293335998d38c497293b1c41f7ad8342b507d458 |
|
09-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 05e5e615e6a26d7a9f5bd0569a0baeae1bcdee49 05e5e615e AP: Skip authentication/deauthentication phase for DMG/IEEE 802.11ad 0c4b9025c AP: Do not look for supported rates in DMG/IEEE 802.11ad e72faadb4 bgscan_simple: Fix short_scan_count comparison 517b5f928 nl80211: Zero num_modes if nl80211_get_hw_feature_data() fails 39c5da328 nl80211: Use correct attribute for scan flags in vendor scan c167662d7 eap_proxy: On SIM error flush PMKSAs only for SIM/AKA/AKA' networks 6657bb158 Fix OOM handling in neighbor report response handling 7187e2093 Allow LCI request with no subelements d73420143 RRM: Enable beacon report with active/passive scan for all drivers ec45927b8 Report received beacon report with BEACON-RESP-RX event f3383366a Report beacon request TX status as control interface event 90d9d7c32 Beacon request through hostapd control interface 73a27a634 Add hostapd configuration parameter rrm_beacon_report de6ec8b55 Enable Beacon Report using beacon table for all drivers 6774c6a9f Update copyright notices for the new year 2017 f56877414 Do not add own BSS in neighbor report with invalid op_class/channel aeff0645d FILS: Fix FILS Realm Information ANQP-element construction 76196ddb2 wpa_supplicant: Add support for Beacon Report Radio Measurement b3060bf99 common: Add helper function to convert RSSI to RCPI 1ac4dba31 wpa_supplicant: Extend verify_channel() and make it global c9ff8e5f6 common: Add function to get an operating class by its number and country e4f1d879c common: Add non-global to global operating classes conversion 96a5f14ee nl80211: Add support for additional scan parameters for beacon report c16b9f8d3 driver: Add scan support to beacon report 3c716fdbd wpa_supplicant: Refactor wpas_rrm_build_lci_report() e1b96e112 wpa_supplicant: Send rejection for unsupported radio measurements 0c73e410d wpa_supplicant: Limit RRM response size to MMPDU size 9664ab8b7 wpa_supplicant: Refactor Radio Measurement Request handling 332bf5d3f wpa_supplicant: Validate RRM request frame format ec493469f wpa_supplicant: Move RRM implementation to a dedicated file d1c74f8c9 Add RRM definitions for beacon report measurement 6a31440b8 Fix LCI request subelement processing ce691a8d9 Add CONFIG_MESH into wpa_supplicant defconfig 67129ab9e wpa_cli: Add commands to use PMKSA_GET/ADD bbad185c1 P2P: Fix compilation warning in p2p_add_device() 2977f5193 GAS: Remove unnecessarily duplicate gas_frag_limit configuration 1940559ea FT: Drop FT Action frames if ft_over_ds=0 d8de90487 Remove deprecated tx_queue_* params from hostapd.conf notes 78022c836 Fix memory leak on hostapd eap_user_file parsing error paths 02f999c6d hostapd: Remove unnecessary NULL check from parser functions fd5f29e7e Fix memory leak in hostapd BSS_TM_REQ error path handling 95de34a10 Remove trailing whitespace 45997cce4 hostapd: Add TERMINATE as per-interface command 546680f81 hostapd: Do not update dtim_period with invalid value 356773058 RADIUS server: Increase maximum number of sessions a5861afcb hostapd: Do not update invalid wep_key_len_unicast f78402ace hostapd: Do not update rejected wep_key_len_broadcast e0ba7efe5 hostapd: Do not update eapol_version with rejected value 9266d00bf hostapd: Reject invalid macaddr_acl value 8628555f9 hostapd: Check driver parameter before replacing previous value 1dfd25a68 Fix hostapd SIGHUP processing before interface is enabled 34e29dfd4 Remove unnecessary NULL check from hostapd_config_read_wpa_psk() call 65dfa8728 mka: Make MKA actor priority configurable 9bcfd5be8 Document new D-Bus WPS properties 77fcbf7ff D-Bus: Use a helper function to get possibly NULL strings dbf524946 D-Bus: Add DeviceType in WPS property 266097fda D-Bus: Add device serial number in WPS property 3ee6a3ab3 D-Bus: Add model number in WPS property ae66822cd D-Bus: Add WPS model name as property 318d4b5be D-Bus: Add WPS manufacturer as property b20f031c6 D-Bus: Add WPS device name as property 4a45dc192 mesh: Show [MESH] flag in print_bss_info() c04a67deb hostapd_cli: Add completion for get command bf4167b9d hostapd_cli: Add completion for set command 86adff09e hostapd_cli: Completion for further commands with STA parameter 4f59ad069 hostapd_cli: Use common completion for commands that use stations 62b95eb67 hostapd_cli: Add missing command help descriptions 04f02faac Fix wpa_cipher_to_alg() return type 9187b13ad wpa_supplicant: Add BSS CURRENT control interface command d7f12e4eb OpenSSL: Make sure local certificate auto chaining is enabled 4be02b71b OpenSSL: Remove SSL_{CTX_,}_clear_options ifdefs 7655bd738 P2P: Do not use wait_time for SD Response TX without fragmentation 1f0fdaf0e Fix race condition between AssocResp callback and 4addr event a6f3761f7 eap_proxy: Add support for SIM state change indication from eap_proxy 79a54ab9f eap_proxy: Fix eap_proxy_init() prototype to use const eapol_cb 4e118c847 D-Bus: Add 'freq' option to P2P Find method to specify starting channel e414f4f02 PeerKey: Fix STK 4-way handshake regression 28fb9bb19 PeerKey: Fix EAPOL-Key processing dfc773172 Android: Add p2p_add_cli_chan=1 option 7508c2ad9 PAE: Make KaY specific details available via control interface b54f43390 FILS: Make FILS Indication element information available in BSS output 8183aee6c FILS: Add support for building FILS Realm Information ANQP-element 9cad61867 FILS: Add Realm Information ANQP-element in BSS data 26bf70e3d FILS: Separate FILS realm configuration from ERP domain 42b847ac1 FILS: Fix hashed realm name derivation 29062f293 Update various definitions based on IEEE Std 802.11-2016 aaa9c60bc Fix preauth_test build by updating add_pmkid/remove_pmkid callbacks 0babae87a Fix wpa_supplicant build error with IEEE8021X_EAPOL unset 19810d29b Make Beacon IEs available in wpa_supplicant BSS command 274e76f22 mesh: Fix channel configuration in pri/sec switch case cebda0e3e Make debug print clearer for AP/mesh mode secondary channel issues 3459381dd External persistent storage for PMKSA cache entries c57931273 Add PMKSA-CACHE-ADDED/REMOVED events to wpa_supplicant 655dc4a43 Send "TERMINATING" event from hostapd 5149a0f04 P2P: Set p2p_persistent_group=1 at the time of reading disabled=2 065c029a5 Remove MBO dependency from Supported Operating Classes element 62cd9d792 nl80211: Specify the BSSID in the QCA vendor scan 444930e5b Define an attribute to do a specific BSSID QCA vendor scan cea761472 Add QCA vendor command definitions for IDs 61-73 cb0cc6efa Define QCA Beacon miss threshold attributes for 2.4 and 5 GHz bands c313c8a5d Fix QCA vendor command values for SAR power limits a5c723adc Interworking: Clear SCANNING state if no network selected a1836de64 SME: Fix IBSS setup after shared key/FT/FILS association f49c852b5 P2P: Fix a theoretical out of bounds read in wpas_p2p_select_go_freq() 944d48588 P2P: Fix a theoretical out of bounds read in wpas_p2p_setup_freqs() 0a6c9dc70 P2P: Send P2P-DEVICE-FOUND event on peer changing device name 9a431d493 WFD: Clear wfd_subelems when P2P peer stops sending them 6e374bd44 Ignore scan results from ongoing scan when FLUSH command is issued 71ac93453 Make update_idx available in BSS control interface command 49aa88bb5 P2P: Clear PEER_WAITING_RESPONSE on GO Negotiation success c79238b6a Define a QCA vendor command to configure SAR Power limits 0f5eb69f8 Use eloop timeout for post-EAP-Failure wait before disconnection 20b1a9e23 Allow hostapd wep_key# parameters to be cleared 5ec3d510e wpa_passphrase: Reject invalid passphrase Test: Wifi Suite Change-Id: Ida52ca4e43bbc326a89d4c9848529df2d545b692 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
d97138ded63ac5388da3a2b63dea563c8b44c8ec |
|
28-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 324ade51e168f28430f4429849becd0f08d507c0 324ade5 TLS: Make tls_cert_chain_failure_event() more robust c6231b5 TLS: Remove storing of never-read value 15a6813 Remove unnecessary cleanup assignment in SHA1Final() ef3866a nl80211: Don't call linux_iface_up() for a dedicated P2P Device c2ed779 mesh: Document Mesh Peering Management element structure in more detail b2817cd mesh: Check PMKID in AMPE Action frames 6c33eed mesh: Fix PMKID to match the standard ede7770 wpa_supplicant: Do not wait for monitor on P2P Device interface 1c94570 Do not wait for monitor to attach if no control interface f98674a Clone default LIBS value to LIBS_* for other tools 7d2f674 Add "GET_CAPABILITY acs" to allow ACS build option to be detected d990971 wpa_supplicant: Enable Automatic Channel Selection support for AP mode 96bc508 Handle survey event properly in wpa_supplicant d39f796 EAP-TNC peer: Remove dead code related to fragmentation 662512e P2PS: Remove dead code abbbaa4 TNC: Print received IF-TNCCS message as debug ASCII hexdump d745f02 EAP-TNC peer: Allow fragment_size to be configured a67e7e5 RADIUS: Add EACCES to list of recognized send() errno values 5bd9be4 Fix RADIUS Called-Station-Id to not escape SSID 0764dd6 TLS client: Multi-OCSP check to cover intermediate CAs d6b536f Add ocsp=3 configuration parameter for multi-OCSP 0268383 TLS: Move variable declaration to the beginning of the block b567775 TLS client: OCSP stapling with ocsp_multi option (RFC 6961) 8ea6a27 TLS server: OCSP stapling with ocsp_multi option (RFC 6961) 5addb0d Server configuration for OCSP stapling with ocsp_multi (RFC 6961) bca0872 TLS server: OCSP stapling 9532bd2 GnuTLS: OCSP stapling on the server side 6241766 Use wpa_msg() for the "RSN: PMKID mismatch" message e161451 EAP-EKE: Merge identical error return paths 13cb0a6 EAP-EKE: Reject too long Prot() data when building a frame 0ab0de8 Document previously missing key_mgmt values Change-Id: I9ac7d0da03d8baf4542e276ab20cb56e44bfa33c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
1b46775bb44f06b3cc285481ff5f7a673559ed7d |
|
14-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 06f14421ea8644d12a7b0be6b583114869f9c451 06f1442 TLS: Parse OCSPResponse to extract BasicOCSPResponse d560288 TLS: Parse CertificateStatus message eeba168 TLS: Add status_request ClientHello extension if OCSP is requested 4303d53 TLS: Parse ServerHello extensions 6b7bb42 TLS: Add minimal support for PKCS #12 5ce2941 TLS: Extend PKCS #5 to support PKCS #12 style key decryption f6a62df TLS: Fix and complete ASN.1 tag list 3c108b7 EAP peer: External server certificate chain validation b6e5e14 EAP-FAST peer: Fix PAC parser error messages 5b904b3 EAP-FAST: Check T-PRF result in MSK/EMSK derivation b1d8c5c EAP-FAST peer: Fix error path handling for Session-Id 36478a1 OpenSSL: Support new API for HMAC/EVP_MD_CTX in OpenSSL 1.1.x-pre1 9257610 FT: Fix FTIE generation for EAPOL-Key msg 3/4 e44bd28 FT: Fix sm->assoc_resp_ftie storing on the AP side 59e78c2 FT: Fix FTIE generation for 4-way handshake after FT protocol run b0ecbd3 AP: Use more readable version of management group cipher in error cases 651c6a8 Add TEST_ASSOC_IE for WPA/RSN IE testing on AP side 58059e6 FST: Print debug entry on MB IE update based on EVENT_AUTH af041f9 dbus: Add support for vendor specific elements 5c8acf7 EAP-IKEv2: Check HMAC SHA1/MD5 result 7b991b4 Use proper build config for parsing proxy_arp 4db29e6 TLS: Add support for PKCS #5 v2.0 PBES2 Change-Id: I10b71e4d3573ef60a52ea6ff56afcd3a06a0b7b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
d7ff03d48f825360eec2a371e3361306f2fd721b |
|
04-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit bf3214b59321f67375df1ee85722b2beb74e1f7a bf3214b P2P: Fix re-invoked client interface completion on data connection 63502c6 P2P: Fix P2P_CANCEL for p2p_in_invitation case e007d53 EST: Comment out X509_REQ_print calls on Android with BoringSSL e6f4832 EST: Add CSR generation support with BoringSSL ed2566a EST: Implement pkcs7_to_cert() with BoringSSL 8d27efa HTTP (curl): OCSP with BoringSSL 213e158 BoringSSL: Move OCSP implementation into a separate file f846211 BoringSSL: Support new SHA_CTX definition for EAP-SIM PRF b34c623 OpenSSL: Fix build with current OpenSSL master branch snapshot 759a8a3 nl80211: Cancel all pending TX frame cookies 9ea91cd EAP-EKE peer: Fix memory leak on error path 328f49a P2P: Complete group formation on client data connection 0e559dc WPS: Support parallel UPnP WPS protocol runs bea48f7 Allow sched_scan_plans to be updated at runtime 32c0226 Add support for configuring scheduled scan plans 09ea430 nl80211: Add support for multiple scan plans for scheduled scan dd895e9 P2P: Make p2p_go_configured() more robust against unexpected calls 8811988 TLS client: Fix session_resumed status after TLS session ticket use 7fff91a Fix tls_connection_prf() regression with CONFIG_TLS=internal 1adf262 TLS: Add support for extKeyUsage X.509v3 extension 0755577 Add TEST_FAIL() support for internal hash functions 4104267 Fix memory leak on NFC DH generation error path c5864dc TLS client: Add certificate chain validation failure callbacks 896a97d TLS client: Add support for disabling TLS versions 0cbc22b TLS client: Use TLS_CONN_* flags 20804fe TLS: Add support for tls_get_version() f2a6ad0 TLS client: Add support for server certificate probing b115eeb TLS: Add TLS v1.2 signature algorithm support for SHA384 and SHA512 c0acec3 crypto: Add CRYPTO_HASH_ALG_SHA384 and CRYPTO_HASH_ALG_SHA512 0aed915 TLS client: Add signature_algorithms extension into ClientHello 9e8809a TLS client: Validate certificates with SHA384 and SHA512 hashes 6bb6a9c Add SHA384 and SHA512 implementations from LibTomCrypt library fdc1614 TLS client: Add support for validating server certificate hash 3665776 TLS client: Do not verify CA certificates when ca_cert is not specified 11c9ddb Add TEST_FAIL() condition to aes_128_cbc_encrypt/decrypt() ea52a46 EAP-SIM peer: Fix memory leak on reauth error path 1a33c94 EAP-SAKE: Fix a typo in attribute parser debug print 53401e9 Abort ongoing scans on FLUSH command e929eb3 wlantest: Add -N command line argument to remove write buffering 3c41749 hostapd: Add Transmit Power Envelope IE when VHT is enabled 2ea2166 Add control interface command for aborting an ongoing scan 4ead7cf Abort an ongoing scan before connect 4f30add nl80211: Add support for aborting an ongoing scan 5ef0b84 Sync with mac80211-next.git include/uapi/linux/nl80211.h 0530eb1 mesh: Clear wpa_s cipher selection on starting mesh 1d6955e nl80211: Fix SIGNAL_POLL in IBSS and mesh 0f29bc6 IBSS/mesh: Add support for VHT80P80 configuration c27f4c9 P2P: Add support for VHT 80+80 MHz and 160 MHz bee5d8e nl80211: Add VHT 160 MHz channel flags 5e1da9c P2P: Define operating classes for VHT 80+80 and 160 ea70811 FST: Improve parsing of Multiband IEs b47d05a FST: Make FST peer connection check more permissive in hostapd 39c3c9b Remove wpa_supplicant/tests 9b635d0 Remove link_test and test_wpa 9e68742 Fix CONFIG_NO_WPA=y build eb926f1 Comment out wpas_reenabled_network_time with CONFIG_NO_SCAN_PROCESSING f231b3d FST: Fix STA MB IEs creation ed7820b P2P: Add a testing option to force P2P GO CSA 6cbbae2 P2P: Set p2p_go_wait_client in invitation_result() cb 83702b6 Android: Give user the option for selecting browser for HS 2.0 OSU cadffac wpa_cli: Add an option to set created interface type 0f039e3 Add an option to create interface of a certain type with INTERFACE_ADD d8a3b66 driver: Make setting up AP optional when creating AP interface 36e8206 Check for LIBRESSL_VERSION_NUMBER in tls_openssl.c 2c51c0b P2P: Clear send action work without waiting on find/stop/listen 6bdc43c AP: Avoid 20/40 MHz co-ex scan if PRI/SEC switch is not allowed 757785d nl80211: Clear ignore_next_local_deauth flag cb2a926 nl80211: Clear ignore_next_local_deauth and ignore_deauth_event f32227e Add QCA vendor attribute and event to indicate subnet change status d38c7be Skip SELECT_NETWORK steps only if already connected or connecting 25eb7fc Fix EAPOL reauth after FT protocol or offloaded PMKSA cache use f68d491 FT auth: Fix EAPOL reauthentication after FT protocol run a65efbf Add VHT support for Mesh a73c984 Set WMM flag to Mesh STA by default 9a8d9f7 Assign QCA vendor command and attribute for Tx power reduction in dB 747ba10 nl80211: Do not return incomplete hw capability info 5e238cc WPS: Reconnect for a failed data connection when STA_AUTOCONNECT is 0 442cc8c dbus: Fix memory leak in sending InvitationReceived signal 0603bcb hostapd: Process MAC ACLs on a station association event (SME in driver) 89a11ad RSN: Remove check for proactive_key_caching while setting PMK offload d381963 Extend QCA roam event with subnet change indication Change-Id: I122220f59ef56e25ed2749a37370a40afafa177a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
af9da3180dc20f57df1fc1e1811f3df9fa9e6ab5 |
|
03-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 681278246232029c334117bd6dc7e74c6b179f96 6812782 hlr_auc_gw: Allow Milenage RES length to be reduced 4839f7c wpa_cli: Fix a typo in usage text a20a361 wpa_supplicant: Clear blacklist on connect 0144ecb Android: wpa_ctrl missing include for sys/stat.h 0bb20ef HS 2.0R2: Allow user to specify spp.xsd file location 97c9991 HS 2.0R2: Add more debugging messages to hs20-osu-client 93c2e60 HS 2.0R2 CA: Improve setup.sh and .conf for more flexibility 02e122a Reschedule scan from wpas_stop_pno if it was postponed 80fd9c3 EAP-PEAP server: Add support for negotiating vendor for Phase 2 a867082 EAP peer: Use 32-bit EAP method type for Phase 2 processing 56dfc49 Fix a typo in configuration parameter documentation c4b45c6 TLS: Fix memory leaks on tls_connection_set_params() error paths af85191 Make tls_connection_get_keyblock_size() internal to tls_*.c 94f1fe6 Remove master key extraction from tls_connection_get_keys() fa0e715 Use tls_connection_prf() for all EAP TLS-based key derivation df8191d Rename HT 20/40 coex variable to be more descriptive 1d0f42a EAP server: Add debug prints to help asleap testing 2c1cf90 Add wpa_snprintf_hex_sep() 5955cfa ms_funcs: Make challenge_hash() non-static Change-Id: I0f3e5e5170a61e458949a675641946d95598dc5d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
818ea489ef32dcdc7c098d8a336d6e1dd8996112 |
|
10-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 390b92913a9a1b3a6aaf70e8b5971a7b7c76cabc 390b929 TLS testing: Allow hostapd to be used as a TLS testing tool 994afe3 RADIUS server: Allow TLS implementation add log entries 01f7fe1 RADIUS server: Allow EAP methods to log into SQLite DB 8a57da7 RADIUS server: Add option for storing log information to SQLite DB f3ef7a2 TLS client: Send decrypt_error on verify_data validation error 129b9b9 TLS: Share a helper function for verifying Signature 6531963 TLS: Use a helper function for calculating ServerKeyExchange hash 65074a2 TLS: Add support for DHE-RSA cipher suites 41ebfe9 TLS server: Enable SHA256-based cipher suites 60b893d wpa_supplicant: Allow external management frame processing for testing ec33bc6 Enable RADIUS message dumps with excessive debug verbosity 226e357 Revert "bridge: Track inter-BSS usage" d0ee16e Allow arbitrary RADIUS attributes to be added into Access-Accept 0ac3876 Fix PMF protect disconnection on session timeout 49021c1 Fix hostapd error path regression Change-Id: Ie0710c036cca2fb370d28684cc5a5d28a075dfc1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
9bce59c7fef20e34a05f04d1e33a4076083dca0c |
|
12-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 10-Sep-2012 TOT commit 762b99db7a76803d1ad274e87caa6fe870d47441 Author: Jouni Malinen <j@w1.fi> Date: Mon Sep 10 12:33:29 2012 +0200 Fix last_scan_res update existing BSS entry is update Change-Id: I03f933bf6d7f7e36b0f8ac410fbc37990f127c18 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
c55524ad84d13014e8019491c2b17e5dcf13545a |
|
07-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Fix D-Bus build without CONFIG_P2P=y nl80211: Allow AP mode to be started without monitor interface nl80211: Process association/disassociation events in AP mode DBus/P2P: Adding decl for PersistentGroupRemoved signal DBus/P2P: Rectified type of SecondaryDeviceTypes in device property Get P2P: Only call dev_lost() for devices that have been dev_found() wpa_cli: Add missing parameter for P2P_GROUP_ADD command wpa_supplicant: Respect PKG_CONFIG variable if set in the environment TLS: Add support for tls_disable_time_checks=1 in client mode hostapd: Clear keys configured when hostapd reloads configuration Add dbus signal for information about server certification Move peer certificate wpa_msg() calls to notify.c wpa_supplicant AP: Disable AP mode on disassoc paths wpa_s AP mode: Enable HT20 if driver supports it Allow PMKSA caching to be disabled on Authenticator FT: Disable PMKSA cache for FT-IEEE8021X FT: Clear SME ft_used/ft_ies when disconnecting 8fd0f0f323a922aa88ec720ee524f7105d3b0f64 Change-Id: I6ae333196c36ffa7589662d5269fabfc3b994605 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/tls/tlsv1_client.c
|