092955c7394ee96d6c8c9724ff46a3c038b36143 |
|
06-Feb-2017 |
Paul Stewart <pstew@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check 89fa633af nl80211: Fix error while enabling AP mode with driver-SME The last change 89fa633af cherrypicks a later change that resolves an issue with starting up AP mode. Bug: 34681709 Test: Wifi Suite Change-Id: Iba8c5824009d6480fb736b274d69243c77aef7fe
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
055a67c81da597ef09906f302da1303c9039fe86 |
|
02-Feb-2017 |
Rebecca Silberstein <silberst@google.com> |
Revert "Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d" This reverts commit bbcc4391bed89e8cd0dd235760cd2983f65721cf. Bug: 34869019 Test: Load image and start soft AP Change-Id: I85f39c134c1321d6a78f9f25a34f71ad7b1173fb
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
bbcc4391bed89e8cd0dd235760cd2983f65721cf |
|
30-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a9491695b30a7f750dc45cb563d813b03f1d4b8d a9491695b QCA vendor command to set/get NUD statistics f593b6c11 nl80211: Do not reset vendor_scan_cookie after scan timeout f2bc34480 wpa_supplicant: Fix global control interface for STA/STA-FIRST/STA-NEXT cc3dae85b hostapd: Add possibility to send debug messages to syslog 0da355235 FST: Remove WPA_ASSERT from wpas_fst_send_action_cb() 968dce9b1 FST: Silence compiler warning on WPA_ASSERT 17e20b1e2 FST: Remove a bogus WPA_ASSERT() 6a5425fd6 Increase delayed EAPOL RX frame timeout cef8fac04 wpa_auth: Make struct wpa_auth_callbacks const 30eddf352 Fix or supress various sparse warnings b301f54e5 IBSS/mesh: Skip VHT channel setup with vht_disabled=1 adc6a5d81 mesh: Check remote peer HT Operation element 9eb5757a8 Define helper function set_disable_ht40() 7813b7c34 nl80211: Fix a memory leak on deinit with HT enabled mesh 6b585f420 mesh: Fix crash on removing virtual mesh interface 5208160b4 FILS: Parse received FILS HLP requests 5732b770f FILS: Allow FILS HLP requests to be added a1aa2aebc Remove unused WLAN_CIPHER_SUITE_* definitions a042e39ac nl80211: Use RSN_CIPHER_SUITE_* instead of WLAN_CIPHER_SUITE_* 2373a3117 Define all RSN_CIPHER_SUITE_* values 89ba101e1 Remove unused WLAN_AKM_SUITE_* definitions bf9f8a052 Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* for wpa_akm_to_suite() 3aa24db95 nl80211: Use RSN_AUTH_KEY_MGMT_* instead of WLAN_AKM_SUITE_* a1343fa6b Remove unnecessary ifdef from RSN_AUTH_KEY_MGMT_* definitions afe731004 Fix CONFIG_SAE build without CONFIG_SME 34e8bfd7a Skip EVENT_ACS_CHANNEL_SELECTED also without CONFIG_AP 510fc2dfc Fix AKM suite selectors for FILS and Suite B d7d0f909f QCA vendor command to carry the reason for power save failure 53b38209f GAS: Cancel gas_query_timeout when AP responds with comeback delay d5bd94133 MBO: Silence a compiler warning when building without CONFIG_MBO 4c4070005 QCA vendor command to enable host driver offload ACS to user space 4d77d80ed mesh: Add MESH_PMKSA_GET/ADD commands 117875db3 D-Bus: Add GroupMgmt entry into the interface Capabilities dict 3cdb4ac07 D-Bus: Add pmf to global capabilities adf8f45f8 D-Bus: Implement Pmf property b98706c14 RSN IBSS: Fix TK clearing on Authentication frame RX fa67debf4 Fix duplicate Reassociation Request frame dropping 6ff92677a wext: Cancel send_rfkill timeout in deinit fcd3d6ce3 FILS: Fix PMK and PMKID derivation from ERP ef495c78d OpenSSL: Implement sha384_vector() a70cd0db8 nl80211: Don't register for Beacon frames for IEEE 802.11ad AP a2aa21a3b Assign additional vendor specific elements for early HE testing f09095d57 wpa_supplicant: Clarify group_rekey documentation c85dfc6f8 nl80211: Set NL80211_ATTR_IFACE_SOCKET_OWNER for connect and associate d07f450da Sync with mac80211-next.git include/uapi/linux/nl80211.h 8f315d050 Fix country code in wpa_supplicant AP mode Country element 29065686a D-Bus: Fix BSS Mode getter for invalid DMG BSS b2442f256 nl80211: Debug prints for TDLS_OPER command and result 2901bc272 bgscan: Remove unnecessary NULL check 9d6eaad6b bgscan: Remove unnecessary NULL check 0f9b4a0f1 bgscan: Deliver beacon loss event to bgscan modules 688556722 nl80211: More complete processing of connection quality monitor events 54736d835 Store FST parameters to configuration file 35c78f7b9 Store osu_dir to configuration file 1f539c78f Store autoscan to configuration file 58ed9e31d Store filter_rssi to configuration file 1fb1bf99d Write sec_device_type to configuration file b4bdeadfa Make "SET" behavior more consistent for dot11RSNA parameters e3394c0e2 Make "SET non_pref_chan .." behavior more consistent f8c201862 Fix cert_in_cb parsing in wpa_supplicant.conf 9284418d0 Fix writing of wpa_supplicant sae_groups configuration parameter 167f78a5e Send BEACON-REQ-TX-STATUS event only for beacon reports 7ba94fc4b RRM: Use wpa_hexdump_buf() instead of wpa_hexdump() e4ec6bbfd nl80211: Register for Link Measurement Report frames in AP mode 33468e532 RRM: Document Link Measurement Report frame construction steps 40e9a3f32 RRM: Fix beacon report scan channels for VHT 80, 80+80, 160 MHz cases 5cda35089 RRM: Move wpabuf_resize() call into wpas_rrm_report_elem() f2058f4af RRM: Remove unnecessary cb check Bug: 34681709 Test: Wifi Suite Change-Id: Ib7ab577a02a9c499ef6e78a222bb93d811f29d36 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
e4663044d3a689fb5458247e9bc0f8b58cf72fca |
|
04-Apr-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f89c32e63f71e66d7b55e284016762b603ae02db f89c32e Android: Fix max number of sched scan SSIDs based on driver capability f1a5a34 binder: Implement interface add/remove methods 7b4bbb9 binder: Add binder skeletal code for Android 5914ebf Remove struct ieee80211_mgmt::u.probe_req 094e949 atheros: Do not use struct ieee80211_mgmt::u.probe_req c01120a wpa_supplicant: Do not use struct ieee80211_mgmt::u.probe_req e1b9962 AP: Do not use struct ieee80211_mgmt::u.probe_req 5cd317d Do not clear PMKSA entry or EAP session cache if config does not change f933216 Revert "Assign QCA vendor command and attribute for Tx/Rx aggregation" bde9a4e Comment out UDP/UNIX socket code from common ctrl_iface based on build a6fbff2 Fix CONFIG_CTRL_IFACE=udp6/udp6-remote builds 0741c48 SAE: Check SHA256-PRF operation result ea86a34 SAE: Remove dead code in FFC pwd-value derivation 87faf1f nl80211: Fix libnl-tiny build with CONFIG_LIBNL20=y 31afdd2 Use TIOCOUTQ instead of SIOCOUTQ to avoid need for linux/sockios.h 6d07e76 wlantest: Use local ETH_P_IP define instead of linux/if_ether.h 795abc8 Drop USE_KERNEL_HEADERS define 9b7cd57 Use a separate header file for Linux bridge interface definitions c815fab Use own header file for defining Linux VLAN kernel interface 81606ab vlan: Fix musl libc conflict with Linux kernel headers f347429 P2P: Fix persistent group for 60 GHz networks e868599 vlan: Move if_nametoindex() use out of vlan_init.c 7c03c08 vlan: Move ifconfig helpers to a separate file 59d6390 vlan: Move CONFIG_FULL_DYNAMIC_VLAN functionality into a separate file 0fe28dd vlan: Remove unnecessary header includes from netlink implementation 84d6755 vlan: Clean up netlink vs. ioctl API implementation cb38bc8 vlan: Fix musl build error 954e10e Make it a bit easier to roam from 2.4 GHz to 5 GHz within ESS 585141b Fix a typo in a comment 1126c07 nl80211: Ignore deauth/disassoc event during Connect reassociation 6a5ee81 Include previous BSSID in connection request to indicate reassociation 00c3c4a nl80211: Add NL80211_ATTR_PREV_BSSID with Connect command cbc3d6f WNM: Verify BSS TM target match against the current network profile 8854f90 mesh: Simplify wpa_auth_pmksa_set_to_sm() 32d4fe9 privsep: Fix a compiler warning on unsigned/signed comparison 2e997ee Add interface matching support with -M, guarded by CONFIG_MATCH_IFACE 45e3fc7 Find correct driver for interface additions/removals 9037702 wpa_supplicant: Fix CONFIG_IBSS_RSN=y build without CONFIG_AP=y 5ae65de wpa_supplicant: Fix p2p_group_add when UDP-based ctrl_iface is used 24bce46 FST: Fix a compiler warning e567c58 Fix nfc_pw_token build with CONFIG_FST=y d774c46 mesh: Use appropriate BLOCKED state duration 9f2cf23 mesh: Add support for PMKSA caching 4c522c7 PMKSA: Flush AP/mesh PMKSA cache by PMKSA_FLUSH command b8daac1 PMKSA: Show AP/mesh PMKSA list in PMKSA command 2604edb mesh: Add MESH_PEER_ADD command e174ef3 mesh: Add MESH_PEER_REMOVE command f7648c8 P2P: Advertise IP Address Allocation only if it is enabled on GO 7f46ad9 BSD: Only down the interface once we are sure we can work with it 192964d Handle OSEN IE in Assoc Request info if req_ies exists 29eddc3 nl80211: Fix error path in if_indices_reason reallocation ee298f1 nl80211: Do not add NL80211_ATTR_SMPS_MODE attribute if HT is disabled 4ca16b5 Assign QCA vendor command and attribute for Tx/Rx aggregation 64ce590 libxml2: Check for xmlDocDumpFormatMemory() error case 8b827c3 BoringSSL: Keep static analyzers happier with X509_get0_pubkey_bitstr() 42a9553 hs20-osu-client: Fix pol_upd command line parsing ec1eae8 hs20-osu-client: Remove dead code from sub_rem command line parsing c3dc68e Do not invalidate EAP session cache on all network block parameter changes 9231c24 wlantest: Fix bip_protect() memory allocation c6c29be Interworking: Add credential realm to EAP-TLS identity Change-Id: I870f325171d00fed9c4fcd82a695fe5e2efee792 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
203eadb9eda41a1dde4a583edb4684319e3f399e |
|
05-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6e9023ea499ea9a89b0e858c85e32b455d57264c 6e9023e DFS: Allow wpa_supplicant AP mode to use non-offloaded DFS 02e42ab nl80211: Add vendor event parsing for DFS offload events bd0f68c DFS: wpa_supplicant event processing d7f1aa8 DFS offload: P2P changes for autonomous GO 1e2aaff DFS offload: Indicate AP-CSA-FINISHED for DFS offloaded case c13578c DFS offload: Add main DFS handler for offloaded case 5de81d7 DFS offload: Skip user space processing for CAC operations 192ad3d Interworking: Clear SCANNING state if no match found 95d7b86 P2P: Consider 5 GHz channels also for auto GO a51c40a P2P: Fix regression in start-GO/AP through a "fake" scan dd5c155 eap_proxy: Callback to notify any updates from eap_proxy 9a05d98 atheros: Add a new flag for OSEN support 9feadba Remove unnecessary NULL check to make function more consistent 1772d34 P2P: Fix interface deinit for failed group interface initialization 3f9ebc4 P2P: Allow AP/GO interface to be started while P2P-in-progress b4a9292 RADIUS client: Fix server failover on return-to-primary on error case 9836cb5 Add option to force a specific RADIUS client address to be used 1a7ed38 RADIUS client: Fix a copy-paste error in accounting server failover de7c06e P2P: Continue find in GO-Neg-Resp-fail status corner cases c280590 Do not add blacklist entries based on normal disconnect request cases bdf0518 P2P: Direct P2P_CONNECT command to proper interface 44b9ea5 P2P: Do not allow scan or normal association on cfg80211 P2P Device 9542f21 Clean up p2p_find command parsing and execution fa9f381 P2P: Allow a specific channel to be specified in P2P_FIND eb78a8d P2P: Restore P2P_SCAN_SPECIFIC d988ff7 hostapd: Disable VHT caps for STAs when no valid VHT MCS found 70fd828 RADIUS client: Fix previous failover change c3dabf5 Fix merge issue with IBSS VHT support 8b2b718 Fix minor issue in HT40 max rate determination 347c55e RADIUS client: Re-try connection if socket is closed on retransmit 94b39e5 RADIUS client: Fix server connection recovery after initial failure bbee36e Allow RADIUS server address to be replaced efb4008 TLS: Remove placeholders for SIGN_ALG_DSA support Change-Id: I8e5d0dfd5fddb6de2f8d8211b708c3bb6674098b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
7f65602d49069f96a7bb44da8bd79ffe8d4c6a98 |
|
25-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f51f54a007e0de1d413dee3523472d3bbeed2ecc f51f54a nl80211: Resubscribe to nl80211 events on global nl_event socket 48ec694 Fix Linux packet socket workaround to not close the socket too easily 0d2030e Use estimated throughput to improve roaming selection 1d747e2 Add snr and est_throughput to the BSS entries a1b790e Select AP based on estimated maximum throughput ab647ff Add wpa_supplicant Makefile target libwpa_ctrl.a abae2d1 trace: Initialize alloc_list even without os_program_init() call 891dfb3 Add helper function to clear and free wpa_psk list 71d77ad Update current BSS level when signal change event occurs f1609f1 wpa_supplicant: Cancel sched_scan when stopping countermeasures abb8d08 nl80211: Add support for configuring P2P GO CTWindow 0b8bcaa P2P: Allow configuring CTWindow when working as GO c77ffc6 TDLS: Ignore extra padding in all packets 5ce6ac1 Inteworking: Add support to update the ANQP Capability List into the BSS 185ada4 HS 2.0: Add support to update the HS20 Capability List into the BSS 7fe7a3a wpa_gui: Debug enhancement 2b892d4 Add forgotten network profile parameters to config file writing 563ee18 IBSS: Add support for VHT80 configuration ada157f Make hostapd_set_freq_params() common 98479dc IBSS: Update operating frequency if joining an existing IBSS 4d9e6fb IBSS: Add fixed_freq network parameter 6f5e1b0 Use priority list instead of global for PNO 97fc2dc Allow libnl-3.0 include path be specified f92446f P2PS: Add P2PS interface info 59b416c Add optional reassoc-to-same-BSS optimization c4da67d Fix passive_scan config parameter writing 715d5c4 hs20-osu-client: Ensure NULL checks are done before dereferencing 58d405f Fix OCSP debug messages 710dfb4 OpenSSL: Fix OCSP error path bd7bb43 HTTP: Fix OCSP error path 946572c Android: Remove commented out non-Android build parameters 15ada7f Android: Remove libxml2 config defines ebe8d3f Android: Silence unused function parameter warnings dbd10da Android: Fix hs20-osu-client build on Android 5.0 a926295 HS 2.0R2: Fix permissions for SP/<fqdn> directory on Android 480994d nl80211: Allocate QCA vendor subcmds for DFS radar detected and CAC events c165cb4 Drop all hostapd STA entries on interface disabled event 106fa1e nl80211: Indicate interface-down event only for the main netdev eeb1cb2 VLAN: Clean up RTM_NEW/DELLINK processing 47e5fbd hostapd: Avoid sending client probe on removed client 3478273 Re-configure WPA2 group keys on hostapd interface re-enable f33c860 Re-enable beaconing on interface disable+enable fc99fab nl80211: Print a debug log entry on NL80211_CMD_PROBE_CLIENT failures 0d2f324 P2P: Fix send_action_in_progress clearing in corner cases 9ff8dda Add hostapd UPDATE_BEACON ctrl_iface command e0761c5 nl80211: Allocate QCA vendor subcmd for DFS CAC Start event 1db718b nl80211: Test vendor command and event 10263dc Add control interface commands for fetching wpa_config values f91a512 Add INTERWORKING_ADD_NETWORK command c612ae9 AP: Do not reply to Probe Request frames with DS Params mismatch 5b74e08 P2P: Document P2P_CONNECT-auto 99650ca Add STOP_AP control interface command 6b00512 P2P: Add event messages for P2P_CONNECT-fallback-to-GO-Neg b0e669b P2P: Fix P2P_CONNECT-auto fallback to GO Neg with group interface bf51f4f mesh: Fix remaining BLOCKED state after SAE auth failure 79ddb20 mesh: Add a monitor event on SAE authentication getting blocked dd2cbaf mesh: Add a monitor event for SAE authentication failure 0cb5f8d mesh: Fix inactivity timer for 32 bit system 11e2ddb mesh: Remove duplicated no_auto_peer update 1e52983 D-Bus: Fix network block type change 4fada12 Fix HT40 co-ex scanning issue on hostapd error path 23ed011 Fix Linux packat socket regression work around 663ae2f Don't write to wpa_supplicant.conf directly d9a9bc0 IBSS: Do not enable HT with WEP or TKIP 0d7eb43 ACS: Accept channel if any (rather than all) survey results are valid 68fa00c ACS: Allow specific channels to be preferred 6f41a25 ACS: Use weighted average for 2.4 GHz adjacent channel interference Change-Id: Ie1cabd28dcfdefafa02e81477e34badae6f7e629 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
cf32e60fa7e0d33fe1551a6dba8dcbbec47ea50e |
|
28-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2e988392436227c51002b573ee27a8cee37f70e9 2e98839 P2P: Disable DNS server from dnsmasq c07f261 P2P NFC: Add script for connection handover with nfcpy 12288d8 WPS NFC: Protect nfcpy pretty print calls against exceptions c209dd1 WPS NFC: nfcpy script to use new connection handover design 6202500 WPS NFC: Logging level configuration to wps-nfc.py and wps-ap-nfc.py 1f1b5b3 WPS NFC: Clean up nfcpy script no-wait operations 79ede5a WPS NFC: Validate ctrl_iface response before decoding it ab1db08 WPS NFC: Use argparse in the nfcpy scripts 6f8fa6e WPS NFC: Update wps-nfc.py and wps-ap-nfc.py to use new nfcpy API b56f6c8 P2P NFC: Add support for freq option in NFC ctrl_iface commands 91a6501 WPS NFC: Use BSSID and AP Channel from handover select 91226e0 WPS: Add testing option to corrupt public key hash 7312776 WPS NFC: add more debug prints for connection handover report 5cd4f66 WPS NFC: Use AP Channel information from credential container d2f1837 WPS NFC: Add BSSID and AP channel info to Configuration Token 75dbf98 WPS-STRICT: Update valid Device Password ID and Config Error range 5cd4740 P2P NFC: WPA state machine config with driver-based BSS selection 8e9f53c P2P NFC: Static handover with NFC Tag on client dd87677 P2P NFC: Enable own NFC Tag on GO Registrar abe44e3 P2P NFC: Add GO info into handover message when in client role 23318be P2P NFC: Optimize join-a-group operation based on NFC information 86e3208 P2P NFC: Copy DH parameters to a separate group interface d4b4d7f WPS NFC: Update DH keys for ER operations ac08752 WPS NFC: Use pubkey mismatch config error from Enrollee 59b45d1 P2P NFC: Add processing of P2P client while NFC handover case 74df9ec P2P NFC: Do not try to join peer if both devices are already GO 201b0f5 P2P: Add test option to disable IP address assignment request 25ef852 P2P: Add support for IP address assignment in 4-way handshake fdd48ff P2P NFC: Optimize GO Negotiation retries c4f87a7 P2P NFC: Add NFC tag enabling for static handover dd37a93 P2P NFC: Report handover select from tag for static handover db6ae69 P2P NFC: Report connection handover as trigger for P2P 9358878 P2P NFC: Build connection handover messages c00ab85 P2P NFC: Define WPS_NFC config method 0deab08 P2P NFC: Allow separate WPS/P2P IES to be parsed fca9958 P2P NFC: Pass OOB Dev Password through P2P parser ab9e344 P2P NFC: Pass OOB Device Password ID to P2P 5154689 P2P NFC: Add WPS attribute building for P2P NFC 01afd8d P2P NFC: Add NDEF helpers for P2P connection handover messages 9e323a2 P2P NFC: Add OOB GO Negotiation Channel attribute 14d8645 WPS NFC: Allow BSSID and channel to be included in handover select 50d1f89 NFC: Update WPS ER to use the new connection handover design d950793 WPS NFC: Add support for wpa_supplicant AP/GO mode to use handover fa4c298 WPS NFC: Process new style handover select 068cdb1 WPS NFC: New style connection handover select from AP/Registrar 3189ca0 WPS NFC: Add AP mode connection handover report 41f9ffb WPS NFC: Build new style carrier record for connection handover request 3f1639d WPS NFC: Split DH key generation to a separate function 9754917 WPS NFC: Update NFC connection handover design 34b6795 WPS NFC: Use abbreviated handshake if both PK hashes delivered OOB 57630e6 WPS: Preparations for allowing SSID filtering for provisioning step 5f45455 WPS NFC: Validate peer public key hash on Enrollee ff40cd6 WPS NFC: Send M2D with config error 20 on pkhash mismatch e435417 WPS: Remove Version attribute from NFC messages 72403ec WPS: Add builder functions for AP Channel and RF Bands attributes ea43ad9 P2P: Make group operating channel available 9f7cd9a P2P: Split add-group-info into a helper function 253f2e3 P2P: Apply unsafe frequency rules to available channels 1682c62 Add a header file defining QCA OUI and vendor extensions Change-Id: Ia7604d018e1ffb25e06bdc01ce258fc4a0569245 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
04f534e89ed127da4077485376f24debc50d80d5 |
|
10-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 075131e32e6967977da4bbfa8a7f63dbfbf86008i 075131e Android: Do not compile wpa_supplicant if not chosen f7154ce DFS: Use channel switch when radar is detected 6c6c58d hostapd: Make hostapd_set_freq_params() public b72f949 DFS: Allow skipping radar channels 8d1fdde nl80211/hostapd: Extend channel switch notify handling 10e694a AP: Use monotonic clock for SA query timeout af53896 Use monotonic clock for RADIUS cache timeouts fe52c21 Use monotonic clock for last_sae_token_key_update 100298e AP: Use monotonic time for AP list e5c9e40 OS utils: Add os_reltime_expired() b3493fa AP: Use monotonic time for STA connected time ed0ebee OS utils: Provide os_reltime_age() 8567866 P2P: Handle frequency conflict in single channel concurrency case b125c48 P2P: Add wfd_dev_info= field for device found event e706d2d bsd: Fix compilation error for NetBSD f757950 eap_proxy: Extend Android.mk to support additional libraries Change-Id: I6d4f0f559f420680903d12966c7a6a87da97d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
e0e48dc666fb14a7bb60264ca87463ba7bc1fe0b |
|
18-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 107a89448c8a127e9131bc9288b9093720b87781 107a894 P2P: Clean up wpas_p2p_setup_freqs() debug message 7d669cf P2P: Clean up wpas_p2p_init_go_params() 384bdd0 P2P: Prefer VHT channels for initial pick a30d50b P2P: Prefer HT40 channels for initial pick f240710 P2P: Prefer 5 GHz channels for initial pick b2d4aaa P2P: Select VHT channel at random instead of using the first entry ee8f6ea P2P: Select HT40 channel at random instead of using the first entry 5576663 P2P: Move random channel selection into a helper function b17d89b P2P: Fix channel selection for MCC case f86d282 Handle legacy scan interruption of sched_scan/PNO 334bf36 Add chan_switch to ctrl interface of wpa_supplicant and hostapd bf281c1 Add AP channel switch mechanism e44a384 Move AP parameter filling into a helper function 1c4ffa8 nl80211: Add channel switch implementation dcca221 wpa_supplicant: Update channel switch driver interface e1925bd eloop: Remove eloop_none.c 3505743 Sync with wireless-testing.git include/uapi/linux/nl80211.h f6c2b8c Android: Add state message sent after 'status' command 6b49907 Android: Add SSID in supplicant change event 22cf7d7 SCARD: Clean up SIM/USIM selection cea97a0 dbus_new: Add DBus TDLS methods cc4952a Request new scan only for the original interface fa58da2 Remove old mechanism of skipping scan request rescheduling e2f5a98 Deplete scan request if new time is less than remaining dcd25d4 P2P: Use negotiated channel from invitation for persistent GO 800d587 TDLS: Provide external control to specify the peers for setup 795baf7 hostapd: Filter channel list updated events after country code change 146fa9b nl80211: Do not force interface down on deinit 49b4b20 nl80211: Do not for station mode on hostapd deinit 04eff7d nl80211: Remove build time condition on HOSTAPD define 0d547d5 nl80211: Share more code between hostapd and wpa_supplicant 7b7de4c nl80211: Remove read-only last_freq/last_freq_ht Change-Id: Idba1eb8d63480fbc30eee11d0d8e189ccc49ddd3 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/ap.h
|