b97e428f8acf1ecb93f38f8d0063d2f2fd0bc36e |
|
08-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c06c9099f0d0827feae5622097bd8ac946eca5ea c06c909 Use stronger PRNG for MS-MPPE-Send/Recv-Key salt 9e1f1bd eloop: Clean up coding style for eloop debug prints f9982b3 Implement kqueue(2) support via CONFIG_ELOOP_KQUEUE 2e69bdd eloop: Add eloop_sock_requeue() 70f4f05 wpa_ctrl: Retry select() on EINTR df9e2c2 D-Bus: Don't do <deny send_interface="..." /> in dbus service file 9684c75 mesh: Fix peer link counting when a mesh peer reconnects 83fe38b P2P: Fall back to no VHT when starting AP/P2P GO 360a9d5 P2P: Reduce off channel wait time for some P2P Action frames 1fc63fe RADIUS: Share a single function for generating session IDs 2cbc6ff RADIUS: Redesign Request Authenticator generation b71a64a Send an Acct-Multi-Session-Id attribute in Access-Request packets 4260e1a Add Acct-Session-Id to Accounting-On/Off d72a005 RADIUS: Use more likely unique accounting Acct-{,Multi-}Session-Id d689317 EAPOL auth: Move radius_cui/identity freeing to eapol_auth_free() 0ae86f9 wpa_supplicant: Fix couple of C++ compiler errors with header files 9b6177a Add Event-Timestamp to all Accounting-Request packets d179089 GAS: Calculate response buffer length of ANQP elements dda091c OpenSSL: Fix server side PKCS#12 processing with extra certificates 443c8e1 OpenSSL: Fix possible null pointer dereference on an OCSP error path a3cc64f Remove -w support from wpa_supplicant README e265838 EAP-FAST: Fix an error path in PAC binary format parsing f91e11f D-Bus: Fix p2p interface capability message 479f46c Do not send Acct-Authentic in Accounting-On/Off 696544e RADIUS: Do not include Acct-Terminate-Cause in Accounting-On/Off 236053e Make fallback from HT40 to HT20 work cb22e3b BSD: Zero ifindex on interface removal a8ef133 Android: Support multiple CA certs when connecting to EAP network 80ce804 WNM: Workaround for broken AP operating class behavior af06093 BSD: Disable interface on down dc0ad60 BSD: Use correct ifindex from route messages 5f17b2c BSD: __FUNCTION__ -> __func__ 2088ecb OSU: Add debug printing of more LogotypeExtn fields 0b905c8 Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" 03a72ea VHT: Add an interoperability workaround for 80+80 and 160 MHz channels Change-Id: Ief9174bdec380e81025e1467c47bf1656eb39cd9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/accounting.h
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/accounting.h
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/accounting.h
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/accounting.h
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/ap/accounting.h
|