ebd93af924f6e54fb4982b3312ff875a4896b62b |
|
21-Feb-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 128f6a98b3d4d6ed103db759707309f451db9682 128f6a98b mka: Fix the order of operations in secure channel deletion 213eb1885 dbus: Set mode to mesh in bss properties when mesh is supported 21fda4ee7 RSN: Fix pre-authentication EAPOL-Start startPeriod configuration 3f23260da nl80211: Notify reason for connection timeout failure ca1ab9db2 hostapd: Get vendor HE capabilities 7785c70bb QCA vendor command for fetching HE capabilities d512f406f hostapd: Add IEEE 802.11ax HE IEs into Beacon/Probe Response frames 94380cb40 hostapd: Initial IEEE 802.11ax (HE) definitions 5972dc73c mesh: Use correct rate in VHT and HT mixed environment 84ea61cff mesh: Use correct rate in HT and legacy mixed environment 025c6a47f VHT: Remove a redundant check a7a638c2c hw_features: Move VHT capabilities checks to common e01cf2afc Define eapol_sm_get_eap_proxy_imsi() only with CONFIG_EAP_PROXY=y a8e25deeb FT: Merge similar error paths to use common steps c6c41f6ea FT: Support addition of RIC elements into Reassociation Request frame ecbdc1a1f Mark RSN msg 1/2 key data debug dump as key material 834c5d681 FILS: Fix PMK length for initial connection with FILS SHA384 AKM e491389eb FILS: Fix ifdef for PTK derivation with SHA384-based AKM 62944f7d2 Add HMAC-SHA384 with internal crypto aeecd4eae OpenSSL: Fix hmac_sha384_vector() implementation 5db32adc9 browser-wpadebug: Send HTTP response with HTTP/1.1 header 79329ae0a P2P: Verify local driver preferred frequencies for P2P use cases 3a7819f0a P2P: Add P2P_SET override_pref_op_chan to allow overriding preference c06fca04f Add wpa_supplicant SET get_pref_freq_list_override b4d56efb1 Use throughput estimate-based BSS selection with larger SNR difference 142041487 Drop GREAT_SNR definition from 30 to 25 dB 364c064a4 FT: Check key derivation results explicitly in AP operations b5562a1a6 FILS: Remove CRC32 dependency from build 5cf0930f9 testS: Additional BSS TM error case coverage 885bbd4de WNM: Remove unused code from BSS TM Req generation e7ddd86a9 WNM: Use a common error path in ieee802_11_send_wnmsleep_resp() d6d5970e2 WNM: Fix WNM-Sleep Mode Request parsing for WNM-Sleep element 8492cc79c PeerKey: Remove dead code related to STSL negotiation state e37c0aa5d OSU server: Remove invalid options from documentation 0d6056703 WMM: Fix estimated medium time calculation for some corner cases ae26d3021 Fix "IEEE 802.11: Ignored Action frame" debug message 4ead4c7ec WMM: Remove obsolete TODO comments 577e794eb Sync android.config with wpa_supplicant defconfig changes 784710b7f Add bgscan options to wpa_supplicant defconfig 212a8f487 Fix wpa_supplicant defconfig copy-paste description 57c3a605c Add support to sched scan to report relatively better BSSs 20c846d9e nl80211: sched_scan relative RSSI parameters 37e9f511e mka: Send MKPDUs forever if mode is PSK 76aa31838 EAP: Call deinit_for_reauth() for Phase 2 EAP methods 02156b98b EAP-AKA: Don't use anonymous identity in phase2 9e2afe10e EAP-SIM: Don't use anonymous identity in phase2 ed9b1c16d EAP peer: Cache decrypted requests for EAP-SIM/AKA/AKA' 5f11880f6 SME: Remove null ie param from CTRL-EVENT-AUTH-REJECT 4d70b2a4e RRM: Fix a memory leak in beacon request handling 401243b73 RRM: Fix range request overriding fb81c0a3d RRM: Merge similar error returns to a single one 13b30052d RRM: Fix Range Request max age parsing bd6ec7f7c Fix MAC ACL query freeing on deinit b4fd1f0ed Allow PNO scan also in connection completed state 4c6f450ca Add radio_work_is_connect() helper 85b6b6b6e Serialize scan/p2p-scan if already scheduled on the same interface fcb303a57 P2P: Clear driver scan cache after BSS_FLUSH 0d6dc6830 FILS: Clean up HLP resize check 1d9d21f37 GAS: Add support to randomize transmitter address 8331c9b31 nl80211: Add support for mgmt_tx with random TA 14fa723a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h 65ab7eb1f GAS: Fix OSU Providers List response with invalid configuration f3e157057 VHT: Fill VHT capability with hardware capability 4bb9b674c Add a log message when GTK rekeying failed 41f140d38 Add hostapd options wpa_group_update_count and wpa_pairwise_update_count e54691106 mka: Some bug fixes for MACsec in PSK mode 7faf403f9 mka: Fix an incorrect update of participant->to_use_sak 00e0f0b01 hs20-osu-client: Hide a trivial compiler warning 276e93654 hw_features: Clean center freq for falling back HT40 channels f47f93617 P2P: Override P2P_PEER group_capab with 0 if no matching BSS entry found bcf66493c Fix estimated throughput based skip-roam case 84bb12aa6 FILS: Fix send_assoc_resp() HLP extension to cover sta == NULL 275cc9428 FILS: Stop processing if fils_rmsk_to_pmk() fails caab23f19 Set EAPOL-Key Key Length field to 0 for group message 1/2 in RSN b0fb2be77 Do not send GNonce in EAPOL-Key group message 1/2 3bbc47050 Fix EAPOL-Key Install bit in Group Key 1/2 with FT and FILS auth db5e53cb0 mesh: Fix struct hostapd_data initialization 9b170991a mesh: Fix mesh interface removal fix 945604a35 Update wpaspy.py to be python3 compatible 4d6e79f86 Use defines in hostapd_set_freq_params() 0217b8d87 eloop: Fix comments mismatch eloop_event/timeout_handler definitions 09a97eb27 Update the copyright notice years for QCA vendor definitions 841e9a8c7 QCA vendor command to set the trace levels for the specific QCA module d77f33041 FILS: Fix AES-SIV AAD for (Re)Association Request frame decryption 7a6c3de23 ERP: Use macro for EMSKname length instead of hardcoded integer value bb3ea71a2 ERP: Fix rIK derivation 124ddfa19 FILS: Parse and report received FILS HLP Containers from response 91d91abf6 FILS: DHCP relay for HLP requests 54b04d6f3 FILS: Move HLP request handling into a separate file 5a9d50493 ProxyARP: Use more robust DHCP option parsing e64c13feb Move DHCP definitions into a common file 70407ee5c Add QCA vendor definitions for BSS transition status 53d171440 AP: Check ACL upon association request for 802.11ad 4cc61c386 GAS: Set temporary session timeout bigger than gas_comeback_delay Test: Wifi Suite Change-Id: Id597d7cba5d2b3875f2dbbeb9a10fd5e69a6a7c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
1d6bf427f4769edb60865a3999d01eeb8f8fcb19 |
|
20-Jan-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e15dcf6d1bc2725388555523effca75b1ffab735 e15dcf6 nl8021: Avoid potential memory leak on error path 17d32eb Allow re-write of ip_addr* configurations to conf file. bcce934 dbus: Restrict DeviceName size to 32 characters in setter 7c70fe2 Sort options and reduce printf calls in wpa_supplicant usage text 6b418ce Fix wpa_supplicant build with IEEE8021X_EAPOL=y and CONFIG_NO_WPA=y 03269d5 AP: Print interface name in more STA events 9e8fde2 AP: Fix Deauth/Disassoc TX status timeout handling 269f9d5 EAP peer: Use ifdef PCSC_FUNCS to get rid of compiler warnings c6e0b4b FST: Get rid of gcc extensions in structure/array initialization 2e3a41a hs20-osu-client: Fix check for osu_nai being available ac2053b OpenSSL: Clean up openssl_digest_vector() to use a single implementation 5c9a337 OpenSSL: Clean up crypto_hash_*() to use a single implementation 587b045 LibreSSL: Fix build with LibreSSL 0daa9f6 EAP-TTLS peer: Fix success after fragmented final Phase 2 message 1eb87ae OpenSSL: Use EVP_CIPHER_CTX_new() to work with OpenSSL 1.1.0 3fb3bea OpenSSL: Update session_secret callback to match OpenSSL 1.1.0 API 814f43c EAP server: Simplify EAP method registration call 49a26bb EAP peer: Simplify EAP method registration call 7ce5603 EAP-WSC peer: Remove unused state values 449a316 bsd: Optimize socket use 4653ceb nl80211: Report disassociated STA / lost peer for the correct BSS 38af042 Drop OpenSSL 0.9.8 patches to add EAP-FAST support Change-Id: Ib88c54b382c322d6151ed77e08f83329f918e3e8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
cc00d5dc8483e32158b2ba61ea44b0c38d790ed7 |
|
04-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative security patch from commit 58606fd98722e92aaa4c2c7b8cb99cc92bd4308c 58606fd EAP-pwd server: Make sure in_frag_pos is cleared to zero on allocation 6aa5d95 EAP-pwd peer: Make sure in_frag_pos is cleared to zero on allocation 28a069a EAP-pwd peer: Fix asymmetric fragmentation behavior 3035cc2 EAP-pwd server: Fix Total-Length parsing for fragment reassembly 477c743 EAP-pwd peer: Fix Total-Length parsing for fragment reassembly e28a58b EAP-pwd server: Fix payload length validation for Commit and Confirm dd2f043 EAP-pwd peer: Fix payload length validation for Commit and Confirm ef566a4 AP WMM: Fix integer underflow in WMM Action frame parser 8640cf7 WPS: Add more debug prints to httpread 1bd0d57 WPS: Replace the httpread_debug design with standard debug prints 7da4f4b WPS: Check maximum HTTP body length earlier in the process af185d0 WPS: Extra validation step for HTTP reader 5acd23f WPS: Fix HTTP chunked transfer encoding parser a5da657 dbus: Stop ongoing scheduled scan when scan is requested 0c28071 Fix sending ANQP request to an unknown BSS while associated 74197e0 wpa_cli: Fix memory leak when tracking networks 4504621 TDLS: Add TDLS_LINK_STATUS command to the control interface 01e87ef IBSS: Check ibss_rsn init before starting new IBSS authentication 74d912f libtommath: Fix check mp_init_multi() result fd66aa6 Check Public Action length explicitly before reading Action Code ff4a6d4 EAP-SIM/AKA: Explicitly check for header to include Reserved field f5ed400 EAP-SAKE: Make attribute parser more readable 0dfb7be EAP-SAKE: Pass EAP identifier instead of full request 354e3f7 TLS: Fix debug dump of X.509 certificate 87fcb5a EAP-PAX: Fix PAX_STD-1 and PAX_STD-3 payload length validation c3c5615 EAP-GPSK: Pass EAP identifier instead of full request d36c803 EAP-TLS/PEAP/TTLS/FAST: Move more towards using struct wpabuf 8d9f3b8 EAP-FAST: Do not use type cast to remove const specification 07f9034 EAP-FAST: Pass EAP identifier instead of full request f153e41 EAP-EKE: Do not pass full request to eap_eke_build_fail() 53f376c Fix a typo in function documentation 5aeebc4 D-Bus Fix network_is_persistent_group() for P2P operations 5441da2 Fix wpas_notify_network_removed() e8181e2 dbus: Add a debug print on fill_dict_with_properties() getter failures 8a78e22 D-Bus: Fix operations when P2P management interface is used dea0d8e RADIUS: Fix a copy-paste error in variable name Change-Id: Ib70bf513c1f6c17974ef135806e44e120a5d5709 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
c28170251eb54dbf64a9074a07fee377587425b2 |
|
02-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e376290c667e970d751acc916e0efe2ed16292ed e376290 HS 2.0R2: Add update_identifier field to network 5bc2857 Fix some sparse warnings about u16 vs. le16 42619d6 Fix CTRL-EVENT-REGDOM-CHANGE event init= value a520bf4 Mark function static 0cb79d3 dbus: Fix indentation level to match code logic 8f03ac9 Mark functions static 6891f0e Allow SCAN command to specify scan_ssid=1 SSIDs 18389ab WPS: Clear keys/PINs explicitly b7175b4 Clear hostapd configuration keys explicitly d1ecca6 HS 2.0 R2: Clear hs20-osu-client configuration keys explicitly 0a13e06 EAP server: Clear keying material on deinit f534ee0 EAP peer: Clear keying material on deinit 19c48da Clear wpa_supplicant configuration keys explicitly 28bfa29 EAP-AKA: Remove unnecessary dead increment 62493df EAP-GPSK: Avoid dead increment by checking pos pointer 164a453 FT: Debug print extra response data 70bfc77 PCSC: Debug print extra response data 5dbbf36 Interworking: Remove unnecessary dead increment a1e46f3 Check for no key_mgmt/proto/auth_alg entries in config writer 290ea6a Remove unnecessary tracking of first entry d3fa2bb WFD: Explicit limit for subelement length (CID 68127) 745ef18 HS 2.0: Verify assoc_req_ie buffer size for indication elements 0233dca SAE: Use os_memcmp_const() for hash/password comparisons 34ef46c WEP shared key: Use os_memcmp_const() for hash/password comparisons 3e4b77c EAP-GTC: Use os_memcmp_const() for hash/password comparisons a6eae3f EAP-MSCHAPv2: Use os_memcmp_const() for hash/password comparisons 30411b3 EAP-TTLS: Use os_memcmp_const() for hash/password comparisons a564d9c EAP-MD5: Use os_memcmp_const() for hash/password comparisons 4685482 EAP-PSK: Use os_memcmp_const() for hash/password comparisons cba0f86 EAP-PEAP: Use os_memcmp_const() for hash/password comparisons 7b1e745 EAP-LEAP: Use os_memcmp_const() for hash/password comparisons 8f92826 EAP-GPSK: Use os_memcmp_const() for hash/password comparisons e1550d4 EAP-PAX: Use os_memcmp_const() for hash/password comparisons c434503 EAP-FAST: Use os_memcmp_const() for hash/password comparisons dddf7bb EAP-EKE: Use os_memcmp_const() for hash/password comparisons dfb5608 EAP-SAKE: Use os_memcmp_const() for hash/password comparisons 05c79d6 EAP-SIM/AKA: Use os_memcmp_const() for hash/password comparisons 675ddad EAP-IKEv2: Use os_memcmp_const() for hash/password comparisons 2049a3c TLS: Use os_memcmp_const() for hash/password comparisons a79aea5 Milenage: Use os_memcmp_const() for hash/password comparisons 05f916e AES-GCM: Use os_memcmp_const() for hash/password comparisons 87a5c93 AES-CCM: Use os_memcmp_const() for hash/password comparisons 7c24f53 EAPOL supplicant: Use os_memcmp_const() for hash/password comparisons 870834a RSN authenticator: Use os_memcmp_const() for hash/password comparisons 0d15b69 RSN supplicant: Use os_memcmp_const() for hash/password comparisons 72619ce MACsec: Use os_memcmp_const() for hash/password comparisons c237195 RADIUS: Use os_memcmp_const() for hash/password comparisons ce9c9bc WPS: Use os_memcmp_const() for hash/password comparisons afc3c8b Add constant time memory comparison function os_memcmp_const ee352f1 EAP-pwd: Add explicit total length limit b2b8a4c EAP-SIM/AKA: Pass EAP type as argument to eap_sim_msg_finish() f107d00 PeerKey: Clean up EAPOL-Key Key Data processing 010fc5f dbus: Clean up array-array-type property getter Change-Id: I1dbe483be2678a7468e6955d70ea261f8e53b26d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
2271d3fdd5982d0e5e81cf9999a861bba933eacb |
|
23-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f95a4524c2c00476e46b7999426ffdcbc7cd538f f95a452 nl80211: Improve debug output by printing SA and DA in frames dedfa44 Print frame type name in debug output 57a8f8a nl80211: Use low-priority scan for OBSS scan 1b928f9 P2P: Allow passphrase length to be configured e985246 eapol_test: Add PC/SC reader and PIN command line arguments 5a62060 Use pcsc_reader configuration in one for scard_init() call f3c6b23 EAP-SIM': Fix AT_KDF parser to avoid infinite loop 79122f9 EAP-SIM/AKA: Remove unused RESULT_FAILURE state Change-Id: I142bed35a75ed228e145e50c961dcde22a9815f7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
f21452aea786ac056eb01f1cbba4f553bd502747 |
|
26-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5e32f8256f5fcce8b70a95e070375ac549ac935a 5e32f82 tests: Verify HS 2.0R2 deauthentication request b61e70c HS 2.0R2: Add WFA server-only EAP-TLS server method 8d2a992 HS 2.0R2: RADIUS server support to request Subscr Remediation ae6d15c HS 2.0R2 AP: Add OSU Providers list ANQP element f7bd7a0 HS 2.0R2 AP: Add Icon Request and Icon binary File ANQP elements 97596f8 HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP 8e1146d HS 2.0R2 AP: Add support for deauthentication request a14896e HS 2.0R2 AP: Add OSEN implementation 6ca0853 HS 2.0R2 AP: Use Subscr Remediation request from RADIUS server 7bc9c25 HS 2.0R2 AP: Add STA's Hotspot 2.0 Release Number into Access-Request 76579ec HS 2.0R2 AP: Add AP Hotspot 2.0 Release Number as WFA RADIUS VSA 0dd100f HS 2.0R2 AP: Add definition and helper function for WFA RADIUS VSA 3fb17a9 HS 2.0R2 AP: Add WNM-Notification Request for Subscription Remediation d5d2478 HS 2.0R2 AP: Update HS 2.0 Indication element to Release 2 a6739e1 HS 2.0R2: Try to scan multiple times for OSU providers cf6d08a Interworking: Add OCSP parameter to the cred block 6402f2f Interworking: Add more debug info on roaming partner preferences 7479489 Interworking: Add sp_priority cred parameter 751ac99 Interworking: Use a helper function to compare cred priority aff419f Interworking: Remove separate credential priority tracking 533536d HS 2.0R2: Disable full ESS for as a workaround for per-BSS issues 8a77f1b HS 2.0R2: Slow down connection attempts on EAP failures 76a55a8 HS 2.0R2: Add more debug to network selection 8b4b9fb HS 2.0R2: Fix bandwidth policy BSS selection 28f2a7c HS 2.0R2: Allow excluded network to be selected based on user override 33fb8c5 HS 2.0R2: Add support for Policy/RequiredProtoPortTuple a45b2dc HS 2.0R2: Add support for Policy/MaximumBSSLoadValue 4cad9df HS 2.0R2: Add support for Policy/MinBackhaulThreshold aa26ba6 HS 2.0R2: Add tracking of provisioning SP 8e5fdfa HS 2.0R2: Add WFA server-only EAP-TLS peer method df0f01d HS 2.0R2: Add OSEN client implementation a5d7563 HS 2.0R2: Add common OSEN definitions 230e373 HS 2.0R2: Add GAS operation duration statistics into debug b572df8 HS 2.0R2: Add routine for fetching OSU provider information 1d2215f HS 2.0R2: Add OSU Providers list ANQP element 184e110 HS 2.0R2: Add Icon Request and Icon binary File ANQP elements 7ef6947 HS 2.0R2: Add STA support for Deauthentication Request notification 95a3ea9 HS 2.0R2: Add WNM-Notification Request for Subscription Remediation f9cd147 HS 2.0R2: Update Indication element to Release 2 bc00053 Interworking: Allow roaming partner configuration ae6f927 nl80211: Add driver capability for GTK_NOT_USED 2c49d04 Do not clear global pmf setting on FLUSH eef7235 Only try fast reconnect if network is not disabled 3d910ef Interworking: Prefer last added network during network selection 2a33687 P2P: Remove unnecessary ifdef CONFIG_NO_CONFIG_WRITE 050d8b5 Fix documentation for wpa_supplicant_global_ctrl_iface_process() 8c9cb81 DFS: Fix coding style (missing whitespace) 4f1e01b DFS: Add VHT160 available channels b8058a6 hostapd: DFS allow mixed channels 4db216f wpa_supplicant: Add support for IPv6 with UDP ctrl_iface e2364d1 hostapd: Deauthenticate clients forbidden by maclist changes 1748f1d hostapd: Make it possible to remove addresses from maclists 064eb05 Add os_remove_in_array() c1151e4 Force OFDM/HT/VHT to be disabled on channel 14 bfb79dd nl80211: Show regulatory rule flags in debug output 3d7ad2f hostapd: Configure spectrum management capability e0392f8 hostapd: Add Power Constraint element 891330f Fix spelling s/algorith/algorithm/ f0e30c8 Do not start another connect work while one is pending 3290398 WPS: Fix UNSUBSCRIBE error returns if NT or CALLBACK header is used f34df28 WPS: Fix UNSUBSCRIBE to return 412 if no SID match found 80f256a WPS: Remove unnecessary filename NULL check Change-Id: I7dc25a8bb0074f4970ade8d42dfa60da166baf96 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
|
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
4530cfd4d14a77c58e35393b91e40f8dd9d62697 |
|
10-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Sep-2012 TOT commit 44256451130c4766e4a019162de17d0734444ee9 Author: Arik Nemtsov <arik@wizery.com> Date: Fri Sep 7 00:22:40 2012 +0300 AP: Configure basic rates from iface and not conf Skipped patches: 20ed5e40ba95440a1946cf2dffad3047fb620582 cf8baca6a5719f4f3257631e03317affee015417 a297201df15656dbb0f37e90f3410d9e8102c6fd 620c783753bddd37988269314862dc7e4a62f700 Change-Id: I857aa80af6d1a21b61f7c03a085e7dfc6066d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/eap_peer/eap_aka.c
|