remove trailing whitespace 45997cce4 hostapd: Add TERMINATE as per-interface command 546680f81 hostapd: Do not update dtim_period with invalid value 356773058 RADIUS server: Increase maximum number of sessions a5861afcb hostapd: Do not update invalid wep_key_len_unicast f78402ace hostapd: Do not update rejected wep_key_len_broadcast e0ba7efe5 hostapd: Do not update eapol_version with rejected value 9266d00bf hostapd: Reject invalid macaddr_acl value 8628555f9 hostapd: Check driver parameter before replacing previous value 1dfd25a68 Fix hostapd SIGHUP processing before interface is enabled 34e29dfd4 Remove unnecessary NULL check from hostapd_config_read_wpa_psk() call 65dfa8728 mka: Make MKA actor priority configurable 9bcfd5be8 Document new D-Bus WPS properties 77fcbf7ff D-Bus: Use a helper function to get possibly NULL strings dbf524946 D-Bus: Add DeviceType in WPS property 266097fda D-Bus: Add device serial number in WPS property 3ee6a3ab3 D-Bus: Add model number in WPS property ae66822cd D-Bus: Add WPS model name as property 318d4b5be D-Bus: Add WPS manufacturer as property b20f031c6 D-Bus: Add WPS device name as property 4a45dc192 mesh: Show [MESH] flag in print_bss_info() c04a67deb hostapd_cli: Add completion for get command bf4167b9d hostapd_cli: Add completion for set command 86adff09e hostapd_cli: Completion for further commands with STA parameter 4f59ad069 hostapd_cli: Use common completion for commands that use stations 62b95eb67 hostapd_cli: Add missing command help descriptions 04f02faac Fix wpa_cipher_to_alg() return type 9187b13ad wpa_supplicant: Add BSS CURRENT control interface command d7f12e4eb OpenSSL: Make sure local certificate auto chaining is enabled 4be02b71b OpenSSL: Remove SSL_{CTX_,}_clear_options ifdefs 7655bd738 P2P: Do not use wait_time for SD Response TX without fragmentation 1f0fdaf0e Fix race condition between AssocResp callback and 4addr event a6f3761f7 eap_proxy: Add support for SIM state change indication from eap_proxy 79a54ab9f eap_proxy: Fix eap_proxy_init() prototype to use const eapol_cb 4e118c847 D-Bus: Add 'freq' option to P2P Find method to specify starting channel e414f4f02 PeerKey: Fix STK 4-way handshake regression 28fb9bb19 PeerKey: Fix EAPOL-Key processing dfc773172 Android: Add p2p_add_cli_chan=1 option 7508c2ad9 PAE: Make KaY specific details available via control interface b54f43390 FILS: Make FILS Indication element information available in BSS output 8183aee6c FILS: Add support for building FILS Realm Information ANQP-element 9cad61867 FILS: Add Realm Information ANQP-element in BSS data 26bf70e3d FILS: Separate FILS realm configuration from ERP domain 42b847ac1 FILS: Fix hashed realm name derivation 29062f293 Update various definitions based on IEEE Std 802.11-2016 aaa9c60bc Fix preauth_test build by updating add_pmkid/remove_pmkid callbacks 0babae87a Fix wpa_supplicant build error with IEEE8021X_EAPOL unset 19810d29b Make Beacon IEs available in wpa_supplicant BSS command 274e76f22 mesh: Fix channel configuration in pri/sec switch case cebda0e3e Make debug print clearer for AP/mesh mode secondary channel issues 3459381dd External persistent storage for PMKSA cache entries c57931273 Add PMKSA-CACHE-ADDED/REMOVED events to wpa_supplicant 655dc4a43 Send "TERMINATING" event from hostapd 5149a0f04 P2P: Set p2p_persistent_group=1 at the time of reading disabled=2 065c029a5 Remove MBO dependency from Supported Operating Classes element 62cd9d792 nl80211: Specify the BSSID in the QCA vendor scan 444930e5b Define an attribute to do a specific BSSID QCA vendor scan cea761472 Add QCA vendor command definitions for IDs 61-73 cb0cc6efa Define QCA Beacon miss threshold attributes for 2.4 and 5 GHz bands c313c8a5d Fix QCA vendor command values for SAR power limits a5c723adc Interworking: Clear SCANNING state if no network selected a1836de64 SME: Fix IBSS setup after shared key/FT/FILS association f49c852b5 P2P: Fix a theoretical out of bounds read in wpas_p2p_select_go_freq() 944d48588 P2P: Fix a theoretical out of bounds read in wpas_p2p_setup_freqs() 0a6c9dc70 P2P: Send P2P-DEVICE-FOUND event on peer changing device name 9a431d493 WFD: Clear wfd_subelems when P2P peer stops sending them 6e374bd44 Ignore scan results from ongoing scan when FLUSH command is issued 71ac93453 Make update_idx available in BSS control interface command 49aa88bb5 P2P: Clear PEER_WAITING_RESPONSE on GO Negotiation success c79238b6a Define a QCA vendor command to configure SAR Power limits 0f5eb69f8 Use eloop timeout for post-EAP-Failure wait before disconnection 20b1a9e23 Allow hostapd wep_key# parameters to be cleared 5ec3d510e wpa_passphrase: Reject invalid passphrase Test: Wifi Suite Change-Id: Ida52ca4e43bbc326a89d4c9848529df2d545b692 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
7d17530e229db79208e99741071df97ea4faeec6 |
|
06-Sep-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fcd85d9a3f2d9d63d0fa57e93446ad467db75b23 fcd85d9 Add QCA vendor commands/attributes for indoor location d1723c5 wpa_supplicant: Allow FTM functionality to be published faecb39 hostapd: Allow FTM functionality to be published fc72a48 hostapd: Use stations nsts capability in (Re)Association Response frame 22950d0 QCA vendor subcommand for LL_STATS extension b44d9c7 D-Bus: Add ConfigFile parameter into the interface properties 7dcec24 mka: Clean up key allocation 95e9460 mka: Get rid of struct ieee802_1x_cp_conf 07a6bfe mka: Store cipher suite ID in a u64 instead of u8 pointer 535a8b8 mka: Make csindex unsigned 343eb3b mka: Reorganize live peer creation and key server election 34dbe90 mka: Share a single delete mka implementation 0dabf79 mka: Introduce compare_priorities() 53080f7 mka: Clean up ieee802_1x_kay_mkpdu_sanity_check() 05283e7 mka: Simplify ieee802_1x_mka_dist_sak_body_present() 87b19c8 mka: Replace participant->kay with a local kay variable f9ea083 mka: Fix typos in grammar in variable names and comments 921171f mka: Use named initializers for mka_body_handler[] 86bef17 mka: Remove unused enum mka_created_mode values ec958ae mka: Remove cs_len argument from the set_current_cipher_suite functions 46bbda2 mka: Clean up ieee802_1x_mka_decode_potential_peer_body() cf375eb mka: Simplify ieee802_1x_mka_encode_icv_body() memory copying 8b4a148 mka: Simplify ieee802_1x_mka_sak_use_body_present() b3df783 mka: Reorganize loops in number of KaY functions de7f533 mka: Remove unused body_peer incrementation 2b13bca mka: Add reset_participant_mi() helper 3ceb458 mka: Clean up printf formats 8fab9e1 mka: Use named initializers for static structs d4f668f mka: Add MKA_ALIGN_LENGTH macro 1de7a9f mka: Add helper functions for dumping and creating peer d9639d1 mka: Clean up ieee802_1x_kay_get_cipher_suite() lookup function 7c547cf mka: Refactor the get_*_peer() functions 515bc1a mka: Fix a typo in mka_body_handler (mak to mka) a33e3c3 mka: Add a helper function, sci_equal(), for sci comparison cefeb8e mka: Use less bitfields in the IEEE 802.1X-2010 structs 2e94489 mka: Fix a typo in macsec_capbility f2f8616 Initialize hapd->nr_db in hostapd_alloc_bss_data() 30e0745 Fix TRACK_STA_LIST before BSS enabled 1f3b8b4 Check for driver initialization before doing driver operations 833d0d4 radius: Sanity check for NULL pointer segfault Change-Id: I500fe4f62e1a0010ea82c277f73becd2ac2dfa43 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
d13095b921f259373b91480bc40fb53172ca4860 |
|
22-Aug-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d015bb05df1e1c2b12060bd7ffa51dc980585f4f d015bb0 Move network add/remove operations to a common function 052b8d3 mesh: Report HT operation mode to kernel 2bd6217 mesh: Use WPA_DRIVER_MESH_CONF_FLAG_* as modification flag 4ffb3f8 mesh: Do NL80211_MESHCONF_* setting in single function a1431ef mesh: Move max_peer_links parameter to appropriate struct 72a652d IAPP: Set SO_REUSEADDR on listening socket 9d5d1c5 Add init fragment for hostapd on Android ecba450 mesh: Simplify HT40 check code 05aed43 mesh: Set correct secondary channel offset if HT40 is disabled 81372e3 ap: Use is_multicast_ether_addr() more 647862e nl80211: Remove duplicated check in nl80211_setup_ap() e3429c0 nl80211: Fix control port protocol no-encrypt setting Change-Id: Icaa3ad65fcf69a347e71c5f1953a29a47a8ab178 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
7f2c753f60025528366b5f19b8b490a47bf5080b |
|
15-Aug-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from comit b97a54108732b8b5048f86388bed305df21ea8e5 b97a541 IBSS: Fix a memory leak on RSN error path 5f040be Move disconnect command handling to a common place 478441b OpenSSL: Fix OpenSSL 1.1.0 compatibility functions 6c33ca9 Add group_rekey parameter for IBSS 79931ef hostapd: Fix parsing the das_client option 4fe726e nl80211: Do not switch interface to station mode when using mesh 8468189 Do not include NAS-Port attribute with AID 0 86a318f atheros: Accept Public Action frames sent to Wildcard BSSID e07adb7 Fix EAP state machine reset with offloaded roaming and authorization 6fe3b9d QCA vendor command to get hardware capabilities dc24a36 Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_QPOWER 42d30e9 Add a require_message_authenticator configuration option 715ad33 roboswitch: Add support for BCM63xx a2072a2 utils: os_unix: Use access() for checking file existence cfe0a01 mka: Fix use after free d68b73c mka: Add check for body length when decoding peers ad19e71 mka: Avoid reading past the end of mka_body_handler 65b4773 mka: Return u8 from get_mka_param_body_type() ac285c0 mka: Add error handling around ieee802_1x_kay_move_live_peer() 90bff0e mka: Avoid inconsistent state in ieee802_1x_kay_move_live_peer() 1244745 mka: Fix length when encoding SAK-use 71dc789 mka: Fix memory leak in ieee802_1x_kay_create_live_peer() error path 099613e mka: Fix multiple key server election bugs a197946 binder: Clang format the source code fe1d077 binder: Expose an aidl interface module b84ce65 Link to, and adjust types for, the PCSC framework included with OSX 842c5af ap: Use is_broadcast_ether_addr() ac81b39 cli: Share a common tokenize_cmd() implementation a6d56a3 wpa_cli: Replace str_match() with common str_starts() 980afcc cli: Share a common write_cmd() implementation fcc84b4 cli: Share a common get_cmd_arg_num() implementation e55df99 Share a single str_starts() implementation 23c130e Use a common license string for hostapd_cli and wpa_cli b90c13d hostapd_cli: Completion for interface command 8b73c6a hostapd_cli: Completion for disassociate and deauthenticate 1cef253 hostapd_cli: Implement event handler 977c079 Move parts of wpa_cli to a new common file 6cad0bf hostapd_cli: Add completion for help command 0193883 hostapd_cli: Replace static usage string with print_help() function 1f927cd hostapd_cli: Add command completion support 003fe58 wpa_cli: Implement completion routine for get_capability fed802c Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_IFINDEX 14b7612 Define vendor command to support IE based access control 4ac75cd QCA vendor command to configure GPIO pins babf0ce Assign QCA vendor attributes for generic commands 112fdee P2P: Fix D-Bus persistent parameter in group started event cc9985d Set default scan IEs to the driver (QCA vendor extension) 4f910f3 Fix a typo in QCA vendor attribution documentation ab21863 Define QCA vendor config attribute to set default scan IEs to the driver 5a5638a Show disabled HT/VHT properly in AP mode STATUS command 551817a AP: Disable VHT in WEP configuration 8df4765 doc: Correct spelling mistake Change-Id: I4341e07c85f76ead78d7217ea1c30672fa44432e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
4ae50e65ef0eefe6d5c356acbc1839f8eac68af5 |
|
27-Jun-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 37fd0be2d3ca50c9035e67041328099356a46860 37fd0be Add CTRL-EVENT-CHANNEL-SWITCH event to indicate channel changes 1574fa1 GAS: Fix double-free on an error path d6e93d3 GAS: Remove unused gas_query_cancel() ae2b482 GAS: Check protected/unprotected drop after action code check 9c21b2b GAS: Report GAS-QUERY-DONE event on initial req TX failure e6804fe OpenSSL: Update to match the modified DH_get0_key() API fc1e2c0 D-Bus: Make the CurrentAuthMode property getter more robust 82b9ec3 D-Bus: Add DeviceFoundProperties signal for discovered peers 4976618 mesh: Mark wpa_state COMPLETED when mesh join has been performed b94fff1 wpa_supplicant: Configurable EAP fragment size in AP mode 617593c Assign vendor specific elements for early HE testing 4874b78 PAE: Use big endian version in current_peer_id.mn to be more consistent ce256b4 PAE: Use sci->port more consistently 2f13e54 wired: Silence sparse warning on redefinition of IFNAMSIZ 82ffcba Move extern declarations for ext_password backends into a header file affdd33 Move extern declarations for autoscan modules into a header file 9eece21 Move extern declarations for bgscan modules into a header file 39ab6a5 Move extern declarations for driver ops into a header file 4775471 nl80211: Mark wpa_driver_nl80211_get_macaddr() static ebae413 Fix a debug print in p2p_manager_disconnect() f367c08 Mark internal functions static 582121b OpenSSL: Silence sparse warnings in fips186_2_prf() 451e094 dhcp_snoop: Silence a sparse warning bbae0f0 ndisc_snoop: Include ndisc_snoop.h to check prototypes 99a716a TNCS: Mark functions static 799a7ed PAE: Mark ieee802_1x_kay_deinit_data_key() static 4e7f5a4 PAE: Use be16/be32 instead of u16/u32 for spartse ac36b13 TNCC: Mark functions static fad6485 radiotap: Silence sparse warnings about byte order swapping 94c4d78 FST: Make fst_action_names static 82c734c FST: Fix byte order of couple of fields on big endian hosts 0dbe22b Mark wpas_data_test_rx() static 4d8d710 Fix byte order for CONFIG_VHT_OVERRIDES parameters 3787c91 OpenSSL: Pull in header files to check function prototypes 39cdd3a FST: Mark wpa_supplicant callback functions get_peer_{first,next} static 6013bbe TDLS: Declare tdls_testing as extern in a header file 0e672b8 trace: Define externs in a header file 6527b52 Undefine __bitwise before defining it for sparse 468b7b1 Fix hostapd_sta_add() call to use NULL as the pointer instead of 0 0558bec MBO: Mark verify_channel() static 9e080bf WNM: Use NULL instead of 0 as the pointer return value Change-Id: Ia18f0c09fafb7bf0a3a91cd72dc81c370c2644ac Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
849734c8d1847920ed7042463f7480b1e0c1dfea |
|
27-May-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8960afa4bfa423774a8ca58cc21a4a7c1ab6089e 8960afa wpa_cli: Run action file in case of an AP event 1cece2f OpenSSL: Comment out tls_connection_get_eap_fast_key without EAP-FAST 7358170 TLS: Split tls_connection_prf() into two functions f150db6 OpenSSL: Remove two more accesses of ssl_ctx->cert_store 6dc3206 scan: Fix a memory leak on an error path 9ce3e61 nl80211: Add TEST_FAIL() to nl80211_set_mac_addr() 8880240 scan: Clean up code a bit - phase1 is used in all WPS cases e1ae287 scan: Clean up code a bit - ssid cannot be NULL here a170394 Update ChangeLog files for v2.6 a26c9c2 Fix sending non-Public Action frames over P2P Device interface 4d916ed nl80211: Register for only for specific Action frames in AP mode 31d7fb1 P2PS: Allow P2P_CONNECT command for P2PS connection with/without PIN 467fc14 P2PS: Correct config_methods for different P2P cases 9d136b0 EAP-SAKE: Do not debug print result if eap_sake_compute_mic() fails 0884633 EAP-PAX: Do not debug print result if eap_pax_mac() fails 92abe37 EAP-FAST: Check sha1_t_prf() result in eap_fast_get_cmk() 636a238 WPS: Check sha256_vector() result in wps_build_oob_dev_pw() 2c3d95c Check md5_vector() result in decrypt_ms_key() 38eee0f Check hmac_md5() result in radius_msg_verify_msg_auth() 05dad94 Check md5_vector() result in radius_msg_verify() aae125e WPS: Fix debug prints in wps_derive_psk() error case 7d1007a Fix external radio work debug printing on removal b6317b4 wpa_supplicant: Add wps_disabled parameter to network block 23d71a0 Set wpa_psk_set in wpa_supplicant AP mode is PSK is available 6641954 Fix AP mode key_mgmt configuration in wpa_supplicant default case ad6cee3 P2P: Do not enable P2P group processing for non-P2P AP mode a185e9b tests/remote: Add hwsim wrapper ff9bb8a tests/remote: Add test_example.py a73fa13 tests/remote: Add utils file ede4719 tests/remote: Add monitor.py 3b11ad3 Send CTRL-EVENT-REGDOM-CHANGE event on the parent interface 4de70e2 Add MGMT_RX_PROCESS test command for wpa_supplicant f42c3ce mesh: Calculate MTK before sending it to MAC in case Open is dropped baa1213 mesh: Add missing action to cancel timer e8a1b6b D-Bus: Check driver capability for IBSS in Modes property of Capabilities 7a1887f wpa_cli: Add backspace key process for some terminal 3dd0e9e wpa_supplicant: Fix CONFIG_AP build without CTRL_IFACE d58b60d drivers: Add NEED_RADIOTAP 6a9681e OpenSSL: Make dh5_init() match the generic implementation 46bac65 WPS: Fix segmentation fault in new DH key derivation e447133 OpenSSL: BoringSSL has SSL_get_client_random(), etc. 03626e9 Skip connection attempt for non-RSN networks if PMF is set to required 2295004 Ignore pmf=1/2 parameter for non-RSN networks 2a3f565 Reject SET commands with newline characters in the string values b166cd8 Reject SET_CRED commands with newline characters in the string values 0fe5a23 Remove newlines from wpa_supplicant config network output 73e4abb Reject psk parameter set with invalid passphrase character ecbb0b3 WPS: Reject a Credential with invalid passphrase f4830be nl80211: Try running without mgmt frame subscription (driver AP SME) df5bde8 Android: Remove EAP-FAST option 60d9f67 WPS: Explicitly clear wpabuf memory with key information 9b377be P2P: Copy config from p2pdev when not using dedicated group interface 3c88d26 P2P: Fix wpas_p2p_nfc_auth_join() 2f19563 WNM: Fetch scan results before checking transition candidates 4ac3398 Use a shared helper function for parsing hostapd.conf IEs a911227 Add assocresp_elements parameter for hostapd 49fe2ad OpenSSL: Support OpenSSL 1.1.0 DH opacity b92d2a5 FT: Fix RRB for FT over-the-air case 9e5a5de systemd: Update service files according to D-Bus interface version ac7aea8 Assign QCA vendor command/attributes for set/get wifi configuration 57b3888 P2P: Add P2P_GROUP_MEMBER command to fetch client interface address 0ee8925 P2P: Trigger event when invitation is accepted bd86ea0 nl80211: Get rid of unused assignment warning 18ae3a6 bsd: Set level correctly for non FreeBSD systems cf667c6 RRM: Modify the processing of a received neighbor report 00ed0aa SME: Add support for global RRM flag b5d172e nl80211: Add support for global RRM flag a7f0bb7 driver: Add global RRM support flag 864b952 nl80211: Register to receive Radio Measurement Request frames 4a74201 wpa_supplicant: Handle LCI request 220754c hostapd: Add FTM range request f4f185a hostapd: Add LCI request 629e180 hostapd: Save RM enabled capability of station 2572df3 hostapd: Handle Neighbor Report Request frame 061269b hostapd: Add own neighbor report data to neighbor database 9b4b226 hostapd: Add a database of neighboring APs 0101821 hostapd: Extend the configuration of RRM capabilities 6a4f0ed Fix spelling of "neighbor" in a function name d41a535 wpa_supplicant: Add LCI and civic request to Neighbor Report Request 624b8a0 utils: Add ssid_parse() function e4fbc8d Add measurement and neighbor report definitions 9d955f7 utils: Rename hostapd_parse_bin to wpabuf_parse_bin and move it 74e982d hostapd: Set LCI and Location Civic information in configuration 1854eec Add POLL_STA command to check connectivity in AP mode 3dbfb28 Allow AP to disconnect STA without sending Deauth/Disassoc frame de92314 Add inactive_msec into STA output 61c1011 Extend VENDOR_ELEM parameters to cover non-P2P Probe Request frame 6922d44 nl80211: Implement configure_data_frame_filters() callback ece4ac5 HS 2.0: Add support for configuring frame filters e42adb9 driver: Add a packet filtering function declaration ae33239 AP: Pass station P2P PS capabilities info during station add/set 7405bb0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 90f1496 wpa_supplicant: "don't care" value for pbss in ssid structure e52a698 RADIUS: Fix a possible memory leak on an error path f1863f2 RADIUS: Fix possible memory leak when parsing per-STA passphrase 3433721 P2P: Continue p2p_find after sending non-success Invitation Response 0f34665 Mark wpa_supplicant_{start,stop}_sched_scan() static Also reverting: c7f648c wpa_supplicant_8: Add a temporary hack to work around BoringSSL incompatibility 1e1c48d2 Update AP IE regardless WPA_DRIVER_FLAGS_BSS_SELECTION flag Change-Id: Idb9bfa80e9d9a4d10323dab5ce2bb24f4baf550c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
31a29cc7ed87b62465c7e01f03484f4643d12309 |
|
10-Mar-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f2d6c17aa0f9107a0e8092238b849461447cdd21 f2d6c17 nl80211: Support network hierarchy of a master interface under bridge f85399f Reserve QCA vendor specific nl80211 commands 116..118 3bd5886 hostapd: Handle running out of DFS channels cc1af6f FST: Fix session setup failure with peer without MB IE dfe0745 P2P: Add optional op_class argument to P2P_SET listen_channel e4a1469 P2P: Adjust service discovery maximum fragment size for 60 GHz c7fb678 D-Bus: Add association response status code property for failure cases 2940bf6 hostapd: Use ifname of the current context in debug messages 6448e06 hostapd: Allow use of driver-generated interface addresses f2accfe AP: Save EAPOL received before Association Response ACK 1307301 wpaspy: Add support for TERMINATE command a2c88a8 wpaspy: Add support for UDP connection 3e67171 hostapd: Add global TERMINATE command 618f5d0 hostapd: Add INTERFACES ctrl_iface command 180e5b9 hostapd: Update ctrl_interface for UDP to include the selected port 56e2fc2 wpa_supplicant: Add ctrl parameter to INTERFACES command b9066c6 hostapd: Allow UDP ctrl_iface configuration to set the UDP port 56885ee hostapd: Add UDP support for ctrl_iface acf57fa ctrl_iface_common: Use sockaddr_storage instead of sockaddr_un 89b781b hostapd: Use common functions for ctrl_iface 1a2124c wpa_supplicant: Use common functions for ctrl_iface ca974ae Add common ctrl_iface files d60886c wpa_supplicant: Add monitor support for global UDP ctrl_iface f0e5d3b wpa_supplicant: Share attach/detach/send UDP ctrl_iface functions db7fb43 wpa_supplicant: Allow UDP ctrl_iface configuration to set the UDP port 3598695 P2P: Update peer WFD IE from PD Response and GO Negotiation Response c69ef1d P2P: Respect p2p_ignore_shared_freq on p2p_group_add 4115b05 P2P: Fix shared freq print in wpas_p2p_init_go_params() Change-Id: Id939064b95210ee1a195f7a9f7c069da520d77ca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
b97e428f8acf1ecb93f38f8d0063d2f2fd0bc36e |
|
08-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c06c9099f0d0827feae5622097bd8ac946eca5ea c06c909 Use stronger PRNG for MS-MPPE-Send/Recv-Key salt 9e1f1bd eloop: Clean up coding style for eloop debug prints f9982b3 Implement kqueue(2) support via CONFIG_ELOOP_KQUEUE 2e69bdd eloop: Add eloop_sock_requeue() 70f4f05 wpa_ctrl: Retry select() on EINTR df9e2c2 D-Bus: Don't do <deny send_interface="..." /> in dbus service file 9684c75 mesh: Fix peer link counting when a mesh peer reconnects 83fe38b P2P: Fall back to no VHT when starting AP/P2P GO 360a9d5 P2P: Reduce off channel wait time for some P2P Action frames 1fc63fe RADIUS: Share a single function for generating session IDs 2cbc6ff RADIUS: Redesign Request Authenticator generation b71a64a Send an Acct-Multi-Session-Id attribute in Access-Request packets 4260e1a Add Acct-Session-Id to Accounting-On/Off d72a005 RADIUS: Use more likely unique accounting Acct-{,Multi-}Session-Id d689317 EAPOL auth: Move radius_cui/identity freeing to eapol_auth_free() 0ae86f9 wpa_supplicant: Fix couple of C++ compiler errors with header files 9b6177a Add Event-Timestamp to all Accounting-Request packets d179089 GAS: Calculate response buffer length of ANQP elements dda091c OpenSSL: Fix server side PKCS#12 processing with extra certificates 443c8e1 OpenSSL: Fix possible null pointer dereference on an OCSP error path a3cc64f Remove -w support from wpa_supplicant README e265838 EAP-FAST: Fix an error path in PAC binary format parsing f91e11f D-Bus: Fix p2p interface capability message 479f46c Do not send Acct-Authentic in Accounting-On/Off 696544e RADIUS: Do not include Acct-Terminate-Cause in Accounting-On/Off 236053e Make fallback from HT40 to HT20 work cb22e3b BSD: Zero ifindex on interface removal a8ef133 Android: Support multiple CA certs when connecting to EAP network 80ce804 WNM: Workaround for broken AP operating class behavior af06093 BSD: Disable interface on down dc0ad60 BSD: Use correct ifindex from route messages 5f17b2c BSD: __FUNCTION__ -> __func__ 2088ecb OSU: Add debug printing of more LogotypeExtn fields 0b905c8 Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" 03a72ea VHT: Add an interoperability workaround for 80+80 and 160 MHz channels Change-Id: Ief9174bdec380e81025e1467c47bf1656eb39cd9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
55840adb6cd32ca52064f327b72a40e769f70661 |
|
14-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 06f14421ea8644d12a7b0be6b583114869f9c451 (DO NOT MERGE) 06f1442 TLS: Parse OCSPResponse to extract BasicOCSPResponse d560288 TLS: Parse CertificateStatus message eeba168 TLS: Add status_request ClientHello extension if OCSP is requested 4303d53 TLS: Parse ServerHello extensions 6b7bb42 TLS: Add minimal support for PKCS #12 5ce2941 TLS: Extend PKCS #5 to support PKCS #12 style key decryption f6a62df TLS: Fix and complete ASN.1 tag list 3c108b7 EAP peer: External server certificate chain validation b6e5e14 EAP-FAST peer: Fix PAC parser error messages 5b904b3 EAP-FAST: Check T-PRF result in MSK/EMSK derivation b1d8c5c EAP-FAST peer: Fix error path handling for Session-Id 36478a1 OpenSSL: Support new API for HMAC/EVP_MD_CTX in OpenSSL 1.1.x-pre1 9257610 FT: Fix FTIE generation for EAPOL-Key msg 3/4 e44bd28 FT: Fix sm->assoc_resp_ftie storing on the AP side 59e78c2 FT: Fix FTIE generation for 4-way handshake after FT protocol run b0ecbd3 AP: Use more readable version of management group cipher in error cases 651c6a8 Add TEST_ASSOC_IE for WPA/RSN IE testing on AP side 58059e6 FST: Print debug entry on MB IE update based on EVENT_AUTH af041f9 dbus: Add support for vendor specific elements 5c8acf7 EAP-IKEv2: Check HMAC SHA1/MD5 result 7b991b4 Use proper build config for parsing proxy_arp 4db29e6 TLS: Add support for PKCS #5 v2.0 PBES2 Change-Id: I10b71e4d3573ef60a52ea6ff56afcd3a06a0b7b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
b70d0bbd90f638aa38da542e337c312309200e87 |
|
16-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 07e3653922513f4309528e299b9ee569c0fe1d28 07e3653 dbus: Do not use pointer arithmetic with a void pointer 3b49719 Android: Use libdbus rather than dbus-1 5b75ece Document passive_scan option for wpa_supplicant.conf 68ac584 nl80211: Add debug message for passive scanning 2d0fe6b dbus: Add SaveConfig to update configuration file a3dff7d P2P: Fix a typo in debug message fb7e7da dbus: Fix a copy-paste error in debug print 9557788 EAP-pwd peer: Fix error path for unexpected Confirm message bef802e EAP-pwd server: Fix last fragment length validation 8057821 EAP-pwd peer: Fix last fragment length validation 03ed0a52 WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used 2cb28a4 WNM: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use Change-Id: Iaa3ec4905772219f13837a8c2e367fc0b3d862f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
2e30bb3e3839dacb4d7d75d6a55a1df1944ca07b |
|
28-Sep-2015 |
Lee Campbell <leecam@google.com> |
Fix pointer arithmetic on a void* Fails to compile on x86 gcc due to pointer arithmetic on a void* Change-Id: Icae95d28d82c1a406ec684aa03327c0f523e3985
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
4171258d30a612645aa061cede62233b5c58ca2a |
|
29-Jun-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8c43ef8449bd4d2d0983db394770bd73f572b12d 8c43ef8 P2PS: Fix attribute addition in p2p_buf_add_service_instance() a9ea609 P2PS: Fix p2p_find last parameter handling 6c73149 AP: Increase maximum value accepted for cwmin/cwmax 575e4f5 SAE: Reject FFC commit-element with value p-1 a406244 P2PS: Do not reply to ProbeReq on another channel when starting Listen 0c2b3f6 SAE: Reject commit-scalar value 1 4f39908 Send CTRL-EVENT-NETWORK-NOT-FOUND if no suitable network was found 123df27 D-Bus: Fix typos in debug print ded14ce Android: Fix nl80211 build if BOARD_*_PRIVATE_LIB is unspecified a140721 Android: Rename ANDROID_P2P_STUB to ANDROID_LIB_STUB 2ba4de3 D-Bus: Add documentation for wpas_dbus_signal_peer_groups_changed() e48b5e2 D-Bus: Fix typo in dbus signal function documentation 09d5048 D-Bus: Add function documentation for wpas_dbus_unregister_interface() adfbbd2 D-Bus: Add function documentation for wpas_dbus_register_interface() c5967f0 D-Bus: Fix wpas_dbus_signal_p2p_invitation_result() documentation 4457f41 radius: Fix NULL dereference issue on allocation failure f826fb1 OpenSSL: Handle EC_POINT_is_on_curve() error case bbb5008 SAE: Use random "password" in extra hunting-and-pecking loops eb5fee0 SAE: Add side-channel protection to PWE derivation with ECC 16841ab crypto: Add functions for computing the Legendre symbol and EC y^2 c4a13b4 OpenSSL: Add support for Brainpool Elliptic Curves 4584b66 SAE: Increase security parameter k to 40 based on Dragonfly recommendation fdd731b SAE: Fix PWE generation to use minimum loop count (k) properly 8ec3332 SAE: Merge sae_derive_commit() error case return statements d93abd4 SAE: Merge sae_get_rand() error case return statements 6a58444 SAE: Verify that own/peer commit-scalar and COMMIT-ELEMENT are different 4e7e688 Add crypto_ec_point_cmp() 8e2a3a4 dbus: Do not initialize variable twice c1a14ef Do not check unsigned size is less than zero fdc5608 OpenSSL: Remove SSL_CTX_{get,set}_app_data() compatibility wrapper ba54933 libtommath: Fix mp_init_multi() stdarg use on error path f6332b0 wpa_gui: Initialize WpaGuiApp::w in the constructor f6df3f3 Use os_* wrapper more consistently 91b7a5e Use unsigned/signed printf format more consistently 59bae74 HS 2.0R2: Fix memory leak on error path in hs20-osu-client c5ca73d P2P: Use offsetof() instead of local implementation c3c5b5f ERP server: Make erp_send_finish_reauth() easier for static analyzers 6ce1bea bsd: Remove redundant NULL check in bsd_init() c99df20 Remove redundant NULL check in ieee802_1x_encapsulate_radius() 2eb5967 AP: Add more 2.4 GHz channels for 20/40 MHz HT co-ex scan 5ed6519 hw_features: Merge similar return cases 4e37dd6 SAE: Simplify sae_prepare_commit() error path 04e6c4c Fix SAE group selection in an error case 3dce85c HS 2.0: Add WLAN RADIUS attributes in OSEN case efd5d26 Remove unnecessary wpa_ie_len check from wpa_parse_wpa_ie_wpa() ce8963f Remove WEP40/WEP104 cipher suite support for WPA/WPA2 ee140ef FT: Stop association attempt if Auth response processing fails (SME) 1887be4 Make check_20mhz_bss() static Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> Bug: 22062116 Change-Id: Ie1d175f1faab24bf39ce81ead7a078e1e236badd
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
a3dc30964aa24aea2b518246f6812663a1103490 |
|
23-Jun-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f43c1ae7989c38fe15756f12a9196a1cf798b4d7 f43c1ae P2P: Handle P2P Device dedicated interface parent removal 1ac977b nl8021: Allow sending wowlan configuration on any interface 4899702 nl80211: Remove android_genl_ctrl_resolve() 38dcc86 P2P: Consider ht/vht on P2P_GROUP_ADD command (with no params) 29292d5 ctrl_iface: Make p2p_ctrl_group_add() more robust e4a80d8 P2P: Fix secondary channel selection for HT40 4e71758 dbus: Add RemoveClient method to remove a client from local GO f0a79c9 D-Bus: Fix wpas_dbus_register_peer() documentation 95d62a6 D-Bus: Add missing params in WPS function documentation 790429b D-Bus: Fix function documentation for wpas_dbus_signal_p2p_go_neg_resp() 92fe746 D-Bus: Add function documentation for wpas_dbus_signal_p2p_go_neg_req() e1dffa3 P2P: Fix PBC overlap detection de7b02f P2P: Use the P2P Device interface in wpas_p2p_fallback_to_go_neg() 6b5147a P2P: Fix memory leak in p2p_process_nfc_connection_handover() 33ba27d EAP-FAST peer: Stop immediately on key derivation failure 144b6a0 OpenSSL: Fix memory leak on an openssl_tls_prf() error path 50a9efe P2PS: Fix Probe Response frame building in error cases 509f269 P2PS: Fix org.wi-fi.wfds matching when building the response 5fa5f84 P2PS: Add more debug prints for service info building fdde3db P2PS: Remove unnecessary service hash filtering from p2p_reply_probe() f2e0eec P2PS: Do not ignore other hashes if org.wi-fi.wfds hash is included ebdc32f P2PS: Fix service hash matching for org.wi-fi.wfds 24533f7 P2PS: Fix p2p_find handling to allow "wildcard" with other hash values f33a31b P2PS: Verify service name length in P2P_FIND command 129b621 P2PS: Fix P2P_FIND seek parameter parsing 83e520e P2PS: Add a wildcard with other advertised service info c5d3cad P2PS: Re-factor p2p_buf_add_service_instance function 13f6f61 wpa_cli: Fix process termination in wpa_cli action mode case b4c0f58 Clear allocated debug message buffers explicitly 14fd033 Clear control interface command explicitly from stack d95c599 P2P: Fix group interface addition failure properly for concurrent case e12c400 P2PS: Refactor p2p_data::query_hash and p2p_data::query_count use 4839da4 P2P: Add vendor elements into Invitation Response frames 886f583 P2PS: Delete p2ps_svc_found from struct p2p_data 3f048aa P2PS: Add a function to free a PD context 8f52409 P2P: Prefer direct Probe Response frames over GO's client list 4e8817f P2P: Use more precise device timestamping for group clients 0799b3f P2P: Specify frequency when sending Probe Response frame 5d180a7 drivers: Add freq parameter to send_mlme() function 5143e7e P2P: Fix return value of p2p_reply_probe() and p2p_probe_req_rx() 07c1e98 P2PS: Enable Probe Request frame processing by P2P Client 734ddf6 P2P: Add rx_freq parameter to Probe Request frame handler e6012e8 P2P: Update target GO Device Address from BSS entry during join a9a4841 Remove duplicated country code from operating class lists 132dfbe Fix removal of tagged interface and bridge when multiple BSS share them e11776a Combine multiple function calls to a single statement b649c0a dbus: Add Reconnect command to D-Bus Interface f4a234a doc: Update D-Bus GONegotiationRequest Signal: add device_go_intent 0c9fb14 P2P: Add Operating class 125 for P2P supported channels Change-Id: I782c1403985248ff994f484282efa6519fd369e9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
cc00d5dc8483e32158b2ba61ea44b0c38d790ed7 |
|
04-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit 58606fd98722e92aaa4c2c7b8cb99cc92bd4308c 58606fd EAP-pwd server: Make sure in_frag_pos is cleared to zero on allocation 6aa5d95 EAP-pwd peer: Make sure in_frag_pos is cleared to zero on allocation 28a069a EAP-pwd peer: Fix asymmetric fragmentation behavior 3035cc2 EAP-pwd server: Fix Total-Length parsing for fragment reassembly 477c743 EAP-pwd peer: Fix Total-Length parsing for fragment reassembly e28a58b EAP-pwd server: Fix payload length validation for Commit and Confirm dd2f043 EAP-pwd peer: Fix payload length validation for Commit and Confirm ef566a4 AP WMM: Fix integer underflow in WMM Action frame parser 8640cf7 WPS: Add more debug prints to httpread 1bd0d57 WPS: Replace the httpread_debug design with standard debug prints 7da4f4b WPS: Check maximum HTTP body length earlier in the process af185d0 WPS: Extra validation step for HTTP reader 5acd23f WPS: Fix HTTP chunked transfer encoding parser a5da657 dbus: Stop ongoing scheduled scan when scan is requested 0c28071 Fix sending ANQP request to an unknown BSS while associated 74197e0 wpa_cli: Fix memory leak when tracking networks 4504621 TDLS: Add TDLS_LINK_STATUS command to the control interface 01e87ef IBSS: Check ibss_rsn init before starting new IBSS authentication 74d912f libtommath: Fix check mp_init_multi() result fd66aa6 Check Public Action length explicitly before reading Action Code ff4a6d4 EAP-SIM/AKA: Explicitly check for header to include Reserved field f5ed400 EAP-SAKE: Make attribute parser more readable 0dfb7be EAP-SAKE: Pass EAP identifier instead of full request 354e3f7 TLS: Fix debug dump of X.509 certificate 87fcb5a EAP-PAX: Fix PAX_STD-1 and PAX_STD-3 payload length validation c3c5615 EAP-GPSK: Pass EAP identifier instead of full request d36c803 EAP-TLS/PEAP/TTLS/FAST: Move more towards using struct wpabuf 8d9f3b8 EAP-FAST: Do not use type cast to remove const specification 07f9034 EAP-FAST: Pass EAP identifier instead of full request f153e41 EAP-EKE: Do not pass full request to eap_eke_build_fail() 53f376c Fix a typo in function documentation 5aeebc4 D-Bus Fix network_is_persistent_group() for P2P operations 5441da2 Fix wpas_notify_network_removed() e8181e2 dbus: Add a debug print on fill_dict_with_properties() getter failures 8a78e22 D-Bus: Fix operations when P2P management interface is used dea0d8e RADIUS: Fix a copy-paste error in variable name Change-Id: Ib70bf513c1f6c17974ef135806e44e120a5d5709 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
9d9e60286e05ae45025b672636490bd12586138d |
|
23-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit ca68a8b561c48393c8ba25055ce294caaa3ac008 ca68a8b WPS: Explicitly reject Public Key attribute with unexpected length 6b94f71 WPS: Truncate variable length string attributes to maximum length f4b64c6 Simplify VHT Operation element parsing d6fefd6 Simplify HT Operation element parsing 40baac0 Simplify VHT Capabilities element parsing baae4cb Simplify HT Capabilities element parsing b39a059 Simplify Timeout Interval element parsing e8997b9 Simplify ERP element parsing f87c99c Simplify DSSS Parameter Set element parsing ae7a42b FT: Check FT, MD, and Timeout Interval length in the parser c9bf7b6 Fix a memory leak on mesh_attr_text() error path 2531036 FT: Fix WMM TSPEC validation in driver-based AP MLME case 632931c P2P: Use WPS_SEC_DEV_TYPE_MAX_LEN in P2P array definition 0f5acfb Use common is_ctrl_char() helper function 5a041ac WPS: Ignore too long SSID attribute d6c3067 Replace SSID_LEN with SSID_MAX_LEN eaa8eef Replace MAX_SSID_LEN with SSID_MAX_LEN 81847c2 Replace HOSTAPD_MAX_SSID_LEN with SSID_MAX_LEN 6fb761c Replace WPA_MAX_SSID_LEN with SSID_MAX_LEN d9d1b95 Use SSID_MAX_LEN define instead of value 32 when comparing SSID length 65b1025 WPS: Ignore too long Device Name attribute cc6f243 Add WPS_DEV_NAME_MAX_LEN define and use it when comparing length dd3d857 P2PS: Check for maximum SSID length in Persistent Group Info 05e46a9 Ignore too long SSID element value in parser 90758f0 Mark QCA vendor command id 53 reserved, but not used anymore f41ded6 Remove unused leftover from multi-SSID design cb71a83 OpenSSL: Clean up TLS PRF implementation 7f90a23 Add QCA vendor subcmd for OCB 897418a eap_example: Fix configuration by added DH parameters Change-Id: If688231edfce41163ef0c1f0ad75291a9bdfbe81 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
8347444e0bfb85e4550817fc99903f38ce8f5bcc |
|
15-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 1acf38f1a5aa19169035de9b611fc76440729c0b 1acf38f Add ifname to vlan_remove_dynamic() debug print 2e192bd Print debug entry on STA pruning from other interfaces c8e6bea Remove VLAN interface on STA free de31fb0 vlan: Ignore multiple NEWLINK messages 371205d vlan: Ignore DELLINK on interfaces that exists a5e81ba Fix STA VLAN bind for RSN pre-authentication case 3ffdeb7 Fix RSN preauthentication with dynamic_vlan enabled but unused 8e2c5f1 dbus: Fix WPS property of fi.w1.wpa_supplicant1.BSS interface d447cd5 Updates for stricter automatic memcpy bounds checking 60eb9e1 AP: Enable multicast snooping on bridge if ProxyARP IPv6 is in use b799118 Fix CONFIG_AP=y build without CONFIG_CTRL_IFACE 954f03a Fix compilation issues with CONFIG_NO_CONFIG_WRITE=y da3db68 Fix INTERFACE_ADD parsing Change-Id: If25ebad847bc2a1b5d9386cbaa80c6fd8ce4e226 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
203eadb9eda41a1dde4a583edb4684319e3f399e |
|
05-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6e9023ea499ea9a89b0e858c85e32b455d57264c 6e9023e DFS: Allow wpa_supplicant AP mode to use non-offloaded DFS 02e42ab nl80211: Add vendor event parsing for DFS offload events bd0f68c DFS: wpa_supplicant event processing d7f1aa8 DFS offload: P2P changes for autonomous GO 1e2aaff DFS offload: Indicate AP-CSA-FINISHED for DFS offloaded case c13578c DFS offload: Add main DFS handler for offloaded case 5de81d7 DFS offload: Skip user space processing for CAC operations 192ad3d Interworking: Clear SCANNING state if no match found 95d7b86 P2P: Consider 5 GHz channels also for auto GO a51c40a P2P: Fix regression in start-GO/AP through a "fake" scan dd5c155 eap_proxy: Callback to notify any updates from eap_proxy 9a05d98 atheros: Add a new flag for OSEN support 9feadba Remove unnecessary NULL check to make function more consistent 1772d34 P2P: Fix interface deinit for failed group interface initialization 3f9ebc4 P2P: Allow AP/GO interface to be started while P2P-in-progress b4a9292 RADIUS client: Fix server failover on return-to-primary on error case 9836cb5 Add option to force a specific RADIUS client address to be used 1a7ed38 RADIUS client: Fix a copy-paste error in accounting server failover de7c06e P2P: Continue find in GO-Neg-Resp-fail status corner cases c280590 Do not add blacklist entries based on normal disconnect request cases bdf0518 P2P: Direct P2P_CONNECT command to proper interface 44b9ea5 P2P: Do not allow scan or normal association on cfg80211 P2P Device 9542f21 Clean up p2p_find command parsing and execution fa9f381 P2P: Allow a specific channel to be specified in P2P_FIND eb78a8d P2P: Restore P2P_SCAN_SPECIFIC d988ff7 hostapd: Disable VHT caps for STAs when no valid VHT MCS found 70fd828 RADIUS client: Fix previous failover change c3dabf5 Fix merge issue with IBSS VHT support 8b2b718 Fix minor issue in HT40 max rate determination 347c55e RADIUS client: Re-try connection if socket is closed on retransmit 94b39e5 RADIUS client: Fix server connection recovery after initial failure bbee36e Allow RADIUS server address to be replaced efb4008 TLS: Remove placeholders for SIGN_ALG_DSA support Change-Id: I8e5d0dfd5fddb6de2f8d8211b708c3bb6674098b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
807291d85bf857320aff6a8ade38c5f622ab9df8 |
|
27-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36d (DO NOT MERGE) 3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
ff787d557db719adea0fdf2679667500c65cf74d |
|
12-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3e7f1c7980c6e9fc7173f78aa72b2761fcd8924d (DO NOT MERGE) 3e7f1c7 GnuTLS: Add TLS event callbacks for chain success/failure and peer cert 0eb2ed0 GnuTLS: Add support for OCSP stapling as a client cf08e9b Add MESH to modes capabilities db5adfe Add SAE to auth_alg capabilities 0e1bb94 GnuTLS: Verify that server certificate EKU is valid for a server d4d1f5c GnuTLS: Fix tls_disable_time_checks=1 processing 594d1fc GnuTLS: Add support for private_key and client_cert as blobs 79b1dd9 GnuTLS: Fix DER encoding certificate parsing a165145 Add "GET tls_library" to provide information on TLS library and version c3bb84b GnuTLS: Add event callbacks 8ddcd6b GnuTLS: Add support for domain_suffix_match 4bc13bf GnuTLS: Check for any unknown verification failure e0d431a GnuTLS: Add more debug prints for version and session status 65ec7f4 GnuTLS: Move peer certificate validation into callback function 7c82457 GnuTLS: Remove support for versions older than 2.12.x e1d63f6 GnuTLS: Remove old version number checks for 1.3.2 ae0a23a GnuTLS: Remove GNUTLS_INTERNAL_STRUCTURE_HACK db4cf40 GnuTLS: Add support for ca_cert as a blob 224104d TLS: Reject openssl_ciphers parameter in non-OpenSSL cases b09baf3 Work around Windows build issues 6dbbef9 Define host_to_le32() for Windows builds 7d28e46 Fix os_win32 build 0b40247 Remove Network Security Service (NSS) support d166947 schannel: Reject subject_match, altsubject_match, suffix_match 59051f8 TLS: Reject subject_match, altsubject_match, suffix_match f8717ac GnuTLS: Reject subject_match, altsubject_match, suffix_match e24aef1 Fix a typo in domain_suffix_match documentation 394b547 Improve subject_match and domain_suffix_match documentation 8a42a07 trace: Fix out-of-memory testing logic 79cd993 Add address masks to BSSID lists b83e455 Add network specific BSSID black and white lists b3d6a0a Add generic parser for MAC address lists 21c74e8 nl80211: Use a helper function to put mesh_id 85e1fad nl80211: Use a helper function for putting beacon interval 6dfc557 Remove mesh_ht_mode network block parameter 54fe48b mesh: Use the shared function with IBSS to determine channel parameters f7e889f mesh: Convert channel configuration to use common routines 6334330 mesh: Use a separate variable to track whether HT is enabled 1fc4ab2 nl80211: Move debug prints into nl80211_put_freq_params() cae87ab nl80211: Add a helper function for putting basic rates 6b8b077 ibss/mesh: Enable HT40 if supported a828f62 Make check_40mhz_2g4 common fdd989d Make check_20mhz_bss common 0e550fe Make check_40mhz_5g common 6d5d098 Make get_pri_sec_chan() common 5144274 Introduce common allowed_ht40_channel_pair() 5f10b7f Use common hw_get_freq/hw_get_chan helpers in hostapd 269dfe2 Introduce common hw features 1830817 IBSS: Add WPA_DRIVER_FLAGS_HT_IBSS f3b8ad4 SAE: Implement retransmission timer a206e2a SAE: Centralize function for sending initial COMMIT 28c91ee bsd: Fix parsing of ieee80211req_scan_result on FreeBSD and DragonFly 96d1d97 Android: Remove hardcoded ICU include paths from hs20-osu-client a354bcc D-Bus: Use NoMemory error message from CreateInterface 635874b Handle interface disabled/enabled more consistently 8f2cf37 P2P: Indicate reason=UNAVAILABLE for group netdev going down 86a7fbb Verify that eloop_register_read_sock() succeeds for ctrl_iface setup 27d9701 Fix a memory leak on WPA authenticator error path c1c07dc Fix hostapd interface addition error path a156ffd Add support for testing memory allocation failures 52b3943 D-Bus: Fix interface unregistration on error path 96dc9a6 D-Bus (old): Fix interface unregistration on error path ef03557 Fix memory leak on wpa_supplicant_init_wpa() error path 52a8058 TDLS: Fix an interface addition error path f2d5728 D-Bus: Fix string array dict entry parser in out-of-memory case c61bc23 D-Bus: Fix byte array dict entry parser in out-of-memory case dacf605 D-Bus: Fix Introspect() in case of os_strdup() failure 68a8669 D-Bus (old): Fix wpsReg error message f0614bc D-Bus (old): Fix message handler error paths a2af1c7 D-Bus (old): Fix memory leak on error path 3d2e2d5 trace: Fix compiler warning on 32-bit builds with bfd support b9f6560 eloop: Fix WPA_TRACE tracking in case of realloc failure e10422c Fix memory leak on hostapd BSS addition error path 2801659 Fix hostapd initialization error path on allocation failure d58ade2 nl80211: Fix compilation with libnl 1.1 and 2.0 51f3427 crypto: Clear temporary stack buffers after use 77a2c39 crypto: Clear temporary heap allocations before freeing a15a7fc DH: Clear memory explicitly on private key deinit 77c45e2 Add wpabuf_clear_free() to allow clearing of freed memory a90c7d9 OpenSSL: Fix pbkdf2_sha1() wrapper f6ebbcf AES-SIV: Make aes_s2v() static dcf8fbc nl80211: Simplify event processing error paths 38751d8 nl80211: Remove cfg80211 state mismatch workaround for authentication 64ae244 nl80211: Check support for rekey offload on first use Change-Id: Ice94c3cf8e39a6d2cac993aacd0f6d45b31c7c15 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
661b4f78e48c697429dc46154a4125892c001718 |
|
29-Sep-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a313d17de943cbaf12cbf67d666af14791be8ad2 a313d17 Extend random MAC address support to allow OUI to be kept 1cbdb9d Add helper function for generating random MAC addresses with same OUI 97ed9a0 nl80211: Remove bridge FDB entry upon sta_remove() 39323bc AP: hostapd_setup_bss() code clean-up 1595eb9 P2P: Add support for 60 GHz social channel b6ebdfb Extend STATUS command with frequency information 375f4a3 hostapd: Avoid dead code with P2P not enabled 6a60488 dbus: Add a global property to set or unset WFD IEs 4bd7e16 wifi_display: Add a utility function to set WFD subelements from IEs d417744 wifi_display: Add a utility function to get the sub-elements as IEs a8833b8 util: Don't use "\e" 8c6f4a5 ap_config.c: fix typo for "capabilities" 6e252b0 WPS: Fix WPS-in-search check when STA_AUTOCONNECT is disabled e5fdc05 P2P: Remove unecessary sanity check for global p2p ee285df P2P: Flush services based on global p2p init and not p2p ifaces 7139cf4 P2P: Decrement sd_pending_bcast_queries when sd returns success dbdc9a1 nl80211: Fix memory leak on start radar detection error path ed8e005 hostap: nl80211 use nl80211_put_freq_params c267753 Add support for using random local MAC address 4d8fb63 Add helper function for generating random MAC addresses fee354c nl80211: Add command for changing local MAC address e49cabc P2P: Set timeout when starting GO Negotiation from Probe Req RX 7549c17 P2P: Clear pending_listen_freq when starting GO Neg/Invite b497a21 nl80211: Ignore auth/assoc events when testing driver-SME 79e2b1c Add PMKSA_FLUSH ctrl_iface command 55c2bfa wpa_cli: Support action scripts with global ctrl_iface 063f850 wpa_cli: Increase event buffer size to 4096 bytes fa0e917 wpa_cli: Fix PING in interactive mode with ifname_prefix c53a9bf Check for driver's DFS offload capability before handling DFS 068e387 STA: Update scan results for ap_scan=1 skip-selection case also 7a4a93b dbus: Add SignalPoll() method to report current signal properties a6ab82d Android: Add NO_EVENTS parameter to status command df2508d P2P: Check os_get_random() return value more consistently 54461f3 RADIUS server: Remove unreachable code e4474c1 FT: Fix hostapd with driver-based SME to authorize the STA 0800f9e nl80211: Add roaming policy update using QCA vendor command 0ef023e Add support for driver command to update roaming policy 0cd9846 nl80211: Print debug info on STA flag changes 17e2091 P2P: Fix radio work issue with wait-for-peer GO Negotiation 76db5b6 Work around broken AP PMKSA caching implementation b08d5fa WPS: Set EAPOL workarounds dynamically based on association 8511a0f WPS: Extend internal entropy pool help for key/snonce derivation abc0553 Remove WPA_EVENT_SCAN_STARTED message from MSG_INFO log c45dabb P2P: Deauth p2p client just after dbus notify 3ee1856 nl80211: Register eloop after hs20 action frame 3bd3257 dbus: add BSS Age property to indicate last-seen time 5c61d21 openssl: Fix memory leak in openssl ec deinit 10e7948 Fix hostapd GET_CONFIG wpa_pairwise_cipher value 3a413e0 RADIUS client: Check getsockname() return value 9c196f7 HTTP: Fix OCSP status check cb5ef95 SME: Verify that os_get_random() succeeds for SA Query c9cd78e RADIUS server: Fix IPv6 radiusAuthClientAddress mask 5e62cfd P2P: Verify that os_get_random() succeeds 6473e80 EAP-PAX server: Add explicit CID length limit 6a6566c Remove unnecessarily shadowed local variable df756b3 hostapd: Remove unused variable assignment e47abdb TDLS: Decline Setup Request with status code 37 if BSSID does not match ce2002a TDLS: Add RSN and Timeout interval IEs in TDLS Discovery Response frame 1c2aa04 P2P: Do not add P2P IEs on P2P disabled interface f2e9083 nl80211: Add more RTM_NEWLINK/DELLINK debug messages 728ff2f nl80211: Fix RTM_DELLINK processing for bridge events e5a4b85 WPS: Merge mixed-WPA/WPA2 credentials if received in same session db9418b Add printf NULL checks to silence static analyzer 4e53675 P2P: Overwrite pending interface only after verifying BSS entry 04a258e hostapd: Check that EVENT_ASSOC data is present before using it 1cc0d6a wpa_supplicant: Use freq_list scan filtar in sched_scan Change-Id: Ibc18f6761b3ccfe8fb4479f26f53e70942068bc8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
c28170251eb54dbf64a9074a07fee377587425b2 |
|
02-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e376290c667e970d751acc916e0efe2ed16292ed e376290 HS 2.0R2: Add update_identifier field to network 5bc2857 Fix some sparse warnings about u16 vs. le16 42619d6 Fix CTRL-EVENT-REGDOM-CHANGE event init= value a520bf4 Mark function static 0cb79d3 dbus: Fix indentation level to match code logic 8f03ac9 Mark functions static 6891f0e Allow SCAN command to specify scan_ssid=1 SSIDs 18389ab WPS: Clear keys/PINs explicitly b7175b4 Clear hostapd configuration keys explicitly d1ecca6 HS 2.0 R2: Clear hs20-osu-client configuration keys explicitly 0a13e06 EAP server: Clear keying material on deinit f534ee0 EAP peer: Clear keying material on deinit 19c48da Clear wpa_supplicant configuration keys explicitly 28bfa29 EAP-AKA: Remove unnecessary dead increment 62493df EAP-GPSK: Avoid dead increment by checking pos pointer 164a453 FT: Debug print extra response data 70bfc77 PCSC: Debug print extra response data 5dbbf36 Interworking: Remove unnecessary dead increment a1e46f3 Check for no key_mgmt/proto/auth_alg entries in config writer 290ea6a Remove unnecessary tracking of first entry d3fa2bb WFD: Explicit limit for subelement length (CID 68127) 745ef18 HS 2.0: Verify assoc_req_ie buffer size for indication elements 0233dca SAE: Use os_memcmp_const() for hash/password comparisons 34ef46c WEP shared key: Use os_memcmp_const() for hash/password comparisons 3e4b77c EAP-GTC: Use os_memcmp_const() for hash/password comparisons a6eae3f EAP-MSCHAPv2: Use os_memcmp_const() for hash/password comparisons 30411b3 EAP-TTLS: Use os_memcmp_const() for hash/password comparisons a564d9c EAP-MD5: Use os_memcmp_const() for hash/password comparisons 4685482 EAP-PSK: Use os_memcmp_const() for hash/password comparisons cba0f86 EAP-PEAP: Use os_memcmp_const() for hash/password comparisons 7b1e745 EAP-LEAP: Use os_memcmp_const() for hash/password comparisons 8f92826 EAP-GPSK: Use os_memcmp_const() for hash/password comparisons e1550d4 EAP-PAX: Use os_memcmp_const() for hash/password comparisons c434503 EAP-FAST: Use os_memcmp_const() for hash/password comparisons dddf7bb EAP-EKE: Use os_memcmp_const() for hash/password comparisons dfb5608 EAP-SAKE: Use os_memcmp_const() for hash/password comparisons 05c79d6 EAP-SIM/AKA: Use os_memcmp_const() for hash/password comparisons 675ddad EAP-IKEv2: Use os_memcmp_const() for hash/password comparisons 2049a3c TLS: Use os_memcmp_const() for hash/password comparisons a79aea5 Milenage: Use os_memcmp_const() for hash/password comparisons 05f916e AES-GCM: Use os_memcmp_const() for hash/password comparisons 87a5c93 AES-CCM: Use os_memcmp_const() for hash/password comparisons 7c24f53 EAPOL supplicant: Use os_memcmp_const() for hash/password comparisons 870834a RSN authenticator: Use os_memcmp_const() for hash/password comparisons 0d15b69 RSN supplicant: Use os_memcmp_const() for hash/password comparisons 72619ce MACsec: Use os_memcmp_const() for hash/password comparisons c237195 RADIUS: Use os_memcmp_const() for hash/password comparisons ce9c9bc WPS: Use os_memcmp_const() for hash/password comparisons afc3c8b Add constant time memory comparison function os_memcmp_const ee352f1 EAP-pwd: Add explicit total length limit b2b8a4c EAP-SIM/AKA: Pass EAP type as argument to eap_sim_msg_finish() f107d00 PeerKey: Clean up EAPOL-Key Key Data processing 010fc5f dbus: Clean up array-array-type property getter Change-Id: I1dbe483be2678a7468e6955d70ea261f8e53b26d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
43cb578dfe2c492257636f6234a24178ed27789e |
|
17-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7efc7f66b1d63b3bbb99d9176f6f68c4d1fc6327 7efc7f6 TDLS: Fix TPK M1 error case (CID 68214) d1bb7ae nl80211: Fix non-hostapd interface addition to not call add_ifidx() 38ddcca TDLS: Add ctrl_iface option for flushing all TDLS peers 342bce6 TDLS: Bail on STA add failure in tpk_m1 processing 947f900 TDLS: Handle unreachable link teardown for external setup cf1600a hostapd: Configure driver ACL even if MAC address list is empty fa21e6c Fix CONFIG_MODULE_TESTS=y build without CONFIG_P2P=y bd10d93 P2P: Clean up by moving ifdef CONFIG_P2P to p2p_suppplicant.h e3bd6e9 P2P: Use another interface operating channel as listen channel 28812a8 P2P: Try using one of the social channels for GO 751b00b P2P: Modify p2p_get_pref_freq 0a816e8 P2P: Remove duplicated code from get_shared_radio_freqs_data() 504df28 Remove unused dump_freq_array() a0c90bb P2P: Collect and use extended data on used frequencies b278f32 P2P: Remove unused code from get_shared_radio_freqs_data() e627012 Clean up EAPOL-Key Key Data processing d56d7e5 Clean up EAPOL-Key processing 8605eab EAP-EKE: Fix typos in debug message 25be28a dbus: Check return value more consistently (CID 62841) ac79fcf wext: Verify set_ssid results consistently (CID 62842) f62415d Note chmod() failure in debug log even in ignore case (CID 62843) 305000e WPS: Check wps_build_wfa_ext() return value consistently (CID 68104) 2485835 EAP-MSCHAPv2: Check hash function results more consistently (CID 68105) b7c61c9 Fix validation of EAPOL-Key length with AES key wrap (CID 62859) Change-Id: I4da11c59a54467301c38c3bec52629b9db19647d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
623d63a3a443027e50efdaaec027befcc3882527 |
|
13-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6590b6400f73762fc6a53ad6ca05a73246cc5e54 6590b64 EAP-TNC: Limit maximum message buffer to 75000 bytes (CID 62873) 49d13df P2P: Fix wfd_dev_info parsing for P2P-DEVICE-FOUND (CID 68127) 1851e17 dbus: Clean up P2P group vendor ext getter 137ff33 HS 2.0R2: Fix OSEN IE parsing for in cipher setup (CID 68132) 2703fb4 WNM: Use cleaner way of generating pointer to a field (CID 68100) da995b2 WNM: Use cleaner way of generating pointer to a field (CID 68099) 062833c GAS server: Fix request frame length validation (CID 68098) 5ce3ae4 HT: Use cleaner way of generating pointer to a field (CID 68097) fb5d417 P2P: Use cleaner way of generating pointer to a field (CID 68096) 35c0318 P2P: Use cleaner way of generating pointer to a field (CID 68095) e987c70 dbus: Add explicit break statements to switch-default 6446420 dbus: Initialize temporary entry properly (CID 62877) 70d9537 Use clearer way of getting pointer to a frame (CID 62835) c02f35f WPS: Clean up indentation level (CID 68109) 0e87e79 Fix HS20_GET_NAI_HOME_REALM_LIST hex length check (CID 68108) beb9e11 dbus: Avoid theoretical memory leaks with duplicated dict entries ceb4cd8 dbus: Fix a potential double-free in on error path (CID 62880) 68e2b88 TNC: Fix minor memory leak (CID 62848) 5519241 GAS: Limit TX wait time based on driver maximum value a0ab408 P2P: Fix SD and DevDisc to limit maximum wait time per driver support Change-Id: If9bdd7b9961c775e39ce1a8fb58220052434b395 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
76cd2cc44b62e858f1897ce58f4ce7d0174e8839 |
|
27-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 147848ec4d26613d5a117d4b35dbc7ff98dd65d1 147848e nl80211: Do not add all virtual interfaces to drv->if_indices de88430 nl80211: Fix del_ifidx() with mixed parent interface cases 829a1b3 P2P: Clear p2p_auth_invite after each persistent group invitation e403ba8 Parse DMG capabilities when reporting to external interfaces f7454c9 P2P: Add 60 GHz in channel to frequency conversion fc3f1d1 Remove unused hostapd_ip_diff() 7bb7090 Add DRIVER_EVENT AVOID_FREQUENCIES for testing d73c7b9 GAS: Send error response if no room for pending dialog context 658d495 HS 2.0: Include OSU client sample in wpa_supplicant release package Change-Id: Ie2109f25bd8de2c926d4116eed37b458ae6a6950 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
684785c7f4e58498603a9a5ce26f933cc2557ebd |
|
12-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7b42862ac87f333b0efb0f0bae822dcdf606bc69 7b42862 P2P: Validate GO operating channel on channel list changes fb2ac53 Remove leftover timeouts on cleanup 1c330a2 Add 'dup_network <id_s> <id_d> <name>' command 316f92c dbus: Reorder deauthentication and cleanup calls when removing a network Change-Id: I7283a61ed5044c884a728fe0b75199dac8552599 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
7dba0e5708da7276a43a44cf479aa743564e15b9 |
|
14-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit bacb984b2d10c0dccb3b05b7779d5d4c5662e8b2 bacb984 radiotap: Update radiotap parser to library version e9b32da Propagate scan failures over D-Bus 142817b Add a wpa_supplicant ctrl_iface event for regdom changes 150fd0b WPS: Split eapol_cb reconnect to a separate code path ded4f94 WPS: Close p2p_group and temporary parameters to all network blocks d6a36f3 nl80211: Mask out deauth even after own deauth request e74dd0e Add forgotten ampdu_factor into wpa_supplicant.conf 759ff2f Re-enable use of wildcard SSID with passphrase 023b466 Fix a debug print to have a space between words 0cd8602 Add CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events bd8838a Fix ctrl_iface BLACKLIST return value Change-Id: I4099b6a33f062d2b6a74c995941a2c534df90b3e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
413dde71f7bc166de54229f337c24b61f4d909fd |
|
11-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f3ff948753ebe5643b5c2d16546a4d16e2c9d20a f3ff948 P2P: Add NFC_HANDOVER commands to p2p_redir list efd11c0 Add reassociate command to dbus doxygen 481e66b Fix reassociate dbus method 2150c33 wpa_cli: Fix wrong comparison in wpa_cli_cmd_interface 83c4cb5 nl80211: Handle multiple interface combinations for P2P 0133591 HS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER 0e0e1e5 P2P: Add retry mechanism for GO Negotiation Confirmation 8235f89 P2P: Mark the scan in p2p_in_invitation as p2p_probe 9392c9b nl80211: Use LEAVE_IBSS with driver-based-SME 38ce8e2 Android: Add qca-vendor.h to be exported Change-Id: I34771c58e2de5e0a3133326d4b3171341ac07b17 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
9866086a955d00e237cc8df3722e7dff75c02532 |
|
12-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 99cd77a8c50413d44f1ebead917310468a8406de 99cd77a tests: Verify reassociate-to-same-BSS commands e8d70a7 nl80211: Hide deauth event due to forced deauth-during-auth 0f44ec8 Add a reattach command for fast reassociate-back-to-same-BSS cfc393a hostapd: Document interworking realm EAP Method types 7450c12 DFS: Add extra debugging messages 5d0d72a wpa_supplicant: Put upper bound on initial scan time delay 8c06db7 nl80211: Fix P2P Device handling when starting with RF-kill blocked 5e3ddf4 PNO: Change sched_scan_stopped event to handle pending PNO properly 737e7a0 PNO: Move and rename pno_start()/pno_stop() 1d91f50 hostapd: Process management frames only once per BSS e070051 hostapd: Allow to switch to usable DFS channels 01b9999 hostapd: Allow to switch to DFS channels if available 70ee1be hostapd: Add config option chanlist for DFS channels 09eef14 Use internal FIPS 186-2 PRF if needed 3b9c517 Fix PTK derivation for CCMP-256 and GCMP-256 e6ef73f nl80211: Add debug print of KEY_DATA and KEY_SEQ b465f5d Remove unused hostapd_wep_key_cmp() 4fb363c Fix error path handling on radius_accept_attr Change-Id: I28ecac6cbcc6f71f19a051c12b54668ca6a66e2a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
7d5c8f257a74ac0d12828962a492e8b84ef83923 |
|
03-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5f7e1c06cd428888a2ed4fa763c5da37a873e422 5f7e1c0 Redirect more frames with ext_mgmt_frame_handling=1 7738163 RADIUS server: Copy IPv4 address only when IPv6 is not used 508e24c dbus: Clean up error reporting for TDLS peer address parsing 3b6170b WPS: Remove duplicate variable setting 78789d9 Remove unnecessary variable initialization a7c37d9 dbus: Remove duplicated variable assignment e997bc7 Remove a static analyzer warning about unused variable write ea3b8c1 Do not use a separate variable for tracking first entry in a list 8a4ce28 WPA: Clean up cipher suite counting in write routines 6ed626d Remove unused gid_str pointer update 749fa14 Debug print trailing WPA/RSN IE bytes, if any a5802c0 OpenSSL: Avoid never-used analyzer warning 7b6e815 Clean up hostapd add_iface error path operations 67adcd2 WNM: Check wpa_s->current_bss more consistently 3ff8073 EAP-FAST: Use clear eap_get_config() result validation a8716d1 roboswitch: Verify that register read succeeds before comparing res 3d91a04 DFS: Make sure center frequency is always initialized for VHT fa0a9f5 trace: Fix memory use on no-function name path bd27b13 Make code path easier for static analyzers 64abb72 nl80211: Allow old r-o-c offchannel TX to be tested fa72a88 P2P: Fix validation on Invitation Request error path ca412c7 Remove unreachable return statement 2af4d87 GAS: Fix additional comeback delay with status code 95 07d462c Interworking: Remove unused password setting for SIM credential 3141b82 Add OSEN to proto config field writer b908c50 Clear hostapd bss entry to NULL on add-interface-failure 0052ce4 atheros: Add support for OSEN Change-Id: Ifd78a8f8259e5b0f654d3dbadd24c9ab029d3afb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
|
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
01904cfafd75a70b9f29c0220b90bdef45595491 |
|
05-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 0ad3b9c402ee92863b720bc01f882ebcb1bd42c8 0ad3b9c Use wpa_radio data for get_shared_radio_freqs() 1b544ff Use wpa_radio data for wpas_wpa_is_in_progress() 5b81927 Use wpa_radio data for wpas_p2p_search_delay() c67e7e2 Use wpa_radio data for channel list updates f88f19b Use wpa_radio data for scan result updates 202dec2 Add shared per-radio structure for wpa_supplicant 73c00fd Move wpa_supplicant driver initialization into a helper function 7feff06 Add CONFIG_CODE_COVERAGE=y option for gcov d9c753b EAP server: Handle EAP method initialization failures more cleanly 59d3438 EAP server: Initialize TLS context based on private_key 6b417a1 Reject TLS-based EAP server method if TLS context not initialized 158b090 nl80211: Fix regression in P2P group interface removal 6f72577 P2P: Handle INTERFACE_DISABLED event on a P2P GO interface 336167c AP: Fix inactivity STA timer trigger for driver offload case 1245503 Restore scan_req if sta scan is rescheduled in the scan results event bdec7ee D-Bus: Add support to set pkcs11_{engine,module}_path 80ed037 Clear beacon_data before usage Change-Id: I1a87557ad09419b88b993ba13f58359121e3543b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
e0e48dc666fb14a7bb60264ca87463ba7bc1fe0b |
|
18-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 107a89448c8a127e9131bc9288b9093720b87781 107a894 P2P: Clean up wpas_p2p_setup_freqs() debug message 7d669cf P2P: Clean up wpas_p2p_init_go_params() 384bdd0 P2P: Prefer VHT channels for initial pick a30d50b P2P: Prefer HT40 channels for initial pick f240710 P2P: Prefer 5 GHz channels for initial pick b2d4aaa P2P: Select VHT channel at random instead of using the first entry ee8f6ea P2P: Select HT40 channel at random instead of using the first entry 5576663 P2P: Move random channel selection into a helper function b17d89b P2P: Fix channel selection for MCC case f86d282 Handle legacy scan interruption of sched_scan/PNO 334bf36 Add chan_switch to ctrl interface of wpa_supplicant and hostapd bf281c1 Add AP channel switch mechanism e44a384 Move AP parameter filling into a helper function 1c4ffa8 nl80211: Add channel switch implementation dcca221 wpa_supplicant: Update channel switch driver interface e1925bd eloop: Remove eloop_none.c 3505743 Sync with wireless-testing.git include/uapi/linux/nl80211.h f6c2b8c Android: Add state message sent after 'status' command 6b49907 Android: Add SSID in supplicant change event 22cf7d7 SCARD: Clean up SIM/USIM selection cea97a0 dbus_new: Add DBus TDLS methods cc4952a Request new scan only for the original interface fa58da2 Remove old mechanism of skipping scan request rescheduling e2f5a98 Deplete scan request if new time is less than remaining dcd25d4 P2P: Use negotiated channel from invitation for persistent GO 800d587 TDLS: Provide external control to specify the peers for setup 795baf7 hostapd: Filter channel list updated events after country code change 146fa9b nl80211: Do not force interface down on deinit 49b4b20 nl80211: Do not for station mode on hostapd deinit 04eff7d nl80211: Remove build time condition on HOSTAPD define 0d547d5 nl80211: Share more code between hostapd and wpa_supplicant 7b7de4c nl80211: Remove read-only last_freq/last_freq_ht Change-Id: Idba1eb8d63480fbc30eee11d0d8e189ccc49ddd3 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
68d0e3ed07847339aedfac8e02f50db68c702e52 |
|
29-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 32b62704fac6af74f60b2effb173474e11ff089d 32b6270 Android: Fix ARRAY_SIZE() compilation 7617388 Interworking: Report STATUS:sp_type even if domain is not configured c20bc9d P2P: Remove compiler warning without CONFIG_IEEE80211N ca9bc5b P2P: Add VHT support 20ea1ca P2P: Add VHT parameter to P2P operations 53cfad4 nl80211: Mark VHT 80 MHz channels f2112b2 wpa_supplicant: Add CONFIG_IEEE80211AC 6b02335 hostapd: Mask out not-supported VHT capabilities 7f0303d hostapd: Verify VHT 160/80+80 MHz driver support c781eb8 hostapd: Verify VHT capabilities are supported by driver b29b012 Fix some VHT Capabilities definitions 7066a8e hostapd: Fix wrong VHT configuration capabilities flags 6651f1f nl80211: Use max tx power from regulatory domain 7ac3616 nl80211: Replace perror() and printf() calls with wpa_printf() 4d9fb08 WPS: Clear known_wps_freq in addition to after_wps d20c340 Interworking: Clear known_wps_freq for network selection f3be6ee tests: Allow test case descriptions to be written into database 1bd05d0 Interworking: Force normal scan for network selection 51e9f22 P2P: Add option to allow additional client channels 556b30d P2P: Add option to remove channels from GO use e7ecab4 Use ARRAY_SIZE() macro 39044a7 Introduce ARRAY_SIZE() macro 2e94624 DFS: Handle radar event when CAC actived correctly 5eaf240 DFS: Fix overlapped() function to check only DFS channels 345276a DFS: Adjust center freq correctly for VHT20/VHT40 1dc17db DFS: Fix available channels list for VHT80 34068ac nl80211: Add debug prints on nl_recvmsgs() failure 10b8592 nl80211: Make eloop sockets non-blocking 5f65e9f nl80211: Abstract handling of sockets on eloop e8d1168 nl80211: Register for IBSS auth frames before eloop 03610ad Clean up get_seqnum() use for IPN 29179b8 Stop ctrl_iface monitor send loop on reinit failure a2a535f Remove unnecessary wpa_s->conf checks 3318376 Add explicit buffer length checks for p2p_build_wps_ie() 0f01201 Verify that readlink() did not truncate result f5eb9da nl80211: Clean up if_add() for hostapd use a288da6 OpenSSL: Fix memory leak on error path 6cb4f11 nl80211: Fix strerror() value in P2P Dev debug messages 35f8363 DFS: Add forgotten break statement 2f243b8 Remove os_strncpy() 24f051e Replace remainining strncpy() uses with strlcpy() 41c526f P2P: Fix snprintf buffer length for group ifname backup Change-Id: I2e1506cb9219a5a37efbb2ae0dc180fb081c809f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
|
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
8da800a193fb6f8832218715f82a7b4e2d2ad338 |
|
24-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 97279d8d1ad40bd7d884af8e2fc26dff0163331a 97279d8 nl80211: Drop frame events that are for foreign address cc2ada8 nl80211: Reduce debug on Probe Request frames 63a965c P2P: Fix after_scan_tx processing during ongoing operations 06b7f58 RSN: Update preauth scan results only based on new scan results 18e00b5 Move wpa_s freeing into wpa_supplicant_deinit_iface() 754632c dbus_new: Add EAP logon/logoff c2aff6b hostapd: Add some testing options adc96dc nl80211: Fix nla_nest_start conversion 0606052 wpa_supplicant: Add get_capability freq c7a39ba Provide TLS alerts to CLI/UI over control interface 2a07a27 P2P: Increase GTK rekeying period to 24 hours 75fa7d1 TDLS: Fix key configuration with current mac80211 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested Change-Id: Ic4b568c341657d266b7759513230d4ef206d75b1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
700a137ab366edc72e371da68ba187b4717ee660 |
|
15-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 565110cd554801fa301c55010b3e9e14f43d7973 nl80211: Include interface name in more debug prints Convert WPS NFC python scripts from using wpactrl to wpaspy wpa_supplicant: Fix lookup of cached PMKSA Add capability flag for IBSS and add get_capability modes hostapd: Fix client reassociation after disconnect due to ACK failure Fix build with CONFIG_NO_CONFIG_BLOBS Fix build without CONFIG_CTRL_IFACE or CONFIG_NO_STDOUT_DEBUG libtommath: Avoid a compiler warning on unused variable libtommath: Condition fast_s_mp_mul_digs() on LTM_FAST P2P: Remove persistent group peer if it rejects invitation P2P: Allow shared interface channel preference to be ignored P2P: Fix shared frequency preference for concurrent operations P2P: Use best-overall channel in p2p_reselect_channel() P2P: Allow all channels for multi-channel concurrency (no negotiation) TDLS: Disable link to existing peer with lower address Fix compiler warning when CONFIG_IEEE80211R is not included WPS NFC: Fix build without CONFIG_WPS_ER FT: Add support for IEEE 802.11r with driver-based SME Change-Id: I1d5ced870c33d5cb73ecc6f04e272a3cf50f344a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
2f023193a0fd630eb82ce6381b80911ad5a3462f |
|
12-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f46fc73a3f8d0eeb1b43d17769464884f467ac47 P2P: Add a peer entry based on Association Request frame P2P: Clear p2p_in_provisioning flag on group removal Allow SME SA Query to be used by all drivers Android: Sync makefile changes for HT/VHT overrides wpa_supplicant: Support VHT capability overrides wpa_supplicant: Parse int values in different bases and reject invalid wpa_supplicant: Reschedule sched scan after network change Remove unnecessary local variable wpa_supplicant: Handle enabling of one or all networks equally wpa_supplicant: Save prev_sched_ssid only if needed wpa_supplicant: Do not allow too short sched scan nl80211: Use helper function for phy_info_freqs() nl80211: Split phy_info_band() into smaller helper functions nl80211: Use helper function for phy_info_handler() nl80211: Split wiphy_info_handler() into smaller helper functions nl80211: Support splitting wiphy information in dumps Synchronize with wireless-testing.git include/uapi/linux/nl80211.h SAE: Add forgotten commit element validation step for FFC groups SAE: Move commit element validation steps into single location Change-Id: I369b6493f03714f6cfb4ed4a8c10ee6e6e71c1f8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
e15c7b57cc7a214d5adaa0fc1d7204378eaf62a5 |
|
04-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Send termination message only in case of wpa_supplicant_deinit() call Change-Id: I276e339a35a9b693b604082bd211f6bd7b093808 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
|
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/dbus/dbus_new_handlers.c
|