293335998d38c497293b1c41f7ad8342b507d458 |
|
09-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 05e5e615e6a26d7a9f5bd0569a0baeae1bcdee49 05e5e615e AP: Skip authentication/deauthentication phase for DMG/IEEE 802.11ad 0c4b9025c AP: Do not look for supported rates in DMG/IEEE 802.11ad e72faadb4 bgscan_simple: Fix short_scan_count comparison 517b5f928 nl80211: Zero num_modes if nl80211_get_hw_feature_data() fails 39c5da328 nl80211: Use correct attribute for scan flags in vendor scan c167662d7 eap_proxy: On SIM error flush PMKSAs only for SIM/AKA/AKA' networks 6657bb158 Fix OOM handling in neighbor report response handling 7187e2093 Allow LCI request with no subelements d73420143 RRM: Enable beacon report with active/passive scan for all drivers ec45927b8 Report received beacon report with BEACON-RESP-RX event f3383366a Report beacon request TX status as control interface event 90d9d7c32 Beacon request through hostapd control interface 73a27a634 Add hostapd configuration parameter rrm_beacon_report de6ec8b55 Enable Beacon Report using beacon table for all drivers 6774c6a9f Update copyright notices for the new year 2017 f56877414 Do not add own BSS in neighbor report with invalid op_class/channel aeff0645d FILS: Fix FILS Realm Information ANQP-element construction 76196ddb2 wpa_supplicant: Add support for Beacon Report Radio Measurement b3060bf99 common: Add helper function to convert RSSI to RCPI 1ac4dba31 wpa_supplicant: Extend verify_channel() and make it global c9ff8e5f6 common: Add function to get an operating class by its number and country e4f1d879c common: Add non-global to global operating classes conversion 96a5f14ee nl80211: Add support for additional scan parameters for beacon report c16b9f8d3 driver: Add scan support to beacon report 3c716fdbd wpa_supplicant: Refactor wpas_rrm_build_lci_report() e1b96e112 wpa_supplicant: Send rejection for unsupported radio measurements 0c73e410d wpa_supplicant: Limit RRM response size to MMPDU size 9664ab8b7 wpa_supplicant: Refactor Radio Measurement Request handling 332bf5d3f wpa_supplicant: Validate RRM request frame format ec493469f wpa_supplicant: Move RRM implementation to a dedicated file d1c74f8c9 Add RRM definitions for beacon report measurement 6a31440b8 Fix LCI request subelement processing ce691a8d9 Add CONFIG_MESH into wpa_supplicant defconfig 67129ab9e wpa_cli: Add commands to use PMKSA_GET/ADD bbad185c1 P2P: Fix compilation warning in p2p_add_device() 2977f5193 GAS: Remove unnecessarily duplicate gas_frag_limit configuration 1940559ea FT: Drop FT Action frames if ft_over_ds=0 d8de90487 Remove deprecated tx_queue_* params from hostapd.conf notes 78022c836 Fix memory leak on hostapd eap_user_file parsing error paths 02f999c6d hostapd: Remove unnecessary NULL check from parser functions fd5f29e7e Fix memory leak in hostapd BSS_TM_REQ error path handling 95de34a10 Remove trailing whitespace 45997cce4 hostapd: Add TERMINATE as per-interface command 546680f81 hostapd: Do not update dtim_period with invalid value 356773058 RADIUS server: Increase maximum number of sessions a5861afcb hostapd: Do not update invalid wep_key_len_unicast f78402ace hostapd: Do not update rejected wep_key_len_broadcast e0ba7efe5 hostapd: Do not update eapol_version with rejected value 9266d00bf hostapd: Reject invalid macaddr_acl value 8628555f9 hostapd: Check driver parameter before replacing previous value 1dfd25a68 Fix hostapd SIGHUP processing before interface is enabled 34e29dfd4 Remove unnecessary NULL check from hostapd_config_read_wpa_psk() call 65dfa8728 mka: Make MKA actor priority configurable 9bcfd5be8 Document new D-Bus WPS properties 77fcbf7ff D-Bus: Use a helper function to get possibly NULL strings dbf524946 D-Bus: Add DeviceType in WPS property 266097fda D-Bus: Add device serial number in WPS property 3ee6a3ab3 D-Bus: Add model number in WPS property ae66822cd D-Bus: Add WPS model name as property 318d4b5be D-Bus: Add WPS manufacturer as property b20f031c6 D-Bus: Add WPS device name as property 4a45dc192 mesh: Show [MESH] flag in print_bss_info() c04a67deb hostapd_cli: Add completion for get command bf4167b9d hostapd_cli: Add completion for set command 86adff09e hostapd_cli: Completion for further commands with STA parameter 4f59ad069 hostapd_cli: Use common completion for commands that use stations 62b95eb67 hostapd_cli: Add missing command help descriptions 04f02faac Fix wpa_cipher_to_alg() return type 9187b13ad wpa_supplicant: Add BSS CURRENT control interface command d7f12e4eb OpenSSL: Make sure local certificate auto chaining is enabled 4be02b71b OpenSSL: Remove SSL_{CTX_,}_clear_options ifdefs 7655bd738 P2P: Do not use wait_time for SD Response TX without fragmentation 1f0fdaf0e Fix race condition between AssocResp callback and 4addr event a6f3761f7 eap_proxy: Add support for SIM state change indication from eap_proxy 79a54ab9f eap_proxy: Fix eap_proxy_init() prototype to use const eapol_cb 4e118c847 D-Bus: Add 'freq' option to P2P Find method to specify starting channel e414f4f02 PeerKey: Fix STK 4-way handshake regression 28fb9bb19 PeerKey: Fix EAPOL-Key processing dfc773172 Android: Add p2p_add_cli_chan=1 option 7508c2ad9 PAE: Make KaY specific details available via control interface b54f43390 FILS: Make FILS Indication element information available in BSS output 8183aee6c FILS: Add support for building FILS Realm Information ANQP-element 9cad61867 FILS: Add Realm Information ANQP-element in BSS data 26bf70e3d FILS: Separate FILS realm configuration from ERP domain 42b847ac1 FILS: Fix hashed realm name derivation 29062f293 Update various definitions based on IEEE Std 802.11-2016 aaa9c60bc Fix preauth_test build by updating add_pmkid/remove_pmkid callbacks 0babae87a Fix wpa_supplicant build error with IEEE8021X_EAPOL unset 19810d29b Make Beacon IEs available in wpa_supplicant BSS command 274e76f22 mesh: Fix channel configuration in pri/sec switch case cebda0e3e Make debug print clearer for AP/mesh mode secondary channel issues 3459381dd External persistent storage for PMKSA cache entries c57931273 Add PMKSA-CACHE-ADDED/REMOVED events to wpa_supplicant 655dc4a43 Send "TERMINATING" event from hostapd 5149a0f04 P2P: Set p2p_persistent_group=1 at the time of reading disabled=2 065c029a5 Remove MBO dependency from Supported Operating Classes element 62cd9d792 nl80211: Specify the BSSID in the QCA vendor scan 444930e5b Define an attribute to do a specific BSSID QCA vendor scan cea761472 Add QCA vendor command definitions for IDs 61-73 cb0cc6efa Define QCA Beacon miss threshold attributes for 2.4 and 5 GHz bands c313c8a5d Fix QCA vendor command values for SAR power limits a5c723adc Interworking: Clear SCANNING state if no network selected a1836de64 SME: Fix IBSS setup after shared key/FT/FILS association f49c852b5 P2P: Fix a theoretical out of bounds read in wpas_p2p_select_go_freq() 944d48588 P2P: Fix a theoretical out of bounds read in wpas_p2p_setup_freqs() 0a6c9dc70 P2P: Send P2P-DEVICE-FOUND event on peer changing device name 9a431d493 WFD: Clear wfd_subelems when P2P peer stops sending them 6e374bd44 Ignore scan results from ongoing scan when FLUSH command is issued 71ac93453 Make update_idx available in BSS control interface command 49aa88bb5 P2P: Clear PEER_WAITING_RESPONSE on GO Negotiation success c79238b6a Define a QCA vendor command to configure SAR Power limits 0f5eb69f8 Use eloop timeout for post-EAP-Failure wait before disconnection 20b1a9e23 Allow hostapd wep_key# parameters to be cleared 5ec3d510e wpa_passphrase: Reject invalid passphrase Test: Wifi Suite Change-Id: Ida52ca4e43bbc326a89d4c9848529df2d545b692 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
9839ecd75c832023d4d13fd2917a8c28261ff668 |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: I249f5fec85ad69ce3879247b07f0db84136ab996 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
fe31a9a8fff325bfddbf06fc3e9edaf480824bee |
|
09-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950" This reverts commit 78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb. Test: None
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: If11d88f812812543dab6839879e815892a39f963 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
7f2c753f60025528366b5f19b8b490a47bf5080b |
|
15-Aug-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from comit b97a54108732b8b5048f86388bed305df21ea8e5 b97a541 IBSS: Fix a memory leak on RSN error path 5f040be Move disconnect command handling to a common place 478441b OpenSSL: Fix OpenSSL 1.1.0 compatibility functions 6c33ca9 Add group_rekey parameter for IBSS 79931ef hostapd: Fix parsing the das_client option 4fe726e nl80211: Do not switch interface to station mode when using mesh 8468189 Do not include NAS-Port attribute with AID 0 86a318f atheros: Accept Public Action frames sent to Wildcard BSSID e07adb7 Fix EAP state machine reset with offloaded roaming and authorization 6fe3b9d QCA vendor command to get hardware capabilities dc24a36 Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_QPOWER 42d30e9 Add a require_message_authenticator configuration option 715ad33 roboswitch: Add support for BCM63xx a2072a2 utils: os_unix: Use access() for checking file existence cfe0a01 mka: Fix use after free d68b73c mka: Add check for body length when decoding peers ad19e71 mka: Avoid reading past the end of mka_body_handler 65b4773 mka: Return u8 from get_mka_param_body_type() ac285c0 mka: Add error handling around ieee802_1x_kay_move_live_peer() 90bff0e mka: Avoid inconsistent state in ieee802_1x_kay_move_live_peer() 1244745 mka: Fix length when encoding SAK-use 71dc789 mka: Fix memory leak in ieee802_1x_kay_create_live_peer() error path 099613e mka: Fix multiple key server election bugs a197946 binder: Clang format the source code fe1d077 binder: Expose an aidl interface module b84ce65 Link to, and adjust types for, the PCSC framework included with OSX 842c5af ap: Use is_broadcast_ether_addr() ac81b39 cli: Share a common tokenize_cmd() implementation a6d56a3 wpa_cli: Replace str_match() with common str_starts() 980afcc cli: Share a common write_cmd() implementation fcc84b4 cli: Share a common get_cmd_arg_num() implementation e55df99 Share a single str_starts() implementation 23c130e Use a common license string for hostapd_cli and wpa_cli b90c13d hostapd_cli: Completion for interface command 8b73c6a hostapd_cli: Completion for disassociate and deauthenticate 1cef253 hostapd_cli: Implement event handler 977c079 Move parts of wpa_cli to a new common file 6cad0bf hostapd_cli: Add completion for help command 0193883 hostapd_cli: Replace static usage string with print_help() function 1f927cd hostapd_cli: Add command completion support 003fe58 wpa_cli: Implement completion routine for get_capability fed802c Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_IFINDEX 14b7612 Define vendor command to support IE based access control 4ac75cd QCA vendor command to configure GPIO pins babf0ce Assign QCA vendor attributes for generic commands 112fdee P2P: Fix D-Bus persistent parameter in group started event cc9985d Set default scan IEs to the driver (QCA vendor extension) 4f910f3 Fix a typo in QCA vendor attribution documentation ab21863 Define QCA vendor config attribute to set default scan IEs to the driver 5a5638a Show disabled HT/VHT properly in AP mode STATUS command 551817a AP: Disable VHT in WEP configuration 8df4765 doc: Correct spelling mistake Change-Id: I4341e07c85f76ead78d7217ea1c30672fa44432e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
31a29cc7ed87b62465c7e01f03484f4643d12309 |
|
10-Mar-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f2d6c17aa0f9107a0e8092238b849461447cdd21 f2d6c17 nl80211: Support network hierarchy of a master interface under bridge f85399f Reserve QCA vendor specific nl80211 commands 116..118 3bd5886 hostapd: Handle running out of DFS channels cc1af6f FST: Fix session setup failure with peer without MB IE dfe0745 P2P: Add optional op_class argument to P2P_SET listen_channel e4a1469 P2P: Adjust service discovery maximum fragment size for 60 GHz c7fb678 D-Bus: Add association response status code property for failure cases 2940bf6 hostapd: Use ifname of the current context in debug messages 6448e06 hostapd: Allow use of driver-generated interface addresses f2accfe AP: Save EAPOL received before Association Response ACK 1307301 wpaspy: Add support for TERMINATE command a2c88a8 wpaspy: Add support for UDP connection 3e67171 hostapd: Add global TERMINATE command 618f5d0 hostapd: Add INTERFACES ctrl_iface command 180e5b9 hostapd: Update ctrl_interface for UDP to include the selected port 56e2fc2 wpa_supplicant: Add ctrl parameter to INTERFACES command b9066c6 hostapd: Allow UDP ctrl_iface configuration to set the UDP port 56885ee hostapd: Add UDP support for ctrl_iface acf57fa ctrl_iface_common: Use sockaddr_storage instead of sockaddr_un 89b781b hostapd: Use common functions for ctrl_iface 1a2124c wpa_supplicant: Use common functions for ctrl_iface ca974ae Add common ctrl_iface files d60886c wpa_supplicant: Add monitor support for global UDP ctrl_iface f0e5d3b wpa_supplicant: Share attach/detach/send UDP ctrl_iface functions db7fb43 wpa_supplicant: Allow UDP ctrl_iface configuration to set the UDP port 3598695 P2P: Update peer WFD IE from PD Response and GO Negotiation Response c69ef1d P2P: Respect p2p_ignore_shared_freq on p2p_group_add 4115b05 P2P: Fix shared freq print in wpas_p2p_init_go_params() Change-Id: Id939064b95210ee1a195f7a9f7c069da520d77ca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
57c2d39d85825f38c5fdac9b73bb0088406ffc85 |
|
23-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 077dcfb8c48d2509a6e116c0de3ad57d2fbfe4fe 077dcfb AP: Debug print management frame TX result ca911d6 MBO: Parse non-preferred channel list on the AP 3f48274 WNM: Fix a memory leak on AP error path f5ca176 VLAN: Fix vlan_compare() for tagged VLANs 1260564 hostapd_cli: Add support for RAW command 940491c MBO: Mandate use of PMF for WPA2+MBO association (STA) 4c57228 MBO: Mandate use of PMF for WPA2+MBO association (AP) 8dd49f0 MBO: Update STA cellular data capability based on WNM Notification 6332aaf MBO: Track STA cellular data capability from association request f3cb7a6 WNM: Minimal processing for WNM Notification Request frames on AP e578343 MBO: Indicate WNM-Notification support on AP when MBO is enabled 990b7b6 Simplify hostapd_build_ap_extra_ies() with helper functions d010048 MBO: Expire non-matching bss_tmp_disallowed entries as part of check f4c74e1 MBO: Parse MBO IE in ieee802_11_parse_elems() 016082e MBO: Send WNM-Notification when cellular capabilities change c0e2a17 hostapd: Add MBO IE to BSS Transition Management Request frame fb9a1c3 hostapd: Add MBO IE to Beacon, Probe Response, Association Response c484b19 Move Hotspot 2.0 element in (Re)Association Request frames a0c38e5 Re-order elements in (Re)Association Request frames 9a493fa WNM: Add candidate list to BSS transition query 84d1c0f WNM: Add candidate list to BSS transition response cf11ab7 utils: Derive phy type by frequency and bandwidth c8082d2 MBO: Add MBO IE to BSS Transition Management Response frame dd59990 MBO: Parse MBO IE in BSS Transition Management Request frames 5e57ba2 MBO: Add Supported Operating Classes element to Association Request 7d46f58 MBO: Add global operating class definitions cb06cf3 MBO: Prevent association to APs that explicitly disallow this c5d193d MBO: Add cellular capability to MBO IE 2d5b861 MBO: Send MBO WNM-Notification Request frames to notify changes 92c6e2e MBO: Implement MBO non-preferred channel report in Association Request facf2c7 MBO: Add non-preferred channel configuration in wpa_supplicant 425dd78 MBO: Add Multi Band Operation definitions a159958 ndis: Use the new get_ie() helper to avoid duplicated code 231b04b utils: Share a single helper function to get IE by ID ea69d97 wpa_supplicant: Share a single get_mode() implementation 75cc211 VLAN: Check vlan_desc validity in a failure debug print 43022ab Use 64-bit TX/RX byte counters for statistics 3f81ac0 AP: Set STA assoc flag in the driver before sending Assoc Resp frame bb598c3 AP: Add support for full station state dc55b6b nl80211: Add support for full station state operations 5558b99 EAP-FAST peer: Remove fixed return value from eap_fast_parse_phase1() 4b16c15 EAP-pwd server: Use os_get_random() for unpredictable token 239952b DFS: Remove the os_random() fallback 98a516e WPS: Use only os_get_random() for PIN generation f441e5a Use os_get_random() for Shared Key authentication challenge 8c676b5 Add RADIUS Service-Type attribute with a value of Framed 09d96de mesh: Drop Authentication frames from BLOCKED STA 70c9396 SAE: Fix PMKID calculation for PMKSA cache 1492fbb Print Acct-Session-Id and Acct-Multi-Session-Id 64-bit values e21ceca kqueue: Use 0 instead of NULL for udata 640b0b9 ctype functions require an unsigned char a5a3efc Fix compile on NetBSD for vlan a084c24 wired: Fix compile on NetBSD for wired driver 634e2e2 Add CONFIG_ELOOP_KQUEUE to defconfig 99a94f5 nl80211: Avoid wpa_printf %s call with NULL pointer in set_param() ba91e92 wpa_supplicant: Parse ifname argument from DATA_TEST_CONFIG 8be640b VLAN: Add per-STA vif option d0bdc96 VLAN: Actually add tagged VLANs to AP_VLAN f9c0018 VLAN: Factor out per-vid code in newlink/dellink 8e44c19 radius: Add tagged VLAN parsing 1889af2 VLAN: Separate station grouping and uplink configuration 3a583e0 OpenSSL: Fix PKCS#12 parsing of extra certificates with OpenSSL 1.0.1 ddd0032 wpa_cli: Clean up logical operation 24c382a TDLS: Clean up os_memcmp use 6136d43 trace: Free symbols on program exit 8bcf8de OpenSSL: Fix memory leak in PKCS12 additional certificate parsing 03e3ddf OpenSSL: Fix memory leak in HMAC_CTX compatibility wrapper function d9a0f69 OpenSSL: Fix memory leak in OCSP parsing 29bc76e OpenSSL: Do not use library init/deinit functions with 1.1.0 0f09637 OpenSSL: Fix memory leak in subjectAltName parsing e60913b curl: Fix memory leak in subjectAltName parsing 6014890 OpenSSL: Fix memory leak with EVP_CIPHER_CTX_new() 99a1735 rfkill: Fix a memory leak 1f1e599 OpenSSL: Fix memory leak on error path b907491 wpa_supplicant: Basic support for PBSS/PCP 86b5c40 nl80211: Basic support for PBSS/PCP afa453a Sync with mac80211-next.git include/uapi/linux/nl80211.h d1d8a2b EAP peer: Simplify buildNotify return 1314bc1 Clean up EAP peer PCSC identity functions Change-Id: I9db475a2a4ebc88d2ee024319ed59a850636bb16 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
b97e428f8acf1ecb93f38f8d0063d2f2fd0bc36e |
|
08-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c06c9099f0d0827feae5622097bd8ac946eca5ea c06c909 Use stronger PRNG for MS-MPPE-Send/Recv-Key salt 9e1f1bd eloop: Clean up coding style for eloop debug prints f9982b3 Implement kqueue(2) support via CONFIG_ELOOP_KQUEUE 2e69bdd eloop: Add eloop_sock_requeue() 70f4f05 wpa_ctrl: Retry select() on EINTR df9e2c2 D-Bus: Don't do <deny send_interface="..." /> in dbus service file 9684c75 mesh: Fix peer link counting when a mesh peer reconnects 83fe38b P2P: Fall back to no VHT when starting AP/P2P GO 360a9d5 P2P: Reduce off channel wait time for some P2P Action frames 1fc63fe RADIUS: Share a single function for generating session IDs 2cbc6ff RADIUS: Redesign Request Authenticator generation b71a64a Send an Acct-Multi-Session-Id attribute in Access-Request packets 4260e1a Add Acct-Session-Id to Accounting-On/Off d72a005 RADIUS: Use more likely unique accounting Acct-{,Multi-}Session-Id d689317 EAPOL auth: Move radius_cui/identity freeing to eapol_auth_free() 0ae86f9 wpa_supplicant: Fix couple of C++ compiler errors with header files 9b6177a Add Event-Timestamp to all Accounting-Request packets d179089 GAS: Calculate response buffer length of ANQP elements dda091c OpenSSL: Fix server side PKCS#12 processing with extra certificates 443c8e1 OpenSSL: Fix possible null pointer dereference on an OCSP error path a3cc64f Remove -w support from wpa_supplicant README e265838 EAP-FAST: Fix an error path in PAC binary format parsing f91e11f D-Bus: Fix p2p interface capability message 479f46c Do not send Acct-Authentic in Accounting-On/Off 696544e RADIUS: Do not include Acct-Terminate-Cause in Accounting-On/Off 236053e Make fallback from HT40 to HT20 work cb22e3b BSD: Zero ifindex on interface removal a8ef133 Android: Support multiple CA certs when connecting to EAP network 80ce804 WNM: Workaround for broken AP operating class behavior af06093 BSD: Disable interface on down dc0ad60 BSD: Use correct ifindex from route messages 5f17b2c BSD: __FUNCTION__ -> __func__ 2088ecb OSU: Add debug printing of more LogotypeExtn fields 0b905c8 Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" 03a72ea VHT: Add an interoperability workaround for 80+80 and 160 MHz channels Change-Id: Ief9174bdec380e81025e1467c47bf1656eb39cd9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
de47be75037bccd4a11b62eedb3d4aed1b36fa67 |
|
07-Jan-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 21cb63fffd1e766c8b989125394ed0bfb05e5a4b 21cb63f OpenSSL: Fix client certificate chain building after PKCS#12 use 12a81b6 ACS: Remove unreachable case from a debug print 896607d Remove a pointer check that can never be true a95cc47 ACS: Be more consistent with iface->current_mode checks 6014e59 P2P: Print find_start in debug log when ignoring old scan results 64845c1 l2_packet: Extend bridge workaround RX processing to cover two frames 4a539ab l2_packet: Improve bridge workaround RX processing 7a36f11 EAP-PAX: Check hmac_sha1_vector() return value 1d20c66 P2P: Clear groups first on FLUSH command 27446e4 mesh: Do not force another peering exchange on driver event cc64fe7 mesh: Do not clear link state on driver event if exchange was started b5f5c32 mesh: Add some more details to MPM debug messages 7d41907 nl80211: Add a missing space to a debug message 6174de6 mesh: Connection and group started/removed events into debug log 2da4a56 Add more hostapd.conf documentation for hw_mode with HT/VHT acc3943 EAP-PEAP peer: Cryptobinding in fast-reconnect case with inner EAP cba9ebf P2P: Try SD Query with each non-ACK peer only once per search iteration e9ccfc3 Clear wpa_supplicant state to DISCONNECTED on FLUSH command aeb408f HS 2.0: Add some documentation for OSEN and network block use 4f6cd3f Fix wpa_supplicant AP mode P2P IE handling if P2P is disabled 92acb40 Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 15c5606 Update copyright notices for the new year 2016 6e379c6 WPS: Testing mechanism to force auth/encr type flags ea31912 WPS: Add a workaround for WPA2PSK missing from Enrollee auth flags db671e0 WPS: Do not build Credential with unsupported encr combination on AP d7c3347 HS 2.0: Postpone WNM-Notification sending by 100 ms 750f5d9 EAP-FAST: Enable AES256-based TLS cipher suites with OpenSSL 1ebb24b OpenSSL: Share a single openssl_tls_prf() implementation dea2051 OpenSSL: Clean up function to fetch client/server random 9a42d85 OpenSSL: Drop support for OpenSSL 1.0.0 de213e8 OpenSSL: Drop support for OpenSSL 0.9.8 e79eb0c P2P: Fix P2P_FIND while waiting for listen ROC to start in the driver 944f693 P2P: Stop offchannel TX wait on P2P_STOP_FIND/P2P_LISTEN 8edd9f1 P2P: Add an option to specify group SSID in P2P_CONNECT join case 70e0cb3 P2P: Provide group SSID, if specified, to P2P Client join step 438be60 P2P: Do not accept any GO BSS entry if SSID is specified for join 35510d5 P2P: Use join SSID in the skip-PD cases 8b8d4f4 P2P: Do not accept any BSS entry for join if SSID is already known b875276 P2P: Use group SSID, if known, for join operation even if no BSS entry aa256cb P2PS: Add group SSID, if known, to the P2PS-PROV-DONE event 071e3bf FST: Fix handling of Rx FST Setup Request when session already exists Change-Id: Ia48764e8663232291160fb24153fa367b9ed3015 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
014a3ff83915745d57480e99b47e281a82143c79 |
|
28-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 324ade51e168f28430f4429849becd0f08d507c0 (DO NOT MERGE) 324ade5 TLS: Make tls_cert_chain_failure_event() more robust c6231b5 TLS: Remove storing of never-read value 15a6813 Remove unnecessary cleanup assignment in SHA1Final() ef3866a nl80211: Don't call linux_iface_up() for a dedicated P2P Device c2ed779 mesh: Document Mesh Peering Management element structure in more detail b2817cd mesh: Check PMKID in AMPE Action frames 6c33eed mesh: Fix PMKID to match the standard ede7770 wpa_supplicant: Do not wait for monitor on P2P Device interface 1c94570 Do not wait for monitor to attach if no control interface f98674a Clone default LIBS value to LIBS_* for other tools 7d2f674 Add "GET_CAPABILITY acs" to allow ACS build option to be detected d990971 wpa_supplicant: Enable Automatic Channel Selection support for AP mode 96bc508 Handle survey event properly in wpa_supplicant d39f796 EAP-TNC peer: Remove dead code related to fragmentation 662512e P2PS: Remove dead code abbbaa4 TNC: Print received IF-TNCCS message as debug ASCII hexdump d745f02 EAP-TNC peer: Allow fragment_size to be configured a67e7e5 RADIUS: Add EACCES to list of recognized send() errno values 5bd9be4 Fix RADIUS Called-Station-Id to not escape SSID 0764dd6 TLS client: Multi-OCSP check to cover intermediate CAs d6b536f Add ocsp=3 configuration parameter for multi-OCSP 0268383 TLS: Move variable declaration to the beginning of the block b567775 TLS client: OCSP stapling with ocsp_multi option (RFC 6961) 8ea6a27 TLS server: OCSP stapling with ocsp_multi option (RFC 6961) 5addb0d Server configuration for OCSP stapling with ocsp_multi (RFC 6961) bca0872 TLS server: OCSP stapling 9532bd2 GnuTLS: OCSP stapling on the server side 6241766 Use wpa_msg() for the "RSN: PMKID mismatch" message e161451 EAP-EKE: Merge identical error return paths 13cb0a6 EAP-EKE: Reject too long Prot() data when building a frame 0ab0de8 Document previously missing key_mgmt values Change-Id: I9ac7d0da03d8baf4542e276ab20cb56e44bfa33c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
d7ff03d48f825360eec2a371e3361306f2fd721b |
|
04-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit bf3214b59321f67375df1ee85722b2beb74e1f7a bf3214b P2P: Fix re-invoked client interface completion on data connection 63502c6 P2P: Fix P2P_CANCEL for p2p_in_invitation case e007d53 EST: Comment out X509_REQ_print calls on Android with BoringSSL e6f4832 EST: Add CSR generation support with BoringSSL ed2566a EST: Implement pkcs7_to_cert() with BoringSSL 8d27efa HTTP (curl): OCSP with BoringSSL 213e158 BoringSSL: Move OCSP implementation into a separate file f846211 BoringSSL: Support new SHA_CTX definition for EAP-SIM PRF b34c623 OpenSSL: Fix build with current OpenSSL master branch snapshot 759a8a3 nl80211: Cancel all pending TX frame cookies 9ea91cd EAP-EKE peer: Fix memory leak on error path 328f49a P2P: Complete group formation on client data connection 0e559dc WPS: Support parallel UPnP WPS protocol runs bea48f7 Allow sched_scan_plans to be updated at runtime 32c0226 Add support for configuring scheduled scan plans 09ea430 nl80211: Add support for multiple scan plans for scheduled scan dd895e9 P2P: Make p2p_go_configured() more robust against unexpected calls 8811988 TLS client: Fix session_resumed status after TLS session ticket use 7fff91a Fix tls_connection_prf() regression with CONFIG_TLS=internal 1adf262 TLS: Add support for extKeyUsage X.509v3 extension 0755577 Add TEST_FAIL() support for internal hash functions 4104267 Fix memory leak on NFC DH generation error path c5864dc TLS client: Add certificate chain validation failure callbacks 896a97d TLS client: Add support for disabling TLS versions 0cbc22b TLS client: Use TLS_CONN_* flags 20804fe TLS: Add support for tls_get_version() f2a6ad0 TLS client: Add support for server certificate probing b115eeb TLS: Add TLS v1.2 signature algorithm support for SHA384 and SHA512 c0acec3 crypto: Add CRYPTO_HASH_ALG_SHA384 and CRYPTO_HASH_ALG_SHA512 0aed915 TLS client: Add signature_algorithms extension into ClientHello 9e8809a TLS client: Validate certificates with SHA384 and SHA512 hashes 6bb6a9c Add SHA384 and SHA512 implementations from LibTomCrypt library fdc1614 TLS client: Add support for validating server certificate hash 3665776 TLS client: Do not verify CA certificates when ca_cert is not specified 11c9ddb Add TEST_FAIL() condition to aes_128_cbc_encrypt/decrypt() ea52a46 EAP-SIM peer: Fix memory leak on reauth error path 1a33c94 EAP-SAKE: Fix a typo in attribute parser debug print 53401e9 Abort ongoing scans on FLUSH command e929eb3 wlantest: Add -N command line argument to remove write buffering 3c41749 hostapd: Add Transmit Power Envelope IE when VHT is enabled 2ea2166 Add control interface command for aborting an ongoing scan 4ead7cf Abort an ongoing scan before connect 4f30add nl80211: Add support for aborting an ongoing scan 5ef0b84 Sync with mac80211-next.git include/uapi/linux/nl80211.h 0530eb1 mesh: Clear wpa_s cipher selection on starting mesh 1d6955e nl80211: Fix SIGNAL_POLL in IBSS and mesh 0f29bc6 IBSS/mesh: Add support for VHT80P80 configuration c27f4c9 P2P: Add support for VHT 80+80 MHz and 160 MHz bee5d8e nl80211: Add VHT 160 MHz channel flags 5e1da9c P2P: Define operating classes for VHT 80+80 and 160 ea70811 FST: Improve parsing of Multiband IEs b47d05a FST: Make FST peer connection check more permissive in hostapd 39c3c9b Remove wpa_supplicant/tests 9b635d0 Remove link_test and test_wpa 9e68742 Fix CONFIG_NO_WPA=y build eb926f1 Comment out wpas_reenabled_network_time with CONFIG_NO_SCAN_PROCESSING f231b3d FST: Fix STA MB IEs creation ed7820b P2P: Add a testing option to force P2P GO CSA 6cbbae2 P2P: Set p2p_go_wait_client in invitation_result() cb 83702b6 Android: Give user the option for selecting browser for HS 2.0 OSU cadffac wpa_cli: Add an option to set created interface type 0f039e3 Add an option to create interface of a certain type with INTERFACE_ADD d8a3b66 driver: Make setting up AP optional when creating AP interface 36e8206 Check for LIBRESSL_VERSION_NUMBER in tls_openssl.c 2c51c0b P2P: Clear send action work without waiting on find/stop/listen 6bdc43c AP: Avoid 20/40 MHz co-ex scan if PRI/SEC switch is not allowed 757785d nl80211: Clear ignore_next_local_deauth flag cb2a926 nl80211: Clear ignore_next_local_deauth and ignore_deauth_event f32227e Add QCA vendor attribute and event to indicate subnet change status d38c7be Skip SELECT_NETWORK steps only if already connected or connecting 25eb7fc Fix EAPOL reauth after FT protocol or offloaded PMKSA cache use f68d491 FT auth: Fix EAPOL reauthentication after FT protocol run a65efbf Add VHT support for Mesh a73c984 Set WMM flag to Mesh STA by default 9a8d9f7 Assign QCA vendor command and attribute for Tx power reduction in dB 747ba10 nl80211: Do not return incomplete hw capability info 5e238cc WPS: Reconnect for a failed data connection when STA_AUTOCONNECT is 0 442cc8c dbus: Fix memory leak in sending InvitationReceived signal 0603bcb hostapd: Process MAC ACLs on a station association event (SME in driver) 89a11ad RSN: Remove check for proactive_key_caching while setting PMK offload d381963 Extend QCA roam event with subnet change indication Change-Id: I122220f59ef56e25ed2749a37370a40afafa177a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
4171258d30a612645aa061cede62233b5c58ca2a |
|
29-Jun-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8c43ef8449bd4d2d0983db394770bd73f572b12d 8c43ef8 P2PS: Fix attribute addition in p2p_buf_add_service_instance() a9ea609 P2PS: Fix p2p_find last parameter handling 6c73149 AP: Increase maximum value accepted for cwmin/cwmax 575e4f5 SAE: Reject FFC commit-element with value p-1 a406244 P2PS: Do not reply to ProbeReq on another channel when starting Listen 0c2b3f6 SAE: Reject commit-scalar value 1 4f39908 Send CTRL-EVENT-NETWORK-NOT-FOUND if no suitable network was found 123df27 D-Bus: Fix typos in debug print ded14ce Android: Fix nl80211 build if BOARD_*_PRIVATE_LIB is unspecified a140721 Android: Rename ANDROID_P2P_STUB to ANDROID_LIB_STUB 2ba4de3 D-Bus: Add documentation for wpas_dbus_signal_peer_groups_changed() e48b5e2 D-Bus: Fix typo in dbus signal function documentation 09d5048 D-Bus: Add function documentation for wpas_dbus_unregister_interface() adfbbd2 D-Bus: Add function documentation for wpas_dbus_register_interface() c5967f0 D-Bus: Fix wpas_dbus_signal_p2p_invitation_result() documentation 4457f41 radius: Fix NULL dereference issue on allocation failure f826fb1 OpenSSL: Handle EC_POINT_is_on_curve() error case bbb5008 SAE: Use random "password" in extra hunting-and-pecking loops eb5fee0 SAE: Add side-channel protection to PWE derivation with ECC 16841ab crypto: Add functions for computing the Legendre symbol and EC y^2 c4a13b4 OpenSSL: Add support for Brainpool Elliptic Curves 4584b66 SAE: Increase security parameter k to 40 based on Dragonfly recommendation fdd731b SAE: Fix PWE generation to use minimum loop count (k) properly 8ec3332 SAE: Merge sae_derive_commit() error case return statements d93abd4 SAE: Merge sae_get_rand() error case return statements 6a58444 SAE: Verify that own/peer commit-scalar and COMMIT-ELEMENT are different 4e7e688 Add crypto_ec_point_cmp() 8e2a3a4 dbus: Do not initialize variable twice c1a14ef Do not check unsigned size is less than zero fdc5608 OpenSSL: Remove SSL_CTX_{get,set}_app_data() compatibility wrapper ba54933 libtommath: Fix mp_init_multi() stdarg use on error path f6332b0 wpa_gui: Initialize WpaGuiApp::w in the constructor f6df3f3 Use os_* wrapper more consistently 91b7a5e Use unsigned/signed printf format more consistently 59bae74 HS 2.0R2: Fix memory leak on error path in hs20-osu-client c5ca73d P2P: Use offsetof() instead of local implementation c3c5b5f ERP server: Make erp_send_finish_reauth() easier for static analyzers 6ce1bea bsd: Remove redundant NULL check in bsd_init() c99df20 Remove redundant NULL check in ieee802_1x_encapsulate_radius() 2eb5967 AP: Add more 2.4 GHz channels for 20/40 MHz HT co-ex scan 5ed6519 hw_features: Merge similar return cases 4e37dd6 SAE: Simplify sae_prepare_commit() error path 04e6c4c Fix SAE group selection in an error case 3dce85c HS 2.0: Add WLAN RADIUS attributes in OSEN case efd5d26 Remove unnecessary wpa_ie_len check from wpa_parse_wpa_ie_wpa() ce8963f Remove WEP40/WEP104 cipher suite support for WPA/WPA2 ee140ef FT: Stop association attempt if Auth response processing fails (SME) 1887be4 Make check_20mhz_bss() static Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> Bug: 22062116 Change-Id: Ie1d175f1faab24bf39ce81ead7a078e1e236badd
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
1d755d025b206e22b06aeb322e25a79f98ca7777 |
|
28-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 01a025937c67f0eca6021d94b8ec3b144f8b1730 01a0259 WPS: Add support for 60 GHz band 0ef1e29 WPS: Fix shorter authentication timeout during no-SelReg iteration 3465176 nl80211: Verify that cipher suite conversion succeeds a250722 Try to set PMK only with key mgmt offload support in the driver 4a7ce98 Make IPv6 NA multicast-to-unicast conversion configurable 9f390f4 Interworking: Fix network selection warning without SIM/USIM support a0ad9e8 Remove WPA per-VLAN groups when no more stations remain 87b5b53 Make VLAN ID available in STA info over control interface 5678a2d P2P: Allow wpa_supplicant to start if social channels are not supported 209214b vlan: Move CONFIG_FULL_DYNAMIC_VLAN includes to proper places a6da824 Do not use C++ reserved words as variable names eaa3728 wpa_gui: Themed icon loader 9a3cb41 Fix wpa_priv (CONFIG_PRIVSEP=y) build 8b423ed Declare all read only data structures as const fd4fb28 OpenSSL: Try to ensure we don't throw away the PIN unnecessarily fabc6dd mesh: Retransmit the last Commit Message in the Committed state 068669f vlan: Verify RADIUS returned VLAN-ID and dynamic_vlan=required 5add410 WPS: Use shorter authentication timeout during no-SelReg iteration e7d2034 WPS: Enforce five second minimum time before AP iteration bd143cc Remove trailing whitespace from Makefile 74802c0 P2P: Do not create a P2P Device interface if P2P is disabled 579674e Document p2p_disabled option in wpa_supplicant.conf 8ea8a89 nl80211: Extend unique MAC address assignment for station iftype Change-Id: I8bc8a63f37c0892b83376b9d5a5859827ae50554 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
9d9e60286e05ae45025b672636490bd12586138d |
|
23-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit ca68a8b561c48393c8ba25055ce294caaa3ac008 ca68a8b WPS: Explicitly reject Public Key attribute with unexpected length 6b94f71 WPS: Truncate variable length string attributes to maximum length f4b64c6 Simplify VHT Operation element parsing d6fefd6 Simplify HT Operation element parsing 40baac0 Simplify VHT Capabilities element parsing baae4cb Simplify HT Capabilities element parsing b39a059 Simplify Timeout Interval element parsing e8997b9 Simplify ERP element parsing f87c99c Simplify DSSS Parameter Set element parsing ae7a42b FT: Check FT, MD, and Timeout Interval length in the parser c9bf7b6 Fix a memory leak on mesh_attr_text() error path 2531036 FT: Fix WMM TSPEC validation in driver-based AP MLME case 632931c P2P: Use WPS_SEC_DEV_TYPE_MAX_LEN in P2P array definition 0f5acfb Use common is_ctrl_char() helper function 5a041ac WPS: Ignore too long SSID attribute d6c3067 Replace SSID_LEN with SSID_MAX_LEN eaa8eef Replace MAX_SSID_LEN with SSID_MAX_LEN 81847c2 Replace HOSTAPD_MAX_SSID_LEN with SSID_MAX_LEN 6fb761c Replace WPA_MAX_SSID_LEN with SSID_MAX_LEN d9d1b95 Use SSID_MAX_LEN define instead of value 32 when comparing SSID length 65b1025 WPS: Ignore too long Device Name attribute cc6f243 Add WPS_DEV_NAME_MAX_LEN define and use it when comparing length dd3d857 P2PS: Check for maximum SSID length in Persistent Group Info 05e46a9 Ignore too long SSID element value in parser 90758f0 Mark QCA vendor command id 53 reserved, but not used anymore f41ded6 Remove unused leftover from multi-SSID design cb71a83 OpenSSL: Clean up TLS PRF implementation 7f90a23 Add QCA vendor subcmd for OCB 897418a eap_example: Fix configuration by added DH parameters Change-Id: If688231edfce41163ef0c1f0ad75291a9bdfbe81 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
8347444e0bfb85e4550817fc99903f38ce8f5bcc |
|
15-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 1acf38f1a5aa19169035de9b611fc76440729c0b 1acf38f Add ifname to vlan_remove_dynamic() debug print 2e192bd Print debug entry on STA pruning from other interfaces c8e6bea Remove VLAN interface on STA free de31fb0 vlan: Ignore multiple NEWLINK messages 371205d vlan: Ignore DELLINK on interfaces that exists a5e81ba Fix STA VLAN bind for RSN pre-authentication case 3ffdeb7 Fix RSN preauthentication with dynamic_vlan enabled but unused 8e2c5f1 dbus: Fix WPS property of fi.w1.wpa_supplicant1.BSS interface d447cd5 Updates for stricter automatic memcpy bounds checking 60eb9e1 AP: Enable multicast snooping on bridge if ProxyARP IPv6 is in use b799118 Fix CONFIG_AP=y build without CONFIG_CTRL_IFACE 954f03a Fix compilation issues with CONFIG_NO_CONFIG_WRITE=y da3db68 Fix INTERFACE_ADD parsing Change-Id: If25ebad847bc2a1b5d9386cbaa80c6fd8ce4e226 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
912c6ecf72fb2c84fbf17dbd0666492778dbd9fc |
|
30-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 989e784601887734e696b3fac0ad6d101badd7ea 989e784 P2P: Optimize scan frequencies list when re-joining a persistent group 154a1d5 hostapd: Fix some compilation errors ce18c10 Add support for CONFIG_NO_ROAMING to Makefile 65a7b21 OpenSSL: Implement AES-128 CBC using EVP API 22ba05c Explicitly clear temporary stack buffers in tls_prf_sha1_md5() 940a4db Explicitly clear temporary stack buffer in sha1_t_prf() eccca10 Explicitly clear temporary stack buffer in hmac_sha256_kdf() e8e365d wext: Add support for renamed Host AP driver ifname fc48d33 Improve error messages related to EAP DB c469d62 Error out if user configures SQLite DB without CONFIG_SQLITE 270427e HS 2.0R2: Add more logging for hs20-osu-client icon matching 8e31cd2 OSU server: Improve logging for SPP schema validation failures 23dd15a http-curl: Improve log messages e7d285c OSU server: Print out signup ID if there is some problem with it 1b45006 HS 2.0R2: Remove unused argument identifier from hs20-osu-client 2e7a228 HS 2.0R2: Allow custom libcurl linkage for hs20-osu-client a52410c Allow PSK/passphrase to be set only when needed 3e808b8 EAP-pwd peer: Add support for hashed password e4840b3 EAP-pwd server: Add support for hashed password 2bd2ed2 EAP-pwd: Mark helper function arguments const when appropriate 9ccc10f wpa_cli: Use tab as only word separator for networks 5a997b2 wpa_cli: Completion routine for dup_network command 1ca6c0f wpa_cli: Completion for remove, select, disable, enable network 7e6cc90 wpa_cli: Implement completion routine for get_network/set_network 32a097f wpa_cli: Keep track of available networks 94dc0e9 wpa_cli: Allow tab as alternative separator for cli_txt_list words efa232f Add support for virtual interface creation/deletion ba87329 wpa_cli: Use .wpa_cli_history under Android 0f8385e Show OSEN key management properly in scan results e7b4cd0 wpa_gui: Add tray icon based signal strength meter 54d3dc9 AP: Unset HT capabilities for an HT association request without WMM Change-Id: I71425b8e20fe1dfdb777592257dc4e4063da8d85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
807291d85bf857320aff6a8ade38c5f622ab9df8 |
|
27-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36d (DO NOT MERGE) 3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
9ead16e203b81d44a2d84eadc2901ceeb7daf805 |
|
07-Oct-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
03658834c33748b9ad86f3d4cdf0c7be9c6887d1 |
|
13-Aug-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4aa9c156e583c64cf5d90751ec888c478e1155c2 4aa9c15 dbus: Close dbus dict just after appending data b8d87ed nl80211: Disable Probe Request reporting for static AP during deinit bf144cf nl80211: Do not change iftype for static AP interface 61157af wext: Add signal_poll callback af65bc3 P2P: Use ssid instead of wpa_ssid to find GO iface 6c460ea Add RSN cipher/AKM suite attributes into RADIUS messages cdffd72 Add WLAN-HESSID into RADIUS messages 69002fb Add Mobility-Domain-Id into RADIUS messages 4a0693a dbus: Declare and implement GroupFinished as for GroupStarted 2fa980f P2P: Cancel pending action TX radio work on p2p_cancel 8b627b7 Fix writing of the wowlan_triggers parameter Bug: 16877362 Change-Id: Ifbb8902e2634470ba212a82cd1ca49880633d961 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
df5a7e4c5c64890c2425bb47d665bbce4992b676 |
|
02-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 39a5800f7c2a9de743c673a78929ac46a099b1a4 39a5800 wpa_supplicant: Allow disabling LDPC 7230040 Interworking: Read IMSI if not read at supplicant start 62f736d Interworking: Init scard when a credential requires SIM access 729897a Interworking: Fix incorrect compile PCSC flag 21611ea edit: Increase buffer size to 4096 bytes 0b2c59e OSU server: Add example scripts for Hotspot 2.0 PKI 0f27c20 HS 2.0R2: Add example OSU SPP server implementation 1e03c6c XML: Remove forgotten, unused definition of debug_print_func 5cfc87b Make hs20_wan_metrics parser error print more helpful 4be20bf Fix validation of anqp_3gpp_cell_net configuration parameter 23587e3 Remove duplicated vht_capab parser entry 18a8e55 Notify STA of disconnection based on ACL change 8943cc9 RADIUS server: Add support for MAC ACL dc87541 Clean up debug print for PSK file search bbbacbf DFS: Print CAC info in ctrl_iface STATUS command ace0fbd P2P: Fix segfault when PBC overlap is detected cf15b15 Add writing of network block ocsp parameter 5c9da16 nl80211: Set all BSS interfaces down when tearing down AP in MBSS mode f1c4dbf wpa_supplicant: Remove pending sme-connect radio work 4f560cd wpa_supplicant: Override HT A-MPDU size if VHT A-MPDU was overridden 3ae8b7b hostapd: Add vendor command support 782e2f7 P2P: Do not initiate scan on P2P Device when enabled 74a1319 Fix issue with incorrect secondary_channel in HT40/HT80 96ecea5 Pass TDLS peer capability information in tdls_mgmt 78cd7e6 Sync with wireless-testing.git include/uapi/linux/nl80211.h b36935b nl80211: Fix EAPOL frames not being delivered 6997f8b nl80211: Set interface address even if using old interface 9b4d9c8 nl80211: Print if_indices list in debug log 762c41a eloop: Add assert() on negative fd when using select() code path 978c673 Add a note on using 'iw list' to determine multi-BSS support Change-Id: I89af7f8d92ed706c8909ed3cc9c49d6e1277a2b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
f21452aea786ac056eb01f1cbba4f553bd502747 |
|
26-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5e32f8256f5fcce8b70a95e070375ac549ac935a 5e32f82 tests: Verify HS 2.0R2 deauthentication request b61e70c HS 2.0R2: Add WFA server-only EAP-TLS server method 8d2a992 HS 2.0R2: RADIUS server support to request Subscr Remediation ae6d15c HS 2.0R2 AP: Add OSU Providers list ANQP element f7bd7a0 HS 2.0R2 AP: Add Icon Request and Icon binary File ANQP elements 97596f8 HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP 8e1146d HS 2.0R2 AP: Add support for deauthentication request a14896e HS 2.0R2 AP: Add OSEN implementation 6ca0853 HS 2.0R2 AP: Use Subscr Remediation request from RADIUS server 7bc9c25 HS 2.0R2 AP: Add STA's Hotspot 2.0 Release Number into Access-Request 76579ec HS 2.0R2 AP: Add AP Hotspot 2.0 Release Number as WFA RADIUS VSA 0dd100f HS 2.0R2 AP: Add definition and helper function for WFA RADIUS VSA 3fb17a9 HS 2.0R2 AP: Add WNM-Notification Request for Subscription Remediation d5d2478 HS 2.0R2 AP: Update HS 2.0 Indication element to Release 2 a6739e1 HS 2.0R2: Try to scan multiple times for OSU providers cf6d08a Interworking: Add OCSP parameter to the cred block 6402f2f Interworking: Add more debug info on roaming partner preferences 7479489 Interworking: Add sp_priority cred parameter 751ac99 Interworking: Use a helper function to compare cred priority aff419f Interworking: Remove separate credential priority tracking 533536d HS 2.0R2: Disable full ESS for as a workaround for per-BSS issues 8a77f1b HS 2.0R2: Slow down connection attempts on EAP failures 76a55a8 HS 2.0R2: Add more debug to network selection 8b4b9fb HS 2.0R2: Fix bandwidth policy BSS selection 28f2a7c HS 2.0R2: Allow excluded network to be selected based on user override 33fb8c5 HS 2.0R2: Add support for Policy/RequiredProtoPortTuple a45b2dc HS 2.0R2: Add support for Policy/MaximumBSSLoadValue 4cad9df HS 2.0R2: Add support for Policy/MinBackhaulThreshold aa26ba6 HS 2.0R2: Add tracking of provisioning SP 8e5fdfa HS 2.0R2: Add WFA server-only EAP-TLS peer method df0f01d HS 2.0R2: Add OSEN client implementation a5d7563 HS 2.0R2: Add common OSEN definitions 230e373 HS 2.0R2: Add GAS operation duration statistics into debug b572df8 HS 2.0R2: Add routine for fetching OSU provider information 1d2215f HS 2.0R2: Add OSU Providers list ANQP element 184e110 HS 2.0R2: Add Icon Request and Icon binary File ANQP elements 7ef6947 HS 2.0R2: Add STA support for Deauthentication Request notification 95a3ea9 HS 2.0R2: Add WNM-Notification Request for Subscription Remediation f9cd147 HS 2.0R2: Update Indication element to Release 2 bc00053 Interworking: Allow roaming partner configuration ae6f927 nl80211: Add driver capability for GTK_NOT_USED 2c49d04 Do not clear global pmf setting on FLUSH eef7235 Only try fast reconnect if network is not disabled 3d910ef Interworking: Prefer last added network during network selection 2a33687 P2P: Remove unnecessary ifdef CONFIG_NO_CONFIG_WRITE 050d8b5 Fix documentation for wpa_supplicant_global_ctrl_iface_process() 8c9cb81 DFS: Fix coding style (missing whitespace) 4f1e01b DFS: Add VHT160 available channels b8058a6 hostapd: DFS allow mixed channels 4db216f wpa_supplicant: Add support for IPv6 with UDP ctrl_iface e2364d1 hostapd: Deauthenticate clients forbidden by maclist changes 1748f1d hostapd: Make it possible to remove addresses from maclists 064eb05 Add os_remove_in_array() c1151e4 Force OFDM/HT/VHT to be disabled on channel 14 bfb79dd nl80211: Show regulatory rule flags in debug output 3d7ad2f hostapd: Configure spectrum management capability e0392f8 hostapd: Add Power Constraint element 891330f Fix spelling s/algorith/algorithm/ f0e30c8 Do not start another connect work while one is pending 3290398 WPS: Fix UNSUBSCRIBE error returns if NT or CALLBACK header is used f34df28 WPS: Fix UNSUBSCRIBE to return 412 if no SID match found 80f256a WPS: Remove unnecessary filename NULL check Change-Id: I7dc25a8bb0074f4970ade8d42dfa60da166baf96 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
96be6222df414a7dde5c5b1b72df22e67b1a77fc |
|
13-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7ae7a84eefd43ed9385e2f8f520a918468f87178 7ae7a84 NFC: Workaround nfcpy message debug exception 6ceb95c Avoid NULL dereference in ieee802_1x_get_mib_sta() printf 97efe70 wpa_supplicant: Fix NULL dereference in tls_verify_cb() c0c11af wpa_supplicant: Fix NULL dereference in eap_fast_parse_end() 93a1cae Remove unnecessary NULL check 1e2ffc6 Fix theoretical NULL dereference in debug printf cbf21c7 P2P: Avoid compiler warning in p2p_supplicant.c 5479ff9 DFS: Avoid compiler warnings in src/ap/dfs.c 5e6aa04 wpa_supplicant: Fix memory leak in wfd_subelems error path 88853ae Fix CONFIG_WPS_NFC=y build without CONFIG_P2P=y 7ac7fd4 Add bssid/freq hint for driver-based BSS selection 92484e2 Start using unodified Developer Certificate of Origin v1.1 56ec49c Sync with wireless-testing.git include/uapi/linux/nl80211.h b64afe2 Fix SAE state validation on AP d6bfaaa NFC: Add summary and success file options for nfcpy scripts 25cfc6f P2P NFC: Add p2p-nfc.py --handover-only option 7bea076 P2P NFC: Clean up p2p-nfc.py error handling b0d18bc WPS: Make UUID-from-MAC Address easily available 825fb6b P2P: Do not indicate P2P_FIND failure if p2p_scan is in progress 8c18fcc WPS: Add more debug information to M7 AP Settings d7a15d5 WPS: Indicate current AP settings in M7 in unconfigurated state d55fc03 P2P: Handle unexpected GO Neg Req reject message more cleanly 062a7c0 Fix persistent P2P connection failure in case channel list changes Change-Id: I5c400a6503f9f00d259ff225999593958322a1ba Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
|
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
04f534e89ed127da4077485376f24debc50d80d5 |
|
10-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 075131e32e6967977da4bbfa8a7f63dbfbf86008i 075131e Android: Do not compile wpa_supplicant if not chosen f7154ce DFS: Use channel switch when radar is detected 6c6c58d hostapd: Make hostapd_set_freq_params() public b72f949 DFS: Allow skipping radar channels 8d1fdde nl80211/hostapd: Extend channel switch notify handling 10e694a AP: Use monotonic clock for SA query timeout af53896 Use monotonic clock for RADIUS cache timeouts fe52c21 Use monotonic clock for last_sae_token_key_update 100298e AP: Use monotonic time for AP list e5c9e40 OS utils: Add os_reltime_expired() b3493fa AP: Use monotonic time for STA connected time ed0ebee OS utils: Provide os_reltime_age() 8567866 P2P: Handle frequency conflict in single channel concurrency case b125c48 P2P: Add wfd_dev_info= field for device found event e706d2d bsd: Fix compilation error for NetBSD f757950 eap_proxy: Extend Android.mk to support additional libraries Change-Id: I6d4f0f559f420680903d12966c7a6a87da97d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
e86b95125ee6d7381c6a399c41b0b7c737627cad |
|
14-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: Remove obsolete ANDROID_P2P from ieee802_1x_finished() Change-Id: Icdd3e6edeb65e6ac0cad5ec1ef87026063173a0a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
cce06667447b5aec83452adb0c15100ada531095 |
|
05-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d4f1a347ceca31fd9cf14070fd000235d5f4e9c1 d4f1a34 Allow AP mode configuration with VHT enabled on 2.4 GHz bb337dd DFS: Do not use cf1 to override freq for 20 MHz channels 0dfd2c6 Document AP mode startup functions fee947b hostapd: Use correct wpa_printf verbosity level for message 2fe210c hostapd: Fix multi-BSS configuration file parsing regression e4ba031 hostapd: Use start_ctrl_iface() from hostapd_add_iface() bf7f09b Fix AP mode QoS Map configuration to be per-BSS dc036d9 DFS: Convert hostapd_data use to hostapd_iface 2db938e hostapd: Fill in phyname automatically 5ae6449 hostapd: Add ctrl_iface STATUS command afadaff Optimize 40 MHz HT co-ex scan on AP 7d6d737 hostapd: Add AP-ENABLED/DISABLED ctrl_iface events e1c5faf hostapd: Track interface state f0793bf hostapd: Wait for channel list update after country code change ae134e1 hostapd: Add ctrl_iface events for ACS ad08e14 hostapd: Move ctrl_iface initialization to happen earlier c20cb02 hostapd: Remove hostapd_interface_init2() 4a5deb9 hostapd: Simplify interface initialization 186c905 DFS: Add control interface events for various DFS events ddf5517 hostapd: Add control interface test commands for radar detection 884f1a3 nl80211: Verify radar event attributes exist before using them 71cdf6b hostapd: Fix ENABLE failure to not remove interface 18ca733 SAE: Fix group selection 65015b2 Replace unnecessary UTF-8 characters with ASCII versions 61323e7 Convert perror/printf calls to wpa_printf 3f134b4 hostapd: Accept RELOG from global control interface b253e6f hostapd: Use wpa_printf() for hostapd_logger() to stdout c092d83 P2P: Clear pending group formation data on group removal 9100b66 P2P: Debug print reason for specific SSID for scan 2aec4f3 Allow add-BSS operation to re-use existing netdev 5592065 hostapd: Allow a single BSS to be removed from an interface 2e2fff3 hostapd: Allow a single BSS to be added to an interface a1fb569 hostapd: Make hostapd_interface_init_bss() available externally 66936c6 hostapd: Make hostapd_init() available externally 390e489 hostapd: Allow the first BSS in a multi-BSS setup to be removed 834ee56 nl80211: Make wpa_driver_nl80211_data::first_bss pointer 748c0ac nl80211: Fix monitor interface reference counting 08e55eb nl80211: Add a debug print for DEL_BEACON 33b0b33 hostapd: Fix error path in hostapd_add_iface() 770ecdf ACS: Do not get stuck while failing to do a subsequent scan 813d4ba DFS: Add support for multi-BSS 954e71d DFS: Reset cac_started properly 6a398dd DFS: Sanitize channel availability checks 32595da DFS: Fix HT40/VHT calculation 0648c3b hostapd: Add -T Linux tracing option 392e68e Set GTK rekey offload information after initial group key handshake bbc706a nl80211: Add debug prints for NL80211_CMD_SET_STATION 731ca63 Update regulatory change to all virtual interface for the phy 6f2db2f hostapd: Validate configuration parameters on RELOAD command eff0fd1 hostapd: Move generic configuration functions into src/ap 5afaa06 hostapd: Allow per-BSS (vif) configuration files ebd79f0 hostapd: Make hostapd_config::bss array of pointers a781e21 hostapd: Force PSK to be derived again on BSS reload 9f104b0 hostapd: Reuse hostapd_clear_old() for RELOAD command Change-Id: I7fbb26cbd4a2960af66a4373c0e6bbe5390a4940 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
9657139ca0bbea9a84e0a3c7e9438d1f53c9ed24 |
|
14-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5079392954c80573234952772dc39dbb5d3179ca 5079392 Increase buffer size and prevent write beyond buffer end ded22b5 hostapd: Fix segfault after ACS when flushing STAs 7e910b7 WPS NFC: Cancel scheduled scan before attempting a scan 24d110d Replace printf with wpa_printf debug message b72e14e P2P: Do not allow P2P client connection without P2P IE from GO 5df7414 P2P: Allow persistent group determination based on Beacon frame aaeb9c9 P2P: Allow GO to be discovered based on Beacon frame b16696f P2P: Show p2p flag in debug info for scan results bb50ae4 P2P: Show P2P flag in BSS entries also based on Beacon frames ff57398 P2P: Do not drop P2P IEs from BSS table on non-P2P scans adeb4f5 P2P: Make sure wait for the first client gets stopped f22f274 P2P: Clone 'disable_scan_offload' parameter for p2p group 63ce59d P2P: Increase Invitation Request timeouts acdd0fc P2P: Clear p2p_group_formation and p2p_in_provisioning on group removal Change-Id: I464e59b59ac0c15af1b72ca0eda00e55c699c1c7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
5393a0f77c5281735888bd9dcf8d8abeb5961461 |
|
08-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d2ba3d6bd9336ef8fd761a0cc7999824d4c4da41 d2ba3d6 VLAN: Simplify no-WEP with VLAN check d66dcb0 WEP: Remove VLAN support from hostapd 646f12a bsd: Add a commit routine 32dc6a3 bsd: Mark define sta_set_flags() only for hostapd 70a867c bsd: Mark the interface down before opening the routing socket 89f4690 bsd: Compute the RSSI level 5dd82c6 bsd: Set IEEE80211_KEY_NOREPLAY in IBSS/AHDEMO mode cb76af8 bsd: Skip SIOCSIFFFLAGS ioctl when there is no change. 7239ea7 nl80211: Add stop AP mode event API Change-Id: Ib1c41f2ed18299451f05d0adf808b8b560522c86 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
|
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
4b06059785b935dd1f4f09314e4e12c417d2c6a4 |
|
30-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b57b560034f1bb1ad3a3892228940dde97323c0e b57b560 wpa_supplicant: Default to nl80211 instead of wext ee28f08 hostapd: Add more messages for error paths 61d2ce2 hostapd: Reject configuration file without interface parameter a8a7890 Clear extra_blacklist_count on FLUSH command c646862 WPS ER: Allow UPnP interface to be forced 728d971 Use status code 17 (unable to handle new STA) on max-STA limitation 5e24dc8 Add dup_binstr() to help common binary string tasks 8b44ad7 Use os_zalloc() instead of os_malloc() + os_memset() 2c48211 FT RRB: Validate os_malloc() return value before using it 7ca902b Make vlan_file optional if dynamic_vlan is used bdb112d Add bitfield routines 04382f7 NFC: Add no waiting and no multiple operations options for scripts fe90496 WPS: Fix AP auto configuration on config token generation 28fcfb6 NFC: Increase wpa_cli command buffer size 8f7a6dd WPS NFC: Allow Device Password ID override for selected registrar aaecb69 WPS: Use generic MAC Address attribute builder 9ccd916 P2P: Clean up channel--frequency conversion functions e864c0a Use a common frequency to channel conversion function 02db75b FT: Reset FT flag upon STA deauthentication 7800d45 P2P: Set P2P_DEV_PEER_WAITING_RESPONSE from TX status callback d78d3c6 EAP peer: Add check before calling getSessionId method dd57970 Disable network temporarily on repeated connection failures Change-Id: If8078d5c1ff40ea806e844543cf6f2bf9d24b7ac Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
ad266fb3da6083126e7619e525153839b918aa44 |
|
25-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-37 - Allow AP_SME support - Do not send disassoc after EAP failure since AP_SME is enabled and del_station will be called - Allow group idle timeout to run during WPS disconnect Change-Id: I7e9e15b9c44804196bc98c01d51a71e24412b91d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
dca3979ccdf869f140f096b83df322a0efc84f22 |
|
06-Sep-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P fixes for BRCM 1. Fix for stopping any on-going P2P-FIND, while doing a P2P-GROUP-ADD. 2. Fix for Supplicant crash. The crash was due to socket being closed during P2P-GROUP-REMOVE. 3. Append P2P DEV ADDR during AP-STA-CONNECTED Event for P2P Devices. For legacy STA, the event format would remain the same. BUG: b/5262575 Change-Id: I8faf2159d35538fd07e42dba82d367b581cf2164 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
497c1d5e50162d6b3c1cce5dbd9c5fd9da69aaef |
|
22-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Add P2P support for BRCM CFG80211 driver Change-Id: Iafec4bedbd33836d0a64e7ea054d8a46ef8ec204 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
|
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/ieee802_1x.c
|