d2986c2e737a8441ff5a791b6b56c1c8322ef3c9 |
|
23-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3d6953288b592704484864f41791f8c67ff9aa5a 3d6953288 Extend RESEND_* test commands to allow forcing plaintext TX 4be5bc98a DPP: Update AES-SIV AD for PKEX frames dc4d271c6 DPP: Update AES-SIV AD for DPP Authentication frames 6338c99ef FILS: Send updated connection parameters to drivers if needed d2ba0d719 Move assoc param setting into a helper function 084131c85 FILS: Allow eap_peer_get_erp_info() to be called without config b0a21e228 FILS: Update replay counter from roam info 693eafb15 nl80211: Update FILS roam info from vendor roam event 3c67e977d nl80211: Add support to send updated connection parameters cddfda789 Add attributes to support roam+auth vendor event for FILS c0fe5f125 Clear BSSID information in supplicant state machine on disconnection 006fb845b nl80211: Use NL80211_BSS_LAST_SEEN_BOOTTIME if available a6ea66530 Additional consistentcy checks for PTK component lengths 6f234c1e2 Optional AP side workaround for key reinstallation attacks daa409608 Allow last (Re)Association Request frame to be replayed for testing 751f5b293 Allow EAPOL-Key Request to be sent through control interface bb06748f4 Make last received ANonce available through control interface 143b81bad Allow arbitrary key configuration for testing d8afdb210 Allow EAPOL-Key messages 1/4 and 3/4 to be retransmitted for testing 6bc2f00f4 Allow group key handshake message 1/2 to be retransmitted for testing 16579769f Add testing functionality for resetting PN/IPN for configured keys b488a1294 Clear PMK length and check for this when deriving PTK 00583ef11 Add debug prints on PMK configuration in WPA supplicant a00e946c1 WPA: Extra defense against PTK reinstalls in 4-way handshake a0bf1b68c Remove all PeerKey functionality e76085117 FILS: Do not allow multiple (Re)Association Response frames 2f1357fb6 FILS: Accept another (Re)Association Request frame during an association df9490620 Add MGMT_TX_STATUS_PROCESS command for testing purposes c53eb9461 OWE: Remove forgotten developer debug prints a34ca59e4 SAE: Allow SAE password to be configured separately (STA) 2377c1cae SAE: Allow SAE password to be configured separately (AP) c5aeb4343 P2P: Do not mark DFS channel as invalid if DFS is offloaded to driver 58efbcbcd DPP: Fix static analyzer warnings in key generation and JWK construction f51609022 P2P: Prefer 5/60 GHz band over 2.4 GHz during GO configuration 91cc34bf3 OWE: Allow set of enabled DH groups to be limited on AP 265bda344 OWE: Allow DH Parameters element to be overridden for testing purposes 8c19ea3f2 DPP: Add the crypto suite field to the frames c77e2ff09 DPP: Remove C-sign-key expiry 6254045a5 DPP: Explicitly delete the PKEX secret element K upon generation of z 0e6709a4e DPP: Rename PKEX secret element from Z to K 657317179 DPP: Verify that PKEX Qi is not the point-at-infinity a89138818 OWE: Transition mode information based on BSS ifname 109704657 OWE: Support station SME-in-driver case 5a78c3619 OWE: PMKSA caching in station mode d90f10fa4 OWE: PMKSA caching in AP mode 8b5579e17 DPP: Fix EAPOL-Key Key MIC calculation ec9f48377 OWE: Support DH groups 20 (NIST P-384) and 21 (NIST P-521) in station 7a12edd16 OWE: Support DH groups 20 (NIST P-384) and 21 (NIST P-521) in AP mode 6c4726189 OWE: Extend shared helper functions to support other DH curves d8c8d8575 OWE: Include RSNE in (Re)Association Response frame e8b964901 OWE: Transition mode support on station side 675112df1 OWE: Set PMK length properly on supplicant side ea079153f OWE: Add AP support for transition mode 4a3746341 hostapd: Update HE capabilities and HE operation definition 63bc0ab0e P2P: Allow GO to advertise Interworking element 3567641eb Add TX/RX rate info and signal strength into STA output fa4b605a0 WPS: Do not increment wildcard_uuid when pin is locked e37cea308 OCE: Update default scan IEs when OCE is enabled/disabled ee522d27c Vendor flags for 11ax channel property flags for use with external ACS 61a56c148 Add group_mgmt network parameter for PMF cipher selection 0ad5893a2 PAE: Validate input before pointer fd35ed5bb AP: Remove unneeded check for 'added_unassociated' d55b17460 FILS: Vendor attribute to disable driver FILS features a7297ae5c Fix hostapd debug messages on wpa_pairwise and rsn_pairwise parsing 29c940e7a TDLS: Update the comments related to TPK derivation 3de1566db FILS: Check req_ies for NULL pointer in hostapd_notif_assoc() 1c9663cf6 OpenSSL: Force RSA 3072-bit DH prime size limit for Suite B 2ed70c758 OpenSSL: Add option to disable ECDHE with Suite B RSA 4eb8cfe06 OpenSSL: Force RSA 3072-bit key size limit for Suite B 6418400db Add hostapd tls_flags parameter 60ed2f24e Suite B: Add tls_suiteb=1 parameter for RSA 3k key case 5030d7d9f DPP: Allow raw hex PSK to be used for legacy configuration 039ab15fd DPP: Add DPP-CONFOBJ-PASS/PSK events for hostapd legacy configuration 9824de57a Fix EAPOL-Key version check for a corner case with Suite B AKM 3c7863f81 wpa_supplicant: Support dynamic update of wowlan_triggers 4cada9dcc FILS: Add DHss into FILS-Key-Data derivation when using FILS SK+PFS 41b819148 FILS: Update PMKID derivation rules for ERP key hierarchy establishment 303113398 mesh: Move writing of mesh_rssi_threshold inside CONFIG_MESH 2efc67207 Fix RSN pre-authentication regression with pre-connection scan results 73b3de01c macsec_linux: Exit early when missing macsec kernel module 7612e65b9 mka: Add error handling for secy_init_macsec() calls 2c66c7d11 wpa_supplicant: Check length when building ext_capability in assoc_cb fdbfb63e4 nl80211: Fix bridge name print while removing interface from bridge 333517ac1 crypto: Fix undefined behavior in random number generator 84fccc724 Send Client-Error when AT_KDF attributes from the server are incorrect 446600c35 Add AT_KDF attributes to Synchronization-Failure in EAP-AKA' 155bf1108 PMKSA: Fix use-after-free in pmksa_cache_clone_entry() cdf250149 dbus: Add new interface property to get mesh group 190f6f117 dbus: Add new interface property to get connected mesh peers a9de99b1c dbus: Add MeshPeerDisconnected signal 9b0701fbf dbus: Add MeshPeerConnected signal a39b040b4 dbus: Add MeshGroupRemoved signal 89e9cd25d dbus: Add MeshGroupStarted signal 49e6a5553 FILS: Add a space before MAC address to a HLP debug message 359166ed2 Remove the completely unused FT parameters in driver association data 3db2a82df Add SHA-384 routines to libcrypto.a a0f19e9c7 SAE: Allow commit fields to be overridden for testing purposes (STA) 3648d8a18 SAE: Allow commit fields to be overridden for testing purposes e75335384 SAE: Add testing code for reflection attack e61fea6b4 SAE: Fix PMKSA caching behavior in AP mode a6f238f21 DPP: Add base64 dependency in makefiles c2d4f2eb5 DPP: Derive PMKID using SHA256() for all curves 64a0a75b5 nl80211: Fix auth_alg selection with FILS in the connect command 7475e80f1 FILS: Fix wpa_supplicant AP build without CONFIG_IEEE80211W 85fd8263a DPP: Use Transaction ID in Peer Discovery Request/Response frames a28675da2 hs20-osu-client: Fix build with new OpenSSL and BoringSSL cf39475b4 Introduce QCA_NL80211_VENDOR_SUBCMD_HANG 17385fba2 tests: JSON module tests for additional array parsing d4488b9da JSON: Fix parsing of arrays of numbers, strings, literals a4bf00787 DPP: Remove devices object from the connector e77d13ef9 QCA vendor attribute to configure beacon miss penalize count for BTC 7bd88aaf3 QCA vendor attribute to configure beacon miss count 505554bbf QCA vendor attribute to enable/disable scan ae048257c WPS: Interpret zero length ap_pin hostapd.conf parameter as "unset" 2bdbace63 Remove some obsolete information from hostapd README file b0fc2ef3a hw_features: Fix check of supported 802.11ac channel width b5bf84ba3 WNM: Differentiate between WNM for station and for AP in build 922dcf1b4 RRM: Remove duplicate frequencies from beacon report scan request 705e2909c RRM: Send response when Beacon report request is not supported/refused 3756acfd4 RRM: Send Radio Measurement response when beacon report scan fails b3c148e9f RRM: Send reject/refuse response only to unicast measurement request 51143af7e wpa_cli: Fix global control interface for STA-FIRST/STA-NEXT 809c67502 DPP: Fix build with OpenSSL 1.1.0 89971d8b1 OpenSSL: Clear default_passwd_cb more thoroughly f665c93e1 OpenSSL: Fix private key password handling with OpenSSL >= 1.1.0f 2b9891bd6 OpenSSL: Add build option to select default ciphers 65833d71a OCE: Add hostapd mode OCE capability indication if enabled 332aadb8a STA: Add OCE capability indication attribute fb718f94d nl80211: Check if driver supports OCE specific features 46b15e470 Add vendor flags for OCE feature support indication b377ec258 FILS: Fix issuing FILS connect to a non-FILS AP in driver-FILS case 9f44f7f3b Introduce a vendor attribute to represent the PNO/EPNO Request ID 881a92e8b FILS: Fix compilation with CONFIG_NO_WPA 1f2ae8cff EAP-TTLS: Fix a memory leak on error paths 83e003a91 EAP-TTLS: Fix possible memory leak in eap_ttls_phase2_request_mschap() 422570eec MBO: Fix possible memory leak in anqp_send_req() 96e595a9f EAP-LEAP: Fix possible memory leak in eap_leap_process_request() 23eead4d7 RRM: Filter scan results by parent TSF only if driver supports it 3f8e3a548 ap: Fix invalid HT40 channel pair fallback 6d3e24d3e ap: Fix return value in hostapd_drv_switch_channel() d02e4c8ac P2P: Clear get_pref_freq_list_override on P2P Device bfbc41eac DPP: Fix compilation without openssl cc6088463 P2P: Allow auto GO on DFS channels if driver supports this fe3e0bac1 FILS: Advertize FILS capability based on driver capability 5579c11c3 Fix a typo in vendor attribute documentation 8b5ddda5f FILS: Add HLP support with driver-based AP SME 31ec556ce FILS: Fix the IP header protocol field in HLP DHCP response b3e567c89 FILS: ERP-based PMKSA cache addition on AP bfe448331 FILS: Fix a frame name in a debug print 6d49aeb76 MBO: Whitespace cleanup f2cdb41b8 OCE: Define OCE attributes and other related macros 267fc0dd3 Add wpa_supplicant ctrl iface support to scan for a specific BSSID f522bb237 DPP: Add DPP_CONFIGURATOR_SIGN to generate own connector dc7fc09cc DPP: Add control interface commands into hostapd_cli a86fb43ca DPP: DPP_BOOTSTRAP_INFO for hostapd 484788b87 DPP: Share bootstrap type to string helper function 623f95685 DPP: Allow wpa_cli DPP_CONFIGURATOR_ADD without arguments 888502325 Add new key_mgmt values for wpa_supplicant STATUS command 3a5954ef9 Add mgmt_group_cipher to wpa_supplicant STATUS command 90f837b0b Update default wpa_group_rekey to once-per-day when using CCMP/GCMP 787615b38 DPP: Set PMKSA expiration based on peer connector 6b140f0fa DPP: Update hostapd configurator parameters to match wpa_supplicant 2605405aa DPP: Configurator in hostapd efeada91a DPP: PKEX in hostapd 6095b4790 DPP: Check JWS protected header alg against C-sign-key curve b65b22d60 DPP: Configurator parameters in responder role 31f03cb00 DPP: Update JWS algorithm strings for Brainpool curves e0d3d3fce DPP: Rename Brainpool curve names for JSON 500ed7f00 DPP: PKEX bootstrapping b9d47b484 DPP: Add helper functions for running hash operations 0c7cf1f50 DPP: Increase hostapd_cli buffer limits 44d6b272c DPP: Fix configuration item list 43fbb8db5 DPP: More debug for own connector configuration errors f1f4fa797 DPP: Fix JWK debug prints b04854cef nl80211/MBO: Set temporary disallowed BSSID list to driver 2a71673e2 ERP: Derive ERP key only after successful EAP authentication 528b65578 Add Set Wi-Fi Configuration vendor attribute to configure LRO 944f359e1 Introduce a vendor command to specify the active Type Of Service b6ea76425 nl80211: Make KCK attribute optional in rekey data 35f064212 DPP: Allow passphrase to be set for Configurator 68cb6dcec DPP: Allow SSID to be set for Configurator 186f20489 JSON: Fix \u escaping a82349347 DPP: Add an example python script for QR Code operations 6a7182a9c DPP: Add DPP_BOOTSTRAP_INFO command 8528994e2 DPP: Automatic network profile creation da143f7fb FILS: Fix EVENT_ASSOC processing checks for driver-SME 3c0daa13d Make wpa_config_read_blob() easier for static analyzers a0d5c56f8 DPP: Network Introduction protocol for wpa_supplicant 4ff89c2eb DPP: Network Introduction protocol for hostapd 650a70a72 DPP: Network Introduction protocol 56c754958 DPP: AP parameters for DPP AKM b979caae5 DPP: Network profile parameters for DPP AKM 0c52953b0 DPP: Allow PMKSA cache entries to be added through hostapd ctrl_iface 567da5bbd DPP: Add new AKM 9c2b8204e DPP: Integration for hostapd 9beb2892d DPP: Add wpa_cli commands for DPP operations 461d39af4 DPP: Configuration exchange 30d27b048 DPP: Authentication exchange be27e185b DPP: Bootstrap information management d4d76d983 Fix offchannel TX done handling for sequence of TX frames 00b02149e nl80211: Register to receive DPP Public Action frames 4e19eb88a tests: Module tests for JSON parser 005be3daa Add JavaScript Object Notation (JSON) parser (RFC7159) 5b52e1adc tests: Update base64 OOM test cases to match implementation changes 0ffdc8b19 Add base64url encoding/decoding per RFC 4648 77f273c82 Extend SHA-384 and SHA-512 support to match SHA-256 2c9d92497 P2P: Debug print P2P_FIND rejection reason 618aa2290 P2P: Fix p2p_in_provisioning clearing in failure case b5db6e5dc eap_proxy: Support multiple SIMs in get_imsi() 002087651 eap_proxy: Build realm from IMSI for proxy based EAP methods 5e0c20ff3 nl80211: Do not notify interface as re-enabled if initialization fails 8696e6170 eap_proxy: Add support for deriving ERP information 115d5e222 hostapd: Fix handling a 20/40 BSS Coexistence Management frame 2d18ab408 Add a config parameter to exclude DFS channels from ACS 3c2bd55f0 P2P: wpas_p2p_select_go_freq() to check for supported pref_freq 8d968351a Interworking: Add NULL checking for EAP name in phase2/autheap parameter 9ddba3a30 Rename vendor attribute DISABLE_OFFCHANNEL to RESTRICT_OFFCHANNEL d506c35ef Set Wi-Fi Configuration attribute to restrict offchannel operations 4aa329298 ERP: Do not generate ERP keys when domain name is not specified 34ee12c55 Do not flush PMKSA on bssid_hint change 290834df6 nl80211: Fix race condition in detecting MAC change 04f667fcd DFS: Allow switch to DFS channel after radar detection in ETSI aa56e36d6 driver: Make DFS domain information available to core e8e430fe7 Vendor attributes to retain connection on a roam request failure 43a356b26 Provide option to configure BSSID hint for a network 33117656e Define a QCA vendor attribute to update the listen interval 85cff4b0d OpenSSL: Try SHA256 hash for OCSP certificate matching d264c2e39 HTTP (curl): Try SHA256 hash for OCSP certificate matching 95818ec17 Fix compiler warning with CONFIG_IEEE80211R no-CONFIG_FILS build 613639454 Make CONFIG_MACSEC depend on IEEE8021X_EAPOL 31a856a12 mesh: Make NL80211_MESHCONF_RSSI_THRESHOLD configurable 1f3c49d41 Fix 160 MHz opclass channel to frequency conversion 9f4947466 dbus: Add method to disable channel switching with a TDLS peer 2a57b4b82 dbus: Add method to enable channel switching with a TDLS peer 193950541 dbus: Add AbortScan method to abort ongoing scan 8fed47e01 FILS: Derive FT key hierarchy on authenticator side for FILS+FT 7d440a3bc FILS: Derive FT key hierarchy on supplicant side for FILS+FT 215eaa748 FILS: Implement FILS-FT derivation 80ddf5d99 FILS: Fix Key-Auth derivation for SK+PFS for authenticator side e6b623133 FILS: Fix Key-Auth derivation for SK+PFS for supplicant side 4d0a61c50 FILS: Debug print inputs to Key-Auth derivation be1ece46f wpa_supplicant: Add GET_CAPABILITY for P2P redirection 853cfa873 Detect endianness when building for RTEMS 35bb8a9a5 Android: Define CONFIG_TESTING_OPTIONS if enabled in config 178553b70 MBO: Add support to set ignore assoc disallow to driver 3a46cf93d FT: Add support for wildcard R0KH/R1KH eefe86301 FT RRB: Add msg replay and msg delay protection 245fc96e5 FT: New RRB message format 50bd8e0a9 FT: Replace inter-AP protocol with use of OUI Extended Ethertype f2a04874c MBO: Fix possible NULL pointer dereference on candidate handling 01dd2b105 ERP: Silence static analyzer warning d912953e3 atheros: Get rid of static analyzer warnings on 0-length memcpy 470f08b4f Enable CONFIG_WNM=y automatically for CONFIG_MBO=y builds f54114825 Fix GAS server ifdef block use 8b49b530b Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y 0661163ef Do not blacklist the current AP on DISABLE_NETWORK ec27b04e6 hostapd: Select a valid secondary channel if both enabled da6a28ba6 FILS: Specify if FILS HLP was sent in connect a38090b16 FILS: Add HLP to Connect IEs 1e6780bda Allocate dynamic memory for connect IEs 9f894823f PAE: Silence static analyzer warning about NULL pointer dereference 9a72bfe9a Add control interface command to enable/disable roaming fa61bff6a FILS: Handle authentication/association in partial driver AP SME 5cee22ca4 FILS: Make handle_auth_fils() re-usable for driver-based AP SME 5e5f8c816 FILS: Move authentication response handling into a helper function b8a3453ac FILS: Pass only IE area to handle_auth_fils() 9392859d7 FILS: Move AssocResp construction to a helper function bd5993532 FILS: Move Key Confirm element validation to a helper function 087631b98 FILS: Move Session element validation to a helper function cc20edc9f FILS: Add FILS auth_alg to driver-based AP SME association handling 957bff83c FILS: Add driver-AP SME callback to set TK after association 8acbf85fa FILS: Add FILS AEAD parameters for sta_auth() calls f46c154c5 atheros: Add FILS AAD parameters in sta_auth() handler 6b128fb2a driver: Move sta_auth() arguments to a struct d7cff1d87 atheros: Enable raw management frame receive for FILS builds 2b7a8ec47 atheros: Read driver FILS capability d5444aac4 FILS: Add FILS Indication element into Beacon/Probe Response template 8befe8a99 Define a QCA attribute to specify the PCL policy for external ACS 183d3924c WPS: Add option for using random UUID b44d1efd2 FILS: Fix key info in GTK rekey EAPOL-Key msg 2/2 04243740c FILS: Fix GTK rekey by accepting EAPOL-Key msg 1/2 with FILS AKM bbe7969d6 FILS: Update cache identifier on association f705f41b7 FILS: Update PMKSA cache with FILS shared key offload 01ef320f1 FILS: Update ERP next sequence number with driver offload 5538fc930 FILS: Track completion with FILS shared key authentication offload 8b0a6dba8 FILS: Connect request for offloaded FILS shared key authentication 79f3121bb FILS: Set cache identifier in current PMKSA entry for driver-SME case 15def72fa ERP: External control of ERP key information 42e69bda2 FILS: Add support for Cache Identifier in add/remove PMKSA 061a3d3d5 nl80211: Add support for FILS Cache Identifier in add/remove_pmkid() 6fbb54140 driver: Move add_pmkid() and remove_pmkid() arguments into a struct ad295f3b8 nl80211: Add support for FILS shared key offload 199eb3a4e FILS: Add support to write FILS key_mgmt values in network blocks 16217e13d QCA vendor commands and attributes for spectral scan 5db997e34 FILS: Add FTE into FILS Authentication frame from AP when using FILS+FT af3e362fa FILS: Add MDE into Authentication frame for FILS+FT 5aa08153a FT: Add selection of FT+FILS AKMs c10e0ccc9 Hide *PMKSA_ADD parameters from debug log 2971da270 P2P: Do not use wait_time for SD Response TX for last fragmentation c5fee1604 FT: Schedule wpa_ft_rrb_rx() through eloop in intra-process communication 469677367 Sync with mac80211-next.git include/uapi/linux/nl80211.h 775e986d5 hostapd: Fix crash on consecutive channel switch failures 3d5f0e916 wpa_supplicant: Avoid associating to temp disabled SSID in ap_scan=2 fbba28f8c P2P: Suppress warning on non-P2P config 127595887 QCA vendor command: Add TA max duration attribute for OCB configure 2a9ec7c69 Define attributes for QCA vendor OCB commands 6a4363f5f MBO: Fix reject reason codes 0119d4424 FILS: Fix wpa_supplicant compilation errors 4cc6574d0 FILS: Fix fils_cache_id check a5269dc20 wpa_helpers: Ignore link-local IPv4 address while waiting for DHCP e2f00bb5f xml: Add Value node in TNDS node conversion for empty value case a34317b52 GAS: Handle no-ACK TX status for GAS request frames 5db86df6a macsec_linux: Fix NULL pointer dereference on error cases e50df5d2a mka: Fix use-after-free when transmit secure channels are deleted 529d6ed72 mka: Fix use-after-free when receive secure channels are deleted 6c2056abe QCA vendor attributes to extend antenna diversity functionality b4ae5f04d Add vendor attribute to config propagation delay's absolute value 7f5f4e46a Fix QCA_ATTR_NUD_STATS_IS_DAD value 2c0ac6d61 P2P: Run full P2P_FIND scan after pending scan completes d3bb082a7 P2P: Continue scanning specified channel with P2P_FIND freq argument 31e130f82 FILS: Add FILS-SK-PFS capability into "GET_CAPABILITY fils" command 649835167 FILS: Check FILS Indication element against local network profile 76e20f4fa FILS: Add FILS SK auth PFS support in STA mode 1764559ee FILS: Add FILS SK auth PFS support in AP mode cad291d67 FILS: Define authentication algorithm for FILS SK auth with PFS 611523849 OWE: Add CONFIG_OWE=y build option 07a5fe823 OWE: Use AKM 00-0F-AC:11 style parameters for EAPOL-Key frames ef9627cbc Print the algorithms used for EAPOL-Key professing in log ef2383859 Return success/failure result from sha384_prf() 0a6147991 OWE: Process Diffie-Hellman Parameter element in STA mode 09368515d OWE: Process Diffie-Hellman Parameter element in AP mode f9561868e OWE: Add driver capability flag for OWE AKM a1ea1b452 OWE: Define and parse OWE AKM selector 9c7aac738 OWE: Define and parse Diffie-Hellman Parameter element e73244c24 tests: Extract-and-Expand HKDF (RFC 5869) 4ec833daf Extend hmac_sha256_kdf() to support HKDF-Expand() as defined in RFC 5869 ae1ec1aaf OpenSSL: Add wrapper functions for ECDH b07ff9cb0 wpa_supplicant: Allow disabling HT in AP mode without HT overrides 2124a615e wpa_supplicant: Allow explicit wide channel configuration for AP mode 57ee04dc7 wpa_cli: Execute action file in case of WPS_EVENT_TIMEOUT 6252b981d wpa_cli: Execute action file in case of WPS_EVENT_ACTIVE acdf50219 WPS: Notify about WPS PBC event in Enrollee mode 15e5ee0b7 wpa_supplicant: events: Don't bounce timeout reason through a buffer e97d15b73 wpa_cli: Update wnm_bss_query auto complete message 15ab61eda WNM: Add option to configure candidates for BTM query candidate list e044a9d1e common: Add candidate list parsing helper function 13bf18eda WNM: Use a dynamically allocated buffer for BTM query and response 34f285190 MBO: Parse MBO ANQP-element on STA 941caed98 MBO: Add MBO ANQP-element processing on AP 8ecf2231f ANQP: Extend ANQP_GET command to request without IEEE 802.11 elements 2316cb358 MBO: Add option to add MBO query list to ANQP query 7cbb5f1a4 DFS: Handle pre-CAC expired event 62c8c7f72 nl80211: Handle pre-CAC expired event from the driver caaaee072 Sync with mac80211-next.git include/uapi/linux/nl80211.h 3dcd735c1 DFS: Handle CAC completion event from other radio d0330d57f nl80211: Add option to delay start of schedule scan plans b696f791a RRM: Fix wpas_rrm_send_msr_report() loop handling 891aa65b8 RRM: Use dynamically allocated buffer for beacon report a1f11e34c Use os_memdup() dbdda355d Introduce os_memdup() af8bc24da MBO: Add support for transition reject reason code 3ab484928 nl80211: Driver command for checking BTM accept/reject 23cddd751 wpa_supplicant: Fix non_pref_chan example b9fd3c244 tests: Add TEST_FAIL() to radius_msg_add_attr() de01f254a RADIUS server: Fix error paths in new session creation 4c803dfcd ACS: Fix memory leak if interface is disabled during scan 29be2c090 ACS: Simplify code paths fa07d2d46 tests: Add TEST_FAIL() checks in l2_packet d4359923e Fix DHCP/NDISC snoop deinit followed by failing re-init 160dca078 Add QCA vendor command/attr for BRP antenna limit control 57d3c5913 Clear scan_res_handler on no-retry failure e9518ae74 WFD: Add WFD R2 Subelements 21ac78279 QCA nl80211 vendor attribute for specific sub-20 MHz channel width ff936bc75 Make the third octet of Country String configurable 511831983 trace: Look up start to cope with ASLR 206516e8c af_alg: Crypto wrappers for Linux kernel crypto (AF_ALG) b41d3e0a7 crypto: Process des_encrypt() error returns in callers 5f0e165e8 crypto: Add return value to DES and AES encrypt/decrypt dca4b503f MBO: Fix minimum length check on non_pref_chan configuration 5b9f46df0 hostapd: Get channel number from frequency based on other modes as well 4c8836f13 FILS: Fix fils_hlp.c build with older netinet/udp.h definitions c4bb39707 Fix AES-SIV build dependencies 694a3a0d6 mesh: Fix CONFIG_MESH=y build without CONFIG_IEEE80211W=y 88a447556 Fix SELECT_NETWORK freq parameter d02989f2e D-Bus: Notify mesh capability if driver supports it 57a2aacab Add option to disable broadcast deauth in hostapd on AP start/stop 21ed24f5a hostapd: Fix potential mesh-related change from impacting non-mesh cases b7286c1b5 FILS: External management of PMKSA cache entry with Cache Identifier 869af3072 FILS: Use FILS Cache Identifier to extend PMKSA applicability 6aea02e57 SME: Clear portValid on starting authentication to fix FILS ba9774bd7 FILS: Fix BSSID in reassociation case 7eace3787 FILS: Find PMKSA cache entries on AP based on FILS Cache Identifier Bug: 68042382 Test: Device boots up and connects to wifi networks. Test: Regression tests. Change-Id: I6710d39e00c489288f8afe855868ad28aeba0100 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|
9839ecd75c832023d4d13fd2917a8c28261ff668 |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: I249f5fec85ad69ce3879247b07f0db84136ab996 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|
fe31a9a8fff325bfddbf06fc3e9edaf480824bee |
|
09-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950" This reverts commit 78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb. Test: None
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|
78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: If11d88f812812543dab6839879e815892a39f963 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|
746bde5f922dfd627d25111da4313395bc4ed6af |
|
12-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3e7f1c7980c6e9fc7173f78aa72b2761fcd8924d 3e7f1c7 GnuTLS: Add TLS event callbacks for chain success/failure and peer cert 0eb2ed0 GnuTLS: Add support for OCSP stapling as a client cf08e9b Add MESH to modes capabilities db5adfe Add SAE to auth_alg capabilities 0e1bb94 GnuTLS: Verify that server certificate EKU is valid for a server d4d1f5c GnuTLS: Fix tls_disable_time_checks=1 processing 594d1fc GnuTLS: Add support for private_key and client_cert as blobs 79b1dd9 GnuTLS: Fix DER encoding certificate parsing a165145 Add "GET tls_library" to provide information on TLS library and version c3bb84b GnuTLS: Add event callbacks 8ddcd6b GnuTLS: Add support for domain_suffix_match 4bc13bf GnuTLS: Check for any unknown verification failure e0d431a GnuTLS: Add more debug prints for version and session status 65ec7f4 GnuTLS: Move peer certificate validation into callback function 7c82457 GnuTLS: Remove support for versions older than 2.12.x e1d63f6 GnuTLS: Remove old version number checks for 1.3.2 ae0a23a GnuTLS: Remove GNUTLS_INTERNAL_STRUCTURE_HACK db4cf40 GnuTLS: Add support for ca_cert as a blob 224104d TLS: Reject openssl_ciphers parameter in non-OpenSSL cases b09baf3 Work around Windows build issues 6dbbef9 Define host_to_le32() for Windows builds 7d28e46 Fix os_win32 build 0b40247 Remove Network Security Service (NSS) support d166947 schannel: Reject subject_match, altsubject_match, suffix_match 59051f8 TLS: Reject subject_match, altsubject_match, suffix_match f8717ac GnuTLS: Reject subject_match, altsubject_match, suffix_match e24aef1 Fix a typo in domain_suffix_match documentation 394b547 Improve subject_match and domain_suffix_match documentation 8a42a07 trace: Fix out-of-memory testing logic 79cd993 Add address masks to BSSID lists b83e455 Add network specific BSSID black and white lists b3d6a0a Add generic parser for MAC address lists 21c74e8 nl80211: Use a helper function to put mesh_id 85e1fad nl80211: Use a helper function for putting beacon interval 6dfc557 Remove mesh_ht_mode network block parameter 54fe48b mesh: Use the shared function with IBSS to determine channel parameters f7e889f mesh: Convert channel configuration to use common routines 6334330 mesh: Use a separate variable to track whether HT is enabled 1fc4ab2 nl80211: Move debug prints into nl80211_put_freq_params() cae87ab nl80211: Add a helper function for putting basic rates 6b8b077 ibss/mesh: Enable HT40 if supported a828f62 Make check_40mhz_2g4 common fdd989d Make check_20mhz_bss common 0e550fe Make check_40mhz_5g common 6d5d098 Make get_pri_sec_chan() common 5144274 Introduce common allowed_ht40_channel_pair() 5f10b7f Use common hw_get_freq/hw_get_chan helpers in hostapd 269dfe2 Introduce common hw features 1830817 IBSS: Add WPA_DRIVER_FLAGS_HT_IBSS f3b8ad4 SAE: Implement retransmission timer a206e2a SAE: Centralize function for sending initial COMMIT 28c91ee bsd: Fix parsing of ieee80211req_scan_result on FreeBSD and DragonFly 96d1d97 Android: Remove hardcoded ICU include paths from hs20-osu-client a354bcc D-Bus: Use NoMemory error message from CreateInterface 635874b Handle interface disabled/enabled more consistently 8f2cf37 P2P: Indicate reason=UNAVAILABLE for group netdev going down 86a7fbb Verify that eloop_register_read_sock() succeeds for ctrl_iface setup 27d9701 Fix a memory leak on WPA authenticator error path c1c07dc Fix hostapd interface addition error path a156ffd Add support for testing memory allocation failures 52b3943 D-Bus: Fix interface unregistration on error path 96dc9a6 D-Bus (old): Fix interface unregistration on error path ef03557 Fix memory leak on wpa_supplicant_init_wpa() error path 52a8058 TDLS: Fix an interface addition error path f2d5728 D-Bus: Fix string array dict entry parser in out-of-memory case c61bc23 D-Bus: Fix byte array dict entry parser in out-of-memory case dacf605 D-Bus: Fix Introspect() in case of os_strdup() failure 68a8669 D-Bus (old): Fix wpsReg error message f0614bc D-Bus (old): Fix message handler error paths a2af1c7 D-Bus (old): Fix memory leak on error path 3d2e2d5 trace: Fix compiler warning on 32-bit builds with bfd support b9f6560 eloop: Fix WPA_TRACE tracking in case of realloc failure e10422c Fix memory leak on hostapd BSS addition error path 2801659 Fix hostapd initialization error path on allocation failure d58ade2 nl80211: Fix compilation with libnl 1.1 and 2.0 51f3427 crypto: Clear temporary stack buffers after use 77a2c39 crypto: Clear temporary heap allocations before freeing a15a7fc DH: Clear memory explicitly on private key deinit 77c45e2 Add wpabuf_clear_free() to allow clearing of freed memory a90c7d9 OpenSSL: Fix pbkdf2_sha1() wrapper f6ebbcf AES-SIV: Make aes_s2v() static dcf8fbc nl80211: Simplify event processing error paths 38751d8 nl80211: Remove cfg80211 state mismatch workaround for authentication 64ae244 nl80211: Check support for rekey offload on first use Change-Id: Ice94c3cf8e39a6d2cac993aacd0f6d45b31c7c15 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|
fb45fd5cfed8bdccd0859c7fc05449fc187e2d06 |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/src/crypto/aes-siv.c
|