d2986c2e737a8441ff5a791b6b56c1c8322ef3c9 |
|
23-Oct-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3d6953288b592704484864f41791f8c67ff9aa5a 3d6953288 Extend RESEND_* test commands to allow forcing plaintext TX 4be5bc98a DPP: Update AES-SIV AD for PKEX frames dc4d271c6 DPP: Update AES-SIV AD for DPP Authentication frames 6338c99ef FILS: Send updated connection parameters to drivers if needed d2ba0d719 Move assoc param setting into a helper function 084131c85 FILS: Allow eap_peer_get_erp_info() to be called without config b0a21e228 FILS: Update replay counter from roam info 693eafb15 nl80211: Update FILS roam info from vendor roam event 3c67e977d nl80211: Add support to send updated connection parameters cddfda789 Add attributes to support roam+auth vendor event for FILS c0fe5f125 Clear BSSID information in supplicant state machine on disconnection 006fb845b nl80211: Use NL80211_BSS_LAST_SEEN_BOOTTIME if available a6ea66530 Additional consistentcy checks for PTK component lengths 6f234c1e2 Optional AP side workaround for key reinstallation attacks daa409608 Allow last (Re)Association Request frame to be replayed for testing 751f5b293 Allow EAPOL-Key Request to be sent through control interface bb06748f4 Make last received ANonce available through control interface 143b81bad Allow arbitrary key configuration for testing d8afdb210 Allow EAPOL-Key messages 1/4 and 3/4 to be retransmitted for testing 6bc2f00f4 Allow group key handshake message 1/2 to be retransmitted for testing 16579769f Add testing functionality for resetting PN/IPN for configured keys b488a1294 Clear PMK length and check for this when deriving PTK 00583ef11 Add debug prints on PMK configuration in WPA supplicant a00e946c1 WPA: Extra defense against PTK reinstalls in 4-way handshake a0bf1b68c Remove all PeerKey functionality e76085117 FILS: Do not allow multiple (Re)Association Response frames 2f1357fb6 FILS: Accept another (Re)Association Request frame during an association df9490620 Add MGMT_TX_STATUS_PROCESS command for testing purposes c53eb9461 OWE: Remove forgotten developer debug prints a34ca59e4 SAE: Allow SAE password to be configured separately (STA) 2377c1cae SAE: Allow SAE password to be configured separately (AP) c5aeb4343 P2P: Do not mark DFS channel as invalid if DFS is offloaded to driver 58efbcbcd DPP: Fix static analyzer warnings in key generation and JWK construction f51609022 P2P: Prefer 5/60 GHz band over 2.4 GHz during GO configuration 91cc34bf3 OWE: Allow set of enabled DH groups to be limited on AP 265bda344 OWE: Allow DH Parameters element to be overridden for testing purposes 8c19ea3f2 DPP: Add the crypto suite field to the frames c77e2ff09 DPP: Remove C-sign-key expiry 6254045a5 DPP: Explicitly delete the PKEX secret element K upon generation of z 0e6709a4e DPP: Rename PKEX secret element from Z to K 657317179 DPP: Verify that PKEX Qi is not the point-at-infinity a89138818 OWE: Transition mode information based on BSS ifname 109704657 OWE: Support station SME-in-driver case 5a78c3619 OWE: PMKSA caching in station mode d90f10fa4 OWE: PMKSA caching in AP mode 8b5579e17 DPP: Fix EAPOL-Key Key MIC calculation ec9f48377 OWE: Support DH groups 20 (NIST P-384) and 21 (NIST P-521) in station 7a12edd16 OWE: Support DH groups 20 (NIST P-384) and 21 (NIST P-521) in AP mode 6c4726189 OWE: Extend shared helper functions to support other DH curves d8c8d8575 OWE: Include RSNE in (Re)Association Response frame e8b964901 OWE: Transition mode support on station side 675112df1 OWE: Set PMK length properly on supplicant side ea079153f OWE: Add AP support for transition mode 4a3746341 hostapd: Update HE capabilities and HE operation definition 63bc0ab0e P2P: Allow GO to advertise Interworking element 3567641eb Add TX/RX rate info and signal strength into STA output fa4b605a0 WPS: Do not increment wildcard_uuid when pin is locked e37cea308 OCE: Update default scan IEs when OCE is enabled/disabled ee522d27c Vendor flags for 11ax channel property flags for use with external ACS 61a56c148 Add group_mgmt network parameter for PMF cipher selection 0ad5893a2 PAE: Validate input before pointer fd35ed5bb AP: Remove unneeded check for 'added_unassociated' d55b17460 FILS: Vendor attribute to disable driver FILS features a7297ae5c Fix hostapd debug messages on wpa_pairwise and rsn_pairwise parsing 29c940e7a TDLS: Update the comments related to TPK derivation 3de1566db FILS: Check req_ies for NULL pointer in hostapd_notif_assoc() 1c9663cf6 OpenSSL: Force RSA 3072-bit DH prime size limit for Suite B 2ed70c758 OpenSSL: Add option to disable ECDHE with Suite B RSA 4eb8cfe06 OpenSSL: Force RSA 3072-bit key size limit for Suite B 6418400db Add hostapd tls_flags parameter 60ed2f24e Suite B: Add tls_suiteb=1 parameter for RSA 3k key case 5030d7d9f DPP: Allow raw hex PSK to be used for legacy configuration 039ab15fd DPP: Add DPP-CONFOBJ-PASS/PSK events for hostapd legacy configuration 9824de57a Fix EAPOL-Key version check for a corner case with Suite B AKM 3c7863f81 wpa_supplicant: Support dynamic update of wowlan_triggers 4cada9dcc FILS: Add DHss into FILS-Key-Data derivation when using FILS SK+PFS 41b819148 FILS: Update PMKID derivation rules for ERP key hierarchy establishment 303113398 mesh: Move writing of mesh_rssi_threshold inside CONFIG_MESH 2efc67207 Fix RSN pre-authentication regression with pre-connection scan results 73b3de01c macsec_linux: Exit early when missing macsec kernel module 7612e65b9 mka: Add error handling for secy_init_macsec() calls 2c66c7d11 wpa_supplicant: Check length when building ext_capability in assoc_cb fdbfb63e4 nl80211: Fix bridge name print while removing interface from bridge 333517ac1 crypto: Fix undefined behavior in random number generator 84fccc724 Send Client-Error when AT_KDF attributes from the server are incorrect 446600c35 Add AT_KDF attributes to Synchronization-Failure in EAP-AKA' 155bf1108 PMKSA: Fix use-after-free in pmksa_cache_clone_entry() cdf250149 dbus: Add new interface property to get mesh group 190f6f117 dbus: Add new interface property to get connected mesh peers a9de99b1c dbus: Add MeshPeerDisconnected signal 9b0701fbf dbus: Add MeshPeerConnected signal a39b040b4 dbus: Add MeshGroupRemoved signal 89e9cd25d dbus: Add MeshGroupStarted signal 49e6a5553 FILS: Add a space before MAC address to a HLP debug message 359166ed2 Remove the completely unused FT parameters in driver association data 3db2a82df Add SHA-384 routines to libcrypto.a a0f19e9c7 SAE: Allow commit fields to be overridden for testing purposes (STA) 3648d8a18 SAE: Allow commit fields to be overridden for testing purposes e75335384 SAE: Add testing code for reflection attack e61fea6b4 SAE: Fix PMKSA caching behavior in AP mode a6f238f21 DPP: Add base64 dependency in makefiles c2d4f2eb5 DPP: Derive PMKID using SHA256() for all curves 64a0a75b5 nl80211: Fix auth_alg selection with FILS in the connect command 7475e80f1 FILS: Fix wpa_supplicant AP build without CONFIG_IEEE80211W 85fd8263a DPP: Use Transaction ID in Peer Discovery Request/Response frames a28675da2 hs20-osu-client: Fix build with new OpenSSL and BoringSSL cf39475b4 Introduce QCA_NL80211_VENDOR_SUBCMD_HANG 17385fba2 tests: JSON module tests for additional array parsing d4488b9da JSON: Fix parsing of arrays of numbers, strings, literals a4bf00787 DPP: Remove devices object from the connector e77d13ef9 QCA vendor attribute to configure beacon miss penalize count for BTC 7bd88aaf3 QCA vendor attribute to configure beacon miss count 505554bbf QCA vendor attribute to enable/disable scan ae048257c WPS: Interpret zero length ap_pin hostapd.conf parameter as "unset" 2bdbace63 Remove some obsolete information from hostapd README file b0fc2ef3a hw_features: Fix check of supported 802.11ac channel width b5bf84ba3 WNM: Differentiate between WNM for station and for AP in build 922dcf1b4 RRM: Remove duplicate frequencies from beacon report scan request 705e2909c RRM: Send response when Beacon report request is not supported/refused 3756acfd4 RRM: Send Radio Measurement response when beacon report scan fails b3c148e9f RRM: Send reject/refuse response only to unicast measurement request 51143af7e wpa_cli: Fix global control interface for STA-FIRST/STA-NEXT 809c67502 DPP: Fix build with OpenSSL 1.1.0 89971d8b1 OpenSSL: Clear default_passwd_cb more thoroughly f665c93e1 OpenSSL: Fix private key password handling with OpenSSL >= 1.1.0f 2b9891bd6 OpenSSL: Add build option to select default ciphers 65833d71a OCE: Add hostapd mode OCE capability indication if enabled 332aadb8a STA: Add OCE capability indication attribute fb718f94d nl80211: Check if driver supports OCE specific features 46b15e470 Add vendor flags for OCE feature support indication b377ec258 FILS: Fix issuing FILS connect to a non-FILS AP in driver-FILS case 9f44f7f3b Introduce a vendor attribute to represent the PNO/EPNO Request ID 881a92e8b FILS: Fix compilation with CONFIG_NO_WPA 1f2ae8cff EAP-TTLS: Fix a memory leak on error paths 83e003a91 EAP-TTLS: Fix possible memory leak in eap_ttls_phase2_request_mschap() 422570eec MBO: Fix possible memory leak in anqp_send_req() 96e595a9f EAP-LEAP: Fix possible memory leak in eap_leap_process_request() 23eead4d7 RRM: Filter scan results by parent TSF only if driver supports it 3f8e3a548 ap: Fix invalid HT40 channel pair fallback 6d3e24d3e ap: Fix return value in hostapd_drv_switch_channel() d02e4c8ac P2P: Clear get_pref_freq_list_override on P2P Device bfbc41eac DPP: Fix compilation without openssl cc6088463 P2P: Allow auto GO on DFS channels if driver supports this fe3e0bac1 FILS: Advertize FILS capability based on driver capability 5579c11c3 Fix a typo in vendor attribute documentation 8b5ddda5f FILS: Add HLP support with driver-based AP SME 31ec556ce FILS: Fix the IP header protocol field in HLP DHCP response b3e567c89 FILS: ERP-based PMKSA cache addition on AP bfe448331 FILS: Fix a frame name in a debug print 6d49aeb76 MBO: Whitespace cleanup f2cdb41b8 OCE: Define OCE attributes and other related macros 267fc0dd3 Add wpa_supplicant ctrl iface support to scan for a specific BSSID f522bb237 DPP: Add DPP_CONFIGURATOR_SIGN to generate own connector dc7fc09cc DPP: Add control interface commands into hostapd_cli a86fb43ca DPP: DPP_BOOTSTRAP_INFO for hostapd 484788b87 DPP: Share bootstrap type to string helper function 623f95685 DPP: Allow wpa_cli DPP_CONFIGURATOR_ADD without arguments 888502325 Add new key_mgmt values for wpa_supplicant STATUS command 3a5954ef9 Add mgmt_group_cipher to wpa_supplicant STATUS command 90f837b0b Update default wpa_group_rekey to once-per-day when using CCMP/GCMP 787615b38 DPP: Set PMKSA expiration based on peer connector 6b140f0fa DPP: Update hostapd configurator parameters to match wpa_supplicant 2605405aa DPP: Configurator in hostapd efeada91a DPP: PKEX in hostapd 6095b4790 DPP: Check JWS protected header alg against C-sign-key curve b65b22d60 DPP: Configurator parameters in responder role 31f03cb00 DPP: Update JWS algorithm strings for Brainpool curves e0d3d3fce DPP: Rename Brainpool curve names for JSON 500ed7f00 DPP: PKEX bootstrapping b9d47b484 DPP: Add helper functions for running hash operations 0c7cf1f50 DPP: Increase hostapd_cli buffer limits 44d6b272c DPP: Fix configuration item list 43fbb8db5 DPP: More debug for own connector configuration errors f1f4fa797 DPP: Fix JWK debug prints b04854cef nl80211/MBO: Set temporary disallowed BSSID list to driver 2a71673e2 ERP: Derive ERP key only after successful EAP authentication 528b65578 Add Set Wi-Fi Configuration vendor attribute to configure LRO 944f359e1 Introduce a vendor command to specify the active Type Of Service b6ea76425 nl80211: Make KCK attribute optional in rekey data 35f064212 DPP: Allow passphrase to be set for Configurator 68cb6dcec DPP: Allow SSID to be set for Configurator 186f20489 JSON: Fix \u escaping a82349347 DPP: Add an example python script for QR Code operations 6a7182a9c DPP: Add DPP_BOOTSTRAP_INFO command 8528994e2 DPP: Automatic network profile creation da143f7fb FILS: Fix EVENT_ASSOC processing checks for driver-SME 3c0daa13d Make wpa_config_read_blob() easier for static analyzers a0d5c56f8 DPP: Network Introduction protocol for wpa_supplicant 4ff89c2eb DPP: Network Introduction protocol for hostapd 650a70a72 DPP: Network Introduction protocol 56c754958 DPP: AP parameters for DPP AKM b979caae5 DPP: Network profile parameters for DPP AKM 0c52953b0 DPP: Allow PMKSA cache entries to be added through hostapd ctrl_iface 567da5bbd DPP: Add new AKM 9c2b8204e DPP: Integration for hostapd 9beb2892d DPP: Add wpa_cli commands for DPP operations 461d39af4 DPP: Configuration exchange 30d27b048 DPP: Authentication exchange be27e185b DPP: Bootstrap information management d4d76d983 Fix offchannel TX done handling for sequence of TX frames 00b02149e nl80211: Register to receive DPP Public Action frames 4e19eb88a tests: Module tests for JSON parser 005be3daa Add JavaScript Object Notation (JSON) parser (RFC7159) 5b52e1adc tests: Update base64 OOM test cases to match implementation changes 0ffdc8b19 Add base64url encoding/decoding per RFC 4648 77f273c82 Extend SHA-384 and SHA-512 support to match SHA-256 2c9d92497 P2P: Debug print P2P_FIND rejection reason 618aa2290 P2P: Fix p2p_in_provisioning clearing in failure case b5db6e5dc eap_proxy: Support multiple SIMs in get_imsi() 002087651 eap_proxy: Build realm from IMSI for proxy based EAP methods 5e0c20ff3 nl80211: Do not notify interface as re-enabled if initialization fails 8696e6170 eap_proxy: Add support for deriving ERP information 115d5e222 hostapd: Fix handling a 20/40 BSS Coexistence Management frame 2d18ab408 Add a config parameter to exclude DFS channels from ACS 3c2bd55f0 P2P: wpas_p2p_select_go_freq() to check for supported pref_freq 8d968351a Interworking: Add NULL checking for EAP name in phase2/autheap parameter 9ddba3a30 Rename vendor attribute DISABLE_OFFCHANNEL to RESTRICT_OFFCHANNEL d506c35ef Set Wi-Fi Configuration attribute to restrict offchannel operations 4aa329298 ERP: Do not generate ERP keys when domain name is not specified 34ee12c55 Do not flush PMKSA on bssid_hint change 290834df6 nl80211: Fix race condition in detecting MAC change 04f667fcd DFS: Allow switch to DFS channel after radar detection in ETSI aa56e36d6 driver: Make DFS domain information available to core e8e430fe7 Vendor attributes to retain connection on a roam request failure 43a356b26 Provide option to configure BSSID hint for a network 33117656e Define a QCA vendor attribute to update the listen interval 85cff4b0d OpenSSL: Try SHA256 hash for OCSP certificate matching d264c2e39 HTTP (curl): Try SHA256 hash for OCSP certificate matching 95818ec17 Fix compiler warning with CONFIG_IEEE80211R no-CONFIG_FILS build 613639454 Make CONFIG_MACSEC depend on IEEE8021X_EAPOL 31a856a12 mesh: Make NL80211_MESHCONF_RSSI_THRESHOLD configurable 1f3c49d41 Fix 160 MHz opclass channel to frequency conversion 9f4947466 dbus: Add method to disable channel switching with a TDLS peer 2a57b4b82 dbus: Add method to enable channel switching with a TDLS peer 193950541 dbus: Add AbortScan method to abort ongoing scan 8fed47e01 FILS: Derive FT key hierarchy on authenticator side for FILS+FT 7d440a3bc FILS: Derive FT key hierarchy on supplicant side for FILS+FT 215eaa748 FILS: Implement FILS-FT derivation 80ddf5d99 FILS: Fix Key-Auth derivation for SK+PFS for authenticator side e6b623133 FILS: Fix Key-Auth derivation for SK+PFS for supplicant side 4d0a61c50 FILS: Debug print inputs to Key-Auth derivation be1ece46f wpa_supplicant: Add GET_CAPABILITY for P2P redirection 853cfa873 Detect endianness when building for RTEMS 35bb8a9a5 Android: Define CONFIG_TESTING_OPTIONS if enabled in config 178553b70 MBO: Add support to set ignore assoc disallow to driver 3a46cf93d FT: Add support for wildcard R0KH/R1KH eefe86301 FT RRB: Add msg replay and msg delay protection 245fc96e5 FT: New RRB message format 50bd8e0a9 FT: Replace inter-AP protocol with use of OUI Extended Ethertype f2a04874c MBO: Fix possible NULL pointer dereference on candidate handling 01dd2b105 ERP: Silence static analyzer warning d912953e3 atheros: Get rid of static analyzer warnings on 0-length memcpy 470f08b4f Enable CONFIG_WNM=y automatically for CONFIG_MBO=y builds f54114825 Fix GAS server ifdef block use 8b49b530b Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y 0661163ef Do not blacklist the current AP on DISABLE_NETWORK ec27b04e6 hostapd: Select a valid secondary channel if both enabled da6a28ba6 FILS: Specify if FILS HLP was sent in connect a38090b16 FILS: Add HLP to Connect IEs 1e6780bda Allocate dynamic memory for connect IEs 9f894823f PAE: Silence static analyzer warning about NULL pointer dereference 9a72bfe9a Add control interface command to enable/disable roaming fa61bff6a FILS: Handle authentication/association in partial driver AP SME 5cee22ca4 FILS: Make handle_auth_fils() re-usable for driver-based AP SME 5e5f8c816 FILS: Move authentication response handling into a helper function b8a3453ac FILS: Pass only IE area to handle_auth_fils() 9392859d7 FILS: Move AssocResp construction to a helper function bd5993532 FILS: Move Key Confirm element validation to a helper function 087631b98 FILS: Move Session element validation to a helper function cc20edc9f FILS: Add FILS auth_alg to driver-based AP SME association handling 957bff83c FILS: Add driver-AP SME callback to set TK after association 8acbf85fa FILS: Add FILS AEAD parameters for sta_auth() calls f46c154c5 atheros: Add FILS AAD parameters in sta_auth() handler 6b128fb2a driver: Move sta_auth() arguments to a struct d7cff1d87 atheros: Enable raw management frame receive for FILS builds 2b7a8ec47 atheros: Read driver FILS capability d5444aac4 FILS: Add FILS Indication element into Beacon/Probe Response template 8befe8a99 Define a QCA attribute to specify the PCL policy for external ACS 183d3924c WPS: Add option for using random UUID b44d1efd2 FILS: Fix key info in GTK rekey EAPOL-Key msg 2/2 04243740c FILS: Fix GTK rekey by accepting EAPOL-Key msg 1/2 with FILS AKM bbe7969d6 FILS: Update cache identifier on association f705f41b7 FILS: Update PMKSA cache with FILS shared key offload 01ef320f1 FILS: Update ERP next sequence number with driver offload 5538fc930 FILS: Track completion with FILS shared key authentication offload 8b0a6dba8 FILS: Connect request for offloaded FILS shared key authentication 79f3121bb FILS: Set cache identifier in current PMKSA entry for driver-SME case 15def72fa ERP: External control of ERP key information 42e69bda2 FILS: Add support for Cache Identifier in add/remove PMKSA 061a3d3d5 nl80211: Add support for FILS Cache Identifier in add/remove_pmkid() 6fbb54140 driver: Move add_pmkid() and remove_pmkid() arguments into a struct ad295f3b8 nl80211: Add support for FILS shared key offload 199eb3a4e FILS: Add support to write FILS key_mgmt values in network blocks 16217e13d QCA vendor commands and attributes for spectral scan 5db997e34 FILS: Add FTE into FILS Authentication frame from AP when using FILS+FT af3e362fa FILS: Add MDE into Authentication frame for FILS+FT 5aa08153a FT: Add selection of FT+FILS AKMs c10e0ccc9 Hide *PMKSA_ADD parameters from debug log 2971da270 P2P: Do not use wait_time for SD Response TX for last fragmentation c5fee1604 FT: Schedule wpa_ft_rrb_rx() through eloop in intra-process communication 469677367 Sync with mac80211-next.git include/uapi/linux/nl80211.h 775e986d5 hostapd: Fix crash on consecutive channel switch failures 3d5f0e916 wpa_supplicant: Avoid associating to temp disabled SSID in ap_scan=2 fbba28f8c P2P: Suppress warning on non-P2P config 127595887 QCA vendor command: Add TA max duration attribute for OCB configure 2a9ec7c69 Define attributes for QCA vendor OCB commands 6a4363f5f MBO: Fix reject reason codes 0119d4424 FILS: Fix wpa_supplicant compilation errors 4cc6574d0 FILS: Fix fils_cache_id check a5269dc20 wpa_helpers: Ignore link-local IPv4 address while waiting for DHCP e2f00bb5f xml: Add Value node in TNDS node conversion for empty value case a34317b52 GAS: Handle no-ACK TX status for GAS request frames 5db86df6a macsec_linux: Fix NULL pointer dereference on error cases e50df5d2a mka: Fix use-after-free when transmit secure channels are deleted 529d6ed72 mka: Fix use-after-free when receive secure channels are deleted 6c2056abe QCA vendor attributes to extend antenna diversity functionality b4ae5f04d Add vendor attribute to config propagation delay's absolute value 7f5f4e46a Fix QCA_ATTR_NUD_STATS_IS_DAD value 2c0ac6d61 P2P: Run full P2P_FIND scan after pending scan completes d3bb082a7 P2P: Continue scanning specified channel with P2P_FIND freq argument 31e130f82 FILS: Add FILS-SK-PFS capability into "GET_CAPABILITY fils" command 649835167 FILS: Check FILS Indication element against local network profile 76e20f4fa FILS: Add FILS SK auth PFS support in STA mode 1764559ee FILS: Add FILS SK auth PFS support in AP mode cad291d67 FILS: Define authentication algorithm for FILS SK auth with PFS 611523849 OWE: Add CONFIG_OWE=y build option 07a5fe823 OWE: Use AKM 00-0F-AC:11 style parameters for EAPOL-Key frames ef9627cbc Print the algorithms used for EAPOL-Key professing in log ef2383859 Return success/failure result from sha384_prf() 0a6147991 OWE: Process Diffie-Hellman Parameter element in STA mode 09368515d OWE: Process Diffie-Hellman Parameter element in AP mode f9561868e OWE: Add driver capability flag for OWE AKM a1ea1b452 OWE: Define and parse OWE AKM selector 9c7aac738 OWE: Define and parse Diffie-Hellman Parameter element e73244c24 tests: Extract-and-Expand HKDF (RFC 5869) 4ec833daf Extend hmac_sha256_kdf() to support HKDF-Expand() as defined in RFC 5869 ae1ec1aaf OpenSSL: Add wrapper functions for ECDH b07ff9cb0 wpa_supplicant: Allow disabling HT in AP mode without HT overrides 2124a615e wpa_supplicant: Allow explicit wide channel configuration for AP mode 57ee04dc7 wpa_cli: Execute action file in case of WPS_EVENT_TIMEOUT 6252b981d wpa_cli: Execute action file in case of WPS_EVENT_ACTIVE acdf50219 WPS: Notify about WPS PBC event in Enrollee mode 15e5ee0b7 wpa_supplicant: events: Don't bounce timeout reason through a buffer e97d15b73 wpa_cli: Update wnm_bss_query auto complete message 15ab61eda WNM: Add option to configure candidates for BTM query candidate list e044a9d1e common: Add candidate list parsing helper function 13bf18eda WNM: Use a dynamically allocated buffer for BTM query and response 34f285190 MBO: Parse MBO ANQP-element on STA 941caed98 MBO: Add MBO ANQP-element processing on AP 8ecf2231f ANQP: Extend ANQP_GET command to request without IEEE 802.11 elements 2316cb358 MBO: Add option to add MBO query list to ANQP query 7cbb5f1a4 DFS: Handle pre-CAC expired event 62c8c7f72 nl80211: Handle pre-CAC expired event from the driver caaaee072 Sync with mac80211-next.git include/uapi/linux/nl80211.h 3dcd735c1 DFS: Handle CAC completion event from other radio d0330d57f nl80211: Add option to delay start of schedule scan plans b696f791a RRM: Fix wpas_rrm_send_msr_report() loop handling 891aa65b8 RRM: Use dynamically allocated buffer for beacon report a1f11e34c Use os_memdup() dbdda355d Introduce os_memdup() af8bc24da MBO: Add support for transition reject reason code 3ab484928 nl80211: Driver command for checking BTM accept/reject 23cddd751 wpa_supplicant: Fix non_pref_chan example b9fd3c244 tests: Add TEST_FAIL() to radius_msg_add_attr() de01f254a RADIUS server: Fix error paths in new session creation 4c803dfcd ACS: Fix memory leak if interface is disabled during scan 29be2c090 ACS: Simplify code paths fa07d2d46 tests: Add TEST_FAIL() checks in l2_packet d4359923e Fix DHCP/NDISC snoop deinit followed by failing re-init 160dca078 Add QCA vendor command/attr for BRP antenna limit control 57d3c5913 Clear scan_res_handler on no-retry failure e9518ae74 WFD: Add WFD R2 Subelements 21ac78279 QCA nl80211 vendor attribute for specific sub-20 MHz channel width ff936bc75 Make the third octet of Country String configurable 511831983 trace: Look up start to cope with ASLR 206516e8c af_alg: Crypto wrappers for Linux kernel crypto (AF_ALG) b41d3e0a7 crypto: Process des_encrypt() error returns in callers 5f0e165e8 crypto: Add return value to DES and AES encrypt/decrypt dca4b503f MBO: Fix minimum length check on non_pref_chan configuration 5b9f46df0 hostapd: Get channel number from frequency based on other modes as well 4c8836f13 FILS: Fix fils_hlp.c build with older netinet/udp.h definitions c4bb39707 Fix AES-SIV build dependencies 694a3a0d6 mesh: Fix CONFIG_MESH=y build without CONFIG_IEEE80211W=y 88a447556 Fix SELECT_NETWORK freq parameter d02989f2e D-Bus: Notify mesh capability if driver supports it 57a2aacab Add option to disable broadcast deauth in hostapd on AP start/stop 21ed24f5a hostapd: Fix potential mesh-related change from impacting non-mesh cases b7286c1b5 FILS: External management of PMKSA cache entry with Cache Identifier 869af3072 FILS: Use FILS Cache Identifier to extend PMKSA applicability 6aea02e57 SME: Clear portValid on starting authentication to fix FILS ba9774bd7 FILS: Fix BSSID in reassociation case 7eace3787 FILS: Find PMKSA cache entries on AP based on FILS Cache Identifier Bug: 68042382 Test: Device boots up and connects to wifi networks. Test: Regression tests. Change-Id: I6710d39e00c489288f8afe855868ad28aeba0100 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
ebd93af924f6e54fb4982b3312ff875a4896b62b |
|
21-Feb-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 128f6a98b3d4d6ed103db759707309f451db9682 128f6a98b mka: Fix the order of operations in secure channel deletion 213eb1885 dbus: Set mode to mesh in bss properties when mesh is supported 21fda4ee7 RSN: Fix pre-authentication EAPOL-Start startPeriod configuration 3f23260da nl80211: Notify reason for connection timeout failure ca1ab9db2 hostapd: Get vendor HE capabilities 7785c70bb QCA vendor command for fetching HE capabilities d512f406f hostapd: Add IEEE 802.11ax HE IEs into Beacon/Probe Response frames 94380cb40 hostapd: Initial IEEE 802.11ax (HE) definitions 5972dc73c mesh: Use correct rate in VHT and HT mixed environment 84ea61cff mesh: Use correct rate in HT and legacy mixed environment 025c6a47f VHT: Remove a redundant check a7a638c2c hw_features: Move VHT capabilities checks to common e01cf2afc Define eapol_sm_get_eap_proxy_imsi() only with CONFIG_EAP_PROXY=y a8e25deeb FT: Merge similar error paths to use common steps c6c41f6ea FT: Support addition of RIC elements into Reassociation Request frame ecbdc1a1f Mark RSN msg 1/2 key data debug dump as key material 834c5d681 FILS: Fix PMK length for initial connection with FILS SHA384 AKM e491389eb FILS: Fix ifdef for PTK derivation with SHA384-based AKM 62944f7d2 Add HMAC-SHA384 with internal crypto aeecd4eae OpenSSL: Fix hmac_sha384_vector() implementation 5db32adc9 browser-wpadebug: Send HTTP response with HTTP/1.1 header 79329ae0a P2P: Verify local driver preferred frequencies for P2P use cases 3a7819f0a P2P: Add P2P_SET override_pref_op_chan to allow overriding preference c06fca04f Add wpa_supplicant SET get_pref_freq_list_override b4d56efb1 Use throughput estimate-based BSS selection with larger SNR difference 142041487 Drop GREAT_SNR definition from 30 to 25 dB 364c064a4 FT: Check key derivation results explicitly in AP operations b5562a1a6 FILS: Remove CRC32 dependency from build 5cf0930f9 testS: Additional BSS TM error case coverage 885bbd4de WNM: Remove unused code from BSS TM Req generation e7ddd86a9 WNM: Use a common error path in ieee802_11_send_wnmsleep_resp() d6d5970e2 WNM: Fix WNM-Sleep Mode Request parsing for WNM-Sleep element 8492cc79c PeerKey: Remove dead code related to STSL negotiation state e37c0aa5d OSU server: Remove invalid options from documentation 0d6056703 WMM: Fix estimated medium time calculation for some corner cases ae26d3021 Fix "IEEE 802.11: Ignored Action frame" debug message 4ead4c7ec WMM: Remove obsolete TODO comments 577e794eb Sync android.config with wpa_supplicant defconfig changes 784710b7f Add bgscan options to wpa_supplicant defconfig 212a8f487 Fix wpa_supplicant defconfig copy-paste description 57c3a605c Add support to sched scan to report relatively better BSSs 20c846d9e nl80211: sched_scan relative RSSI parameters 37e9f511e mka: Send MKPDUs forever if mode is PSK 76aa31838 EAP: Call deinit_for_reauth() for Phase 2 EAP methods 02156b98b EAP-AKA: Don't use anonymous identity in phase2 9e2afe10e EAP-SIM: Don't use anonymous identity in phase2 ed9b1c16d EAP peer: Cache decrypted requests for EAP-SIM/AKA/AKA' 5f11880f6 SME: Remove null ie param from CTRL-EVENT-AUTH-REJECT 4d70b2a4e RRM: Fix a memory leak in beacon request handling 401243b73 RRM: Fix range request overriding fb81c0a3d RRM: Merge similar error returns to a single one 13b30052d RRM: Fix Range Request max age parsing bd6ec7f7c Fix MAC ACL query freeing on deinit b4fd1f0ed Allow PNO scan also in connection completed state 4c6f450ca Add radio_work_is_connect() helper 85b6b6b6e Serialize scan/p2p-scan if already scheduled on the same interface fcb303a57 P2P: Clear driver scan cache after BSS_FLUSH 0d6dc6830 FILS: Clean up HLP resize check 1d9d21f37 GAS: Add support to randomize transmitter address 8331c9b31 nl80211: Add support for mgmt_tx with random TA 14fa723a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h 65ab7eb1f GAS: Fix OSU Providers List response with invalid configuration f3e157057 VHT: Fill VHT capability with hardware capability 4bb9b674c Add a log message when GTK rekeying failed 41f140d38 Add hostapd options wpa_group_update_count and wpa_pairwise_update_count e54691106 mka: Some bug fixes for MACsec in PSK mode 7faf403f9 mka: Fix an incorrect update of participant->to_use_sak 00e0f0b01 hs20-osu-client: Hide a trivial compiler warning 276e93654 hw_features: Clean center freq for falling back HT40 channels f47f93617 P2P: Override P2P_PEER group_capab with 0 if no matching BSS entry found bcf66493c Fix estimated throughput based skip-roam case 84bb12aa6 FILS: Fix send_assoc_resp() HLP extension to cover sta == NULL 275cc9428 FILS: Stop processing if fils_rmsk_to_pmk() fails caab23f19 Set EAPOL-Key Key Length field to 0 for group message 1/2 in RSN b0fb2be77 Do not send GNonce in EAPOL-Key group message 1/2 3bbc47050 Fix EAPOL-Key Install bit in Group Key 1/2 with FT and FILS auth db5e53cb0 mesh: Fix struct hostapd_data initialization 9b170991a mesh: Fix mesh interface removal fix 945604a35 Update wpaspy.py to be python3 compatible 4d6e79f86 Use defines in hostapd_set_freq_params() 0217b8d87 eloop: Fix comments mismatch eloop_event/timeout_handler definitions 09a97eb27 Update the copyright notice years for QCA vendor definitions 841e9a8c7 QCA vendor command to set the trace levels for the specific QCA module d77f33041 FILS: Fix AES-SIV AAD for (Re)Association Request frame decryption 7a6c3de23 ERP: Use macro for EMSKname length instead of hardcoded integer value bb3ea71a2 ERP: Fix rIK derivation 124ddfa19 FILS: Parse and report received FILS HLP Containers from response 91d91abf6 FILS: DHCP relay for HLP requests 54b04d6f3 FILS: Move HLP request handling into a separate file 5a9d50493 ProxyARP: Use more robust DHCP option parsing e64c13feb Move DHCP definitions into a common file 70407ee5c Add QCA vendor definitions for BSS transition status 53d171440 AP: Check ACL upon association request for 802.11ad 4cc61c386 GAS: Set temporary session timeout bigger than gas_comeback_delay Test: Wifi Suite Change-Id: Id597d7cba5d2b3875f2dbbeb9a10fd5e69a6a7c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a741f4b5e5602c2f4d46a62a11f3971a8aca871e |
|
27-Jan-2017 |
Roshan Pius <rpius@google.com> |
Merge changes I1dac2f1c,I656f4cd2,I03fb2cb2 * changes: wpa_supplicant(hidl): Parse the network request callbacks wpa_supplicant(hidl): Implement auth timeout callback wpa_supplicant(hidl): Implementation of P2p callbacks
|
fd2fd66037872fa3b6adcd2a72adc66dda5912ca |
|
23-Jan-2017 |
Roshan Pius <rpius@google.com> |
wpa_supplicant(hidl): Implementation of P2p callbacks Implementation of all the P2P callbacks exposed in ISupplicantP2pIfaceCallback interface. Few callbacks are intentionally left out because there are other callbacks which already provide the necessary info: 1. The various onProvisionDiscovery* callbacks can be inferred from the onProvisionDiscoveryCompleted callback. 2. onGroupFormationSuccess can be inferred from onGroupStarted callback. These will be removed from the .hal files. Bug:34221586 Test: Compiles Change-Id: I03fb2cb2c5a1579a5357b4f5578e1152f5cb49a5
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
293335998d38c497293b1c41f7ad8342b507d458 |
|
09-Jan-2017 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 05e5e615e6a26d7a9f5bd0569a0baeae1bcdee49 05e5e615e AP: Skip authentication/deauthentication phase for DMG/IEEE 802.11ad 0c4b9025c AP: Do not look for supported rates in DMG/IEEE 802.11ad e72faadb4 bgscan_simple: Fix short_scan_count comparison 517b5f928 nl80211: Zero num_modes if nl80211_get_hw_feature_data() fails 39c5da328 nl80211: Use correct attribute for scan flags in vendor scan c167662d7 eap_proxy: On SIM error flush PMKSAs only for SIM/AKA/AKA' networks 6657bb158 Fix OOM handling in neighbor report response handling 7187e2093 Allow LCI request with no subelements d73420143 RRM: Enable beacon report with active/passive scan for all drivers ec45927b8 Report received beacon report with BEACON-RESP-RX event f3383366a Report beacon request TX status as control interface event 90d9d7c32 Beacon request through hostapd control interface 73a27a634 Add hostapd configuration parameter rrm_beacon_report de6ec8b55 Enable Beacon Report using beacon table for all drivers 6774c6a9f Update copyright notices for the new year 2017 f56877414 Do not add own BSS in neighbor report with invalid op_class/channel aeff0645d FILS: Fix FILS Realm Information ANQP-element construction 76196ddb2 wpa_supplicant: Add support for Beacon Report Radio Measurement b3060bf99 common: Add helper function to convert RSSI to RCPI 1ac4dba31 wpa_supplicant: Extend verify_channel() and make it global c9ff8e5f6 common: Add function to get an operating class by its number and country e4f1d879c common: Add non-global to global operating classes conversion 96a5f14ee nl80211: Add support for additional scan parameters for beacon report c16b9f8d3 driver: Add scan support to beacon report 3c716fdbd wpa_supplicant: Refactor wpas_rrm_build_lci_report() e1b96e112 wpa_supplicant: Send rejection for unsupported radio measurements 0c73e410d wpa_supplicant: Limit RRM response size to MMPDU size 9664ab8b7 wpa_supplicant: Refactor Radio Measurement Request handling 332bf5d3f wpa_supplicant: Validate RRM request frame format ec493469f wpa_supplicant: Move RRM implementation to a dedicated file d1c74f8c9 Add RRM definitions for beacon report measurement 6a31440b8 Fix LCI request subelement processing ce691a8d9 Add CONFIG_MESH into wpa_supplicant defconfig 67129ab9e wpa_cli: Add commands to use PMKSA_GET/ADD bbad185c1 P2P: Fix compilation warning in p2p_add_device() 2977f5193 GAS: Remove unnecessarily duplicate gas_frag_limit configuration 1940559ea FT: Drop FT Action frames if ft_over_ds=0 d8de90487 Remove deprecated tx_queue_* params from hostapd.conf notes 78022c836 Fix memory leak on hostapd eap_user_file parsing error paths 02f999c6d hostapd: Remove unnecessary NULL check from parser functions fd5f29e7e Fix memory leak in hostapd BSS_TM_REQ error path handling 95de34a10 Remove trailing whitespace 45997cce4 hostapd: Add TERMINATE as per-interface command 546680f81 hostapd: Do not update dtim_period with invalid value 356773058 RADIUS server: Increase maximum number of sessions a5861afcb hostapd: Do not update invalid wep_key_len_unicast f78402ace hostapd: Do not update rejected wep_key_len_broadcast e0ba7efe5 hostapd: Do not update eapol_version with rejected value 9266d00bf hostapd: Reject invalid macaddr_acl value 8628555f9 hostapd: Check driver parameter before replacing previous value 1dfd25a68 Fix hostapd SIGHUP processing before interface is enabled 34e29dfd4 Remove unnecessary NULL check from hostapd_config_read_wpa_psk() call 65dfa8728 mka: Make MKA actor priority configurable 9bcfd5be8 Document new D-Bus WPS properties 77fcbf7ff D-Bus: Use a helper function to get possibly NULL strings dbf524946 D-Bus: Add DeviceType in WPS property 266097fda D-Bus: Add device serial number in WPS property 3ee6a3ab3 D-Bus: Add model number in WPS property ae66822cd D-Bus: Add WPS model name as property 318d4b5be D-Bus: Add WPS manufacturer as property b20f031c6 D-Bus: Add WPS device name as property 4a45dc192 mesh: Show [MESH] flag in print_bss_info() c04a67deb hostapd_cli: Add completion for get command bf4167b9d hostapd_cli: Add completion for set command 86adff09e hostapd_cli: Completion for further commands with STA parameter 4f59ad069 hostapd_cli: Use common completion for commands that use stations 62b95eb67 hostapd_cli: Add missing command help descriptions 04f02faac Fix wpa_cipher_to_alg() return type 9187b13ad wpa_supplicant: Add BSS CURRENT control interface command d7f12e4eb OpenSSL: Make sure local certificate auto chaining is enabled 4be02b71b OpenSSL: Remove SSL_{CTX_,}_clear_options ifdefs 7655bd738 P2P: Do not use wait_time for SD Response TX without fragmentation 1f0fdaf0e Fix race condition between AssocResp callback and 4addr event a6f3761f7 eap_proxy: Add support for SIM state change indication from eap_proxy 79a54ab9f eap_proxy: Fix eap_proxy_init() prototype to use const eapol_cb 4e118c847 D-Bus: Add 'freq' option to P2P Find method to specify starting channel e414f4f02 PeerKey: Fix STK 4-way handshake regression 28fb9bb19 PeerKey: Fix EAPOL-Key processing dfc773172 Android: Add p2p_add_cli_chan=1 option 7508c2ad9 PAE: Make KaY specific details available via control interface b54f43390 FILS: Make FILS Indication element information available in BSS output 8183aee6c FILS: Add support for building FILS Realm Information ANQP-element 9cad61867 FILS: Add Realm Information ANQP-element in BSS data 26bf70e3d FILS: Separate FILS realm configuration from ERP domain 42b847ac1 FILS: Fix hashed realm name derivation 29062f293 Update various definitions based on IEEE Std 802.11-2016 aaa9c60bc Fix preauth_test build by updating add_pmkid/remove_pmkid callbacks 0babae87a Fix wpa_supplicant build error with IEEE8021X_EAPOL unset 19810d29b Make Beacon IEs available in wpa_supplicant BSS command 274e76f22 mesh: Fix channel configuration in pri/sec switch case cebda0e3e Make debug print clearer for AP/mesh mode secondary channel issues 3459381dd External persistent storage for PMKSA cache entries c57931273 Add PMKSA-CACHE-ADDED/REMOVED events to wpa_supplicant 655dc4a43 Send "TERMINATING" event from hostapd 5149a0f04 P2P: Set p2p_persistent_group=1 at the time of reading disabled=2 065c029a5 Remove MBO dependency from Supported Operating Classes element 62cd9d792 nl80211: Specify the BSSID in the QCA vendor scan 444930e5b Define an attribute to do a specific BSSID QCA vendor scan cea761472 Add QCA vendor command definitions for IDs 61-73 cb0cc6efa Define QCA Beacon miss threshold attributes for 2.4 and 5 GHz bands c313c8a5d Fix QCA vendor command values for SAR power limits a5c723adc Interworking: Clear SCANNING state if no network selected a1836de64 SME: Fix IBSS setup after shared key/FT/FILS association f49c852b5 P2P: Fix a theoretical out of bounds read in wpas_p2p_select_go_freq() 944d48588 P2P: Fix a theoretical out of bounds read in wpas_p2p_setup_freqs() 0a6c9dc70 P2P: Send P2P-DEVICE-FOUND event on peer changing device name 9a431d493 WFD: Clear wfd_subelems when P2P peer stops sending them 6e374bd44 Ignore scan results from ongoing scan when FLUSH command is issued 71ac93453 Make update_idx available in BSS control interface command 49aa88bb5 P2P: Clear PEER_WAITING_RESPONSE on GO Negotiation success c79238b6a Define a QCA vendor command to configure SAR Power limits 0f5eb69f8 Use eloop timeout for post-EAP-Failure wait before disconnection 20b1a9e23 Allow hostapd wep_key# parameters to be cleared 5ec3d510e wpa_passphrase: Reject invalid passphrase Test: Wifi Suite Change-Id: Ida52ca4e43bbc326a89d4c9848529df2d545b692 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
abb90a3fc1917e628167827cb14e742000605332 |
|
06-Dec-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit ed0a4ddc22526361a138c6b145561fcaac24e2a5 ed0a4dd nl80211: Update drv->ssid on connect/associate event based on BSS data 9f346fa nl80211: Fix scan_state update in no pending scan state 34f7c69 Add multicast to unicast support 5f2c0a2 Sync with mac80211-next.git include/uapi/linux/nl80211.h 08032c7 Remove inactivity timeout for wired interfaces 57f93d6 Defer scans while PNO is in progress instead of skipping them a1fce39 nl80211: Optimize memory use in nl80211_get_assoc_freq() da2c284 nl80211: Reduce nl80211_dump_scan() memory need b72a01b nl80211: Split bss_info_handler() into a separate parser function cfadab2 nl80211: Move duplicate scan result removal to bss.c 2a1cf26 nl80211: Add more debug details to duplicate scan entry removal 865081c privsep: Support frequency list for scan requests da818ee privsep: Support multiple scan SSIDs 002b504 privsep: Coding style cleanup for struct definitions d3c43e5 privsep: Fix scan result fetching with Beacon frame IEs 0771e91 wpa_priv: Document reduced functionality 6d97561 wpa_priv: Handler driver global_deinit() on termination path ce0f899 wpa_priv: Explicitly clear padding in message structures e064177 wpa_priv: Use fromlen instead sizeof(struct sockaddr_un) 128d3c6 wpa_priv: Add support for multiple l2_packet connections c8fef78 nl80211: Split nl80211_check_bss_status() into a separate function e35e137 nl80211: Separate channel noise fetch from scan result processing cb2b666 Fix 4addr reassociation-without-deauthentication on AP 8c0ed37 wired: Mark some common helper functions static ba5ea11 mka: Remove references to macsec_qca from wpa_supplicant.conf f014d9d macsec_linux: Add a driver for macsec on Linux kernels 8618313 drivers: Move driver_wired_get_ssid() to a common file d27c42b drivers: Move driver_wired_get_bssid() to a common file 9281e5c drivers: Move driver_wired_get_capa() to a common file ec9cfb9 drivers: Move driver_wired_deinit_common() to a common file ed5ae61 drivers: Move driver_wired_init_common() to a common file 5a55ec3 drivers: Move driver_wired_get_ifstatus() to a common file d718a5d drivers: Move driver_wired_set_ifflags() to a common file 567b7d4 drivers: Move driver_wired_get_ifflags() to a common file 693124a drivers: Move driver_wired_multi() to a common file b0906ef drivers: Move wired_multicast_membership() to a common file 0abc8d1 drivers: Move common definitions for wired drivers out bf88401 Add support to abort vendor scan eeb34a4 nl80211: Enhance abort scan to also abort the vendor scan 1a793f5 Define a QCA vendor command to abort vendor scan 47d74bf Add MGMT_RX_PROCESS test command for hostapd 2ab0965 AP: Do not drop STA entry if PMF is used with full AP client state 209dad0 FT: Explicitly check for MDE not present in non-FT association d4f3003 nl80211: Configure Beacon frame TX rate if driver advertises support 29483a5 Add support for user configurable Beacon frame data rate for AP mode 346b333 Use random MAC address for scanning only in non-connected state 18f1611 D-Bus: Send P2P IP address assignment info with GroupStarted event 046fa6f D-Bus: Add getter and setter for P2P IP address config parameters d503eee FT: Complete CONFIG_IEEE80211R_AP renaming for hostapd e0d9fd3 wpa_supplicant: Allow configuring the MACsec port for MKA 1d3d066 mka: Add enable_encrypt op and call it from CP state machine 7b4d546 wpa_supplicant: Add macsec_integ_only setting for MKA 008e224 mka: Disable peer detection timeout for PSK mode ad51731 wpa_supplicant: Allow pre-shared (CAK,CKN) pair for MKA 5acbf22 Fix hostapd usage entry style for -T 611d67a Add doxygen ref to eap_method structure 88f93c3 Android: Remove BoringSSL guard 7824bf7 nl80211: Fix get_inact_sec() returning -1 on failure 088d53d mka: Fix getting capabilities from the driver 5e785a6 Reserve QCA vendor specific nl80211 command 144 4051dd8 GAS: Add Capability List ANQP-element support for Info ID 270, 280..299 d50f518 Fix libap.a build e65a87b Debug print scan results matching the currently selected network 8d1e693 Use estimated throughput to avoid signal based roaming decision Test: Wifi Suite Change-Id: Ic470ffe9004d28d34916e50221d631ac99d4163f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9839ecd75c832023d4d13fd2917a8c28261ff668 |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: I249f5fec85ad69ce3879247b07f0db84136ab996 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
fe31a9a8fff325bfddbf06fc3e9edaf480824bee |
|
09-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950" This reverts commit 78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb. Test: None
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb |
|
07-Nov-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950 4ec1fd8 FT: Differentiate between FT for station and for AP in build f0259c3 hostapd: Fix own wide bandwidth subelement generation (neighbor report) 0a63635 AP: Use valid status code in wpa_ft_send_rrb_auth_resp() e4b48b7 Extend ieee80211_freq_to_channel_ext() to cover channels 52-64 c433c50 wpa_supplicant: Make CONFIG_MBO independent of CONFIG_AP d044d2f wpa_supplicant: Get scan_result IE also from Beacon frames 451a27b hostapd: Add a configuration to set an AP as stationary 5cb5937 hostapd: Clear location configuration when it is reset f5ec346 hostapd: Fix adding neighbor entry 99b82bf mka: Implement reference counting on data_key 23c3528 mka: Add support for removing SAs 6b6175b mka: Sync structs definitions with IEEE Std 802.1X-2010 6f551ab mka: Remove "channel" hacks from the stack and the macsec_qca driver 7d8f795 Fix typo in DigestAlgorithn f5c15dc Fix typo in eap_example_server.c 59d7cff AP: Disable VHT in TKIP-only configuration 847ee1a wpa_supplicant: Use correct interface type when creating P2P interface 78a3b23 P2P: Clear old P2PS provision data f69939e P2P: Clear listen state during PD-in-FIND 4cc0f90 P2P: Clear P2PS provision state on P2P flush a818425 hostapd: Added signal level to STA tracking a1047f5 Remove duplicate dl_list_init() for global_ctrl_dst 3765c97 hostapd_cli: Remove duplicate const in hostapd_cli_cmd() 8c88922 TDLS: Fix checks on prohibit bits c2ad5b9 nl80211: Update channel information after channel switch notification 913c3e1 Add CONFIG_IBSS_RSN=y into wpa_supplicant defconfig 81a10a9 Do not try to start/join RSN IBSS without CONFIG_IBSS_RSN=y ea06a08 HS 2.0 server: Remove redundant NULL check 5f99d96 Removed redundant NULL check for sta in hostapd_event_sta_low_ack() 230b2b2 Removed redundant NULL check for b in wpabuf_concat() 641c73f driver.h: Fix a typo in a comment 2e4e4fb nl80211: Allow TDLS trigger modes to be configured to the host driver 14cd203 QCA vendor command to configure the TDLS behavior in the host driver a18563d Extend QCA vendor attribute link layer statistics attribute 95f3703 Add more QCA vendor attribute definitions into qca-vendor.h 87416ea QCA vendor attribute to report frame aggregation failure befdb2d nl80211: Check driver FILS capability 40a4572 nl80211: FILS KEK and nonces for NL80211_CMD_ASSOCIATE d8f9342 nl80211: Add support for setting FILS authentication algorithm e76e950 Sync with mac80211-next.git include/uapi/linux/nl80211.h 2a0b86d Note set_key(WPA_ALG_NONE) failure in debug log 061dac1 FILS: Claim FILS capability only if driver supports it ff338fa FILS: Setup EAPOL state machines properly after FILS association (AP) da24c5a FILS: Set TK after association (AP) 07e0117 FILS: Mark connection fully authorized after FILS Association (AP) 706df42 FILS: Association Response processing (STA) e73ffa0 FILS: Add Association Response frame elements and encrypt them (AP) 78815f3 FILS: Decrypt Association Request elements and check Key-Auth (AP) 86cd692 FILS: Add elements to FILS Association Request frame ac56c39 driver: Add option to pass FILS KEK/AAD to the driver for association 783c292 P2P: Check if the pref_freq reported by the driver supports P2P a660993 FILS: Authentication frame processing (STA) c4fd6d8 FILS: Process FILS Authentication frame (AP) ffb62f2 FILS: Add a helper function for status code conversion c1bd4ba FILS: Extend wpa_auth_pmksa_get() to support PMKID matching c30bd28 FILS: Export IEEE 802.1X helper functions a6228b8 ERP: Update client identity based on EAP-Initiate/Re-auth f00b9b8 FILS: Try to use FILS authentication if PMKSA or ERP entry is available 2c2c557 SME: Clear possibly used WPA/RSN IE for new connection 0866ed0 WPA: Add debug print for not-update-own-IEs case 14de9e3 FILS: Include wpa_insert_pmkid() in non-FT builds de57d87 ERP: Make eap_peer_finish() callable c28767e ERP: Make eap_peer_erp_reauth_start() available 5b092fb nl80211: Make full (Re)Association Response frame available 2aa1e48 FILS: Do not clear PTK on FILS Auth/Assoc (AP) a852ab4 FILS: Key-Auth derivation function for FILS SK c089bc5 FILS: PMK-to-PTK key derivation for FILS authentication ce16c48 Rename sae_data to more generic auth_data 6eb1a56 Add QCA vendor command/attr for low level DMG(11ad) RF sector control a2675b3 wpa_cli: Mark number of char *cmd constant e097556 hostapd_cli: Mark number of char *cmd constant c43cf33 wpa_cli: Add completion for ssid config commands 624259d wpa_cli: Add completion for sta, deauthenticate and disassociate 4c43f44 cli: Add list_sta command 85bab32 hostapd_cli: Process events received following control iface commands e054a43 hostapd_cli: Refactor control iface reconnects with common helper aa2ab91 hostapd_cli: Refresh stations list on control interface reconnect 839e4a8 hostapd_cli: Add completion for sta command bc4b680 hostapd_cli: Enable command completion and history for Android cf296a2 hostapd_cli: Add support for cli history file c650f92 hostapd: Add CONFIG_WPA_CLI_EDIT to defconfig 5d30f92 wpa_supplicant: Restore permanent MAC address on reassociation e3e2fe3 Always propagate scan results to all interfaces 33111c9 Check for NULL qsort() base pointers 4b5b8a5 WPS: Force BSSID for WPS provisioning step connection bf07e05 ERP: Do not pass full EAP header to eap_peer_erp_reauth_start() 2449791 FILS: Update EAPOL-Key Descriptor Version RX rules (AP) 16eb485 FILS: Handle Group Key msg 1/2 without MIC when using AEAD cipher (STA) 75c8563 FILS: Perform AEAD processing after PTK has been confirmed 0ab1dd0 FILS: Use AEAD cipher to check received EAPOL-Key frames (STA) b729fd8 FILS: Use AEAD cipher to protect EAPOL-Key frames (AP) 3b5b7aa FILS: Use AEAD cipher to check received EAPOL-Key frames (AP) 2022f1d FILS: Use AEAD cipher to protect EAPOL-Key frames (STA) 1049af7 RSN: Pass full PTK to wpa_eapol_key_send() instead of KCK only b986648 FILS: Update EAPOL-Key RX rules for FILS (AP) 352caf0 FILS: Update EAPOL-Key descriptor version rules for RX (STA) 36a50fd FILS: Set EAPOL-Key Key Descriptor Version to 0 with FILS AKMs (AP) 4a26ccd FILS: Set EAPOL-Key Key Info MIC=0 when using AEAD cipher (supplicant) f5ff8ae FILS: Do not add Key MIC field in supplicant when using AEAD cipher dc5bad4 RSN authenticator: Add more debug print details on EAPOL-Key RX 555ff85 wlantest: Recognize EAPOL-Key frames without MIC bit for FILS 6d014ff Make struct wpa_eapol_key easier to use with variable length MIC 94f66e8 FILS: Advertise ERP domain in FILS Indication element c30ed45 FILS: Allow hostapd to select FILS AKM for connection b8ae56e FILS: Allow wpa_supplicant to select FILS AKM for connection 7147a83 FILS: Add FILS flags into wpa_supplicant BSS command output 379e2b4 FILS: Add 'GET_CAPABILITY fils' for runtime check e4d2ce1 FILS: Set FILS Capability bit in management frames from station f55acd9 FILS: Set FILS Capability bit in management frames from AP 198a942 FILS: Add FILS Indication element to Beacon and Probe Response frames 9b7a2b8 FILS: Add wpa_supplicant configuration options 903ecbe FILS: Add hostapd configuration options 274d8b7 FILS: Add definitions for new frames and values 94318a0 FILS: Add AKM definitions 1d29163 FILS: Add new information elements 325a85b Extend AES-SIV implementation to support different key lengths e2991ee Move CRC-32 routine from wlantest to src/utils 150948e test: FT: EAP test for mismatching keys d0175d6 test: FT with locally generated PMK-R0/PMK-R1 from PSK 9659056 FT: Allow PMK-R0 and PMK-R1 for FT-PSK to be generated locally a25e4ef mka: Add driver op to get macsec capabilities 53b2555 EAP-pwd: Validate Prep field in EAP-pwd-ID/Response 2875e32 EAP-pwd: Fix Prep in EAP-pwd-ID/Response when EAP_PWD_PREP_MS is used 5f5ca28 mka: Pass full structures down to macsec drivers' receive SC ops 8ebfc7c mka: Pass full structures down to macsec drivers' transmit SC ops b70d508 LibreSSL: Fix compatibility for EAP-FAST df42673 LibreSSL: Fix TLS initialization/deinitialization 0d42179 LibreSSL: Fix dh5 code 32d08d5 Add QCA vendor attributes for measurement frequency for FTM/AOA cecdecd mka: Pass full structures down to macsec drivers' receive SA ops 909c1b9 mka: Pass full structures down to macsec drivers' transmit SA ops 7fa5eff mka: Pass full structures down to macsec drivers' packet number ops f75f6e2 mka: Move structs {transmit,receive}_{sa,sc} to a common header 9d3f4a7 autoscan: Add more debug prints for cases where autoscan is not used 98529f3 The master branch is now used for v2.7 development 2462f34 Change version number to v2.6 for the release 5ac8f86 Fix PNO restart flow 14f34a7 Continue scanning if sched_scan stops unexpectedly 1ac3886 Remove disconnected APs from BSS table if likely out-of-range ebf59eb Restart PNO/sched_scan on channel list update 746e5c2 Fix spelling mistakes in number of comments 8b66888 Add explicit enum values for QCA vendor config attributes 8f47917 MBO: Add support to send ANQP request to get cellular preference Test: Wifi Test Suite: b/32709661 Change-Id: If11d88f812812543dab6839879e815892a39f963 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
aca489e0b2daec9e67dd611b7a44f47bd1f41e27 |
|
29-Sep-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5bb7327a697108c880dd31c9e421df386c904b1a 5bb7327 Share a common helper function for restarting sched_scan be7ebd8 wpa_supplicant: Cancel sched_scan on SELECT_NETWORK initiated scan 8b7c5b8 QCA vendor command for antenna diversity feature 61bcc85 Update ChangeLog files for v2.6 64c92c0 MBO: Do not parse reason_detail in non_pref_chan attr (AP) 4a83d4b MBO: Do not add reason_detail in non_pref_chan attr (STA) a483c6f WNM: Add testing option to reject BSS Transition Management Request 2800ec8 MBO: Add QCA vendor option to configure driver to ignore assoc disallow 6ad37d7 MBO: Add support to ignore association disallowed set by AP 320caea Add attributes for QCA_NL80211_VENDOR_SUBCMD_LL_STATS_EXT 0df12cb IEEE P802.11ah/D10.0 PV1 CCMP test vectors 02adead Add ignore_auth_resp control interface debug parameter ef24ad3 nl80211: Remove unnecessary duplication from nl80211_set_param() 4d584d8 nl80211: Add driver parameter force_bss_selection 04e3d81 Blacklist correct BSSID on authentication timeout dc2744f P2P: Fix common frequencies calculation for a group 5cdd729 P2P: Fix compilation warning in p2p_supplicant.c 14220fe Flush the BSS (scan) entries when an interface becomes disabled b223b55 doc: Remove duplicate description for -t cee0be7 Show mode=mesh in STATUS command 0d7eba5 Define a QCA vendor command to validate encryption engine 4428194 taxonomy: Store Probe Request frames in hostapd_sta_info 04059ab Passive Client Taxonomy 5e99339 Initialize iface->sta_seen on allocation 4424aa5 P2P: Fix D-Bus persistent parameter in group started event on GO 81258ef Remove unused generation of Request Authenticator in Account-Request ea19b39 Revert "nl80211: Remove duplicated check in nl80211_setup_ap()" 205d2d1 Fix typos in wpa_supplicant configuration parameter documentation 660103e nl80211: Use the monitor interface only without device_ap_sme support c7f9d44 FST: Fix search for peer's "other" connection a62dea4 Fix mistakes in definition of QCA vendor commands for indoor location 711e3ca Handle NULL return from os_zalloc() in sta_track_add() Test: manual Change-Id: I1d8bd5d084c3e72594004d10ceb254a2f766dfab Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7f2c753f60025528366b5f19b8b490a47bf5080b |
|
15-Aug-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from comit b97a54108732b8b5048f86388bed305df21ea8e5 b97a541 IBSS: Fix a memory leak on RSN error path 5f040be Move disconnect command handling to a common place 478441b OpenSSL: Fix OpenSSL 1.1.0 compatibility functions 6c33ca9 Add group_rekey parameter for IBSS 79931ef hostapd: Fix parsing the das_client option 4fe726e nl80211: Do not switch interface to station mode when using mesh 8468189 Do not include NAS-Port attribute with AID 0 86a318f atheros: Accept Public Action frames sent to Wildcard BSSID e07adb7 Fix EAP state machine reset with offloaded roaming and authorization 6fe3b9d QCA vendor command to get hardware capabilities dc24a36 Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_QPOWER 42d30e9 Add a require_message_authenticator configuration option 715ad33 roboswitch: Add support for BCM63xx a2072a2 utils: os_unix: Use access() for checking file existence cfe0a01 mka: Fix use after free d68b73c mka: Add check for body length when decoding peers ad19e71 mka: Avoid reading past the end of mka_body_handler 65b4773 mka: Return u8 from get_mka_param_body_type() ac285c0 mka: Add error handling around ieee802_1x_kay_move_live_peer() 90bff0e mka: Avoid inconsistent state in ieee802_1x_kay_move_live_peer() 1244745 mka: Fix length when encoding SAK-use 71dc789 mka: Fix memory leak in ieee802_1x_kay_create_live_peer() error path 099613e mka: Fix multiple key server election bugs a197946 binder: Clang format the source code fe1d077 binder: Expose an aidl interface module b84ce65 Link to, and adjust types for, the PCSC framework included with OSX 842c5af ap: Use is_broadcast_ether_addr() ac81b39 cli: Share a common tokenize_cmd() implementation a6d56a3 wpa_cli: Replace str_match() with common str_starts() 980afcc cli: Share a common write_cmd() implementation fcc84b4 cli: Share a common get_cmd_arg_num() implementation e55df99 Share a single str_starts() implementation 23c130e Use a common license string for hostapd_cli and wpa_cli b90c13d hostapd_cli: Completion for interface command 8b73c6a hostapd_cli: Completion for disassociate and deauthenticate 1cef253 hostapd_cli: Implement event handler 977c079 Move parts of wpa_cli to a new common file 6cad0bf hostapd_cli: Add completion for help command 0193883 hostapd_cli: Replace static usage string with print_help() function 1f927cd hostapd_cli: Add command completion support 003fe58 wpa_cli: Implement completion routine for get_capability fed802c Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_IFINDEX 14b7612 Define vendor command to support IE based access control 4ac75cd QCA vendor command to configure GPIO pins babf0ce Assign QCA vendor attributes for generic commands 112fdee P2P: Fix D-Bus persistent parameter in group started event cc9985d Set default scan IEs to the driver (QCA vendor extension) 4f910f3 Fix a typo in QCA vendor attribution documentation ab21863 Define QCA vendor config attribute to set default scan IEs to the driver 5a5638a Show disabled HT/VHT properly in AP mode STATUS command 551817a AP: Disable VHT in WEP configuration 8df4765 doc: Correct spelling mistake Change-Id: I4341e07c85f76ead78d7217ea1c30672fa44432e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
58d12adcdf693a076f719cef9b9f2ccf81892045 |
|
28-Jul-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f5728d0a82d5c5fb5347e41ce761fdf4a79772ec f5728d0 nl80211: Fix segfault when params->freq is NULL for AP mode start 3388e7b mesh: Remove HT IEs if HT is disabled 4ac2ea5 mesh: Make DTIM period configurable fac72f9 mesh: Stop joining to different frequency network 7035162 mesh: Join an existing MBSS instead of creating a new one 58fe015 gitignore static library files 0f282c7 P2Ps: Clear existing value when peer stops sending adv_service_instance 4d7aab7 Make driver flags available through control interface 77d468e P2P: Cleanup by removing unnecessary os_free() call from p2p_deinit() e347caf mesh: Report mesh peer AID to kernel e3227c3 Sync with mac80211-next.git include/uapi/linux/nl80211.h 6c34b9c Assign QCA vendor attribute for setting TX fail count threshold 52fec36 Assign QCA vendor attributes for set retry configuration 1c8fe68 QCA vendor command to configure conditional switch channel for AP 34a5014 MBO: Remove unused assignment f8608fa SME: Fix SA Query local failure handling ab6ab07 Clear wpa_s->sme.last_unprot_disconnect.sec on FLUSH command 9636b07 HS 2.0: Add an event message to note failed OSU provider write 460e5cd OpenSSL: Fix OpenSSL 1.1.0 DH operation dd20eab HS 2.0: Add optional no-scan parameter to FETCH_OSU f465c32 Interworking: Define control interface message prefixes in wpa_ctrl.h 99a9423 HS 2.0: Make hs20_build_anqp_req() static 75b2a87 HS 2.0: Fix hs20_get_icon() error path 0da9869 Interworking: Remove unused allow_excluded from interworking_connect() 8329ad4 Fix wpa_config_get_all() error path f7c04e5 Interworking: Combine identical error returns into a single one a6f5b19 P2P: Allow P2P listen being offloaded to the driver/firmware 35d6655 nl80211: P2P Listen offload vendor command definitions ef60f64 Do not exceed scan ssid max size advertised by driver 4ac5f2f Add text name for WPA_KEY_MGMT_WPA_NONE key_mgmt value f0e8405 nl80211: Provide frequency in EVENT_ASSOC when IBSS is joined 653d227 MBO: Improve supported operating class generation 9607a1a nl80211: Keep QCA vendor extensions together 8bd9099 mesh: Add debug prints on my/peer lid mismatches 78ac368 mesh: Add MPM FSM transitions from ESTAB to HOLDING for {OPN,CNF}_RJCT 0202256 mesh: Update MPM FSM events to match the standard d02e549 mesh: Rename MPM FSM states to match the standard 1f2f3f1 mesh: Indicate OPN_RJCT event if AES-SIV decrypt fails e8afaad mesh: Write close reason from Mesh Peering Close to debug log ee0ad45 mesh: Remove GTKdata and IGTKdata from Mesh Peering Confirm/Close Change-Id: Ia720dc2e4db8539d566cbc826a5c6cfd26f169e1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d5ab1b53af720d05586ccc0addabe93459f1f388 |
|
21-Jun-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3b208346ec56342fda736e62601df485ed002493 3b20834 ctrl_iface: BSS command to skip info items if parsing fails a9c52e8 HS 2.0R2: No longer use HTTP_RAW_POST_DATA 04c18fa curl: Don't free memory for subjectAltName before calling callback 5a8e48f mesh: Use MESH_CAP_* macros for mesh capability d70a8ab mesh: Ignore crowded peer a151b0e mesh: Select pairwise and group cipher based on network profile 3b6deac mesh: Avoid use of hardcoded cipher f868d56 mesh: Clean up AMPE element encoding and parsing 4367eec mesh: Do not use RX MGTK as RX IGTK a4eec3c mesh: Use variable length MGTK for RX fccba2c mesh: Generate a separate TX IGTK if PMF is enabled 696f792 mesh: Support variable length TX MGTK b02f4d0 mesh: Add variable length MTK support 846201d mesh: Coding style cleanup for MTK derivation 0f76d82 mesh: Fix MTK derivation to use AKM suite selector f5ba692 mesh: Coding style cleanup for AEK derivation a59c5e9 mesh: Fix AEK derivation to use AKM suite selector 18aca1a mesh: Use ieee80211w profile parameter b8b499e mesh: Use WPA_NONCE_LEN macro bb4e19e hostapd: Skip hostapd ACL check for drivers supporting ACL offload 00ec535 WPS: Fix memory leak with wps_ie in wpa_bss_is_wps_candidate() d1296da Reserve QCA vendor specific nl80211 command 121 fae7b37 WPS: Do not expire probable BSSes for WPS connection 52a6c9c Add a QCA vendor command to configure AP parameters 31d3692 hostapd: Add comment about '-i' parameter in hostapd.conf 40f6282 hostapd: Accept interface names as a command line parameter cc27c8e hostapd: Fix early init failure path 976dfb3 FST: Make fst_global_deinit() more robust 7a69fad mesh: Sync max peer links with kernel f7cb6e9 Update PKCS#11 references in template wpa_supplicant.conf c3d7fb7 OpenSSL: Initialise PKCS#11 engine even if found with ENGINE_by_id() fdc1188 nl80211: Fix use-after-free in qca_nl80211_get_features() 8359472 hostapd Make GAS Address3 field selection behavior configurable 6996ff7 hostapd: Fix Public Action frame TX status processing for wildcard BSSID 78a3632 hostapd: Fix Public Action frame addressing (BSSID field) c86bef2 wpa_supplicant: Make GAS Address3 field selection behavior configurable a5a187b nl80211: Add TEST_FAIL() to command generation and set_mode ee854ff mesh: Remove extra newline from the end of an error message 331f077 mesh: Allow 160 MHz channel to be configured 92a515b nl80211: Update drv->assoc_freq on mesh join d2cc8bb mesh: Remove unreachable code cc9a257 nl80211: Use extended capabilities per interface type c6edea0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 9a5160f Report connection timeouts in CTRL-EVENT-ASSOC-REJECT dad0129 mesh: Support simple SAE group negotiation case b4c738e mesh: Fix error path handling for RSN (MGTK init) f4b4ddf D-Bus: Remove unused wpas_dbus_signal_p2p_group_started() parameter 4fe50bb D-Bus: Indicate whether created group is persistent or not 62fc8e6 mesh: Fix MESH_INTERFACE_ADD error path cleanup 9c10be3 mesh: Fix error path handling in init OOM cases 7012e25 Remove dead code from wpas_sched_scan_plans_set() 8e909fa Improve reattach scan OOM failure handling f37d8a4 Indicate scan failure event on parameter cloning failure 9356823 wpaspy: Fix potentially referencing non existing attribute Change-Id: I656be560523c206195a5bf8649e73d8aa70bd8f9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
849734c8d1847920ed7042463f7480b1e0c1dfea |
|
27-May-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8960afa4bfa423774a8ca58cc21a4a7c1ab6089e 8960afa wpa_cli: Run action file in case of an AP event 1cece2f OpenSSL: Comment out tls_connection_get_eap_fast_key without EAP-FAST 7358170 TLS: Split tls_connection_prf() into two functions f150db6 OpenSSL: Remove two more accesses of ssl_ctx->cert_store 6dc3206 scan: Fix a memory leak on an error path 9ce3e61 nl80211: Add TEST_FAIL() to nl80211_set_mac_addr() 8880240 scan: Clean up code a bit - phase1 is used in all WPS cases e1ae287 scan: Clean up code a bit - ssid cannot be NULL here a170394 Update ChangeLog files for v2.6 a26c9c2 Fix sending non-Public Action frames over P2P Device interface 4d916ed nl80211: Register for only for specific Action frames in AP mode 31d7fb1 P2PS: Allow P2P_CONNECT command for P2PS connection with/without PIN 467fc14 P2PS: Correct config_methods for different P2P cases 9d136b0 EAP-SAKE: Do not debug print result if eap_sake_compute_mic() fails 0884633 EAP-PAX: Do not debug print result if eap_pax_mac() fails 92abe37 EAP-FAST: Check sha1_t_prf() result in eap_fast_get_cmk() 636a238 WPS: Check sha256_vector() result in wps_build_oob_dev_pw() 2c3d95c Check md5_vector() result in decrypt_ms_key() 38eee0f Check hmac_md5() result in radius_msg_verify_msg_auth() 05dad94 Check md5_vector() result in radius_msg_verify() aae125e WPS: Fix debug prints in wps_derive_psk() error case 7d1007a Fix external radio work debug printing on removal b6317b4 wpa_supplicant: Add wps_disabled parameter to network block 23d71a0 Set wpa_psk_set in wpa_supplicant AP mode is PSK is available 6641954 Fix AP mode key_mgmt configuration in wpa_supplicant default case ad6cee3 P2P: Do not enable P2P group processing for non-P2P AP mode a185e9b tests/remote: Add hwsim wrapper ff9bb8a tests/remote: Add test_example.py a73fa13 tests/remote: Add utils file ede4719 tests/remote: Add monitor.py 3b11ad3 Send CTRL-EVENT-REGDOM-CHANGE event on the parent interface 4de70e2 Add MGMT_RX_PROCESS test command for wpa_supplicant f42c3ce mesh: Calculate MTK before sending it to MAC in case Open is dropped baa1213 mesh: Add missing action to cancel timer e8a1b6b D-Bus: Check driver capability for IBSS in Modes property of Capabilities 7a1887f wpa_cli: Add backspace key process for some terminal 3dd0e9e wpa_supplicant: Fix CONFIG_AP build without CTRL_IFACE d58b60d drivers: Add NEED_RADIOTAP 6a9681e OpenSSL: Make dh5_init() match the generic implementation 46bac65 WPS: Fix segmentation fault in new DH key derivation e447133 OpenSSL: BoringSSL has SSL_get_client_random(), etc. 03626e9 Skip connection attempt for non-RSN networks if PMF is set to required 2295004 Ignore pmf=1/2 parameter for non-RSN networks 2a3f565 Reject SET commands with newline characters in the string values b166cd8 Reject SET_CRED commands with newline characters in the string values 0fe5a23 Remove newlines from wpa_supplicant config network output 73e4abb Reject psk parameter set with invalid passphrase character ecbb0b3 WPS: Reject a Credential with invalid passphrase f4830be nl80211: Try running without mgmt frame subscription (driver AP SME) df5bde8 Android: Remove EAP-FAST option 60d9f67 WPS: Explicitly clear wpabuf memory with key information 9b377be P2P: Copy config from p2pdev when not using dedicated group interface 3c88d26 P2P: Fix wpas_p2p_nfc_auth_join() 2f19563 WNM: Fetch scan results before checking transition candidates 4ac3398 Use a shared helper function for parsing hostapd.conf IEs a911227 Add assocresp_elements parameter for hostapd 49fe2ad OpenSSL: Support OpenSSL 1.1.0 DH opacity b92d2a5 FT: Fix RRB for FT over-the-air case 9e5a5de systemd: Update service files according to D-Bus interface version ac7aea8 Assign QCA vendor command/attributes for set/get wifi configuration 57b3888 P2P: Add P2P_GROUP_MEMBER command to fetch client interface address 0ee8925 P2P: Trigger event when invitation is accepted bd86ea0 nl80211: Get rid of unused assignment warning 18ae3a6 bsd: Set level correctly for non FreeBSD systems cf667c6 RRM: Modify the processing of a received neighbor report 00ed0aa SME: Add support for global RRM flag b5d172e nl80211: Add support for global RRM flag a7f0bb7 driver: Add global RRM support flag 864b952 nl80211: Register to receive Radio Measurement Request frames 4a74201 wpa_supplicant: Handle LCI request 220754c hostapd: Add FTM range request f4f185a hostapd: Add LCI request 629e180 hostapd: Save RM enabled capability of station 2572df3 hostapd: Handle Neighbor Report Request frame 061269b hostapd: Add own neighbor report data to neighbor database 9b4b226 hostapd: Add a database of neighboring APs 0101821 hostapd: Extend the configuration of RRM capabilities 6a4f0ed Fix spelling of "neighbor" in a function name d41a535 wpa_supplicant: Add LCI and civic request to Neighbor Report Request 624b8a0 utils: Add ssid_parse() function e4fbc8d Add measurement and neighbor report definitions 9d955f7 utils: Rename hostapd_parse_bin to wpabuf_parse_bin and move it 74e982d hostapd: Set LCI and Location Civic information in configuration 1854eec Add POLL_STA command to check connectivity in AP mode 3dbfb28 Allow AP to disconnect STA without sending Deauth/Disassoc frame de92314 Add inactive_msec into STA output 61c1011 Extend VENDOR_ELEM parameters to cover non-P2P Probe Request frame 6922d44 nl80211: Implement configure_data_frame_filters() callback ece4ac5 HS 2.0: Add support for configuring frame filters e42adb9 driver: Add a packet filtering function declaration ae33239 AP: Pass station P2P PS capabilities info during station add/set 7405bb0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 90f1496 wpa_supplicant: "don't care" value for pbss in ssid structure e52a698 RADIUS: Fix a possible memory leak on an error path f1863f2 RADIUS: Fix possible memory leak when parsing per-STA passphrase 3433721 P2P: Continue p2p_find after sending non-success Invitation Response 0f34665 Mark wpa_supplicant_{start,stop}_sched_scan() static Also reverting: c7f648c wpa_supplicant_8: Add a temporary hack to work around BoringSSL incompatibility 1e1c48d2 Update AP IE regardless WPA_DRIVER_FLAGS_BSS_SELECTION flag Change-Id: Idb9bfa80e9d9a4d10323dab5ce2bb24f4baf550c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
e4663044d3a689fb5458247e9bc0f8b58cf72fca |
|
04-Apr-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f89c32e63f71e66d7b55e284016762b603ae02db f89c32e Android: Fix max number of sched scan SSIDs based on driver capability f1a5a34 binder: Implement interface add/remove methods 7b4bbb9 binder: Add binder skeletal code for Android 5914ebf Remove struct ieee80211_mgmt::u.probe_req 094e949 atheros: Do not use struct ieee80211_mgmt::u.probe_req c01120a wpa_supplicant: Do not use struct ieee80211_mgmt::u.probe_req e1b9962 AP: Do not use struct ieee80211_mgmt::u.probe_req 5cd317d Do not clear PMKSA entry or EAP session cache if config does not change f933216 Revert "Assign QCA vendor command and attribute for Tx/Rx aggregation" bde9a4e Comment out UDP/UNIX socket code from common ctrl_iface based on build a6fbff2 Fix CONFIG_CTRL_IFACE=udp6/udp6-remote builds 0741c48 SAE: Check SHA256-PRF operation result ea86a34 SAE: Remove dead code in FFC pwd-value derivation 87faf1f nl80211: Fix libnl-tiny build with CONFIG_LIBNL20=y 31afdd2 Use TIOCOUTQ instead of SIOCOUTQ to avoid need for linux/sockios.h 6d07e76 wlantest: Use local ETH_P_IP define instead of linux/if_ether.h 795abc8 Drop USE_KERNEL_HEADERS define 9b7cd57 Use a separate header file for Linux bridge interface definitions c815fab Use own header file for defining Linux VLAN kernel interface 81606ab vlan: Fix musl libc conflict with Linux kernel headers f347429 P2P: Fix persistent group for 60 GHz networks e868599 vlan: Move if_nametoindex() use out of vlan_init.c 7c03c08 vlan: Move ifconfig helpers to a separate file 59d6390 vlan: Move CONFIG_FULL_DYNAMIC_VLAN functionality into a separate file 0fe28dd vlan: Remove unnecessary header includes from netlink implementation 84d6755 vlan: Clean up netlink vs. ioctl API implementation cb38bc8 vlan: Fix musl build error 954e10e Make it a bit easier to roam from 2.4 GHz to 5 GHz within ESS 585141b Fix a typo in a comment 1126c07 nl80211: Ignore deauth/disassoc event during Connect reassociation 6a5ee81 Include previous BSSID in connection request to indicate reassociation 00c3c4a nl80211: Add NL80211_ATTR_PREV_BSSID with Connect command cbc3d6f WNM: Verify BSS TM target match against the current network profile 8854f90 mesh: Simplify wpa_auth_pmksa_set_to_sm() 32d4fe9 privsep: Fix a compiler warning on unsigned/signed comparison 2e997ee Add interface matching support with -M, guarded by CONFIG_MATCH_IFACE 45e3fc7 Find correct driver for interface additions/removals 9037702 wpa_supplicant: Fix CONFIG_IBSS_RSN=y build without CONFIG_AP=y 5ae65de wpa_supplicant: Fix p2p_group_add when UDP-based ctrl_iface is used 24bce46 FST: Fix a compiler warning e567c58 Fix nfc_pw_token build with CONFIG_FST=y d774c46 mesh: Use appropriate BLOCKED state duration 9f2cf23 mesh: Add support for PMKSA caching 4c522c7 PMKSA: Flush AP/mesh PMKSA cache by PMKSA_FLUSH command b8daac1 PMKSA: Show AP/mesh PMKSA list in PMKSA command 2604edb mesh: Add MESH_PEER_ADD command e174ef3 mesh: Add MESH_PEER_REMOVE command f7648c8 P2P: Advertise IP Address Allocation only if it is enabled on GO 7f46ad9 BSD: Only down the interface once we are sure we can work with it 192964d Handle OSEN IE in Assoc Request info if req_ies exists 29eddc3 nl80211: Fix error path in if_indices_reason reallocation ee298f1 nl80211: Do not add NL80211_ATTR_SMPS_MODE attribute if HT is disabled 4ca16b5 Assign QCA vendor command and attribute for Tx/Rx aggregation 64ce590 libxml2: Check for xmlDocDumpFormatMemory() error case 8b827c3 BoringSSL: Keep static analyzers happier with X509_get0_pubkey_bitstr() 42a9553 hs20-osu-client: Fix pol_upd command line parsing ec1eae8 hs20-osu-client: Remove dead code from sub_rem command line parsing c3dc68e Do not invalidate EAP session cache on all network block parameter changes 9231c24 wlantest: Fix bip_protect() memory allocation c6c29be Interworking: Add credential realm to EAP-TLS identity Change-Id: I870f325171d00fed9c4fcd82a695fe5e2efee792 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
31a29cc7ed87b62465c7e01f03484f4643d12309 |
|
10-Mar-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f2d6c17aa0f9107a0e8092238b849461447cdd21 f2d6c17 nl80211: Support network hierarchy of a master interface under bridge f85399f Reserve QCA vendor specific nl80211 commands 116..118 3bd5886 hostapd: Handle running out of DFS channels cc1af6f FST: Fix session setup failure with peer without MB IE dfe0745 P2P: Add optional op_class argument to P2P_SET listen_channel e4a1469 P2P: Adjust service discovery maximum fragment size for 60 GHz c7fb678 D-Bus: Add association response status code property for failure cases 2940bf6 hostapd: Use ifname of the current context in debug messages 6448e06 hostapd: Allow use of driver-generated interface addresses f2accfe AP: Save EAPOL received before Association Response ACK 1307301 wpaspy: Add support for TERMINATE command a2c88a8 wpaspy: Add support for UDP connection 3e67171 hostapd: Add global TERMINATE command 618f5d0 hostapd: Add INTERFACES ctrl_iface command 180e5b9 hostapd: Update ctrl_interface for UDP to include the selected port 56e2fc2 wpa_supplicant: Add ctrl parameter to INTERFACES command b9066c6 hostapd: Allow UDP ctrl_iface configuration to set the UDP port 56885ee hostapd: Add UDP support for ctrl_iface acf57fa ctrl_iface_common: Use sockaddr_storage instead of sockaddr_un 89b781b hostapd: Use common functions for ctrl_iface 1a2124c wpa_supplicant: Use common functions for ctrl_iface ca974ae Add common ctrl_iface files d60886c wpa_supplicant: Add monitor support for global UDP ctrl_iface f0e5d3b wpa_supplicant: Share attach/detach/send UDP ctrl_iface functions db7fb43 wpa_supplicant: Allow UDP ctrl_iface configuration to set the UDP port 3598695 P2P: Update peer WFD IE from PD Response and GO Negotiation Response c69ef1d P2P: Respect p2p_ignore_shared_freq on p2p_group_add 4115b05 P2P: Fix shared freq print in wpas_p2p_init_go_params() Change-Id: Id939064b95210ee1a195f7a9f7c069da520d77ca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9c17526f86859e2b6aebac0ed4f2561601816103 |
|
03-Mar-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 12c1fdf19a721aaf29e1c77d63445c7f5b8c61c0 12c1fdf P2P: Update peer listen channel from Probe Request frames a805731 P2P: Abort ongoing scan when p2p_find is stopped 7441698 nl80211: Abort an ongoing scan upon scan timeout indication 1446afc wpa_supplicant: Handle EVENT_SCAN_RESULTS when an interface is disabled d14e63a WNM: Do not scan based on malformed BSS Transition Management Request f420577 WNM: Fix candidates count in BSS Transition Management Request 3c58df7 wpa_cli: Support running action script on global control interface b8f02d8 EAP-PWD peer: Fix possible memory leak on error path 8f38eed Android: Remove superfluous OpenSSL include paths cbf8d18 HS 2.0R2: Clear fetch_anqp_in_progress if fopen fails 4a6e9e5 Fix CONFIG_WPA_TRACE=y compilation without CONFIG_WPA_TRACE_BFD=y 2bf9a53 Add EAP-AKA' and EAP-pwd to wpa_supplicant README 4196c08 Update notes about OpenSSL versions 5d7b1a3 Fix some typos in wpa_supplicant README files 4194fee README-P2P: Fix a typo c58eed6 P2P: Add Dev Info attribute to Probe Request frames in 60 GHz 2b6e9f9 wpa_supplicant: Expose wpas_get_bands() and related API 94ad3c3 P2P: Change order of P2P IE and frequencies set up 61697c7 Android: Allow wpa_supplicant to write files to osu-info dir 0147afa FST: Enlarge State Transition Timeout (STT) e1d00d4 Add error handling for offloaded ACS with vendor command failures bef5e9a Fix scan rescheduling from wpas_stop_pno to check postponed case b9ca12a nl80211: Add more address fields into RX frame debug message debde14 RADIUS: Add Acct-Delay-Time into accounting messages 669b532 RADIUS: Update full message for interim accounting updates 251953b Document nas_identifier requirements for RADIUS accounting 902c07a Replace hostapd_mac_comp_empty() with is_zero_ether_addr() 5aef495 VLAN: Avoid use of libnl cache 732b1d2 nl80211: Clean up ifidx properly if interface in a bridge is removed 170c545 FT: Check destination MAC address on RRB receive 57b2c91 RADIUS: Allow RADIUS server to provide PSK instead of passphrase d8912fd Cache hashed passphrase in RADIUS-based PSK delivery f8e09bc Defer passphrase-to-PSK hashing out of 802.11 authentication ACL check cc9c805 VLAN: Use stack instead of heap allocation for new interface name d48d1b8 FT: Use BSSID as r1_key_holder if no value is configured 71456db FT: Check hapd->wpa_auth before RRB internal delivery 0270bde FT: Fix R0KH-R1KH protocol data length values 96a26ab P2P: Support dedicated P2P_DEVICE without separate group interface ba307f8 P2P: Add a separate pointer to the P2P Device instance e040197 GAS client: Make PMF check on RX more consistent 0645492 WNM: Optimize a single BSS transition management candidate scan eb20cea nl80211: Add an option to specify the BSSID to scan for adf0478 AP: Store STA supported operating classes information Change-Id: If0ce28aae5591be783c38e5b60f7f9ff0fb9f8f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
57c2d39d85825f38c5fdac9b73bb0088406ffc85 |
|
23-Feb-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 077dcfb8c48d2509a6e116c0de3ad57d2fbfe4fe 077dcfb AP: Debug print management frame TX result ca911d6 MBO: Parse non-preferred channel list on the AP 3f48274 WNM: Fix a memory leak on AP error path f5ca176 VLAN: Fix vlan_compare() for tagged VLANs 1260564 hostapd_cli: Add support for RAW command 940491c MBO: Mandate use of PMF for WPA2+MBO association (STA) 4c57228 MBO: Mandate use of PMF for WPA2+MBO association (AP) 8dd49f0 MBO: Update STA cellular data capability based on WNM Notification 6332aaf MBO: Track STA cellular data capability from association request f3cb7a6 WNM: Minimal processing for WNM Notification Request frames on AP e578343 MBO: Indicate WNM-Notification support on AP when MBO is enabled 990b7b6 Simplify hostapd_build_ap_extra_ies() with helper functions d010048 MBO: Expire non-matching bss_tmp_disallowed entries as part of check f4c74e1 MBO: Parse MBO IE in ieee802_11_parse_elems() 016082e MBO: Send WNM-Notification when cellular capabilities change c0e2a17 hostapd: Add MBO IE to BSS Transition Management Request frame fb9a1c3 hostapd: Add MBO IE to Beacon, Probe Response, Association Response c484b19 Move Hotspot 2.0 element in (Re)Association Request frames a0c38e5 Re-order elements in (Re)Association Request frames 9a493fa WNM: Add candidate list to BSS transition query 84d1c0f WNM: Add candidate list to BSS transition response cf11ab7 utils: Derive phy type by frequency and bandwidth c8082d2 MBO: Add MBO IE to BSS Transition Management Response frame dd59990 MBO: Parse MBO IE in BSS Transition Management Request frames 5e57ba2 MBO: Add Supported Operating Classes element to Association Request 7d46f58 MBO: Add global operating class definitions cb06cf3 MBO: Prevent association to APs that explicitly disallow this c5d193d MBO: Add cellular capability to MBO IE 2d5b861 MBO: Send MBO WNM-Notification Request frames to notify changes 92c6e2e MBO: Implement MBO non-preferred channel report in Association Request facf2c7 MBO: Add non-preferred channel configuration in wpa_supplicant 425dd78 MBO: Add Multi Band Operation definitions a159958 ndis: Use the new get_ie() helper to avoid duplicated code 231b04b utils: Share a single helper function to get IE by ID ea69d97 wpa_supplicant: Share a single get_mode() implementation 75cc211 VLAN: Check vlan_desc validity in a failure debug print 43022ab Use 64-bit TX/RX byte counters for statistics 3f81ac0 AP: Set STA assoc flag in the driver before sending Assoc Resp frame bb598c3 AP: Add support for full station state dc55b6b nl80211: Add support for full station state operations 5558b99 EAP-FAST peer: Remove fixed return value from eap_fast_parse_phase1() 4b16c15 EAP-pwd server: Use os_get_random() for unpredictable token 239952b DFS: Remove the os_random() fallback 98a516e WPS: Use only os_get_random() for PIN generation f441e5a Use os_get_random() for Shared Key authentication challenge 8c676b5 Add RADIUS Service-Type attribute with a value of Framed 09d96de mesh: Drop Authentication frames from BLOCKED STA 70c9396 SAE: Fix PMKID calculation for PMKSA cache 1492fbb Print Acct-Session-Id and Acct-Multi-Session-Id 64-bit values e21ceca kqueue: Use 0 instead of NULL for udata 640b0b9 ctype functions require an unsigned char a5a3efc Fix compile on NetBSD for vlan a084c24 wired: Fix compile on NetBSD for wired driver 634e2e2 Add CONFIG_ELOOP_KQUEUE to defconfig 99a94f5 nl80211: Avoid wpa_printf %s call with NULL pointer in set_param() ba91e92 wpa_supplicant: Parse ifname argument from DATA_TEST_CONFIG 8be640b VLAN: Add per-STA vif option d0bdc96 VLAN: Actually add tagged VLANs to AP_VLAN f9c0018 VLAN: Factor out per-vid code in newlink/dellink 8e44c19 radius: Add tagged VLAN parsing 1889af2 VLAN: Separate station grouping and uplink configuration 3a583e0 OpenSSL: Fix PKCS#12 parsing of extra certificates with OpenSSL 1.0.1 ddd0032 wpa_cli: Clean up logical operation 24c382a TDLS: Clean up os_memcmp use 6136d43 trace: Free symbols on program exit 8bcf8de OpenSSL: Fix memory leak in PKCS12 additional certificate parsing 03e3ddf OpenSSL: Fix memory leak in HMAC_CTX compatibility wrapper function d9a0f69 OpenSSL: Fix memory leak in OCSP parsing 29bc76e OpenSSL: Do not use library init/deinit functions with 1.1.0 0f09637 OpenSSL: Fix memory leak in subjectAltName parsing e60913b curl: Fix memory leak in subjectAltName parsing 6014890 OpenSSL: Fix memory leak with EVP_CIPHER_CTX_new() 99a1735 rfkill: Fix a memory leak 1f1e599 OpenSSL: Fix memory leak on error path b907491 wpa_supplicant: Basic support for PBSS/PCP 86b5c40 nl80211: Basic support for PBSS/PCP afa453a Sync with mac80211-next.git include/uapi/linux/nl80211.h d1d8a2b EAP peer: Simplify buildNotify return 1314bc1 Clean up EAP peer PCSC identity functions Change-Id: I9db475a2a4ebc88d2ee024319ed59a850636bb16 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
de47be75037bccd4a11b62eedb3d4aed1b36fa67 |
|
07-Jan-2016 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 21cb63fffd1e766c8b989125394ed0bfb05e5a4b 21cb63f OpenSSL: Fix client certificate chain building after PKCS#12 use 12a81b6 ACS: Remove unreachable case from a debug print 896607d Remove a pointer check that can never be true a95cc47 ACS: Be more consistent with iface->current_mode checks 6014e59 P2P: Print find_start in debug log when ignoring old scan results 64845c1 l2_packet: Extend bridge workaround RX processing to cover two frames 4a539ab l2_packet: Improve bridge workaround RX processing 7a36f11 EAP-PAX: Check hmac_sha1_vector() return value 1d20c66 P2P: Clear groups first on FLUSH command 27446e4 mesh: Do not force another peering exchange on driver event cc64fe7 mesh: Do not clear link state on driver event if exchange was started b5f5c32 mesh: Add some more details to MPM debug messages 7d41907 nl80211: Add a missing space to a debug message 6174de6 mesh: Connection and group started/removed events into debug log 2da4a56 Add more hostapd.conf documentation for hw_mode with HT/VHT acc3943 EAP-PEAP peer: Cryptobinding in fast-reconnect case with inner EAP cba9ebf P2P: Try SD Query with each non-ACK peer only once per search iteration e9ccfc3 Clear wpa_supplicant state to DISCONNECTED on FLUSH command aeb408f HS 2.0: Add some documentation for OSEN and network block use 4f6cd3f Fix wpa_supplicant AP mode P2P IE handling if P2P is disabled 92acb40 Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 15c5606 Update copyright notices for the new year 2016 6e379c6 WPS: Testing mechanism to force auth/encr type flags ea31912 WPS: Add a workaround for WPA2PSK missing from Enrollee auth flags db671e0 WPS: Do not build Credential with unsupported encr combination on AP d7c3347 HS 2.0: Postpone WNM-Notification sending by 100 ms 750f5d9 EAP-FAST: Enable AES256-based TLS cipher suites with OpenSSL 1ebb24b OpenSSL: Share a single openssl_tls_prf() implementation dea2051 OpenSSL: Clean up function to fetch client/server random 9a42d85 OpenSSL: Drop support for OpenSSL 1.0.0 de213e8 OpenSSL: Drop support for OpenSSL 0.9.8 e79eb0c P2P: Fix P2P_FIND while waiting for listen ROC to start in the driver 944f693 P2P: Stop offchannel TX wait on P2P_STOP_FIND/P2P_LISTEN 8edd9f1 P2P: Add an option to specify group SSID in P2P_CONNECT join case 70e0cb3 P2P: Provide group SSID, if specified, to P2P Client join step 438be60 P2P: Do not accept any GO BSS entry if SSID is specified for join 35510d5 P2P: Use join SSID in the skip-PD cases 8b8d4f4 P2P: Do not accept any BSS entry for join if SSID is already known b875276 P2P: Use group SSID, if known, for join operation even if no BSS entry aa256cb P2PS: Add group SSID, if known, to the P2PS-PROV-DONE event 071e3bf FST: Fix handling of Rx FST Setup Request when session already exists Change-Id: Ia48764e8663232291160fb24153fa367b9ed3015 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
014a3ff83915745d57480e99b47e281a82143c79 |
|
28-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 324ade51e168f28430f4429849becd0f08d507c0 (DO NOT MERGE) 324ade5 TLS: Make tls_cert_chain_failure_event() more robust c6231b5 TLS: Remove storing of never-read value 15a6813 Remove unnecessary cleanup assignment in SHA1Final() ef3866a nl80211: Don't call linux_iface_up() for a dedicated P2P Device c2ed779 mesh: Document Mesh Peering Management element structure in more detail b2817cd mesh: Check PMKID in AMPE Action frames 6c33eed mesh: Fix PMKID to match the standard ede7770 wpa_supplicant: Do not wait for monitor on P2P Device interface 1c94570 Do not wait for monitor to attach if no control interface f98674a Clone default LIBS value to LIBS_* for other tools 7d2f674 Add "GET_CAPABILITY acs" to allow ACS build option to be detected d990971 wpa_supplicant: Enable Automatic Channel Selection support for AP mode 96bc508 Handle survey event properly in wpa_supplicant d39f796 EAP-TNC peer: Remove dead code related to fragmentation 662512e P2PS: Remove dead code abbbaa4 TNC: Print received IF-TNCCS message as debug ASCII hexdump d745f02 EAP-TNC peer: Allow fragment_size to be configured a67e7e5 RADIUS: Add EACCES to list of recognized send() errno values 5bd9be4 Fix RADIUS Called-Station-Id to not escape SSID 0764dd6 TLS client: Multi-OCSP check to cover intermediate CAs d6b536f Add ocsp=3 configuration parameter for multi-OCSP 0268383 TLS: Move variable declaration to the beginning of the block b567775 TLS client: OCSP stapling with ocsp_multi option (RFC 6961) 8ea6a27 TLS server: OCSP stapling with ocsp_multi option (RFC 6961) 5addb0d Server configuration for OCSP stapling with ocsp_multi (RFC 6961) bca0872 TLS server: OCSP stapling 9532bd2 GnuTLS: OCSP stapling on the server side 6241766 Use wpa_msg() for the "RSN: PMKID mismatch" message e161451 EAP-EKE: Merge identical error return paths 13cb0a6 EAP-EKE: Reject too long Prot() data when building a frame 0ab0de8 Document previously missing key_mgmt values Change-Id: I9ac7d0da03d8baf4542e276ab20cb56e44bfa33c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7d56b75791f317618c9c3ff08a4cfc36c91c9611 |
|
22-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c24f8e8e75b46f0b191cca788b6f4c10bed81861 (DO NOT MERGE) c24f8e8 GAS: Do not cancel initial offchannel wait with comeback delay 1 364282c GAS: Retry full GAS query if comeback response is not received a587666 GAS server: Replenish temporary STA entry timeout on comeback request 8fb718a GAS: Shorten the duration of the wait for GAS comeback response c012567 GAS: Clear offchannel_tx_started when ending remain-on-channel cb73008 EAP-TTLS/PEAP/FAST: Reject unsupported Phase 2 method in configuration 18704f6 EAP-TLS: Merge common error paths 4f5c86e EAP-PEAP peer: Fix a memory leak on an error path e7160bd Drop any pending EAPOL RX frame when starting a new connection cd5895e WPA: Explicitly clear the buffer used for decrypting Key Data 4b90fcd EAP-PEAP peer: Check SHA1 result when deriving Compond_MAC 6ca5838 EAP-PEAP server: Add support for fast-connect crypto binding 6560caf EAP-PEAP peer: Remove unused return value and error path 61f25f8 HS 2.0: Remove duplicate icon entries ca9968a HS 2.0: Convert icon storage to use dl_list 8dd5c1b HS 2.0: Add a command to retrieve icon with in-memory storage 0e92fb8 rfkill: Match only the correct expected wiphy rfkill 6da504a nl80211: Handle rfkill for P2P Device interface 96e8d83 wpa_supplicant: Add SIGNAL_MONITOR command 2c0d0ae GAS: End remain-on-channel due to delayed GAS comeback request dabdef9 TDLS: Ignore incoming TDLS Setup Response retries 0fc5707 hlr_auc_gw: Simplify string parsers with str_token() d67e63d hlr_auc_gw: Fix a typo in an error message 59e7120 hlr_auc_gw: Remove unnecessary assignment 685ea2f wpa_cli: Send ALL_STA command to the correct interface 0e6a2cf Disconnect before trying to switch to a different network 706e11a Avoid network selection from scan during connection 819ad5b utils: Fix NULL pointer dereference with unexpected kernel behavior 1b3dd69 P2P: Fix possible NULL pointer dereference f24e488 EAP-TTLS peer: Fix parsing auth= and autheap= phase2 params 47c1de2 atheros: Unify memory processing functions d06a350 mesh: Fix VHT Operation information in peering messages 8ba8c01 TLS: Report OCSP rejection cases when no valid response if found f163ed8 TLS: Process OCSP SingleResponse(s) 8e3271d TLS: Store DER encoded version of Subject DN for X.509 certificates 32ce690 TLS: Share digest OID checkers from X.509 b72a367 TLS: Support longer X.509 serialNumber values af4eba1 TLS: Parse and validate BasicOCSPResponse Change-Id: I0fadef8993a548d64a4280372bc105fefa11e62a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d7ff03d48f825360eec2a371e3361306f2fd721b |
|
04-Dec-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit bf3214b59321f67375df1ee85722b2beb74e1f7a bf3214b P2P: Fix re-invoked client interface completion on data connection 63502c6 P2P: Fix P2P_CANCEL for p2p_in_invitation case e007d53 EST: Comment out X509_REQ_print calls on Android with BoringSSL e6f4832 EST: Add CSR generation support with BoringSSL ed2566a EST: Implement pkcs7_to_cert() with BoringSSL 8d27efa HTTP (curl): OCSP with BoringSSL 213e158 BoringSSL: Move OCSP implementation into a separate file f846211 BoringSSL: Support new SHA_CTX definition for EAP-SIM PRF b34c623 OpenSSL: Fix build with current OpenSSL master branch snapshot 759a8a3 nl80211: Cancel all pending TX frame cookies 9ea91cd EAP-EKE peer: Fix memory leak on error path 328f49a P2P: Complete group formation on client data connection 0e559dc WPS: Support parallel UPnP WPS protocol runs bea48f7 Allow sched_scan_plans to be updated at runtime 32c0226 Add support for configuring scheduled scan plans 09ea430 nl80211: Add support for multiple scan plans for scheduled scan dd895e9 P2P: Make p2p_go_configured() more robust against unexpected calls 8811988 TLS client: Fix session_resumed status after TLS session ticket use 7fff91a Fix tls_connection_prf() regression with CONFIG_TLS=internal 1adf262 TLS: Add support for extKeyUsage X.509v3 extension 0755577 Add TEST_FAIL() support for internal hash functions 4104267 Fix memory leak on NFC DH generation error path c5864dc TLS client: Add certificate chain validation failure callbacks 896a97d TLS client: Add support for disabling TLS versions 0cbc22b TLS client: Use TLS_CONN_* flags 20804fe TLS: Add support for tls_get_version() f2a6ad0 TLS client: Add support for server certificate probing b115eeb TLS: Add TLS v1.2 signature algorithm support for SHA384 and SHA512 c0acec3 crypto: Add CRYPTO_HASH_ALG_SHA384 and CRYPTO_HASH_ALG_SHA512 0aed915 TLS client: Add signature_algorithms extension into ClientHello 9e8809a TLS client: Validate certificates with SHA384 and SHA512 hashes 6bb6a9c Add SHA384 and SHA512 implementations from LibTomCrypt library fdc1614 TLS client: Add support for validating server certificate hash 3665776 TLS client: Do not verify CA certificates when ca_cert is not specified 11c9ddb Add TEST_FAIL() condition to aes_128_cbc_encrypt/decrypt() ea52a46 EAP-SIM peer: Fix memory leak on reauth error path 1a33c94 EAP-SAKE: Fix a typo in attribute parser debug print 53401e9 Abort ongoing scans on FLUSH command e929eb3 wlantest: Add -N command line argument to remove write buffering 3c41749 hostapd: Add Transmit Power Envelope IE when VHT is enabled 2ea2166 Add control interface command for aborting an ongoing scan 4ead7cf Abort an ongoing scan before connect 4f30add nl80211: Add support for aborting an ongoing scan 5ef0b84 Sync with mac80211-next.git include/uapi/linux/nl80211.h 0530eb1 mesh: Clear wpa_s cipher selection on starting mesh 1d6955e nl80211: Fix SIGNAL_POLL in IBSS and mesh 0f29bc6 IBSS/mesh: Add support for VHT80P80 configuration c27f4c9 P2P: Add support for VHT 80+80 MHz and 160 MHz bee5d8e nl80211: Add VHT 160 MHz channel flags 5e1da9c P2P: Define operating classes for VHT 80+80 and 160 ea70811 FST: Improve parsing of Multiband IEs b47d05a FST: Make FST peer connection check more permissive in hostapd 39c3c9b Remove wpa_supplicant/tests 9b635d0 Remove link_test and test_wpa 9e68742 Fix CONFIG_NO_WPA=y build eb926f1 Comment out wpas_reenabled_network_time with CONFIG_NO_SCAN_PROCESSING f231b3d FST: Fix STA MB IEs creation ed7820b P2P: Add a testing option to force P2P GO CSA 6cbbae2 P2P: Set p2p_go_wait_client in invitation_result() cb 83702b6 Android: Give user the option for selecting browser for HS 2.0 OSU cadffac wpa_cli: Add an option to set created interface type 0f039e3 Add an option to create interface of a certain type with INTERFACE_ADD d8a3b66 driver: Make setting up AP optional when creating AP interface 36e8206 Check for LIBRESSL_VERSION_NUMBER in tls_openssl.c 2c51c0b P2P: Clear send action work without waiting on find/stop/listen 6bdc43c AP: Avoid 20/40 MHz co-ex scan if PRI/SEC switch is not allowed 757785d nl80211: Clear ignore_next_local_deauth flag cb2a926 nl80211: Clear ignore_next_local_deauth and ignore_deauth_event f32227e Add QCA vendor attribute and event to indicate subnet change status d38c7be Skip SELECT_NETWORK steps only if already connected or connecting 25eb7fc Fix EAPOL reauth after FT protocol or offloaded PMKSA cache use f68d491 FT auth: Fix EAPOL reauthentication after FT protocol run a65efbf Add VHT support for Mesh a73c984 Set WMM flag to Mesh STA by default 9a8d9f7 Assign QCA vendor command and attribute for Tx power reduction in dB 747ba10 nl80211: Do not return incomplete hw capability info 5e238cc WPS: Reconnect for a failed data connection when STA_AUTOCONNECT is 0 442cc8c dbus: Fix memory leak in sending InvitationReceived signal 0603bcb hostapd: Process MAC ACLs on a station association event (SME in driver) 89a11ad RSN: Remove check for proactive_key_caching while setting PMK offload d381963 Extend QCA roam event with subnet change indication Change-Id: I122220f59ef56e25ed2749a37370a40afafa177a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d80a401aed31d06f261efd19223cf55d1a2a8228 |
|
06-Nov-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f10ff62e4eda7917a8e28fe492fd98723a5e97c4 f10ff62 Describe preferred mechanism for submitting contributions fcdb359 Use "STATUS-NO_EVENTS" instead of "STATUS" in get_wpa_status function 73ed03f wpa_supplicant: Add GTK RSC relaxation workaround ea6030c Restore previous wpa_state in scan-only result handler 1e74ae4 WNM: Clear BSS TM data if already associated with preferred candidate d129b02 EAP-pwd: Add support for Brainpool Elliptic Curves a34eace dbus: Remove unused dict helper functions cdcb2d0 wpa_cli: Add support for vendor_elem_* commands 17b7032 EAP peer: Clear ignore flag in INITIALIZE state 1f1e619 Add test programs for checking libwpa_client linking 736b7cb wpa_supplicant/Makefile: Fix libwpa_client build 2e38079 TLS: Fix memory leak with multiple TLS server instances 7b0f550 eap_sim_db: Implement eap_sim_db_expire_pending() 45c3e72 Add frequency to operating class determination for 5 GHz 100..140 e50c50d dbus: Expose interface globals via D-Bus properties 1aa0fb7 dbus: Pass property description to getters/setters c93b7e1 RSN: Check result of EAPOL-Key frame send request 95be79f Allow -1 as value to disable frag_threshold bc50bb0 Extend the range of values for the RTS threshold 053693d hostapd: Add feature to start all interfaces at the same time in sync 9578413 Reserve QCA vendor specific nl80211 commands 110..114 5d4c508 Assign QCA commands and attributes for Tx power scaling and OTA testing 5d1d69a P2P: Filter control chars in group client device name similarly to peer f67d1a0 TDLS: Do not send error case of TPK M3 if TX fails 1248e58 wpa_supplicant: Reopen debug log file upon receipt of SIGHUP signal d8fd633 Do not write ERROR level log entries if debug file is not used 67deaa5 l2_packet: Add build option to disable Linux packet socket workaround fa46426 RSN: Do not try to connect if PMF disabled and AP requires it 8acbe7f WNM: Verify WNM Sleep Mode element length dacd789 WNM: Mark set TFS buffer const ... f24b979 OpenSSL: Merge error returns 84d6a17 TLS: Remove unused tls_capabilities() 7867227 ms_funcs: Merge similar return cases 3596361 hw_features: Merge similar return case in check_40mhz_2g4() aac1efe Reject the initial 4-way handshake if initial GTK setup fails 2da5256 Add backtrace-based error path testing mechanism 55413ce P2P: Do not allow 40 MHz co-ex PRI/SEC switch to force MCC Next patches were skipped due to explicit cherry-pick: bddc51e RSN: Stop connection attempt on apparent PMK mismatch 3fdaaa8 Throttle control interface event message bursts a530fe7 Add wpa_supplicant EVENT_TEST control interface command ee1e3f5 hostapd: Global control interface notifications 2e95cfc Add debug prints for wpa_supplicant ctrl_iface socket send operations ce7d0eb Update AP WPA/RSN IE on all associations if driver can select BSS 844dfeb QCA vendor command support to set band to driver Change-Id: I909996c5afcd3b5d123ea1e23c0e1212021f7625 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a3dc30964aa24aea2b518246f6812663a1103490 |
|
23-Jun-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f43c1ae7989c38fe15756f12a9196a1cf798b4d7 f43c1ae P2P: Handle P2P Device dedicated interface parent removal 1ac977b nl8021: Allow sending wowlan configuration on any interface 4899702 nl80211: Remove android_genl_ctrl_resolve() 38dcc86 P2P: Consider ht/vht on P2P_GROUP_ADD command (with no params) 29292d5 ctrl_iface: Make p2p_ctrl_group_add() more robust e4a80d8 P2P: Fix secondary channel selection for HT40 4e71758 dbus: Add RemoveClient method to remove a client from local GO f0a79c9 D-Bus: Fix wpas_dbus_register_peer() documentation 95d62a6 D-Bus: Add missing params in WPS function documentation 790429b D-Bus: Fix function documentation for wpas_dbus_signal_p2p_go_neg_resp() 92fe746 D-Bus: Add function documentation for wpas_dbus_signal_p2p_go_neg_req() e1dffa3 P2P: Fix PBC overlap detection de7b02f P2P: Use the P2P Device interface in wpas_p2p_fallback_to_go_neg() 6b5147a P2P: Fix memory leak in p2p_process_nfc_connection_handover() 33ba27d EAP-FAST peer: Stop immediately on key derivation failure 144b6a0 OpenSSL: Fix memory leak on an openssl_tls_prf() error path 50a9efe P2PS: Fix Probe Response frame building in error cases 509f269 P2PS: Fix org.wi-fi.wfds matching when building the response 5fa5f84 P2PS: Add more debug prints for service info building fdde3db P2PS: Remove unnecessary service hash filtering from p2p_reply_probe() f2e0eec P2PS: Do not ignore other hashes if org.wi-fi.wfds hash is included ebdc32f P2PS: Fix service hash matching for org.wi-fi.wfds 24533f7 P2PS: Fix p2p_find handling to allow "wildcard" with other hash values f33a31b P2PS: Verify service name length in P2P_FIND command 129b621 P2PS: Fix P2P_FIND seek parameter parsing 83e520e P2PS: Add a wildcard with other advertised service info c5d3cad P2PS: Re-factor p2p_buf_add_service_instance function 13f6f61 wpa_cli: Fix process termination in wpa_cli action mode case b4c0f58 Clear allocated debug message buffers explicitly 14fd033 Clear control interface command explicitly from stack d95c599 P2P: Fix group interface addition failure properly for concurrent case e12c400 P2PS: Refactor p2p_data::query_hash and p2p_data::query_count use 4839da4 P2P: Add vendor elements into Invitation Response frames 886f583 P2PS: Delete p2ps_svc_found from struct p2p_data 3f048aa P2PS: Add a function to free a PD context 8f52409 P2P: Prefer direct Probe Response frames over GO's client list 4e8817f P2P: Use more precise device timestamping for group clients 0799b3f P2P: Specify frequency when sending Probe Response frame 5d180a7 drivers: Add freq parameter to send_mlme() function 5143e7e P2P: Fix return value of p2p_reply_probe() and p2p_probe_req_rx() 07c1e98 P2PS: Enable Probe Request frame processing by P2P Client 734ddf6 P2P: Add rx_freq parameter to Probe Request frame handler e6012e8 P2P: Update target GO Device Address from BSS entry during join a9a4841 Remove duplicated country code from operating class lists 132dfbe Fix removal of tagged interface and bridge when multiple BSS share them e11776a Combine multiple function calls to a single statement b649c0a dbus: Add Reconnect command to D-Bus Interface f4a234a doc: Update D-Bus GONegotiationRequest Signal: add device_go_intent 0c9fb14 P2P: Add Operating class 125 for P2P supported channels Change-Id: I782c1403985248ff994f484282efa6519fd369e9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7a53dbb56693ee9f55c0cab1a8297436511e8613 |
|
11-Jun-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 57e832de37ea0a82e650d8230457e0868a01b72e 57e832d GAS: Remove all radio works before calling gas_query_deinit() 661888b P2P: Fix persistent group profile on manual disabled=2 change 1a2f7ca D-Bus: Add WPS pbc-overlap Event 4f36965 P2P: Add ModelNumber and SerialNumber info into D-Bus peer interface 2899cba P2P: Add ModelName info into D-Bus peer interface 8bb5cfe doc: Add missing ListenChannel to P2P information 995a3a0 Document the wpa_msg_cb "global" parameter e66bced Do not set own_disconnect_req flag if not connected 8d2ed87 wpa_gui: Port to Qt5 e1ede80 eapol_test: Support IPv6 for authentication server e19c1d2 Fix pairwise cipher suite bitfields to the driver in mixed mode ee120ff Remove [MU-BEAMFORMEE] option from hostapd vht_capab parameter c5ee4dd Fix spelling of initialize in a comment and an error message aa2b125 P2P: Add GO Intent of connecting device in GO Negotiation Request event cf60962 doc: Fix a typo in D-Bus API document f13e815 Set Acct-Session-Id from os_get_random() instead of os_get_time() 92f190a OpenSSL: Fix build iwth OpenSSL 0.9.8 a80651d Add support to request a scan with specific SSIDs 94687a0 WPS: Allow the priority for the WPS networks to be configured 09d57ce wpa_supplicant: Remove trailing whitespace 0980c7f hostapd: Make sure band selection does not result in NULL dereference Change-Id: I32154fcf606169fc1e3e3a653e80c99f058f8e95 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b1e52102c211357f585e9ff6d54501e90254326e |
|
29-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit dc1a341dec54c28c3351ee7edab9ccaf7b68861f dc1a341 P2P: Add manufacturer info into D-Bus peer interface 3330395 P2P: Add P2P Cancel method over D-Bus interface 87d3c62 WPS: Add WPS Cancel method over D-Bus interface eda9d84 P2P: Fix a potential memory leak in a P2P+NFC corner case 701d972 Add libwpa_client build option to use a dynamic library ccad05a P2P: Restart group formation timer upon receiving new Inv Req 4d3be9c Postpone updating of wpa_s->current_bss till association event 3784c05 Extend hw_mode to support any band for offloaded ACS case 1b748e6 HS 2.0: hs20-client: Fix hostname extraction from URL dba68f2 HS 2.0: Fix hs20_spp_server compile error e4a43a9 HS 2.0: spp-client: Warn user if xml file cannot be found Change-Id: If4acdda6f6e6a07bf87216d34b2c89486a4a3078 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8bd70b7d6ba220544ee2f0e201e5df23e277fa1d |
|
27-May-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b4342ca4d8f21af51d4923ca15910d3211bfdc7e b4342ca P2P: Use p2p_init_wpa_s for P2P command redirection over D-Bus 96512a0 P2P: Fix D-Bus PresenceRequest to use group interface b740401 P2P: Fix wpas_remove_persistent_peer() to use P2P mgmt interface 1e0a029 P2P: Fix wpas_p2p_add_persistent_group_client() to use P2P mgmt interface 86b91c8 P2P: Fix wpas_p2p_set_own_freq_preference() to use P2P mgmt interface 4367749 P2P: Use the P2P Device management interface in wpas_p2p_remove_client() 7b642dc P2P: Add D-Bus FindStopped to notify P2P-FIND-STOPPED event d63f141 P2P: Advertize cross connection to WLAN AP on a non-P2P interface ca24117 EAP-EKE: Add Session-Id 7f2f3a6 Increase DH key size in the hostapd.conf example 567098e ACS: Scan only channels specified in the channel list c7dafdf WPS: Fix build without CONFIG_WPS=y Change-Id: I7bcd69f71b239e7f907eccdb925bd954e72d8758 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
1d755d025b206e22b06aeb322e25a79f98ca7777 |
|
28-Apr-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 01a025937c67f0eca6021d94b8ec3b144f8b1730 01a0259 WPS: Add support for 60 GHz band 0ef1e29 WPS: Fix shorter authentication timeout during no-SelReg iteration 3465176 nl80211: Verify that cipher suite conversion succeeds a250722 Try to set PMK only with key mgmt offload support in the driver 4a7ce98 Make IPv6 NA multicast-to-unicast conversion configurable 9f390f4 Interworking: Fix network selection warning without SIM/USIM support a0ad9e8 Remove WPA per-VLAN groups when no more stations remain 87b5b53 Make VLAN ID available in STA info over control interface 5678a2d P2P: Allow wpa_supplicant to start if social channels are not supported 209214b vlan: Move CONFIG_FULL_DYNAMIC_VLAN includes to proper places a6da824 Do not use C++ reserved words as variable names eaa3728 wpa_gui: Themed icon loader 9a3cb41 Fix wpa_priv (CONFIG_PRIVSEP=y) build 8b423ed Declare all read only data structures as const fd4fb28 OpenSSL: Try to ensure we don't throw away the PIN unnecessarily fabc6dd mesh: Retransmit the last Commit Message in the Committed state 068669f vlan: Verify RADIUS returned VLAN-ID and dynamic_vlan=required 5add410 WPS: Use shorter authentication timeout during no-SelReg iteration e7d2034 WPS: Enforce five second minimum time before AP iteration bd143cc Remove trailing whitespace from Makefile 74802c0 P2P: Do not create a P2P Device interface if P2P is disabled 579674e Document p2p_disabled option in wpa_supplicant.conf 8ea8a89 nl80211: Extend unique MAC address assignment for station iftype Change-Id: I8bc8a63f37c0892b83376b9d5a5859827ae50554 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
912c6ecf72fb2c84fbf17dbd0666492778dbd9fc |
|
30-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 989e784601887734e696b3fac0ad6d101badd7ea 989e784 P2P: Optimize scan frequencies list when re-joining a persistent group 154a1d5 hostapd: Fix some compilation errors ce18c10 Add support for CONFIG_NO_ROAMING to Makefile 65a7b21 OpenSSL: Implement AES-128 CBC using EVP API 22ba05c Explicitly clear temporary stack buffers in tls_prf_sha1_md5() 940a4db Explicitly clear temporary stack buffer in sha1_t_prf() eccca10 Explicitly clear temporary stack buffer in hmac_sha256_kdf() e8e365d wext: Add support for renamed Host AP driver ifname fc48d33 Improve error messages related to EAP DB c469d62 Error out if user configures SQLite DB without CONFIG_SQLITE 270427e HS 2.0R2: Add more logging for hs20-osu-client icon matching 8e31cd2 OSU server: Improve logging for SPP schema validation failures 23dd15a http-curl: Improve log messages e7d285c OSU server: Print out signup ID if there is some problem with it 1b45006 HS 2.0R2: Remove unused argument identifier from hs20-osu-client 2e7a228 HS 2.0R2: Allow custom libcurl linkage for hs20-osu-client a52410c Allow PSK/passphrase to be set only when needed 3e808b8 EAP-pwd peer: Add support for hashed password e4840b3 EAP-pwd server: Add support for hashed password 2bd2ed2 EAP-pwd: Mark helper function arguments const when appropriate 9ccc10f wpa_cli: Use tab as only word separator for networks 5a997b2 wpa_cli: Completion routine for dup_network command 1ca6c0f wpa_cli: Completion for remove, select, disable, enable network 7e6cc90 wpa_cli: Implement completion routine for get_network/set_network 32a097f wpa_cli: Keep track of available networks 94dc0e9 wpa_cli: Allow tab as alternative separator for cli_txt_list words efa232f Add support for virtual interface creation/deletion ba87329 wpa_cli: Use .wpa_cli_history under Android 0f8385e Show OSEN key management properly in scan results e7b4cd0 wpa_gui: Add tray icon based signal strength meter 54d3dc9 AP: Unset HT capabilities for an HT association request without WMM Change-Id: I71425b8e20fe1dfdb777592257dc4e4063da8d85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f73259cc00af557e36add405799b7f2326587c13 |
|
17-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 0b08f25445caacb502c394e917a292d7fa595447 0b08f25 wpa_gui: Documentation update 6128a90 hostapd: Add channel 140 to allowed HT40 channel pairs 8ffaafa wpa_cli: Add missing parameters for "set" command completion routine 0fd9d95 wpa_cli: Add completion routine for "get" command 5c6c315 Add IPv4 support function for "get" control interface command 74fa78b Add AVG_BEACON_RSSI to SIGNAL_POLL output 4acdc48 nl80211: Handle NL80211_ATTR_EXT_FEATURES attribute a0563ac Sync with mac80211-next.git include/uapi/linux/nl80211.h 0f89328 P2P: Move upper layer SD interaction into a separate file 8b94980 FT: Avoid unnecessary allocation for MIC calculation 18da814 The master branch is now used for v2.5 development bc04db9 Change version information for the 2.4 release bc1d23a Add ChangeLog entries for v2.4 319d9da Fix bitfield_get_first_zero() to not read beyond buffer 39c3bfc Indicate AP-DISABLED on main AP mode deinit path f10487e Send CTRL-EVENT-DISCONNECTED on wpa_supplicant AP deinit Change-Id: I0b8459261265a25fe0edd7b435ede32be3cc6616 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
203eadb9eda41a1dde4a583edb4684319e3f399e |
|
05-Mar-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6e9023ea499ea9a89b0e858c85e32b455d57264c 6e9023e DFS: Allow wpa_supplicant AP mode to use non-offloaded DFS 02e42ab nl80211: Add vendor event parsing for DFS offload events bd0f68c DFS: wpa_supplicant event processing d7f1aa8 DFS offload: P2P changes for autonomous GO 1e2aaff DFS offload: Indicate AP-CSA-FINISHED for DFS offloaded case c13578c DFS offload: Add main DFS handler for offloaded case 5de81d7 DFS offload: Skip user space processing for CAC operations 192ad3d Interworking: Clear SCANNING state if no match found 95d7b86 P2P: Consider 5 GHz channels also for auto GO a51c40a P2P: Fix regression in start-GO/AP through a "fake" scan dd5c155 eap_proxy: Callback to notify any updates from eap_proxy 9a05d98 atheros: Add a new flag for OSEN support 9feadba Remove unnecessary NULL check to make function more consistent 1772d34 P2P: Fix interface deinit for failed group interface initialization 3f9ebc4 P2P: Allow AP/GO interface to be started while P2P-in-progress b4a9292 RADIUS client: Fix server failover on return-to-primary on error case 9836cb5 Add option to force a specific RADIUS client address to be used 1a7ed38 RADIUS client: Fix a copy-paste error in accounting server failover de7c06e P2P: Continue find in GO-Neg-Resp-fail status corner cases c280590 Do not add blacklist entries based on normal disconnect request cases bdf0518 P2P: Direct P2P_CONNECT command to proper interface 44b9ea5 P2P: Do not allow scan or normal association on cfg80211 P2P Device 9542f21 Clean up p2p_find command parsing and execution fa9f381 P2P: Allow a specific channel to be specified in P2P_FIND eb78a8d P2P: Restore P2P_SCAN_SPECIFIC d988ff7 hostapd: Disable VHT caps for STAs when no valid VHT MCS found 70fd828 RADIUS client: Fix previous failover change c3dabf5 Fix merge issue with IBSS VHT support 8b2b718 Fix minor issue in HT40 max rate determination 347c55e RADIUS client: Re-try connection if socket is closed on retransmit 94b39e5 RADIUS client: Fix server connection recovery after initial failure bbee36e Allow RADIUS server address to be replaced efb4008 TLS: Remove placeholders for SIGN_ALG_DSA support Change-Id: I8e5d0dfd5fddb6de2f8d8211b708c3bb6674098b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7f65602d49069f96a7bb44da8bd79ffe8d4c6a98 |
|
25-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f51f54a007e0de1d413dee3523472d3bbeed2ecc f51f54a nl80211: Resubscribe to nl80211 events on global nl_event socket 48ec694 Fix Linux packet socket workaround to not close the socket too easily 0d2030e Use estimated throughput to improve roaming selection 1d747e2 Add snr and est_throughput to the BSS entries a1b790e Select AP based on estimated maximum throughput ab647ff Add wpa_supplicant Makefile target libwpa_ctrl.a abae2d1 trace: Initialize alloc_list even without os_program_init() call 891dfb3 Add helper function to clear and free wpa_psk list 71d77ad Update current BSS level when signal change event occurs f1609f1 wpa_supplicant: Cancel sched_scan when stopping countermeasures abb8d08 nl80211: Add support for configuring P2P GO CTWindow 0b8bcaa P2P: Allow configuring CTWindow when working as GO c77ffc6 TDLS: Ignore extra padding in all packets 5ce6ac1 Inteworking: Add support to update the ANQP Capability List into the BSS 185ada4 HS 2.0: Add support to update the HS20 Capability List into the BSS 7fe7a3a wpa_gui: Debug enhancement 2b892d4 Add forgotten network profile parameters to config file writing 563ee18 IBSS: Add support for VHT80 configuration ada157f Make hostapd_set_freq_params() common 98479dc IBSS: Update operating frequency if joining an existing IBSS 4d9e6fb IBSS: Add fixed_freq network parameter 6f5e1b0 Use priority list instead of global for PNO 97fc2dc Allow libnl-3.0 include path be specified f92446f P2PS: Add P2PS interface info 59b416c Add optional reassoc-to-same-BSS optimization c4da67d Fix passive_scan config parameter writing 715d5c4 hs20-osu-client: Ensure NULL checks are done before dereferencing 58d405f Fix OCSP debug messages 710dfb4 OpenSSL: Fix OCSP error path bd7bb43 HTTP: Fix OCSP error path 946572c Android: Remove commented out non-Android build parameters 15ada7f Android: Remove libxml2 config defines ebe8d3f Android: Silence unused function parameter warnings dbd10da Android: Fix hs20-osu-client build on Android 5.0 a926295 HS 2.0R2: Fix permissions for SP/<fqdn> directory on Android 480994d nl80211: Allocate QCA vendor subcmds for DFS radar detected and CAC events c165cb4 Drop all hostapd STA entries on interface disabled event 106fa1e nl80211: Indicate interface-down event only for the main netdev eeb1cb2 VLAN: Clean up RTM_NEW/DELLINK processing 47e5fbd hostapd: Avoid sending client probe on removed client 3478273 Re-configure WPA2 group keys on hostapd interface re-enable f33c860 Re-enable beaconing on interface disable+enable fc99fab nl80211: Print a debug log entry on NL80211_CMD_PROBE_CLIENT failures 0d2f324 P2P: Fix send_action_in_progress clearing in corner cases 9ff8dda Add hostapd UPDATE_BEACON ctrl_iface command e0761c5 nl80211: Allocate QCA vendor subcmd for DFS CAC Start event 1db718b nl80211: Test vendor command and event 10263dc Add control interface commands for fetching wpa_config values f91a512 Add INTERWORKING_ADD_NETWORK command c612ae9 AP: Do not reply to Probe Request frames with DS Params mismatch 5b74e08 P2P: Document P2P_CONNECT-auto 99650ca Add STOP_AP control interface command 6b00512 P2P: Add event messages for P2P_CONNECT-fallback-to-GO-Neg b0e669b P2P: Fix P2P_CONNECT-auto fallback to GO Neg with group interface bf51f4f mesh: Fix remaining BLOCKED state after SAE auth failure 79ddb20 mesh: Add a monitor event on SAE authentication getting blocked dd2cbaf mesh: Add a monitor event for SAE authentication failure 0cb5f8d mesh: Fix inactivity timer for 32 bit system 11e2ddb mesh: Remove duplicated no_auto_peer update 1e52983 D-Bus: Fix network block type change 4fada12 Fix HT40 co-ex scanning issue on hostapd error path 23ed011 Fix Linux packat socket regression work around 663ae2f Don't write to wpa_supplicant.conf directly d9a9bc0 IBSS: Do not enable HT with WEP or TKIP 0d7eb43 ACS: Accept channel if any (rather than all) survey results are valid 68fa00c ACS: Allow specific channels to be preferred 6f41a25 ACS: Use weighted average for 2.4 GHz adjacent channel interference Change-Id: Ie1cabd28dcfdefafa02e81477e34badae6f7e629 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
216983bceec7c450951e2fbcd076b5c75d432e57 |
|
06-Feb-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2c0efd9e49b15da163cee659409eee85390620c3 2c0efd9 P2P: Fix stopping on search after SD callback db3168d OpenSSL: Use SSL_cache_hit() when available 68ae477 OpenSSL: Use library wrapper functions to access cert store abe96d0 P2P: Clean up Listen channel optimization debug prints d2ca6ba Fix hostapd obss_interval documentation d027c7b Fix 20/40 MHz co-ex report processing with obss_interval=0 93eca61 P2PS: Do not remove pending interface on p2p_stop_find ae2dd83 P2PS: Allow PD retry in SEARCH and LISTEN_ONLY also 87d5ef5 P2PS: Add commands to control interface redir list 0cf12b3 P2PS: Send P2P_FIND_STOPPED event during P2P SD also 306aaf4 P2PS: Start WPS registrar upon GO formation 9e96e46 P2PS: PD Response processing ab8ee77 P2PS: Provision Discovery fail event 1300cc8 P2PS: PD Request processing and PD Response building 5fefce2 P2PS: Callback to send P2PS provisioning events 9a58e52 P2PS: Callback to create pending group after sending PD Response 895d94d P2PS: Callback to remove stale persistent groups f309c18 P2PS: ASP provisioning commands to control interface 6d90851 P2PS: Process P2PS provisioning commands 369678a P2PS: Add P2PS attributes into PD Request if requested 59fec34 P2PS: Allow p2p_build_ssid() to use pre-set SSID d4b43b5 P2PS: Add support to send ASP-RESP events 6df08d0 P2PS: Logic to parse GAS requests for ASP services 5a4102c P2PS: Add support to send ASP service requests 095b3c4 P2PS: Add Application Service Info to device found events 4660e73 P2PS: Add Advertised Service Info into Probe Response frames 9e7321e P2PS: Parse Probe Request frames for matching ASP hashes ae9d45f P2PS: Extend add/del services logic to support ASP ea8e033 P2P: Allow p2p_get_group_num_members() to be called with NULL 4f88fc0 P2PS: WPS changes needed for P2PS default PIN 1a94b0a P2PS: Add service hash to Probe Request frames 5177509 P2PS: Add option to specify seek strings into P2P_FIND 5f18501 P2PS: Helper functions to build new P2P attributes 60d1148 P2PS: Add parsing of new P2P attributes b9348be P2PS: Add new P2P identifier assignments from P2P spec v1.5 c3d6c71 Add helper functions for escaping and unescaping UTF-8 66eaf8a Fix driver-offloaded offchannel TX done processing c5e154c P2P: Add P2P state into p2p_send_action_cb() debug entry f2dc06e P2P: Ignore remain-on-channel callback event if not waiting for one 6a6569b HS 2.0R2: Add password to DB in case of machine managed subscription f0d0a5d Improve BSS selection with default noise floor values 7f7bfba Add an option allow canned EAP-Success for wired IEEE 802.1X 49fcc32 EAP-MSCHAPv2 peer: Add option to disable password retry query 66bc683 hostapd: Simplify vlan_add_dynamic error paths 99805a0 Interworking: Convert wpa_printf() to wpa_msg() b42f539 Add a variable to handle extra CFLAGS values e6dd819 Work around Linux packet socket regression 7650f9e Fix resource leaks on rsn_preauth_init() error paths a565e03 dhcp_snoop: Make IPv4 addresses human readable in debug log 2dd4f3a Fix STA re-bind to another VLAN on reauthentication 4437f8f Free old eap_user_file data on configuration change 1180dd6 WPA auth: Disconnect STA if MSK cannot be fetched 40aaa64 WPA auth: Clear temporary MSK storage from stack explicitly 01b481a Convert couple of remaining printf to wpa_printf in ap_list bfaefd5 EAP-PEAP server: Fix Phase 2 TLV length in error case 745d936 mesh: Create new station entry on popen frames 41bff86 mesh: Always free the station if peering failed 871ff0b mesh: Sync plink state with kernel ba42261 Simplify eapol_sm_notify_pmkid_attempt() 993a865 Add eap_session_id to wpa_supplicant STATUS output f19c907 OpenSSL: Implement aes_wrap() and aes_unwrap() fee31f7 OpenSSL: Remove support for versions older than 0.9.8 8bf3030 OpenSSL: Use a common helper function for HMAC 983c6a6 OpenSSL: Replace internal HMAC-MD5 implementation Change-Id: I5743003f14efae324537f7dc2c5e6ada892a33a7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
807291d85bf857320aff6a8ade38c5f622ab9df8 |
|
27-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36d (DO NOT MERGE) 3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2f74e36e84064ffa32f82f3decf36b653c7e4fad |
|
21-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fb09ed338919db09f3990196171fa73b37e7a17f (DO NOT MERGE) fb09ed3 Interworking: Notify the ANQP parsing status d10b01d HS20: Provide appropriate permission to the OSU related files 73f1ee0 HS20: Fix TrustRoot path for PolicyUpdate node in PPS MO 54a0ac0 HS20: Return result of cmd_sub_rem in hs20-osu-client b62b0cb WNM: Fix possible memory leak by free buf 9bd0273 EAP: Fix possible memory leak in eap_ttls_process_decrypted() b760e64 eap_server: Avoid NULL pointer dereference in eap_fast_encrypt_phase2() 948d3a8 hostapd: Remove unused variable from hostapd_get_hw_features dd09e42 Fix memory leak in wpa_supplicant global bgscan configuration 30f459c wpa_cli: Fix NULL dereference on printf string argument 414f23d Avoid NULL string in printf on EAP method names in authenticator b72b2ad P2P: Stop p2p_listen/find on wpas_p2p_invite 7b7b444 nl80211: Fix reading of the extended capabilities mask 7e608d1 P2P: Use the correct wpa_s interface to handle P2P state flush fd83335 AP: Enable HT Tx STBC for AP/GO if supported by driver d90bfa9 Move external_scan_running to wpa_radio 0c5f01f Clear reattach flag in fast associate flow 8ad8bc5 NFC: Redirect NFC commands on global control interface 57ae1f5 P2P: Fix P2P invitation with NFC 07565ab WNM: Fix the length of WNM_BSS_QUERY control interface command 2d9c99e Retry scan-for-connect if driver trigger fails 911942e Add a test framework for various wpa_supplicant failure cases 6b46bfa WPS: Re-fix an interoperability issue with mixed mode and AP Settings 1648cc6 ACS: Allow subset of channels to be configured 95ff306 nl80211: Allow HT/VHT to be disabled for IBSS 7451a21 mesh: Return negative value on join failed 5a2a6de mesh: Make inactivity timer configurable b9749ba AP: Expire STA without entry in kernel a114c72 AP: Remove redundant condition for STA expiration 0d787f0 Fix RADIUS client with out-of-memory and missing shared secret 0efcad2 Print in debug log whether attached monitor is for global interface 8266e6c HS 2.0: Try to use same BSS entry for storing GAS results 6c69991 Make wpa_supplicant FLUSH command more likely to clear all BSS entries 2dbe63a Write reason for scan only_new_results into debug log 242b83a eapol_test: Fix cert_cb() function arguments a8826b1 Interworking: Avoid busy loop in scan result mismatch corner cases edd5939 Interworking: Start ANQP fetch from eloop callback cbc210d RADIUS DAS: Allow PMKSA cache entry to be removed without association 4e871ed RADIUS DAS: Support Acct-Multi-Session-Id as a session identifier b52c0d4 Add authMultiSessionId into hostapd STA info 861beb7 RADIUS DAS: Check for single session match for Disconnect-Request 783b2a9 Interworking: Fix INTERWORKING_CONNECT with zero-length SSID BSS entry 1fef85c nl80211: Fix AP-scan-in-STA-mode error path behavior cebee30 Add domain_match network profile parameter d07d3fb Add peer certificate alt subject name information to EAP events 98a4cd4 D-Bus: Clear cached EAP data on network profile changes 483dd6a Include peer certificate always in EAP events dd5f902 Get rid of a compiler warning d29fa3a Extend VENDOR_ELEM parameters to cover non-P2P Association Request e7d0e97 hostapd: Add vendor specific VHT extension for the 2.4 GHz band Change-Id: I45436c49986cd6bddbd869db3f474871a29ce1dc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
ff787d557db719adea0fdf2679667500c65cf74d |
|
12-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3e7f1c7980c6e9fc7173f78aa72b2761fcd8924d (DO NOT MERGE) 3e7f1c7 GnuTLS: Add TLS event callbacks for chain success/failure and peer cert 0eb2ed0 GnuTLS: Add support for OCSP stapling as a client cf08e9b Add MESH to modes capabilities db5adfe Add SAE to auth_alg capabilities 0e1bb94 GnuTLS: Verify that server certificate EKU is valid for a server d4d1f5c GnuTLS: Fix tls_disable_time_checks=1 processing 594d1fc GnuTLS: Add support for private_key and client_cert as blobs 79b1dd9 GnuTLS: Fix DER encoding certificate parsing a165145 Add "GET tls_library" to provide information on TLS library and version c3bb84b GnuTLS: Add event callbacks 8ddcd6b GnuTLS: Add support for domain_suffix_match 4bc13bf GnuTLS: Check for any unknown verification failure e0d431a GnuTLS: Add more debug prints for version and session status 65ec7f4 GnuTLS: Move peer certificate validation into callback function 7c82457 GnuTLS: Remove support for versions older than 2.12.x e1d63f6 GnuTLS: Remove old version number checks for 1.3.2 ae0a23a GnuTLS: Remove GNUTLS_INTERNAL_STRUCTURE_HACK db4cf40 GnuTLS: Add support for ca_cert as a blob 224104d TLS: Reject openssl_ciphers parameter in non-OpenSSL cases b09baf3 Work around Windows build issues 6dbbef9 Define host_to_le32() for Windows builds 7d28e46 Fix os_win32 build 0b40247 Remove Network Security Service (NSS) support d166947 schannel: Reject subject_match, altsubject_match, suffix_match 59051f8 TLS: Reject subject_match, altsubject_match, suffix_match f8717ac GnuTLS: Reject subject_match, altsubject_match, suffix_match e24aef1 Fix a typo in domain_suffix_match documentation 394b547 Improve subject_match and domain_suffix_match documentation 8a42a07 trace: Fix out-of-memory testing logic 79cd993 Add address masks to BSSID lists b83e455 Add network specific BSSID black and white lists b3d6a0a Add generic parser for MAC address lists 21c74e8 nl80211: Use a helper function to put mesh_id 85e1fad nl80211: Use a helper function for putting beacon interval 6dfc557 Remove mesh_ht_mode network block parameter 54fe48b mesh: Use the shared function with IBSS to determine channel parameters f7e889f mesh: Convert channel configuration to use common routines 6334330 mesh: Use a separate variable to track whether HT is enabled 1fc4ab2 nl80211: Move debug prints into nl80211_put_freq_params() cae87ab nl80211: Add a helper function for putting basic rates 6b8b077 ibss/mesh: Enable HT40 if supported a828f62 Make check_40mhz_2g4 common fdd989d Make check_20mhz_bss common 0e550fe Make check_40mhz_5g common 6d5d098 Make get_pri_sec_chan() common 5144274 Introduce common allowed_ht40_channel_pair() 5f10b7f Use common hw_get_freq/hw_get_chan helpers in hostapd 269dfe2 Introduce common hw features 1830817 IBSS: Add WPA_DRIVER_FLAGS_HT_IBSS f3b8ad4 SAE: Implement retransmission timer a206e2a SAE: Centralize function for sending initial COMMIT 28c91ee bsd: Fix parsing of ieee80211req_scan_result on FreeBSD and DragonFly 96d1d97 Android: Remove hardcoded ICU include paths from hs20-osu-client a354bcc D-Bus: Use NoMemory error message from CreateInterface 635874b Handle interface disabled/enabled more consistently 8f2cf37 P2P: Indicate reason=UNAVAILABLE for group netdev going down 86a7fbb Verify that eloop_register_read_sock() succeeds for ctrl_iface setup 27d9701 Fix a memory leak on WPA authenticator error path c1c07dc Fix hostapd interface addition error path a156ffd Add support for testing memory allocation failures 52b3943 D-Bus: Fix interface unregistration on error path 96dc9a6 D-Bus (old): Fix interface unregistration on error path ef03557 Fix memory leak on wpa_supplicant_init_wpa() error path 52a8058 TDLS: Fix an interface addition error path f2d5728 D-Bus: Fix string array dict entry parser in out-of-memory case c61bc23 D-Bus: Fix byte array dict entry parser in out-of-memory case dacf605 D-Bus: Fix Introspect() in case of os_strdup() failure 68a8669 D-Bus (old): Fix wpsReg error message f0614bc D-Bus (old): Fix message handler error paths a2af1c7 D-Bus (old): Fix memory leak on error path 3d2e2d5 trace: Fix compiler warning on 32-bit builds with bfd support b9f6560 eloop: Fix WPA_TRACE tracking in case of realloc failure e10422c Fix memory leak on hostapd BSS addition error path 2801659 Fix hostapd initialization error path on allocation failure d58ade2 nl80211: Fix compilation with libnl 1.1 and 2.0 51f3427 crypto: Clear temporary stack buffers after use 77a2c39 crypto: Clear temporary heap allocations before freeing a15a7fc DH: Clear memory explicitly on private key deinit 77c45e2 Add wpabuf_clear_free() to allow clearing of freed memory a90c7d9 OpenSSL: Fix pbkdf2_sha1() wrapper f6ebbcf AES-SIV: Make aes_s2v() static dcf8fbc nl80211: Simplify event processing error paths 38751d8 nl80211: Remove cfg80211 state mismatch workaround for authentication 64ae244 nl80211: Check support for rekey offload on first use Change-Id: Ice94c3cf8e39a6d2cac993aacd0f6d45b31c7c15 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
6c0da2bb83f6915d8260912362692d1a742e057b |
|
05-Jan-2015 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b48e3200680f71ae083b84793e6bdc2099416d2 [DO NOT MERGE] 8b48e32 wpa_cli: Add MAC address randomization in scan fb37588 ctrl_iface: Add MAC address randomization in scan processing 56c76fa scan: Add MAC address randomization in scan handling 86056fe nl80211: Handle MAC address randomization in scan/sched_scan ff23ed2 driver: Add definitions for MAC address randomization in scan 7db53bb wpa_cli: Implement TDLS start/cancel channel switching commands 72b2605 nl80211: Pass TDLS channel-switch start/stop params to kernel 6b90dea TDLS: Propagate enable/disable channel-switch commands to driver d9d3b78 TDLS: Track TDLS channel switch prohibition in BSS 4daa572 TDLS: Add channel-switch capability flag ca16586 Sync with wireless-testing.git include/uapi/linux/nl80211.h 8c42b36 WMM AC: Reconfigure tspecs on reassociation to the same BSS 677e7a9 WMM AC: Do not fail on unknown IEs in Association Response fecc2bb WMM AC: Delete tspecs on roaming 20fe745 WMM AC: Print user-priority in wmm_ac_status 730a0d1 nl80211: Always register management frames handler ... 209702d Add possibility to set the setband parameter ee82e33 Do not trigger the scan during initialization on Android platforms e69ae5f Reject new SCAN commands if there is a pending request ... 59d7148 nl80211: Provide subtype and reason code for AP SME drivers 9d4ff04 Add external EAPOL transmission option for testing purposes 61fc904 P2P: Handle improper WPS termination on GO during group formation 58b40fd P2P: Clear p2p_go_group_formation_completed on GO start c155305 Complete sme-connect radio work when clearing connection state debb2da P2P: Report group removal reason PSK_FAILURE in timeout case 51465a0 The master branch is now used for v2.4 development Change-Id: I9b9cfa5c5cd4d26b2f3f5595f7c226ac60de6258
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9ead16e203b81d44a2d84eadc2901ceeb7daf805 |
|
07-Oct-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
661b4f78e48c697429dc46154a4125892c001718 |
|
29-Sep-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit a313d17de943cbaf12cbf67d666af14791be8ad2 a313d17 Extend random MAC address support to allow OUI to be kept 1cbdb9d Add helper function for generating random MAC addresses with same OUI 97ed9a0 nl80211: Remove bridge FDB entry upon sta_remove() 39323bc AP: hostapd_setup_bss() code clean-up 1595eb9 P2P: Add support for 60 GHz social channel b6ebdfb Extend STATUS command with frequency information 375f4a3 hostapd: Avoid dead code with P2P not enabled 6a60488 dbus: Add a global property to set or unset WFD IEs 4bd7e16 wifi_display: Add a utility function to set WFD subelements from IEs d417744 wifi_display: Add a utility function to get the sub-elements as IEs a8833b8 util: Don't use "\e" 8c6f4a5 ap_config.c: fix typo for "capabilities" 6e252b0 WPS: Fix WPS-in-search check when STA_AUTOCONNECT is disabled e5fdc05 P2P: Remove unecessary sanity check for global p2p ee285df P2P: Flush services based on global p2p init and not p2p ifaces 7139cf4 P2P: Decrement sd_pending_bcast_queries when sd returns success dbdc9a1 nl80211: Fix memory leak on start radar detection error path ed8e005 hostap: nl80211 use nl80211_put_freq_params c267753 Add support for using random local MAC address 4d8fb63 Add helper function for generating random MAC addresses fee354c nl80211: Add command for changing local MAC address e49cabc P2P: Set timeout when starting GO Negotiation from Probe Req RX 7549c17 P2P: Clear pending_listen_freq when starting GO Neg/Invite b497a21 nl80211: Ignore auth/assoc events when testing driver-SME 79e2b1c Add PMKSA_FLUSH ctrl_iface command 55c2bfa wpa_cli: Support action scripts with global ctrl_iface 063f850 wpa_cli: Increase event buffer size to 4096 bytes fa0e917 wpa_cli: Fix PING in interactive mode with ifname_prefix c53a9bf Check for driver's DFS offload capability before handling DFS 068e387 STA: Update scan results for ap_scan=1 skip-selection case also 7a4a93b dbus: Add SignalPoll() method to report current signal properties a6ab82d Android: Add NO_EVENTS parameter to status command df2508d P2P: Check os_get_random() return value more consistently 54461f3 RADIUS server: Remove unreachable code e4474c1 FT: Fix hostapd with driver-based SME to authorize the STA 0800f9e nl80211: Add roaming policy update using QCA vendor command 0ef023e Add support for driver command to update roaming policy 0cd9846 nl80211: Print debug info on STA flag changes 17e2091 P2P: Fix radio work issue with wait-for-peer GO Negotiation 76db5b6 Work around broken AP PMKSA caching implementation b08d5fa WPS: Set EAPOL workarounds dynamically based on association 8511a0f WPS: Extend internal entropy pool help for key/snonce derivation abc0553 Remove WPA_EVENT_SCAN_STARTED message from MSG_INFO log c45dabb P2P: Deauth p2p client just after dbus notify 3ee1856 nl80211: Register eloop after hs20 action frame 3bd3257 dbus: add BSS Age property to indicate last-seen time 5c61d21 openssl: Fix memory leak in openssl ec deinit 10e7948 Fix hostapd GET_CONFIG wpa_pairwise_cipher value 3a413e0 RADIUS client: Check getsockname() return value 9c196f7 HTTP: Fix OCSP status check cb5ef95 SME: Verify that os_get_random() succeeds for SA Query c9cd78e RADIUS server: Fix IPv6 radiusAuthClientAddress mask 5e62cfd P2P: Verify that os_get_random() succeeds 6473e80 EAP-PAX server: Add explicit CID length limit 6a6566c Remove unnecessarily shadowed local variable df756b3 hostapd: Remove unused variable assignment e47abdb TDLS: Decline Setup Request with status code 37 if BSSID does not match ce2002a TDLS: Add RSN and Timeout interval IEs in TDLS Discovery Response frame 1c2aa04 P2P: Do not add P2P IEs on P2P disabled interface f2e9083 nl80211: Add more RTM_NEWLINK/DELLINK debug messages 728ff2f nl80211: Fix RTM_DELLINK processing for bridge events e5a4b85 WPS: Merge mixed-WPA/WPA2 credentials if received in same session db9418b Add printf NULL checks to silence static analyzer 4e53675 P2P: Overwrite pending interface only after verifying BSS entry 04a258e hostapd: Check that EVENT_ASSOC data is present before using it 1cc0d6a wpa_supplicant: Use freq_list scan filtar in sched_scan Change-Id: Ibc18f6761b3ccfe8fb4479f26f53e70942068bc8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
57cea1a480975338d84f7bbc229b4dc76e030600 |
|
20-Aug-2014 |
Jithu Jance <jithu@broadcom.com> |
P2P: Avoid trunction of extended listen due to offchan tx On receiving the cancel remain on channel event, the pending_tx is scheduled immediately and returned. This was preventing the wpas_p2p_listen_start function from execution thereby resulting in termination of the extended listen. Bug: 17027752 Change-Id: Ib12425f144364e92b3a5539fba3a850779b4fe2b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
03658834c33748b9ad86f3d4cdf0c7be9c6887d1 |
|
13-Aug-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4aa9c156e583c64cf5d90751ec888c478e1155c2 4aa9c15 dbus: Close dbus dict just after appending data b8d87ed nl80211: Disable Probe Request reporting for static AP during deinit bf144cf nl80211: Do not change iftype for static AP interface 61157af wext: Add signal_poll callback af65bc3 P2P: Use ssid instead of wpa_ssid to find GO iface 6c460ea Add RSN cipher/AKM suite attributes into RADIUS messages cdffd72 Add WLAN-HESSID into RADIUS messages 69002fb Add Mobility-Domain-Id into RADIUS messages 4a0693a dbus: Declare and implement GroupFinished as for GroupStarted 2fa980f P2P: Cancel pending action TX radio work on p2p_cancel 8b627b7 Fix writing of the wowlan_triggers parameter Bug: 16877362 Change-Id: Ifbb8902e2634470ba212a82cd1ca49880633d961 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7f0b69e88015ca077ef7a417fde0a76c10df23a5 |
|
28-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit e8c08c9a363340c45baf8e13c758c99078bc0d8b e8c08c9 EAP-FAST server: Fix potential read-after-buffer (by one byte) 8b65fef Interworking: Remove unnecessary placeholder for PAME-BI 27a725c EAP: Do not allow fast session resumption with different network block 52f4abf P2P: Remove PSK/passphrase from P2P-GROUP-STARTED debug log entry f8723e1 P2P: Use a helper function for P2P_EVENT_GROUP_STARTED events 905c722 Add wpa_msg_global_ctrl() 1f1fe19 EAP-pwd: Clear identity string and temporary buffer explicitly f119d66 EAP-pwd: Verify BN_rand_range return code 5197f03 EAP-pwd: Use os_memcmp_const() for hash comparisons 26c10f7 OpenSSL: Use EC_POINT_clear_free instead of EC_POINT_free 3248071 OpenSSL: Use BN_clear_free instead of BN_free 870dfe9 EAP-TTLS: Remove FreeRADIUS workaround for EAP-TTLS/MSCHAPv2 Bug: 15615050, 16493485 Change-Id: I7028a61ad6dbda1f336376cc0568b81046045725 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2e67f06149ff649fb6f8782bad041d3d9124685e |
|
16-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 6d00ab04302df257cb3092b2b31b4eac42e77569 6d00ab0 nl80211: Ensure nl_preq unregistration on driver deinit 71a0e39 P2P: Make unrecognized vendor elements available in P2P_PEER 86bd36f Add generic mechanism for adding vendor elements into frames Change-Id: I392072a37d8dbfc92769082b60f052f7095466b6 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
6aa8ae4b6139bdf5593301474277dcdbc2528190 |
|
07-Jul-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4ed3492206097c24aa37b4429938fec049ba1827 4ed3492 PNO: Send Probe Request frames only for hidden SSIDs 8931a36 P2P: Add explicit check for ssid->p2p_client_list != NULL c0e46bb DFS: Remove dead assignment Change-Id: I16b7d38ba8fc974391d679a43f1426eb9e4bce23 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d30ac604c9f6da71a0dd7f46d25be05a2a62cfbb |
|
30-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit ea18024d78bde140fb8f74d216d757816bfd6e9b ea18024 dbus: Add PropertiesChanged signal to Peer object 36716ee P2P: Add a utility function to run a method on every known peer bf03566 dbus: Remove GroupMember object type and use Peer instead 17a37d7 dbus: Add a Groups property to a Peer object on which it belongs 6f04642 P2P: Add utility functions to get GO/client interface c6386e5 P2P Add a utility to run a callback on all available groups 8e76f48 P2P: Add a utility function to get the group configuration 37d8a27 TDLS: Clean up add/set peer operations bcd2baa TDLS: Tear down connection on malformed Setup Confirm 8190540 TDLS: Abort local setup when failing to add STA 1dce7a2 TDLS: Update peer STA as soon as full peer info is available 819c943 TDLS: Remove peer from global peer-list on free 5841958 hostapd: Use channel switch fallback on error 8974620 hostapd: Perform multi-BSS CSA for DFS properly ccac7c6 hostapd: Make chan_switch command per-interface not per-BSS 6782b68 hostapd: Move CSA parameters to hostapd_data 1de809e eapol_test: Fix -R option to not replace -s option value 3c5d34e Change channel before IBSS associations ebffdbc nl80211: Refactor mode switch logic Change-Id: I1cbdc4dce586ec69f693b3b04eb340a5332f6b40 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2271d3fdd5982d0e5e81cf9999a861bba933eacb |
|
23-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f95a4524c2c00476e46b7999426ffdcbc7cd538f f95a452 nl80211: Improve debug output by printing SA and DA in frames dedfa44 Print frame type name in debug output 57a8f8a nl80211: Use low-priority scan for OBSS scan 1b928f9 P2P: Allow passphrase length to be configured e985246 eapol_test: Add PC/SC reader and PIN command line arguments 5a62060 Use pcsc_reader configuration in one for scard_init() call f3c6b23 EAP-SIM': Fix AT_KDF parser to avoid infinite loop 79122f9 EAP-SIM/AKA: Remove unused RESULT_FAILURE state Change-Id: I142bed35a75ed228e145e50c961dcde22a9815f7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
43cb578dfe2c492257636f6234a24178ed27789e |
|
17-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7efc7f66b1d63b3bbb99d9176f6f68c4d1fc6327 7efc7f6 TDLS: Fix TPK M1 error case (CID 68214) d1bb7ae nl80211: Fix non-hostapd interface addition to not call add_ifidx() 38ddcca TDLS: Add ctrl_iface option for flushing all TDLS peers 342bce6 TDLS: Bail on STA add failure in tpk_m1 processing 947f900 TDLS: Handle unreachable link teardown for external setup cf1600a hostapd: Configure driver ACL even if MAC address list is empty fa21e6c Fix CONFIG_MODULE_TESTS=y build without CONFIG_P2P=y bd10d93 P2P: Clean up by moving ifdef CONFIG_P2P to p2p_suppplicant.h e3bd6e9 P2P: Use another interface operating channel as listen channel 28812a8 P2P: Try using one of the social channels for GO 751b00b P2P: Modify p2p_get_pref_freq 0a816e8 P2P: Remove duplicated code from get_shared_radio_freqs_data() 504df28 Remove unused dump_freq_array() a0c90bb P2P: Collect and use extended data on used frequencies b278f32 P2P: Remove unused code from get_shared_radio_freqs_data() e627012 Clean up EAPOL-Key Key Data processing d56d7e5 Clean up EAPOL-Key processing 8605eab EAP-EKE: Fix typos in debug message 25be28a dbus: Check return value more consistently (CID 62841) ac79fcf wext: Verify set_ssid results consistently (CID 62842) f62415d Note chmod() failure in debug log even in ignore case (CID 62843) 305000e WPS: Check wps_build_wfa_ext() return value consistently (CID 68104) 2485835 EAP-MSCHAPv2: Check hash function results more consistently (CID 68105) b7c61c9 Fix validation of EAPOL-Key length with AES key wrap (CID 62859) Change-Id: I4da11c59a54467301c38c3bec52629b9db19647d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
09f57babfc1e4473db20ced4f58a4c9f082c8ed8 |
|
11-Jun-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d3b204694a39e6c57a4c6689b87f4192e1b93a06 d3b2046 P2P: Make the default p2p_find delay value configurable 3dacd3e atheros: Add support for new GCMP/CCMP/CMAC/GMAC cipher suites 737754d EAP-IKEv2: Remove obsolete ccns.pl project workarounds aa6bf6d eap_proxy: Check sm != NULL more consistently 4f4d51e TDLS: Add extra validation step for responder RSN IE length a01acc5 Check for EVENT_ASSOC data to be present for AP mode operation 1fde15a GAS server: Explicitly check that home realm is available aff0bee GAS server: Remove unused function parameter 86388af WPS: Check for theoretical gmtime() failure d75a5ae WPS ER: Fix UDN parser to handle missing field 0bbaa9b Validate driver extended capabilities length against buffer length 9c6c558 Interworking: Reject EAP configuration with unsupported inner method f2ca0e9 Check eap_get_name() return against NULL to silence static analyzer bc32bb7 Make a code path easier for static analyzers to understand fb958ea Check current_ssid on unexpected association event 2a57c33 Reserve QCA vendor specific nl80211 commands 20..33 84df167 nl80211: Add vendor attribute for interface index 9949483 The master branch is now used for v2.3 development Change-Id: Ib39c204aaa3ebcc909057f815e5e291e15e5df88 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
76cd2cc44b62e858f1897ce58f4ce7d0174e8839 |
|
27-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 147848ec4d26613d5a117d4b35dbc7ff98dd65d1 147848e nl80211: Do not add all virtual interfaces to drv->if_indices de88430 nl80211: Fix del_ifidx() with mixed parent interface cases 829a1b3 P2P: Clear p2p_auth_invite after each persistent group invitation e403ba8 Parse DMG capabilities when reporting to external interfaces f7454c9 P2P: Add 60 GHz in channel to frequency conversion fc3f1d1 Remove unused hostapd_ip_diff() 7bb7090 Add DRIVER_EVENT AVOID_FREQUENCIES for testing d73c7b9 GAS: Send error response if no room for pending dialog context 658d495 HS 2.0: Include OSU client sample in wpa_supplicant release package Change-Id: Ie2109f25bd8de2c926d4116eed37b458ae6a6950 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
6dc03bd757d3befd2c03a543a402338db03914d6 |
|
16-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b19c098e75d1dfa681960d9656d36001464a746e b19c098 Send authentication failure reason in wpas_auth_failed() 5cd0e22 P2P: Iterate through full pref_chan list in search of a valid channel f41d55d hostapd: Check for overlapping 20 MHz BSS before starting 20/40 MHz BSS 5516ed3 WPS: Deinit before wpas_p2p_disconnect() c70c375 SCARD: Fix GSM authentication on USIM c78c6b7 WPS: Fix return value when context is not valid 388444e P2P: Modify the timeout for GO Negotiation on no concurrent session 7e68be3 P2P: Refrain from performing extended listen during PD e9eb648 P2P: Reject P2P_FIND and P2P_LISTEN on disabled interface c71c241 P2P: Clear P2P state if active interface is disabled ad12f2f Add DRIVER_EVENT ctrl_iface command for testing purposes 3e66f78 P2P: Make sure GO start does not miss connect_without_scan c7caac5 nl80211: Fix send_frame freq for IBSS 28fa4eb P2P: Fix scan optimization for GO during persistent group invocation Change-Id: I5b4d46322641de1a2d87e50a7f5fdc97f2f30c38 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
684785c7f4e58498603a9a5ce26f933cc2557ebd |
|
12-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7b42862ac87f333b0efb0f0bae822dcdf606bc69 7b42862 P2P: Validate GO operating channel on channel list changes fb2ac53 Remove leftover timeouts on cleanup 1c330a2 Add 'dup_network <id_s> <id_d> <name>' command 316f92c dbus: Reorder deauthentication and cleanup calls when removing a network Change-Id: I7283a61ed5044c884a728fe0b75199dac8552599 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5a1480c7c46c4236d93bfd303dde32062bee04ac |
|
12-May-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4626235de4b6d19c7399a2522241f7c43e0caf6 f462623 EAP-pwd server: Allow fragment_size to be configured c876dcd EAP-IKEv2: Allow frag ack without integrity checksum 0f73c64 EAP-pwd: Fix processing of group setup failure 13e2574 EAP-pwd peer: Export Session-Id through getSessionId callback cfdb32e eapol_test: Check EAP-Key-Name 251c53e RADIUS: Define EAP-Key-Name 04cad50 EAP-SIM peer: Fix counter-too-small message building 270c9a4 Interworking: Allow FT to be used for connection 81ed499 Remove duplicated ibss_rsn_deinit() call 144f104 X.509: Fix v3 parsing with issuerUniqueID/subjectUniqueID present 0f1034e P2P: Refrain from performing extended listen during P2P connection 8d0dd4e Add macsec_qca driver wrapper dd10abc MACsec: wpa_supplicant integration 887d9d0 MACsec: Add PAE implementation 7baec80 MACsec: Add driver_ops 4e9528c MACsec: Add common IEEE 802.1X definitions 3bcfab8 MACsec: Add define for EAPOL type MKA 0836c04 MACsec: Allow EAPOL version 3 to be configured 49be483 Add function to fetch EAP Session-Id from EAPOL supplicant ea40a57 nl80211: Use max associated STAs information in AP mode Change-Id: I0e37a10ca58d0dc1be95a0088d6a4c37b2505ad4 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7832adbbd72a1b784b7fb74a71a5d4085b0cb0d3 |
|
29-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c0333c8dd59b9e254d3fc725c984b1c0cd3d496a c0333c8 Check rx_mgmt::frame more consistently against NULL d6c6b1f Make sta NULL-check easier for static analyzers 0bceb8d Make dl_list_first() and dl_list_last() uses easier for static analyzers 5f693cb WPS HTTP: Remove unused assignment ee4fefc Remove duplicated variable zeroing 4a9d0eb Make PMKID check easier for static analyzers 06df2aa Remove floating constant suffix 'd' from test coee 9670f87 ACS: Clean up ifdef CONFIG_ACS to avoid unreachable code ece88f7 Make last_scan_res update easier for static analyzers d06e9ac P2P: Verify operating channel validity for NFC connection handover 13a524a nl80211: Remove unnecessary wpa_driver_nl80211_set_freq() wrapper e87ef75 nl80211: Add support for changing AP mode channel bandwidth 3057518 Sync with mac80211-next.git nl80211.h 5f0bca7 Retry initial 20/40 MHz co-ex scan if the driver is busy 587d60d Add AP mode support for HT 20/40 co-ex Action frame 9c47f6a hostapd: Extend support for HT 20/40 coexistence feature 196c9c7 Make channel parameters available in set_ap() driver operation b7a6702 Indicate disconnection event on interface disabled b89962b Fix wpa_config_read() with existing config block 27b4187 WPS: Print setsockopt() failure in debug log 52cb207 trace: Replace demangle.h with internal defines 0e80ea2 nl80211: Fix some coding style issues a26582c Make qca-vendor.h independent of other header files 4a64d5a nl80211: Allocate QCA vendor subcmd for extended statistics Change-Id: Ibabee77b2b87f04f99d6b1ca0f1ac741cb9222c0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
21de214b4ba4271ca20843f3b8fba9f1501b2a89 |
|
08-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 4a16a0bd550401a50dedfcf701f6dcc7a3598133i 4a16a0b nl80211: Add QCA vendor subcmd for NAN f8b10c1 Fix CONFIG_AP=y build without CONFIG_P2P=y f05cee9 P2P: Clear p2p_in_invitation on cancel ec331d0 WNM: Fix deinit path to clean neighbor report count 679f2e7 WPS NFC: Remove NFC_RX_HANDOVER_SEL dc39004 WPS: Remove unused WEP related functionality 9437c2d EAP-pwd peer: Fix fragmentation of PWD-Confirm-Resp 48f668e EAP-pwd: Fix memory leak on error path with fragmentation 9ff4de6 Move DROP_SA command to be within ifdef CONFIG_TESTING_OPTIONS e1a273a Remove used KDE addition code from EAPOL-Key msg 4/4 9a147ba WNM: Fix regression in Sleep Mode exit key data parsing 76d3fb1 Remove unused wpa_sm_get_param() function ed42993 TDLS: Add test mode for MIC failure testing 5784b9a Fix memory leaks in hostapd configuration updates Change-Id: I7f1ec783ac791e06178f9c8b9be9119ac46aa745 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
df5a7e4c5c64890c2425bb47d665bbce4992b676 |
|
02-Apr-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 39a5800f7c2a9de743c673a78929ac46a099b1a4 39a5800 wpa_supplicant: Allow disabling LDPC 7230040 Interworking: Read IMSI if not read at supplicant start 62f736d Interworking: Init scard when a credential requires SIM access 729897a Interworking: Fix incorrect compile PCSC flag 21611ea edit: Increase buffer size to 4096 bytes 0b2c59e OSU server: Add example scripts for Hotspot 2.0 PKI 0f27c20 HS 2.0R2: Add example OSU SPP server implementation 1e03c6c XML: Remove forgotten, unused definition of debug_print_func 5cfc87b Make hs20_wan_metrics parser error print more helpful 4be20bf Fix validation of anqp_3gpp_cell_net configuration parameter 23587e3 Remove duplicated vht_capab parser entry 18a8e55 Notify STA of disconnection based on ACL change 8943cc9 RADIUS server: Add support for MAC ACL dc87541 Clean up debug print for PSK file search bbbacbf DFS: Print CAC info in ctrl_iface STATUS command ace0fbd P2P: Fix segfault when PBC overlap is detected cf15b15 Add writing of network block ocsp parameter 5c9da16 nl80211: Set all BSS interfaces down when tearing down AP in MBSS mode f1c4dbf wpa_supplicant: Remove pending sme-connect radio work 4f560cd wpa_supplicant: Override HT A-MPDU size if VHT A-MPDU was overridden 3ae8b7b hostapd: Add vendor command support 782e2f7 P2P: Do not initiate scan on P2P Device when enabled 74a1319 Fix issue with incorrect secondary_channel in HT40/HT80 96ecea5 Pass TDLS peer capability information in tdls_mgmt 78cd7e6 Sync with wireless-testing.git include/uapi/linux/nl80211.h b36935b nl80211: Fix EAPOL frames not being delivered 6997f8b nl80211: Set interface address even if using old interface 9b4d9c8 nl80211: Print if_indices list in debug log 762c41a eloop: Add assert() on negative fd when using select() code path 978c673 Add a note on using 'iw list' to determine multi-BSS support Change-Id: I89af7f8d92ed706c8909ed3cc9c49d6e1277a2b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
15907098d1f67c24bb000e593e279af173cf57d7 |
|
25-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit cf28c66bcb8883e6be921d6406a534e4a5b45b96 cf28c66 HS 2.0: Extend ANQP_GET to accept Hotspot 2.0 subtypes 163f801 nl80211: Indicate HS 2.0 OSEN AKM in connect/associate command c201f93 WPS: Enable WSC 2.0 support unconditionally 91364b7 P2P: Set a timeout for a persistent reinvoke on a P2P Client 41d5ce9 P2P: Optimize scan for GO during persistent group invocation 4d1e38b ACS: Fix number of error path issues Change-Id: I31a51d3dba055d1a906516bb08894effec327da9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d11f019d62a42a8fc4c4d1f2ec17cf35b0763153 |
|
24-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 31ded52e7084976c5f84caae6cb55e632dd8b013 31ded52 SME: Add more debug prints for OBSS scans and 20/40 MHz co-ex report 7f8eb34 SME: Fix OBSS scan result processing for 20/40 MHz co-ex report b7a8d67 Allow hostapd to advertise 40 MHz intolerant HT capability 692ec30 FT: Add support for postponing FT response 6ace13a P2P: Clean up channel selection code to use helper functions 70c3523 WPS: Comment out unused AP WEP config write with WPS 2.0 c3ba70f P2P: Update op_reg_class in random social channel case 70634ee hostapd: Check driver DFS offload capability for channel disablement 65d645c nl80211: Fetch DFS offload capability from driver a500f31 WPS: Comment out unused AP WEP config update with WPS 2.0 be4e5af Add SAE and FT-SAE key_mgmt to hostapd GET_CONFIG 1d4fe3b Remove unnecessary parameter validation 94b84bc P2P: Avoid unsafe pre-configured channel as channel preference d3c9c35 Add freq= parameter to 'set pno' command b998236 dbus: Implement P2P Peers info IEs buffer getter c6f356f dbus: Export the peer's device address as a property 442adfd dbus: Declare properly ServiceDiscoveryRequest method 8903741 dbus: Cancelling a service request always reply by an error 13494c4 dbus: Remove duplicate signal declaration 513dcec Don't overwrite channel on hostapd config reload 5eae87a P2P: Fix GO failed interface init c46235a wpa_supplicant: Fix radio_remove_interface 2ce7e4f Android: Enable CONFIG_EAP_AKA_PRIME option 95bf699 Add get_radio_name() driver wrapper for wpa_supplicant d06ecab D-Bus: Make p2p_no_group_iface configurable 8b6b6d8 Fix hostapd.conf description of HT40+ Change-Id: I5e776f71050a106195a39e96d0c38930a387a806 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b36ed7cd946148d829f311de8fe53ea3ffaaffe3 |
|
17-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit f4e3860f8a770a0db3816196c77baf894c7ccc1e f4e3860 Fix AP mode default TXOP Limit values for AC_VI and AC_VO 47bd94a TLS testing: Add new test cases for RSA-DHE primes f5bbb2f TLS client: Reject RSA-DHE prime if it shorter than 768 bits 817742f TLS testing: Fix test_flags check for ApplData report 1120e45 Allow config blobs to be set through ctrl_iface c3722e1 ACS: Fix VHT20 49b7443 Fix HT40 co-ex scan for some pri/sec channel switches 5bdac4a Remove unused STA entry information c9d9ee9 Fix hostapd_add_iface error path to deinit partially initialized BSS 6829da3 Fix external radio_work deinit path 8dd9f9c Allow management group cipher to be configured 67d39cf P2P: Do not create another group interface on NFC Token enable 6aa1cd4 wpa_supplicant: Apply VHT_OVERRIDES to wpas_start_assoc_cb() db63757 hostapd: Supply default parameters for OBSS scan 6e9375e TDLS: Add get_capability tdls command 67e1a40 hostapd: For VHT 20/40, allow center segment 0 to be zero d0bf06f GAS server: Remove incomplete remote ANQP processing fdb4535 WPS: Extend per-station PSK to support ER case as well 9a1a538 wpa_supplicant AP: Allow PMF to be enabled with ieee80211w ce6b9cd Allow reason code to be specified for DEAUTH/DISASSOC test frame dda8be7 TDLS: Use QoS info from WMM IE obtained in TDLS frames daa70bd Fix CONFIG_NO_SCAN_PROCESSING=y build 3a8ec73 P2P: Report dev_found event (if not yet done) from GO Neg Req RX 0f23a5e Mark AP disabled if initialization steps fail Change-Id: I7e499241552147c734fec9b77351b47ffd6e3a7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2ac5f6049e74103a8fe8e9c78b330020081d7df4 |
|
07-Mar-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit c16a7590cfe76d5895ac70ef711e5b0b384f7aa6 c16a759 wpa_supplicant: Add a configuration file for the P2P_DEVICE parameters 185677b Disable interface if ACS fails 8f05577 Configure beacon interval for IBSS command 95faa36 HS 2.0R2: Check for OSEN when determining whether to authorize STA 113318a Set the station to authorized on assoc event for open authentication Change-Id: Id8111b6475bf93a0600a431708cb16120d380e24 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f21452aea786ac056eb01f1cbba4f553bd502747 |
|
26-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5e32f8256f5fcce8b70a95e070375ac549ac935a 5e32f82 tests: Verify HS 2.0R2 deauthentication request b61e70c HS 2.0R2: Add WFA server-only EAP-TLS server method 8d2a992 HS 2.0R2: RADIUS server support to request Subscr Remediation ae6d15c HS 2.0R2 AP: Add OSU Providers list ANQP element f7bd7a0 HS 2.0R2 AP: Add Icon Request and Icon binary File ANQP elements 97596f8 HS 2.0R2 AP: Add support for Session Info URL RADIUS AVP 8e1146d HS 2.0R2 AP: Add support for deauthentication request a14896e HS 2.0R2 AP: Add OSEN implementation 6ca0853 HS 2.0R2 AP: Use Subscr Remediation request from RADIUS server 7bc9c25 HS 2.0R2 AP: Add STA's Hotspot 2.0 Release Number into Access-Request 76579ec HS 2.0R2 AP: Add AP Hotspot 2.0 Release Number as WFA RADIUS VSA 0dd100f HS 2.0R2 AP: Add definition and helper function for WFA RADIUS VSA 3fb17a9 HS 2.0R2 AP: Add WNM-Notification Request for Subscription Remediation d5d2478 HS 2.0R2 AP: Update HS 2.0 Indication element to Release 2 a6739e1 HS 2.0R2: Try to scan multiple times for OSU providers cf6d08a Interworking: Add OCSP parameter to the cred block 6402f2f Interworking: Add more debug info on roaming partner preferences 7479489 Interworking: Add sp_priority cred parameter 751ac99 Interworking: Use a helper function to compare cred priority aff419f Interworking: Remove separate credential priority tracking 533536d HS 2.0R2: Disable full ESS for as a workaround for per-BSS issues 8a77f1b HS 2.0R2: Slow down connection attempts on EAP failures 76a55a8 HS 2.0R2: Add more debug to network selection 8b4b9fb HS 2.0R2: Fix bandwidth policy BSS selection 28f2a7c HS 2.0R2: Allow excluded network to be selected based on user override 33fb8c5 HS 2.0R2: Add support for Policy/RequiredProtoPortTuple a45b2dc HS 2.0R2: Add support for Policy/MaximumBSSLoadValue 4cad9df HS 2.0R2: Add support for Policy/MinBackhaulThreshold aa26ba6 HS 2.0R2: Add tracking of provisioning SP 8e5fdfa HS 2.0R2: Add WFA server-only EAP-TLS peer method df0f01d HS 2.0R2: Add OSEN client implementation a5d7563 HS 2.0R2: Add common OSEN definitions 230e373 HS 2.0R2: Add GAS operation duration statistics into debug b572df8 HS 2.0R2: Add routine for fetching OSU provider information 1d2215f HS 2.0R2: Add OSU Providers list ANQP element 184e110 HS 2.0R2: Add Icon Request and Icon binary File ANQP elements 7ef6947 HS 2.0R2: Add STA support for Deauthentication Request notification 95a3ea9 HS 2.0R2: Add WNM-Notification Request for Subscription Remediation f9cd147 HS 2.0R2: Update Indication element to Release 2 bc00053 Interworking: Allow roaming partner configuration ae6f927 nl80211: Add driver capability for GTK_NOT_USED 2c49d04 Do not clear global pmf setting on FLUSH eef7235 Only try fast reconnect if network is not disabled 3d910ef Interworking: Prefer last added network during network selection 2a33687 P2P: Remove unnecessary ifdef CONFIG_NO_CONFIG_WRITE 050d8b5 Fix documentation for wpa_supplicant_global_ctrl_iface_process() 8c9cb81 DFS: Fix coding style (missing whitespace) 4f1e01b DFS: Add VHT160 available channels b8058a6 hostapd: DFS allow mixed channels 4db216f wpa_supplicant: Add support for IPv6 with UDP ctrl_iface e2364d1 hostapd: Deauthenticate clients forbidden by maclist changes 1748f1d hostapd: Make it possible to remove addresses from maclists 064eb05 Add os_remove_in_array() c1151e4 Force OFDM/HT/VHT to be disabled on channel 14 bfb79dd nl80211: Show regulatory rule flags in debug output 3d7ad2f hostapd: Configure spectrum management capability e0392f8 hostapd: Add Power Constraint element 891330f Fix spelling s/algorith/algorithm/ f0e30c8 Do not start another connect work while one is pending 3290398 WPS: Fix UNSUBSCRIBE error returns if NT or CALLBACK header is used f34df28 WPS: Fix UNSUBSCRIBE to return 412 if no SID match found 80f256a WPS: Remove unnecessary filename NULL check Change-Id: I7dc25a8bb0074f4970ade8d42dfa60da166baf96 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7f93d6fa14a343127754c33a03cf2f641b6ff6e4 |
|
21-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit aef5047acc971c97622c85236f0cd84d169221e6 aef5047 P2P: Fix missing eloop_cancel_timeout in invitation trigger 3cdcb34 tests: Add module tests for WPS attribute parsing da179bd WPS: Fix parsing of 0-length WFA vendor extension subelement 211d7ab P2P: Add even more debug prints for Probe Request in non-Listen state Change-Id: Ifbdb1c8aa74906aaf60cb5be025dd7f02bb07c6e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
bd14a57187b024f49f5b9ace55ef457d8d04650a |
|
18-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b3253ebb73d6d52ac636c5cc6d958955a5a98fca b3253eb wpa_supplicant: Complete radio works on disable event 38ecb06 Convert RADIUS debug dumps to use wpa_printf() a0ac572 EAP-SIM DB: Remove client socket file on connect() error a1dd890 RADIUS: Add minimal accounting server support 22dd2d7 Fix MSCHAP UTF-8 to UCS-2 conversion for three-byte encoding 9aab811 Fix nt_password_hash build a9b08ad Remove unused crypto_bignum_rshift() 2dff9e8 Remove unused NFC_RX_HANDOVER_REQ be24917 nl80211: Use nl80211_set_iface_id() to get hw features data 8a45811 hostapd: Add Operating Mode Notification support d9dd86b Enable IEEE 802.11w in defconfig Change-Id: I6bf13cd0b7e3cb3c3550b87a77a035340e9d0a6b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
96be6222df414a7dde5c5b1b72df22e67b1a77fc |
|
13-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 7ae7a84eefd43ed9385e2f8f520a918468f87178 7ae7a84 NFC: Workaround nfcpy message debug exception 6ceb95c Avoid NULL dereference in ieee802_1x_get_mib_sta() printf 97efe70 wpa_supplicant: Fix NULL dereference in tls_verify_cb() c0c11af wpa_supplicant: Fix NULL dereference in eap_fast_parse_end() 93a1cae Remove unnecessary NULL check 1e2ffc6 Fix theoretical NULL dereference in debug printf cbf21c7 P2P: Avoid compiler warning in p2p_supplicant.c 5479ff9 DFS: Avoid compiler warnings in src/ap/dfs.c 5e6aa04 wpa_supplicant: Fix memory leak in wfd_subelems error path 88853ae Fix CONFIG_WPS_NFC=y build without CONFIG_P2P=y 7ac7fd4 Add bssid/freq hint for driver-based BSS selection 92484e2 Start using unodified Developer Certificate of Origin v1.1 56ec49c Sync with wireless-testing.git include/uapi/linux/nl80211.h b64afe2 Fix SAE state validation on AP d6bfaaa NFC: Add summary and success file options for nfcpy scripts 25cfc6f P2P NFC: Add p2p-nfc.py --handover-only option 7bea076 P2P NFC: Clean up p2p-nfc.py error handling b0d18bc WPS: Make UUID-from-MAC Address easily available 825fb6b P2P: Do not indicate P2P_FIND failure if p2p_scan is in progress 8c18fcc WPS: Add more debug information to M7 AP Settings d7a15d5 WPS: Indicate current AP settings in M7 in unconfigurated state d55fc03 P2P: Handle unexpected GO Neg Req reject message more cleanly 062a7c0 Fix persistent P2P connection failure in case channel list changes Change-Id: I5c400a6503f9f00d259ff225999593958322a1ba Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9767226d8e6a1adaa33beb9f517ef40dddfa460c |
|
03-Feb-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 1b56d398a7646c66fd3df8f0a5159c920f99de36 1b56d39 wpa_supplicant: Fix misplaced os_free 8597ebd Fix hostapd segfault on beacon hint event c69ed4d bsd: Fix hostapd compiler warning d950477 Fix authentication algorithm negotiation in SME code 1412bee nl80211: Show DFS region info in debug messages fd92413 hostapd: Increase timeout for channel list update to 5 seconds ff5e1d1 nl80211: Treat RSSI as part of each sched scan matchset 04c366c Fix memory leaks and wrong memory access fd67275 wpa_supplicant: Fix wrong size memory allocation 4b0f228 nl80211: Fix channel switching with VHT80 e28f39b nl80211: Verify that ifindex attribute is included in survey 4701f37 wpa_cli: Add tdls_external_control to tab completion for SET Change-Id: Iad3348c5c012c018cc1bfb759a36dbdb237b6468 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
cf32e60fa7e0d33fe1551a6dba8dcbbec47ea50e |
|
28-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2e988392436227c51002b573ee27a8cee37f70e9 2e98839 P2P: Disable DNS server from dnsmasq c07f261 P2P NFC: Add script for connection handover with nfcpy 12288d8 WPS NFC: Protect nfcpy pretty print calls against exceptions c209dd1 WPS NFC: nfcpy script to use new connection handover design 6202500 WPS NFC: Logging level configuration to wps-nfc.py and wps-ap-nfc.py 1f1b5b3 WPS NFC: Clean up nfcpy script no-wait operations 79ede5a WPS NFC: Validate ctrl_iface response before decoding it ab1db08 WPS NFC: Use argparse in the nfcpy scripts 6f8fa6e WPS NFC: Update wps-nfc.py and wps-ap-nfc.py to use new nfcpy API b56f6c8 P2P NFC: Add support for freq option in NFC ctrl_iface commands 91a6501 WPS NFC: Use BSSID and AP Channel from handover select 91226e0 WPS: Add testing option to corrupt public key hash 7312776 WPS NFC: add more debug prints for connection handover report 5cd4f66 WPS NFC: Use AP Channel information from credential container d2f1837 WPS NFC: Add BSSID and AP channel info to Configuration Token 75dbf98 WPS-STRICT: Update valid Device Password ID and Config Error range 5cd4740 P2P NFC: WPA state machine config with driver-based BSS selection 8e9f53c P2P NFC: Static handover with NFC Tag on client dd87677 P2P NFC: Enable own NFC Tag on GO Registrar abe44e3 P2P NFC: Add GO info into handover message when in client role 23318be P2P NFC: Optimize join-a-group operation based on NFC information 86e3208 P2P NFC: Copy DH parameters to a separate group interface d4b4d7f WPS NFC: Update DH keys for ER operations ac08752 WPS NFC: Use pubkey mismatch config error from Enrollee 59b45d1 P2P NFC: Add processing of P2P client while NFC handover case 74df9ec P2P NFC: Do not try to join peer if both devices are already GO 201b0f5 P2P: Add test option to disable IP address assignment request 25ef852 P2P: Add support for IP address assignment in 4-way handshake fdd48ff P2P NFC: Optimize GO Negotiation retries c4f87a7 P2P NFC: Add NFC tag enabling for static handover dd37a93 P2P NFC: Report handover select from tag for static handover db6ae69 P2P NFC: Report connection handover as trigger for P2P 9358878 P2P NFC: Build connection handover messages c00ab85 P2P NFC: Define WPS_NFC config method 0deab08 P2P NFC: Allow separate WPS/P2P IES to be parsed fca9958 P2P NFC: Pass OOB Dev Password through P2P parser ab9e344 P2P NFC: Pass OOB Device Password ID to P2P 5154689 P2P NFC: Add WPS attribute building for P2P NFC 01afd8d P2P NFC: Add NDEF helpers for P2P connection handover messages 9e323a2 P2P NFC: Add OOB GO Negotiation Channel attribute 14d8645 WPS NFC: Allow BSSID and channel to be included in handover select 50d1f89 NFC: Update WPS ER to use the new connection handover design d950793 WPS NFC: Add support for wpa_supplicant AP/GO mode to use handover fa4c298 WPS NFC: Process new style handover select 068cdb1 WPS NFC: New style connection handover select from AP/Registrar 3189ca0 WPS NFC: Add AP mode connection handover report 41f9ffb WPS NFC: Build new style carrier record for connection handover request 3f1639d WPS NFC: Split DH key generation to a separate function 9754917 WPS NFC: Update NFC connection handover design 34b6795 WPS NFC: Use abbreviated handshake if both PK hashes delivered OOB 57630e6 WPS: Preparations for allowing SSID filtering for provisioning step 5f45455 WPS NFC: Validate peer public key hash on Enrollee ff40cd6 WPS NFC: Send M2D with config error 20 on pkhash mismatch e435417 WPS: Remove Version attribute from NFC messages 72403ec WPS: Add builder functions for AP Channel and RF Bands attributes ea43ad9 P2P: Make group operating channel available 9f7cd9a P2P: Split add-group-info into a helper function 253f2e3 P2P: Apply unsafe frequency rules to available channels 1682c62 Add a header file defining QCA OUI and vendor extensions Change-Id: Ia7604d018e1ffb25e06bdc01ce258fc4a0569245 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
1846323989242844f0e857458a8939fa5836429c |
|
24-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8615bdfac90174c3730ae5e6607b85f8bbec847e 8615bdf Increase global ctrl_iface buffer to same size as per-interface c5a64e2 GAS client: Use Protected Dual of Public Action frames with PMF 5ce00d0 GAS server: Add support for Protected Dual of Public Action frames e24fe94 Add definitions for Protected Dual of Public Action frames 7b2c42f hostapd: Fix PMF robust Action frame processing rules ea6e040 Clear more configuration parameters to default on FLUSH cf70d29 wpa_supplicant: Schedule PNO on completion of ongoing sched_scan 080cc44 nl80211: Fix sizeof check in vendor command/event handling a487b35 hostapd: Fix segmentation fault when calling hostapd_cli all_sta a6cff8b wpa_supplicant: Fix seg fault in wpas_ctrl_radio_work_flush() in error case f62a3c2 P2P: Clone dtim_period to a new interface 88a0bca Update copyright years in the manpages 32185f5 Sync manpages and command-line options b948e78 Add manpage for eapol_test 36bd29e wpa_supplicant: Fix usage text based on build options dcdd383 P2P: Reduce peer expiration age to 60 sec and allow customization dd27185 Skip normal scan when PNO is already in progress a2d6365 P2P: Extend the listen time based on the active concurrent session Change-Id: Iad81dc478319e59d8cfb673e2988d8bd3099b313 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9e3f8ee32a0c11c56b11985805b5492d04886a99 |
|
17-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 3eaaca1a0b372f31ddc43d152c3681dce48889bb 3eaaca1 P2P: Allow GO Negotiation Request to update peer entry after PD 443427e P2P: Add missing direct global ctrl_iface commands for P2P 37b4198 P2P: Use GO's operating channel to optimize scan during join a691d99 P2P: Don't expire the peer, if GO Negotiation is in progress a0e9d89 Use minimal scan delay upon EVENT_INTERFACE_ADDED 5ddd07c Reset normal_scans counter upon entering INTERFACE_DISABLED state Change-Id: I07ea029ba6d473af39c74c10b7058de0056695da Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
64b860b7715d176ec6716b31da53de6e82ca6462 |
|
15-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: Revert 100 ms wait before starting persistent group Change-Id: I5b1a4cd862662cc161347542b5186c71fb1dfc79 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
344abd362cfe2d03ed956666527352826b67bde5 |
|
14-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit efc64886b8a285440e9954b5395a5370d8c5f84f efc6488 nl80211: Pass station supported channel and oper class info 3ed9727 TDLS: Pass peer's Supported channel and oper class info during sta_add eed65aa hostapd: DFS setup seg0 correctly for HT40- 25592b2 hostapd: DFS/CSA check if CSA in progress b19ef32 Android: Remove hostapd dump_file functionality c48414a P2P: Limit join-a-group scans based on SSID from invitation 78f0c93 Flush secondary device types on FLUSH command 2b38410 P2P: Allow requested device type to be specified with p2p_find d9bb282 Clear configuration blobs on FLUSH command c60ba9f Skip network disabling on expected EAP failure 7185e16 EAP-FAST peer: Make debug clearer on missing pac_file configuration 7b88b64 EXT PW: Fix hash return in password fetching 08081ad hostapd: Skip full AP configuration validation on SET command 1785d2e P2P: Wait on GO Negotiation Confirm transmit 472fa21 P2P: Cancel action frame offchan wait after recv GO Neg Conf bfdc2a3 bsd: Fix NULL pointer dereference on error path 38bbd06 bsd: Prepare event buffer on init process 3043b4f nl80211: Document how to configure for libnl 2.0 and 3.2 Change-Id: Ia592bc948eaa43dbfaf0b4a20231efca61acb11f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
fb79edc9df1f20461e90e478363d207348213d35 |
|
10-Jan-2014 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46 95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
04f534e89ed127da4077485376f24debc50d80d5 |
|
10-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 075131e32e6967977da4bbfa8a7f63dbfbf86008i 075131e Android: Do not compile wpa_supplicant if not chosen f7154ce DFS: Use channel switch when radar is detected 6c6c58d hostapd: Make hostapd_set_freq_params() public b72f949 DFS: Allow skipping radar channels 8d1fdde nl80211/hostapd: Extend channel switch notify handling 10e694a AP: Use monotonic clock for SA query timeout af53896 Use monotonic clock for RADIUS cache timeouts fe52c21 Use monotonic clock for last_sae_token_key_update 100298e AP: Use monotonic time for AP list e5c9e40 OS utils: Add os_reltime_expired() b3493fa AP: Use monotonic time for STA connected time ed0ebee OS utils: Provide os_reltime_age() 8567866 P2P: Handle frequency conflict in single channel concurrency case b125c48 P2P: Add wfd_dev_info= field for device found event e706d2d bsd: Fix compilation error for NetBSD f757950 eap_proxy: Extend Android.mk to support additional libraries Change-Id: I6d4f0f559f420680903d12966c7a6a87da97d61a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a6163554e8e14a7f561b94f5743ae9df2424c969 |
|
05-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Android: Handle Freq conflict in single channel concurrency case" Change-Id: Id1ccb6111a5688d464d359dabae7566d70d672a6 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
01904cfafd75a70b9f29c0220b90bdef45595491 |
|
05-Dec-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 0ad3b9c402ee92863b720bc01f882ebcb1bd42c8 0ad3b9c Use wpa_radio data for get_shared_radio_freqs() 1b544ff Use wpa_radio data for wpas_wpa_is_in_progress() 5b81927 Use wpa_radio data for wpas_p2p_search_delay() c67e7e2 Use wpa_radio data for channel list updates f88f19b Use wpa_radio data for scan result updates 202dec2 Add shared per-radio structure for wpa_supplicant 73c00fd Move wpa_supplicant driver initialization into a helper function 7feff06 Add CONFIG_CODE_COVERAGE=y option for gcov d9c753b EAP server: Handle EAP method initialization failures more cleanly 59d3438 EAP server: Initialize TLS context based on private_key 6b417a1 Reject TLS-based EAP server method if TLS context not initialized 158b090 nl80211: Fix regression in P2P group interface removal 6f72577 P2P: Handle INTERFACE_DISABLED event on a P2P GO interface 336167c AP: Fix inactivity STA timer trigger for driver offload case 1245503 Restore scan_req if sta scan is rescheduled in the scan results event bdec7ee D-Bus: Add support to set pkcs11_{engine,module}_path 80ed037 Clear beacon_data before usage Change-Id: I1a87557ad09419b88b993ba13f58359121e3543b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
370782ac05d9812b896b30dcd1f51b94cd3bd1fe |
|
26-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Revert "Android: Restore p2p_group_formation pointer" Change-Id: Ic55ba014bc040a4f910effc2fea78b4dfa0e6e37 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
fa3fc4a1ac08ad14272301c7f6f01b362997c3e4 |
|
21-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 594516b4c28a94ca686b17f1e463dfd6712b75a7 594516b Use monotonic clock for relative time for eloop if available 461e3eb Fix and work around some MinGW compilation issues 81cbc04 Fix compiler warning for OpenSSL without HAVE_OCSP 68d628a hostapd: Fix interface enabling/disabling and DFS 1cba9be STA: Cancel sched_scan while initiating wps_reassoc 215a02f Add Wi-Fi Direct to the build configuration example ca9c14f dbus_new: Add documentation for D-Bus TDLS methods 6fc4848 P2P: Short scan wait to speed up the group re-invocation 93a06fe Fix QoS Map Configure frame use Change-Id: Id76002ca7fa742b6533e7e592ffd3867886dc50e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a0d265f81180f341d22511538fa18166e1bbce9f |
|
19-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 00043740251716e83ca8a01b5b8a2bed1ed02db9 0004374 P2P: Prefer U-NII-3 over U-NII-1 during channel selection 1b665cb P2P: Fix channel preference use for MCC p2p_connect 5624ccf P2P: Optimize default case for own freq preference setting d0f61a4 P2P: Fix p2p_ignore_shared_freq=1 when inviting a peer 21e491f P2P: Fix p2p_ignore_shared_freq=1 during invitation processing Change-Id: I79cdeb935ff2eb14ba99b5fc3d364b9399e3f89f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
e0e48dc666fb14a7bb60264ca87463ba7bc1fe0b |
|
18-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 107a89448c8a127e9131bc9288b9093720b87781 107a894 P2P: Clean up wpas_p2p_setup_freqs() debug message 7d669cf P2P: Clean up wpas_p2p_init_go_params() 384bdd0 P2P: Prefer VHT channels for initial pick a30d50b P2P: Prefer HT40 channels for initial pick f240710 P2P: Prefer 5 GHz channels for initial pick b2d4aaa P2P: Select VHT channel at random instead of using the first entry ee8f6ea P2P: Select HT40 channel at random instead of using the first entry 5576663 P2P: Move random channel selection into a helper function b17d89b P2P: Fix channel selection for MCC case f86d282 Handle legacy scan interruption of sched_scan/PNO 334bf36 Add chan_switch to ctrl interface of wpa_supplicant and hostapd bf281c1 Add AP channel switch mechanism e44a384 Move AP parameter filling into a helper function 1c4ffa8 nl80211: Add channel switch implementation dcca221 wpa_supplicant: Update channel switch driver interface e1925bd eloop: Remove eloop_none.c 3505743 Sync with wireless-testing.git include/uapi/linux/nl80211.h f6c2b8c Android: Add state message sent after 'status' command 6b49907 Android: Add SSID in supplicant change event 22cf7d7 SCARD: Clean up SIM/USIM selection cea97a0 dbus_new: Add DBus TDLS methods cc4952a Request new scan only for the original interface fa58da2 Remove old mechanism of skipping scan request rescheduling e2f5a98 Deplete scan request if new time is less than remaining dcd25d4 P2P: Use negotiated channel from invitation for persistent GO 800d587 TDLS: Provide external control to specify the peers for setup 795baf7 hostapd: Filter channel list updated events after country code change 146fa9b nl80211: Do not force interface down on deinit 49b4b20 nl80211: Do not for station mode on hostapd deinit 04eff7d nl80211: Remove build time condition on HOSTAPD define 0d547d5 nl80211: Share more code between hostapd and wpa_supplicant 7b7de4c nl80211: Remove read-only last_freq/last_freq_ht Change-Id: Idba1eb8d63480fbc30eee11d0d8e189ccc49ddd3 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
ff07917b8921a2a178ed9188a63b166af144ae53 |
|
08-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: Minor sync with mainstream code Change-Id: Ia7b165534577394e0117318e6655d14a3a1d9d2d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b96dad47218788efffa3db0fe7f1b54a7d19e366 |
|
05-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 2b6623ab134fff6d96114f5fe329a2f87d5e893a 2b6623a hostapd: Do not terminate process on dynamic interface add failure 217cf49 P2P: Add more debug prints for frequency selection 4dd3f86 P2P: Fix bug in GO frequency selection 9804873 wpa_supplicant: Fix bug in get_shared_radio_freqs 3342c26 wpa_supplicant: Fix updating GO beacons on WFD subelements change 72c12c1 EAPOL: Fix static analyzer warnings for pac_opaque_encr_key 3139270 bgscan: Add global bgscan configuration efc58df eap_proxy: Re-read IMSI from proxy in Interworking functionality Change-Id: I006abd3b52fbbd1a7b97059364c72ab0386d5f63 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
cce06667447b5aec83452adb0c15100ada531095 |
|
05-Nov-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit d4f1a347ceca31fd9cf14070fd000235d5f4e9c1 d4f1a34 Allow AP mode configuration with VHT enabled on 2.4 GHz bb337dd DFS: Do not use cf1 to override freq for 20 MHz channels 0dfd2c6 Document AP mode startup functions fee947b hostapd: Use correct wpa_printf verbosity level for message 2fe210c hostapd: Fix multi-BSS configuration file parsing regression e4ba031 hostapd: Use start_ctrl_iface() from hostapd_add_iface() bf7f09b Fix AP mode QoS Map configuration to be per-BSS dc036d9 DFS: Convert hostapd_data use to hostapd_iface 2db938e hostapd: Fill in phyname automatically 5ae6449 hostapd: Add ctrl_iface STATUS command afadaff Optimize 40 MHz HT co-ex scan on AP 7d6d737 hostapd: Add AP-ENABLED/DISABLED ctrl_iface events e1c5faf hostapd: Track interface state f0793bf hostapd: Wait for channel list update after country code change ae134e1 hostapd: Add ctrl_iface events for ACS ad08e14 hostapd: Move ctrl_iface initialization to happen earlier c20cb02 hostapd: Remove hostapd_interface_init2() 4a5deb9 hostapd: Simplify interface initialization 186c905 DFS: Add control interface events for various DFS events ddf5517 hostapd: Add control interface test commands for radar detection 884f1a3 nl80211: Verify radar event attributes exist before using them 71cdf6b hostapd: Fix ENABLE failure to not remove interface 18ca733 SAE: Fix group selection 65015b2 Replace unnecessary UTF-8 characters with ASCII versions 61323e7 Convert perror/printf calls to wpa_printf 3f134b4 hostapd: Accept RELOG from global control interface b253e6f hostapd: Use wpa_printf() for hostapd_logger() to stdout c092d83 P2P: Clear pending group formation data on group removal 9100b66 P2P: Debug print reason for specific SSID for scan 2aec4f3 Allow add-BSS operation to re-use existing netdev 5592065 hostapd: Allow a single BSS to be removed from an interface 2e2fff3 hostapd: Allow a single BSS to be added to an interface a1fb569 hostapd: Make hostapd_interface_init_bss() available externally 66936c6 hostapd: Make hostapd_init() available externally 390e489 hostapd: Allow the first BSS in a multi-BSS setup to be removed 834ee56 nl80211: Make wpa_driver_nl80211_data::first_bss pointer 748c0ac nl80211: Fix monitor interface reference counting 08e55eb nl80211: Add a debug print for DEL_BEACON 33b0b33 hostapd: Fix error path in hostapd_add_iface() 770ecdf ACS: Do not get stuck while failing to do a subsequent scan 813d4ba DFS: Add support for multi-BSS 954e71d DFS: Reset cac_started properly 6a398dd DFS: Sanitize channel availability checks 32595da DFS: Fix HT40/VHT calculation 0648c3b hostapd: Add -T Linux tracing option 392e68e Set GTK rekey offload information after initial group key handshake bbc706a nl80211: Add debug prints for NL80211_CMD_SET_STATION 731ca63 Update regulatory change to all virtual interface for the phy 6f2db2f hostapd: Validate configuration parameters on RELOAD command eff0fd1 hostapd: Move generic configuration functions into src/ap 5afaa06 hostapd: Allow per-BSS (vif) configuration files ebd79f0 hostapd: Make hostapd_config::bss array of pointers a781e21 hostapd: Force PSK to be derived again on BSS reload 9f104b0 hostapd: Reuse hostapd_clear_old() for RELOAD command Change-Id: I7fbb26cbd4a2960af66a4373c0e6bbe5390a4940 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
68d0e3ed07847339aedfac8e02f50db68c702e52 |
|
29-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 32b62704fac6af74f60b2effb173474e11ff089d 32b6270 Android: Fix ARRAY_SIZE() compilation 7617388 Interworking: Report STATUS:sp_type even if domain is not configured c20bc9d P2P: Remove compiler warning without CONFIG_IEEE80211N ca9bc5b P2P: Add VHT support 20ea1ca P2P: Add VHT parameter to P2P operations 53cfad4 nl80211: Mark VHT 80 MHz channels f2112b2 wpa_supplicant: Add CONFIG_IEEE80211AC 6b02335 hostapd: Mask out not-supported VHT capabilities 7f0303d hostapd: Verify VHT 160/80+80 MHz driver support c781eb8 hostapd: Verify VHT capabilities are supported by driver b29b012 Fix some VHT Capabilities definitions 7066a8e hostapd: Fix wrong VHT configuration capabilities flags 6651f1f nl80211: Use max tx power from regulatory domain 7ac3616 nl80211: Replace perror() and printf() calls with wpa_printf() 4d9fb08 WPS: Clear known_wps_freq in addition to after_wps d20c340 Interworking: Clear known_wps_freq for network selection f3be6ee tests: Allow test case descriptions to be written into database 1bd05d0 Interworking: Force normal scan for network selection 51e9f22 P2P: Add option to allow additional client channels 556b30d P2P: Add option to remove channels from GO use e7ecab4 Use ARRAY_SIZE() macro 39044a7 Introduce ARRAY_SIZE() macro 2e94624 DFS: Handle radar event when CAC actived correctly 5eaf240 DFS: Fix overlapped() function to check only DFS channels 345276a DFS: Adjust center freq correctly for VHT20/VHT40 1dc17db DFS: Fix available channels list for VHT80 34068ac nl80211: Add debug prints on nl_recvmsgs() failure 10b8592 nl80211: Make eloop sockets non-blocking 5f65e9f nl80211: Abstract handling of sockets on eloop e8d1168 nl80211: Register for IBSS auth frames before eloop 03610ad Clean up get_seqnum() use for IPN 29179b8 Stop ctrl_iface monitor send loop on reinit failure a2a535f Remove unnecessary wpa_s->conf checks 3318376 Add explicit buffer length checks for p2p_build_wps_ie() 0f01201 Verify that readlink() did not truncate result f5eb9da nl80211: Clean up if_add() for hostapd use a288da6 OpenSSL: Fix memory leak on error path 6cb4f11 nl80211: Fix strerror() value in P2P Dev debug messages 35f8363 DFS: Add forgotten break statement 2f243b8 Remove os_strncpy() 24f051e Replace remainining strncpy() uses with strlcpy() 41c526f P2P: Fix snprintf buffer length for group ifname backup Change-Id: I2e1506cb9219a5a37efbb2ae0dc180fb081c809f Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
4ce9c87407c036fc83eb5a6044ddf976c86f53fc |
|
24-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit fa56315cfc9ebaff2b210ed99d43dda9b16bdf56 fa56315 eap_proxy: Add context data pointer to the get_imsi call 07041c6 eap_proxy: Confirm eap_proxy initialization before reading SIM info 47d986e P2P: Check Action frame payload match before accepted TX status d259249 Fix ENABLE_NETWORK not to reconnect in disconnected state 677cf19 hostapd: Select any supported channel if ACS fails 20f9cb1 hostapd: Allow ACS to deal with partial survey data 3645fd5 hostapd: Propagate ACS errors to iface setup 0e1d0b3 hostapd: Don't get stuck after failed ACS af8a827 Make frequency range list routines more general 941dae0 P2P: Add more user friendly debug print of channel lists Change-Id: I942dbbc0cb92f4e09626ec6ea17f6ea583c17f1a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
051af73b8f8014eff33330aead0f36944b3403e6 |
|
22-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 538922a628d4f5403b9a96b171a59235bcb3d921 538922a dbus: Add boolean AllowRoam option to Scan() method options dictionary c6f5dec Don't start second scan when changing scan interval cd3b070 nl80211: Fix DFS radar event parsing 2b72df6 nl80211: Free BSS structure even if netdev does not exists 41cc50d nl80211: Update send_action_cookie on AP-offchannel-TX path 313424d GAS: Add support for multiple pending queries for the same destination cbc5484 GAS: Do not start new scan operation during an ongoing GAS query c377514 GAS: Delay GAS query Tx while scanning/connecting 24c694b GAS: Delay GAS query Tx while another query is in progress 7255983 WPS: Clear after_wps from number of new locations 73b54d6 P2P: Fix Operating Channel in Invitation Request for operating group dc46fd6 P2P: Cancel offchannel TX wait on Invitation Response RX 0c92963 D-Bus: Clean up debug print for P2P invitation result 8d82c21 P2P: Fix PD retry channel on join-a-group case d285888 P2P: Add GO BSS entry details to debug log on join-a-group 512629a P2P: Accept Invitation Response non-success without Channel List e241b1b eap_proxy: Fix IMSI fetch for home vs. visited network determination db13605 EAP-AKA/AKA' peer: Allow external USIM processing to be used 569ccf7 EAP-SIM peer: Allow external SIM processing to be used 84dc137 hlr_auc_gw: Add GSM-AUTH-REQ command a5d44ac EAP peer: Add framework for external SIM/USIM processing 7e8bc7d eapol_test: Initialize BSS lists bceb843 Send CTRL-RSP command response before processing EAPOL update b607796 eapol_test: Fix external EAP request mechanism 94de082 eapol_test: Initialize wpa_s->global to fix ctrl_iface f07bba3 Android: Add dfs.c into build 0cf0af2 WNM: Set Disassoc Imminent flag in ESS Disassoc Imminent frame f47c145 Interworking: Add required_roaming_consortium parameter for credentials a83e574 GAS: Update timeout from TX status handler e88060e HTTP server: Allow TCP socket to be reused 9bc3386 Add test option for specifying hardcoded BSS Load element 9c7e43a Define BSS Load element id 56f5af4 Interworking: Add support for QoS Mapping functionality for the STA 850e1c2 atheros: Add support for QoS Mapping configuration c551700 Interworking: Add support for QoS Mapping functionality for the AP ac1bc54 Interworking: Add domain_suffix_match for credentials 463c8ff Interworking: Add support for multiple home FQDNs 01f809c Add AAA server domain name suffix matching constraint be7963b OpenSSL: Fix code indentation in OCSP processing 899cc14 hostapd: Add support for DFS with 160 MHz channel width 6de0e0c Mark DFS functions static and rename them 58b73e3 hostapd: DFS with 40/80 MHz channel width support 846de15 DFS: Add more parameters to radar events 04e8003 nl80211: Use struct hostapd_freq_params with start_dfs_cac 72c753d hostapd: Split hostapd_set_freq to helper function e76da50 hostapd: Add AP DFS support Change-Id: Ie9ed4662ba6d81e6d8b14bccb29ffa192becf0f2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9657139ca0bbea9a84e0a3c7e9438d1f53c9ed24 |
|
14-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 5079392954c80573234952772dc39dbb5d3179ca 5079392 Increase buffer size and prevent write beyond buffer end ded22b5 hostapd: Fix segfault after ACS when flushing STAs 7e910b7 WPS NFC: Cancel scheduled scan before attempting a scan 24d110d Replace printf with wpa_printf debug message b72e14e P2P: Do not allow P2P client connection without P2P IE from GO 5df7414 P2P: Allow persistent group determination based on Beacon frame aaeb9c9 P2P: Allow GO to be discovered based on Beacon frame b16696f P2P: Show p2p flag in debug info for scan results bb50ae4 P2P: Show P2P flag in BSS entries also based on Beacon frames ff57398 P2P: Do not drop P2P IEs from BSS table on non-P2P scans adeb4f5 P2P: Make sure wait for the first client gets stopped f22f274 P2P: Clone 'disable_scan_offload' parameter for p2p group 63ce59d P2P: Increase Invitation Request timeouts acdd0fc P2P: Clear p2p_group_formation and p2p_in_provisioning on group removal Change-Id: I464e59b59ac0c15af1b72ca0eda00e55c699c1c7 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5605286c30e1701491bd3af974ae423727750edd |
|
04-Oct-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 8b3b803ab9fe69650da7e3b2ee9e44f0f054ee0a 8b3b803 Include Extended Capabilities element based on scan results 6903ee6 P2P Extend postponing of concurrent scans for persistent GO 77e3094 hlr_auc_gw: Fix max_chal value validation 3e6547b hlr_auc_gw: Add support for processing command line operations 2b5b875 EAP-AKA server: Fix AUTS processing 9a50ee6 hlr_auc_gw: Update file comments to mention Milenage 5388dc9 Document use of Linux capabilities instead of privileged process a771c07 Add driver status information to control interface 739faee nl80211: Add some more debug prints for mgmt frame TX f78f278 nl80211: Fix off-channel Action frame TX from GO with use_monitor 298f518 Get rid of compiler warning in no-CONFIG_CTRL_IFACE builds ea61aa1 Add no_ctrl_interface config param to clear ctrl_interface 25b65a1 Make sure updated BSS entry does not get added twice to the list bbc6c72 P2P: Use group formation timeout on persistent group GO 41f8532 P2P: Extend group formation timeout on GO to first data connection 20625e9 P2P: Remove P2P groups on process termination 76fe79e Register wpa_msg callback even if only global ctrl_iface is used af96448 nl80211: Add more debug prints for send_mlme operations 5d4c78f nl80211: Reset nlmode to station on leaving IBSS 0249c12 Avoid compiler warning with CONFIG_NO_STDOUT_DEBUG=y ed1bf01 Allow hostapd config file for dynamically added interface 97bacf7 Do not clear hostapd configuration parameters on disable-iface 66f4dd1 hostapd: Fix couple of deinit path cases to clear pointers f18b781 nl80211: Print more debug info on management frame RX information 89286e9 Re-open ctrl_iface socket on some failure cases as a workaround 3ca96df atheros: Compile fix for driver code not defining IEEE80211_APPIE_FRAME_WNM 762c92a OpenSSL: Split OCSP peer_cert/peer_issuer debug output into parts f224cf0 HS 2.0: Allow printf format parsing with language:name strings 913c19c Fix wpa_config_parse_string() to null terminate printf decoded values 04e533e Fix language string length validation in parse_lang_string() 742e715 Simplify ctrl_iface sendto() use 6668efd Clear frequency list on empty value 1a9f247 Make scan_freq field to be saved by save_config aa78cd3 Drop EAP packet with code 10 before EAPOL state machine processing 3cc247a Use configured sched_scan interval for the PNO scan d047ae6 WPS: Ignore PBC-to-PIN change from M1 to M2 as a workaround 79986bf Print ctrl_iface sendto() failures into debug log eab2b50 P2P: Cancel group formation timeout on client connection 00eb299 P2P: Fix operation channel configuration update Change-Id: I9269e23bc8019b951c2a2d3c707562b2e006148b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
51a47d533b6bf0efff06cc80195a588852a45058 |
|
10-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Android: P2P: Fix frequency choice if multichannel supported Bug: 10513949 Change-Id: Id9e5b2560630049a6ca5f74e3785d4a2c2be3124 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
391c59f0632df8db1c325da1d31d479b2eedce45 |
|
03-Sep-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
92c368d56f46a4e648b441085707c1381b5e5f63 |
|
29-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit commit add7add09d72c3294c63a113635d69b766acf504 add7add IBSS RSN: Add a timeout for Authentication frame exchange c1c0b35 P2P: Postpone concurrent scans when waiting for first client as GO 6fb7b58 IBSS RSN: Work around Data RX vs. Authentication RX race condition Bug: 10513949 Change-Id: Ic4d77c94a5b6e4729cd798f7b033e3ea5b2481cc Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b7b4d0ec07161a6d76c40ba7ef1306e82fbb7e15 |
|
26-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Cumulative patch from commit 853b49a030c00fd6b2dde14e183ca2bf108eaa16 853b49a tests: Increase test_ap_wps_init connection timeout 28de68a P2P: Update peer operating channel from GO Negotiation Confirm 6701fdc P2P: Use the first pref_chan entry as operating channel preference 99d7c76 P2P: Add more debug info on operating channel selection 8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event 2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message 4c55901 P2P: Add state info to global STATUS command ae8c27f Add STATUS command to global control interface 42868f1 Add SAVE_CONFIG command to global control interface 1b9b31c Add SET command for global control interface 0185007 hostapd: Add survey dump support 245e026 hostapd: Split up channel checking into helpers ba873bd wired: Wait for the link to become active before sending packets d393de1 P2P: Validate the freq in p2p_group_add 973622c wpa_supplicant: Fix AP mode frequency initialization d99ca89 P2P: Skip non-P2P interface in p2p_group_remove * 239abaf WPS: Set currently used RF band in RF Bands attribute bf83eab nl80211: Start P2P Device when rfkill is unblocked 60b13c2 nl80211: Do not change type to station on P2P interfaces e0591c3 wpa_supplicant: Reduce wait time for control interfaces 5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs 5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket a235aca Fix DETACH command debug prints to avoid use of freed memory 8d6e035 Make global UNIX socket non-blocking for ctrl_iface 86bd141 Change WEP network selection to reject WPA/WPA2 APs 2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged 3351a38 WPS: Add control interface command for fetching latest status e96872a WPS: Track peer MAC address from the last operations ae23935 WPS: Track PBC status 61b6520 WPS: Track result of the latest WPS operation 50396e2 WPS: Add PBC mode activated/disabled events 961750c WPS: Share a common function for error strings 30158a0 nl80211: Update the assoc_freq during connect 83e7bb0 nl80211: Add more debug prints for DEL_STATION commands Bug: 9056601 Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
eaf261d3b8eef1dcb8d645e0cd2b9016bb66cdfd |
|
15-Aug-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Remove obsolete parameter from p2p_sd_service_update() Bug: 9056601 Change-Id: Ia461ff500df50f1b97ad446dc14d43fa3513677b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
c2ebb4b85d69b65f552fee71ac68f44e8d87b39e |
|
24-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 932659696e2755bb1ecd6a27e1968fd27eef4948 9326596 nl80211: Remove unused WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT 0d08efa P2P: Use the number of concurrent channels in P2P flows a21816a Use wpa_drv_shared_freq() if get_radio_name() is not supported 53c5dfc Change share_vif_oper_freq() to handle multiple freqs 4752147 nl80211: Report the number of concurrent support channels d7df0fa Clean up wpa_supplicant_event() with deauth/disassoc helper functions fd9f170 Remove unnecessary nested ifdef CONFIG_AP 13adc57 IBSS RSN: Add peer restart detection b21990b nl80211: Register for AUTH frames when joining an IBSS network c91f796 nl80211: Support not specifying the frame frequency ec384c5 IBSS RSN: Fix disconnect() with internal SME ed07764 nl80211: Remove redundant assignment of ifindex 4ed8d95 TDLS: Tear down TDLS using wpas_drv_tlds_oper() if not external 831770b Cancel delayed scheduled scan when wpa_supplicant cleans up 69dd296 WDS: Fix WEP usage with nl80211 wds_sta=1 c8ebeda wpa_supplicant: Add support for VHT BSS membership selector 3f9a813 hostapd: Add a config option to control beaconing 182b2e5 Add missing host_to_le32() for big endian hosts 3f53c00 nl80211: Ignore disconnect event in case of locally generated request Change-Id: Ia7368e71ae40966a92970ac82b002c09a7971d41 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
34af306c42b7ccf956508e7cd23f0ba90606e360 |
|
11-Jul-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b 1075b29 P2P: Report group formation failure on error to start GO mode b62b29e Do not block on ctrl_iface monitor events eb7ddbf WPS: Stop SSDP service before freeing the pending entries 98cbc0a Remove forgotten Xcode defines 0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC c7a67a7 WPS: Disconnect when removing existing WPS network block fe65847 EAP-EKE: Add server implementation 7e7610d EAP-EKE: Add peer implementation 489202d EAP-SAKE: Use configured server identity a607b42 EAP-PSK: Use configured server identity 15b042b EAP-MSCHAPv2: Use configured server identity 162865b EAP-IKEv2 server: Use configured server identity 8f89d82 EAP-GPSK server: Use configured server identity 67fe933 Add server identity configuration for EAP server 06aeff5 dbus: Register the AutoScan method call at the right place 78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*) 1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface 9e6a321 Fix non-P2P build after the P2P_DEVICE changes d53d259 Fix build with older OpenSSL versions 54d4ba4 nl80211: Silence a compiler warning with older gcc versions 2e5ba4b P2P: Derive group interface name bit more sensibly c68f620 P2P: Create P2P Device interface if supported 851b0c5 nl80211: Do not indicate P2P_DEVICE support by default bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support 7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE f608081 nl80211: Verify P2P GO/client address with all interface addresses 5fbcb45 nl80211: Fix determining phy name for P2P Device 27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device 080585c Add support for OCSP stapling to validate server certificate 72950ed P2P: Remove a call to wpas_p2p_deinit_global() ab7a1ad nl80211: Fix P2P group interface creating using P2P Device fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once() fdc554b nl80211: Use wdev id to obtain P2P Device scan results 597b94f nl80211: Add .get_mac_addr() callback for P2P Device 8e12685 nl80211: Rework setting interface mode 91724d6 nl80211: Introduce i802_set_iface_flags() eb4582f nl80211: Remove P2P Device interface upon .deinit() f632e48 nl80211: Fix P2P Device interface initialization e472e1b nl80211: Handle creation of P2P Device interface 01517c8 nl80211: Allow Android P2P functionality 6bae92e nl80211: Add support for P2P Device in add interface d6dcfcd nl80211: Add a handler to create_interface d3aaef8 nl80211: Hold wdev identification for P2P Device 7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction 6a71413 nl80211: Rename is_p2p_interface 8393e1a nl80211: Print interface name on set_key() 80ebfd9 VLAN: Avoid access to non-existing interfaces 4345fe9 bridge: Track inter-BSS usage 459eee9 bridge: Use safe default bridge interface 2aaeedf bridge: Give bridge name in per-bss configuration 8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized 9578329 Add AVG_RSSI report in signal_poll 2cc8d8f Add bandwidth and center freq info to signal_poll 1e0e943 Remove 802.11b rates only in case of P2P group operation 2090a0b nl80211: Add prints for kernel events 8743676 TDLS: Validate ext_supp_rates in copy_supp_rates 85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO ec7b97a Interworking: Add support for using eap_proxy offload 4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver 56cb4e1 wpadebug: Add option to ignore SSL errors aa20e1a Remove CONFIG_NO_WPA2 build parameter 5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING 9aaa695 Remove compiler warnings if TDLS is enabled without WPA2 84ae1d4 Fix WNM build without WPA2 c33d5eb Fix build without WPA2 or EAP 1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth() Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8bae4138a0356709720a96f3e50b4d734e532c12 |
|
06-Jun-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 4abc0424ef4bde2ea4fb1ba1c18619c7bc36eb02 4abc042 P2P: Automatic channel selection at re-invocation of persistent GO 8f39528 P2P: Modify wait time in INVITE state based on Tx status of INV-REQ e112764 nl80211: Use NL80211_ATTR_PEER_AID to set TDLS peer AID f8a5fd4 Synchronize with wireless-testing.git include/uapi/linux/nl80211.h 9b1693a WPS: Allow Device Password Id changes between PIN methods 1ba51ec nl80211: Add debug print for set_supp_port operation add9b7a nl80211: Ignore deauth/disassoc event from old AP eb4737f Fix ESS_DISASSOC ctrl_iface command parser b54c9ff FT: Fix TKIP group key configuration in FT protocol e78aaca Stop TKIP countermeasures on FLUSH command 3cb953e Do not set driver MAC ACL unless driver supports this 3c4ca36 hostapd: Support MAC address based access control list Change-Id: I0250e483c2992e6da8b2d1a323b7e3b8a73f9608 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f7e0a9905988e62e4f70fed8b795722abeab719b |
|
23-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 376204934db44d45f798bdde4db005bc88d666f0 3762049 wpa_cli: Support tab completion with ifname= prefix 13b11ba wpa_cli: Allow IFNAME= prefix to be used ae8535b WNM: Make ESS Disassoc Imminent event more convenient to use 6df634f WNM: Do not reject ESS Disassoc Imminent 7b53acd WNM: Use defines for BSS Trans Mgmt field values 8e1bc70 WNM: Fix ess_disassoc timeout to be specified in TBTTs 901d1fe WNM: Remove PMKSA cache entry on ESS disassoc imminent notification dad153d Try to use fast-associate on ENABLE_NETWORK b068001 Fix already-associated detection with driver-based BSS selection 72728c6 P2P: Relax channel forcing for invitation processing with MCC support 4033935 Fix OKC-based PMKSA cache entry clearing 1045ec3 nl80211: Add couple of additional iftypes to debug prints 2cadc8e TDLS: Retry TDLS Setup Response more quickly Change-Id: Ib02db74ca336a4d2da66c21d361c5529ee85f864 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b6e9aaf735990dc64cdb6efccc03d076768eabf3 |
|
20-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit d5b559b6418c2bd09663e0d09e93a6592357fdce d5b559b WNM: Add disassociation timeout processing for ESS_DISASSOC f65f539 GAS: Reduce query timeout to two seconds 7a56af5 GAS: Assign new dialog token even if previous one is free 9e1ecab GAS: Ignore replays if previous frag_id without dropping GAS session fa7ae95 Add test code for fetching the last configured GTK 576bce9 P2P: Direct global ctrl_iface commands automatically for P2P c4bf83a P2P: No duplicate AP-STA-CONNECTED/DISCONNECTED as global event 7793c95 Clean up AP-STA-CONNECTED/DISCONNECTED prints 92c4465 P2P: Mark P2P events global (not specific to interface) ed496f1 P2P: Clean up debug prints 710ae9a P2P: Move p2p_find stopped event message into p2p_supplicant.c 47bfe49 Add wpa_msg_global() for global events 214e428 Allow global ctrl_iface monitors 89c7ac5 wpa_cli: Set buffer length the same as in wpa_supplicant_ctrl_iface_process() faf9a85 Add band option (2.4 vs. 5) for filtering scans b83b1b2 Android: Clarify keystore include directories 6f1127c Android: Add a top level Android.mk d2a9e2c Abstract and Android sockets for global ctrl_iface 6fd5cea wpa_cli: Allow global interface to be used in interactive mode 2925756 wpa_supplicant: Add -G argument to specify global ctrl group cf3bebf Allow global ctrl_iface to be used for per-interface commands 058c863 FT RRB: Fix a memory leak on error path Change-Id: I32a4afb43894167a30c4b0df18fd4846a2945c7c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
44c957860ca714a86357591f39aff0bfa904c743 |
|
17-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit c6ccf12d3f6f35e295f9522dded535da8af6ab98 c6ccf12 P2P: Use preferred channel list during GO creation 6d956c4 P2P: Re-select channel in invitation case with peer info 010b5f9 P2P: Fix p2p_pref_chan setting from configuration file d7692b8 dbus: Terminate cleanly on messagebus shutdown e2396a6 WNM: Enable CONFIG_WNM in Android.mk 65bcd0a WNM: Add sending of BSS Transition Management Query e27d20b WNM: Add neighbor report processing for BSS Transition Management f3e907a WPS: Clear connection failure counts on WPS success 170f566 NFC: Connect using learnt credential after NFC Tag read 0af2db7 edit: Fix libreadline history clearing with WPA_TRACE Change-Id: I0599ea2179869ae8c250ff6b887bb16324fc02f4 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
51b6ea882f234c14cd1fe1332a3840cf61fafcca |
|
08-May-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 6ea1f4135b72199988393f34dd7f5ad8040b7a42 6ea1f41 Try to set WPA-None key after IBSS-joined event 66562e9 Use cached driver capabilities instead of new fetch for each operation 55293aa TDLS: Do not overwrite the reason code in the Tear Down Request 4aa8186 Add a configration parameter for sched_scan interval 03565bc Synchronize with wireless-testing.git include/uapi/linux/nl80211.h f11b72c TDLS: Move AID=1 workaround into driver_nl80211.c 7853369 TDLS: Pass peer's AID information to kernel 55a2df4 HS 2.0: Include HS 2.0 Indication element only for HS 2.0 association ad0685e edit: Fix history processing on running old command 9be3714 wpa_cli: Fetch the current BSSID list when starting interactive mode 69aa334 wpa_cli: Add BSSID tab completion for set bssid_filter 2156587 wpa_cli: Replace set command help with completion routine f1fb042 wpa_cli: Allow space in the set command value f5ffc34 wpa_supplicant: Allow global scan frequencies configuration abfc3ad Synchronize build config comments for wpa_supplicant a01e10d Android: Enable WPS ER and NFC support in the build 11e5a49 WPS: Do not use void* in arithmetic 0f105f9 HS 2.0: Move Probe Request Indication IE addition to proper place 8543ed8 WPA: Print pairwise EAPOL-Key flag as a bool 7af092a hostapd: Add Key MIC in group EAPOL-Key frames corruption test option b691dcb nl80211: Fix max_remain_on_chan capability reading 41b1a76 P2P: Clone beacon_int when initializing new group interface 741ed9f WPS: Remove duplicate networks after WPS Change-Id: I9a2a0cb2acf87dfd7548318d2bda5f342b815884 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
1cf4573e05a4e7ce02e0ccc46771a1da5f303411 |
|
30-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P: Fix group removal in case of frequency conflict Group removal in wpas_p2p_handle_frequency_conflicts() happens during wpa_supplicant_associate() processing and in case of having interface per group will cause interface removal and use of freed memory later. So we need to postpone it to eloop timer. Change-Id: Iee15b31a03a8c7f675929a2a51a6ad20d7070193 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7d96eda062fd58d2ab28311bd0c8ab9193da4080 |
|
24-Apr-2013 |
Dmitry Shmidt <dimitrysh%android.com@gtempaccount.com> |
am 77979736: Merge "P2P: Unblock the code under wpas_p2p_set_group_idle_timeout." * commit '77979736ea5fe4448d77937df56d84d263436034': P2P: Unblock the code under wpas_p2p_set_group_idle_timeout.
|
9e4e8acef07b7053e93024a621489286900b9ec7 |
|
16-Apr-2013 |
Deepthi Gowri <deepthi@codeaurora.org> |
P2P: Unblock the code under wpas_p2p_set_group_idle_timeout. Unblock the code under wpas_p2p_set_group_idle_timeout which was blocked under ANDROID_P2P.The unblocked code is basically avoid to set group idle timeout if the group is started. Change-Id: I0bb134b014f932802da474ccdc20ceb1a086e87b
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
444d567b27731d8572ef37697dd12fd1c37c2f24 |
|
01-Apr-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 17b8995cf5813d7c027cd7a6884700e791d72392 17b8995 Interworking: Try to use same BSS entry for storing GAS results 3db5439 Optimize Extended Capabilities element to be of minimal length 8cd6b7b hostapd/wpa_s: Use driver's extended capabilities acb5464 Add ctrl_iface command FLUSH for clearing wpa_supplicant state 97236ce WPS: Skip rescanning after provisioning if AP was configured 4342326 Add ignore_old_scan_res configuration parameter 9599ccc WPS: Clear after_wps on new WPS connection 702621e WPS: Use latest updated BSS entry if multiple BSSID matches found ab547b5 WPS: Add more helpful debug for invalid WPS_REG command parsing a679c0f WPS: Allow hostapd process to control independent WPS interfaces ccdff94 WPS AP: Add support for reconfiguration with in-memory config 8970bae nl80211: Use nla_nest_start/end instead of nla_put_nested 558d69e P2P: Omit P2P Group Info in case of no connected peers 65a32cd AP: Fix infinite loop in WPA state machine when out of random bytes a5f61b2 Fix OLBC non-HT AP detection to check channel 69554d7 ap_list: Remove unused functions 08c99ca ap_list: Remove unused iteration list pointers 6b16917 ap_list: Remove unused fields 66f1f75 P2P: Fix provision discovery response handling in some cases 2f9b66d Extend ROAM command to handle multiple SSIDs per BSS Change-Id: I46002b1d3bbf6e376c2ae09bcb2c824c54805bbd Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
37d4d6a4efea4ef4f864347ac8ed8d62a9e19f90 |
|
18-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 52728dcd25b5074fb7c0493a8155f096089ad6d0 P2P: Stop P2P_PD_DURING_FIND wait on PD Response RX P2P: Postpone P2P scan only if station mode scan is pending Use special scan result processing steps only on requesting interface P2P: Re-start P2P operation if station mode scanning is stopped P2P: Use common function for re-starting P2P scan after station scan Change-Id: I62bb738a912483647606de1a5bd5357346ebd8f9 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
700a137ab366edc72e371da68ba187b4717ee660 |
|
15-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 565110cd554801fa301c55010b3e9e14f43d7973 nl80211: Include interface name in more debug prints Convert WPS NFC python scripts from using wpactrl to wpaspy wpa_supplicant: Fix lookup of cached PMKSA Add capability flag for IBSS and add get_capability modes hostapd: Fix client reassociation after disconnect due to ACK failure Fix build with CONFIG_NO_CONFIG_BLOBS Fix build without CONFIG_CTRL_IFACE or CONFIG_NO_STDOUT_DEBUG libtommath: Avoid a compiler warning on unused variable libtommath: Condition fast_s_mp_mul_digs() on LTM_FAST P2P: Remove persistent group peer if it rejects invitation P2P: Allow shared interface channel preference to be ignored P2P: Fix shared frequency preference for concurrent operations P2P: Use best-overall channel in p2p_reselect_channel() P2P: Allow all channels for multi-channel concurrency (no negotiation) TDLS: Disable link to existing peer with lower address Fix compiler warning when CONFIG_IEEE80211R is not included WPS NFC: Fix build without CONFIG_WPS_ER FT: Add support for IEEE 802.11r with driver-based SME Change-Id: I1d5ced870c33d5cb73ecc6f04e272a3cf50f344a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2f023193a0fd630eb82ce6381b80911ad5a3462f |
|
12-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f46fc73a3f8d0eeb1b43d17769464884f467ac47 P2P: Add a peer entry based on Association Request frame P2P: Clear p2p_in_provisioning flag on group removal Allow SME SA Query to be used by all drivers Android: Sync makefile changes for HT/VHT overrides wpa_supplicant: Support VHT capability overrides wpa_supplicant: Parse int values in different bases and reject invalid wpa_supplicant: Reschedule sched scan after network change Remove unnecessary local variable wpa_supplicant: Handle enabling of one or all networks equally wpa_supplicant: Save prev_sched_ssid only if needed wpa_supplicant: Do not allow too short sched scan nl80211: Use helper function for phy_info_freqs() nl80211: Split phy_info_band() into smaller helper functions nl80211: Use helper function for phy_info_handler() nl80211: Split wiphy_info_handler() into smaller helper functions nl80211: Support splitting wiphy information in dumps Synchronize with wireless-testing.git include/uapi/linux/nl80211.h SAE: Add forgotten commit element validation step for FFC groups SAE: Move commit element validation steps into single location Change-Id: I369b6493f03714f6cfb4ed4a8c10ee6e6e71c1f8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
7a5e50a0554bee77a9da492ea3d86f46147f1671 |
|
05-Mar-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit 77e4e85321a0a1255901914d5de916aba050f9e1 P2P: Mark peer authorized for persistent group invitation P2P: Indicate frequency for upper layer invitation processing Allow wpa_supplicant AP mode to configure Beacon interval P2P: Use peer's channel list to limit GO freq on invitation P2P: Allow P2P client to specify preferred group channel P2P: Use shared function for setting up frequencies P2P: Allow all channels in case of multi channel concurrency hostapd: Make VHT IE struct more expressive Change-Id: I6d86d98a10a1a699bb464c5b916ebf21f626558b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f86232838cf712377867cb42417c1613ab5dc425 |
|
20-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit b618a469c42120e984ab1c85ed6058504d1fca78 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Sat Feb 16 19:54:09 2013 +0200 Interworking: Select highest priority cred if multiple matches Interworking: Select highest priority cred if multiple matches GAS server: Fix a regression in GAS server callback hostapd: Fix Max SP Length derivation from QoS Info nl80211: Configure STA Capabilities and Extended Capabilities Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Fix build without CONFIG_WPS_NFC WPS: Add support for NFC handover select generation with wpa_supplicant WPS: Update NFC connection handover documentation WPS: Add support for config token generation with wpa_supplicant WPS: Allow password token to be written with nfcpy WPS: Use pre-configured NFC password token instead of overriding it TDLS: Pass peer's Capability and Ext Capability info during sta_add TDLS: Pass peer's HT Capability and QOS information during sta_add nl80211: Add debug prints for STA add/set operations TDLS: Fix add/set STA operation Synchronize with wireless-testing.git include/uapi/linux/nl80211.h WPS: Allow Device Password to be changed from M1 to M2 WPS: Fix wps_reg nfc-pw option TDLS: Tear down peers when disconnecting from the AP P2P: Do not use old scan result data for peer discovery Use more accurate timestamps for scan results P2P: Postpone P2P-DEVICE-FOUND if config_methods not known P2P: Do not allow peer update to clear config_methods WPS: Report NFC connection handover completion differently P2P: Avoid concurrent scans during all steps of group formation P2P: Cancel group formation timeout on group removal (on client) WPS: Change listen time to match nfcpy default (250 ms) WPS: Report only the carrier record from NFC to wpa_supplicant WPS: Fetch only the carrier record from wpa_supplicant for NFC WPS: Update nfcpy script to support AP mode NFC connection handover WPS: Add command for fetching carrier record for NFC handover WPS: Clean up debug prints with nfcpy WPS: Remove 0.5 sec extra wait from NFC handover with nfcpy WPS: Use alternating poll/listen for NFC peer discovery with nfcpy WPS: Configure logging to show nfcpy log message WPS: Add an example python script for NFC operations with hostapd hostapd: Do not change HT40 capability due to OBSS scan dbus: Add missing signal description for WPS (7) EAP peer: Add Session-Id derivation to more EAP methods EAP peer: Add Session-Id derivation EAP-IKEV2 server: Fix invalid memory freeing operation eap_proxy: Add a dummy implementation for compilation testing eap_proxy: Add mechanism for allowing EAP methods to be offloaded Android: Allow setgroups to be overridden from build configuration P2P: Send p2p_stop_find event on failure to start pending p2p_find P2P: Fix GO Probe Response IEs when Wi-Fi Display is enabled Capability matching for 60 GHz band nl80211: Add ctrl_iface message for AP mode connection rejection P2P: Allow local configuration to use 5 GHz band 40 MHz channels Fix BSS RANGE command for no exact id match cases Change-Id: Iac9284bba31db40911aecc3adf2843c9b1576db1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
4b9d52f502481b258fec743c03a5e957e5605afc |
|
06-Feb-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit cc03d0fef3bf5913f8e11b7e998c10bf36a3c07f Author: Amar Singhal <asinghal@qca.qualcomm.com> Date: Wed Feb 6 00:31:34 2013 +0200 Add "BSS LAST ..." command - Add "BSS LAST ..." command - HS 2.0: Fix IE buffer length for extra scan IEs - TDLS: Several fixes - P2P: Fix P2P-GROUP-STARTED event for p2p_connect-join - P2P: Fix Action frame processing if Interworking is enabled - wpa_supplicant: Fix access to the freed memory when removing all networks - Add driver for OpenBSD net80211 layer - Make wpas_select_network_from_last_scan() static - wpa_supplicant: Implement fast-associate on SelectNetwork - Update scan interval gracefully - eloop: Add a timer cancel that returns the remaining time - nl80211: Do not use void pointer for driver_ops used internally - hostapd: Fix crash when scan fails Change-Id: I083747a0b1f7000730a9ab3ea80f3ee7e6247181 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a54fa5fb807eaeff45464139b5a7759f060cec68 |
|
15-Jan-2013 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit dc013f1e37df3462085cf01a13f0c432f146ad7a Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Tue Jan 15 12:03:29 2013 +0200 eapol_test: Remove unnecessary header file inclusion - P2P: Send P2P-FIND-STOPPED event in the new continue-search states - P2P: Add some more details on Service Query TLV format - P2P: Use the same Dialog Token value for every GO Negotiation retry - P2P: Publish more connected clients info in Probe Response frames - P2P: Fix some memory leaks in p2p_add_device() - P2P: Use the same Dialog Token value for every PD retry - P2P: Document operating channel selection functions - P2P: Always re-select operating channel if not hard coded - P2P: Do not allow re-selection of GO channel if forced_freq in use - P2P: Set FORCE_FREQ flag as part of p2p_prepare_channel() - P2P: Share a single function for GO channel selection - P2P: Prefer operating channels where HT40 is possible - P2P: Be more careful with wpa_config_update_psk() call - P2P: Allow PSK to be used instead of passphrase for persistent GO - P2P: Consider age for the P2P scan results - Move some P2P offchannel operations to offchannel.c - P2P: Add more complete description of p2p_cancel - P2P: Allow p2p_cancel to be used to stop p2p_connect-join operation - Interworking changes - WNM changes - WPS changes - SAE changes Change-Id: I38b847d3460066cc58aecbcf67266bfcff1d344e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
d5e4923d04122f81300fa68fb07d64ede28fd44d |
|
04-Dec-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Accumulative patch from commit f5f37d3a4fc2df2a24676b4f95afca15ed793cba Author: Jouni Malinen <j@w1.fi> Date: Sun Nov 25 22:05:32 2012 +0200 Fix REAUTHENTICATE command after PMKSA caching The current PMKSA cache entry needs to be clear to allow EAPOL reauthentication to be started in case this association used PMKSA caching. - Remove old WPS_OOB NCF - WPS: Add preliminary NFC connection handover support for Enrollee - WPS: Reenable the networks disabled during wpa_wpas_reassoc - P2P: Avoid multi-channel scans when they are not needed - P2P: Allow discoverable interval for p2p_find to be configured - P2P: Allow all channels with multi-channel concurrency - Bonjour changes - Remove disassociate - HS 2.0 changes - Add preliminary support for using SQLite for eap_user database - Add SAE support - Add disallow_aps parameter to disallow BSSIDs/SSIDs Change-Id: I85358a05b39d46b8db49acdad667e771c580b05c Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
12b1cd9e151d1e5c4d35aa38531f38b4ef5cc805 |
|
08-Oct-2012 |
Jeff Johnson <jjohnson@codeaurora.org> |
Support conc_pref when use_p2p_group_interface=0 The original implementation of wpas_p2p_handle_frequency_conflicts() only works correctly when P2P groups use a separate interface (i.e. use_p2p_group_interface=1). Update the implementation so that it also works when the device interfaces is used (i.e. use_p2p_group_interface=0). Bug: 7290509 Change-Id: Icbc489125c5b7bd6e174d6aecd53555cdc9ad99d
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
81931b8bb302c38828763358f9e15af2b22c52c6 |
|
17-Oct-2012 |
Irfan Sheriff <isheriff@google.com> |
Increase channel delay to 100ms There is an inherent flaw in the p2p protocol design where an ACK loss right before channel switch leads to peers being out of sync. A work around of 50ms was added persistent case, but it turns out in heavy lossy conditions that is not enough. Increase it to 100ms. Experimental evaluation showed 100ms improves the reliability of p2p persistence reinvocation. Bug: 7359500 Change-Id: I73ab1b64e32b87101e95b0e487c90818c2c0aaf3
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2c5b17df4c29abdf11a85216c2f6272af796c576 |
|
14-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Improve robustness against lost ctrl::ack P2P includes two use cases where one of the devices is going to start a group and likely change channels immediately after processing a frame. This operation may be fast enough to make the device leave the current channel before the peer has completed layer 2 retransmission of the frame in case the ctrl::ack frame was lost. This can result in the peer not getting TX status success notification. For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround that ignores the TX status failure and will continue with the group formation with the assumption that the peer actually received the frame even though we did not receive ctrl::ack. For Invitation Response frame to re-invoke a persistent group, no such workaround is used in p2p_invitation_resp_cb(). Consequently, TX status failure due to lost ctrl::ack frame results in one of the peers not starting the group. Increase the likelihood of layer 2 retransmission getting acknowledged and ctrl::ack being received by waiting a short duration after having processed the GO Negotiation Confirm and Invitation Response frames for the re-invocation case. For the former, use 20 ms wait since this case has been worked around in deployed devices. For the latter, use 50 ms wait to get even higher likelihood of getting ctrl::ack through since deployed devices (and the current wpa_supplicant implementation) do not have a workaround to ignore TX status failure. 20 ms is long enough to include at least couple of retries and that should increase likelihood of getting ctrl::ack through quite a bit. The longer 50 ms wait is likely to include full set of layer 2 retries. Bug: 7282991 Change-Id: If063895046ff42fb52579bfb386281085bedce58 Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
9d71283328fbad680cc74d9b287580e373eb4d6c |
|
05-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Fix network removal to select correct block If wpa_s->current_ssid is not set (e.g., after disconnection that did not result in immediate group removal), an incorrect group could have been removed since the network block iteration here could select the network block that is used to store persistent group credentials. Fix this by verifying that disabled != 2 to avoid picking the network block that could not have been the temporary P2P group. Bug: 7290511 Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
adddfc48d2d7bfa2b1a2405ab8f404b6383ec236 |
|
03-Oct-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Fix p2p_cancel processing during group formation The wpa_s->p2p_in_provisioning flag did not get cleared in some cases where p2p_cancel command is used to stop group formation. This can result in some operations (like p2p_find) failing afterwards. Fix this by using wpas_group_formation_completed() when processing p2p_cancel for a group that has not yet completed group formation. Bug: 7280743 Change-Id: I2dea935bd7c0509237de54bd048954f75ce80bfc Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
91c40cdce17424d9a4718876becf0b7811cf68f2 |
|
25-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: P2P-related fixes - P2P: Show own channel list in debug log - P2P: Allow peer to propose channel in invitation process - P2P: Clear sta_scan_pending on group removal - P2P: Fix ignoring of PD Response due to dialog token mismatch BUG: 7226065, 7231289 Change-Id: Iacb0f85d80f63bcdf311ccc0d29d0c282a0c0576 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
aa532510a7b8c4da2d7d6e2c11dda5db840894e4 |
|
24-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: P2P-related fixes - Remove unused function warning in WPS-NFC case - P2P: Fix p2p_ctrl_invite_persistent to parse peer parameter - hostapd: Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y - hostapd: Fix WDS VLAN bridge handling - hostapd: Send EAPOL frames from the VO queue if WMM is active - P2P: Remove channel 14 from supported P2P channels - hostapd: Clear WLAN_STA_ASSOC_REQ_OK if sending the assoc response failed - hostapd: Add check for the wds sta flag before creating 4addr VLANs - nl80211: Use the monitor interface if socket tx status is not supported - wpa_supplicant: Set state to DISCONNECTED on AP creation errors - P2P: Fix p2p_group_idle in no-group-interface P2P client case - P2P: Fix PSK configuration for GO network - Print control interface commands in easier format - Add debug print for no enabled networks case - P2P: Add more debug prints for GO start routines - P2P: Fix pending sta scan processing for concurrent operation cases BUG: 6940646 Change-Id: I1b1c54a08c61ec4af2bfd2274afc93501004eea2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f06196652a3e12af00503f4a548c56d4e60f7246 |
|
24-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Fix build: Add ANDROID_P2P for SCC interop fixes Change-Id: I847b63428b47016cf9a9a0b090636e1d5b9d28b8
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
af84a575044f6556994fcc124a955fc0ac0a6736 |
|
23-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
GC channel fixes for better interop with SCC - Force operating channel as the only channel in channel list attribute for go negotiation and persistence - Force an operating channel in go negotiation response even if the GO indicates a different in negotiation request - Fix a bug with updating peer operating channel based on GO negotiation confirm Bug: 7217600 Change-Id: I6da0dc1a49c1d99ae97dcab8ee9899e07a80a6cb
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
043a5a9d2586bf379a3f3e811c8c64d92050e131 |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Check all interfaces for pending scan for p2p_scan failures Driver could reject the new scan based on any virtual interface running a concurrent scan. As such, mark the pending scan callback for P2P based on any interfaces instead of just the one used for the p2p_scan operation. Signed-hostap: Jouni Malinen <j@w1.fi>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
dc7b71324df9788e194745e8ab9386a4619a623a |
|
14-Sep-2012 |
Jouni Malinen <j@w1.fi> |
P2P: Move p2p_cb_on_scan_complete to global context Since we have a global P2P module, the flag to trigger scan completion events to it needs to be in similar context. The previous design maintained this separately for each virtual interface and if P2P module did not run its scan operation on the virtual interface that completed the scan, P2P module would not be allowed to restart operations properly. Change-Id: I1b5a55c03aede15bbe0ac70dcbe0011a90f69b20 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5887a9d552f3d9d612011daba073e076daab5b2a |
|
14-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Skip unnecessary scan attempts Change-Id: Ieea8843c0fcb063dbb1df56e5cdf3fbdd0590cd4 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2b380488c6b5d21e54e98397c7a8d6a9f16dd8b5 |
|
13-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P: Skip join in case of provision discovery failure Change-Id: I46cb3d2f17a45bf0ff62697040602334b818d805 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
f4f5db315918f3f048324ea43dc37a3b0fb31ecc |
|
11-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Improve scan during p2p_find Change-Id: I733b23c2b7a24cfa96fe6593adbcbeb7d0798002 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5a85f720c8e43866880fdf9446dc5ad9f45e9091 |
|
11-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Merge "clear wfd_dev_info_hex before use" into jb-mr1-dev
|
8d96518810ad721dc2f07d3b08a186ce23db06ff |
|
11-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
clear wfd_dev_info_hex before use Change-Id: Ic5cdb4df220834faf9e7da5cc1cc0a4191e6abd1
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
a2854abb63b41c123e4c78e5653a55d902f00be6 |
|
11-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Postpone P2P scan if usual scan is in progress BUG: b/7137954 Change-Id: I64ef8dbb51c354b4cdebe490ffcd2cec07995939 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8367dc909f536f600c7474582fe0a96bef7c78fc |
|
10-Sep-2012 |
Irfan Sheriff <isheriff@google.com> |
Add WFD dev info in device found event Change-Id: If25804d41e7ea1d028a30c180290d8de547f43e8
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
5c44edb00c9384534a1b50981071874436aaecd5 |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
P2P: Do not fail p2p_group_remove just based on current_ssid The wpa_s->current_ssid pointer may get cleared, e.g., when disconnected. Commit 30ee769235f3170d9bf6b62c11c6e018e97deb84 made wpas_p2p_group_delete() exit early before removing a P2P interface in this type of case. That can cause number of issues from p2p_group_remove command failing to busy loop when terminating wpa_supplicant if there is a P2P group interface in client mode and that interface happens to be in disconnected state. Fix these issues by allowing wpas_p2p_group_delete() remove the P2P group interface regardless of whether wpa_s->currnt_ssid is set. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
31be0a4b946ecab910c0a9af3837dbccea5d204b |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
P2P: Allow p2p_invite-persistent to specify channel for GO The freq and ht40 parameters can now be used with the p2p_invite command when reinvoking a persistent group as the GO. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2b89da85b8cfe9bb862e8dd334855263c3522c00 |
|
31-Aug-2012 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Fix disconnection event processing Commit 0d30cc240fa36905b034dc9676f9d8da0ac18e56 forced wpa_s->current_ssid and wpa_s->key_mgmt to be cleared in wpa_supplicant_mark_disassoc() which gets called from wpa_supplicant_event_disassoc(). This broke IEEE 802.1X authentication failure processing and P2P deauthentication notification (group termination). Fix this by splitting wpa_supplicant_event_disassoc() into two parts and make wpas_p2p_deauth_notif() indicate whether the interface was removed. If so, the last part of disassocition event processing is skipped. Since the wpa_supplicant_mark_disassoc() call is in the second part, the above mentioned issues are resolved. In addition, this cleans up the P2P group interface removal case by not trying to use fast reconnection mechanism just before the interface gets removed. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
61d9df3e62aaa0e87ad05452fcb95142159a17b6 |
|
30-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 29-Aug-2012 TOT commit 6ffdc2f7bd496ace7a46e055f9714e7db4b1f722 Author: Jouni Malinen <jouni@qca.qualcomm.com> Date: Fri Mar 2 22:31:04 2012 +0200 WFD: Add preliminary WSD request processing and response This commit does not yet address support for different device roles, i.e., the same set of subelements are returned regardless of which role was indicated in the request. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I9d63acce719b982c02e589bb59602382e82988c8 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
4b86ea55603eded752b5773179884a35e74e1a89 |
|
04-Sep-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-38 - Restore p2p_group_formation pointer till the 4-way handshake completes for the p2p client Change-Id: I976659ae5dac4cf01ecdd7995ff9abb6bf914bc1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
ad266fb3da6083126e7619e525153839b918aa44 |
|
25-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-37 - Allow AP_SME support - Do not send disassoc after EAP failure since AP_SME is enabled and del_station will be called - Allow group idle timeout to run during WPS disconnect Change-Id: I7e9e15b9c44804196bc98c01d51a71e24412b91d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
04abaa93653bcee36d59576c90f283d4efdb0a64 |
|
18-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-36 Change-Id: Ic3f1375953f4a7c77d2208f8436d951889093397 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
b5e8f06e18446918f6d801566e5709a8c87f1780 |
|
08-Aug-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to BRCM version 0.8.0-34 - Remove interface priority - Add action parameter to service discovery functionality Change-Id: Ibc74c4053996e91f2f577b57695c68c86b5603c2 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
04949598a23f501be6eec21697465fd46a28840a |
|
19-Jul-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to 07-Jul-2012 TOT commit a5ed45586c63ffd8f9d2b44e27c251d7bacbeaf4 Author: Jouni Malinen <j@w1.fi> Date: Sat Jul 7 13:01:45 2012 +0300 WPS SSDP: Fix socket leaks on error paths Change-Id: I0864aac7fc88fa2a60f5cca7d524b94363410c85 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
61dc7fcf73a67f1611a17db5b8170fb468e5137b |
|
06-Jun-2012 |
Irfan Sheriff <isheriff@google.com> |
Fix supplicant crash at group removal Bug: 6613470 Change-Id: Ia96694ce906414b3f56cd57416d7c4c6f2030a6e
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
98f9e76624da6bb96edc1982c423e4a119c5170a |
|
30-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.27 from BRCM - Fix crash during TRUE pbc overlap - Fix p2p_stop_find event - Avoid race condition in GO-NEG process if both peers enter p2p_connect at the same time - Retry assoc immediately on ASSOC-REJECT. Previously assoc was retried on authentication timeout (which occurs after 10secs). Now on assoc reject, we cancel the auth timer and then initiate a assoc scan. BUG: 6543705, 6427094 Change-Id: I4489fb14b6cead069f0d14fcbb9e2224f790d77b Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
2fb777c379ad560c309c54b96c2c13291da23f54 |
|
02-May-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Update to Version 0.8.26 from BRCM - Add interface command - Improve scan handling during P2P BUG: b/6324527, b/6427094 Change-Id: I4425f44d2a15de0725ba4a1b42cc56e10954b314 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
687922c7347bdc3b4f8c921efe1d1388cb3baac0 |
|
26-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to Version 0.8.24 from BRCM - Add 'conc_priority' command - Fix handling a single channel concurrency case: If conc_priority is not set, advertise the frequency conflict to the framework and disable the new connection attempted - When P2P Interface gets removed due to single channel frequency conflict, show GROUP_REMOVE reason=FREQ_CONFLICT - Fix sched scan processing Change-Id: Ie6fe105cebd379a0a9c49ace62d2e48e71571107 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
c5ec7f57ead87efa365800228aa0b09a12d9e6c4 |
|
07-Mar-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.22 from BRCM - Based on 0c01d65 : Ignore TX status for Data frames from not associated STA Change-Id: I2776ff8e292593f407bf5b9177640c512e06bf0d Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
1f69aa52ea2e0a73ac502565df8c666ee49cab6a |
|
25-Jan-2012 |
Dmitry Shmidt <dimitrysh@google.com> |
Update to new version 0.8.16 from BRCM Sync with main tree commit b8349523e460493fa0b4de36c689595109e45e91 Author: Neeraj Kumar Garg <neerajkg@broadcom.com> Date: Tue Dec 27 23:21:45 2011 +0200 P2P: Reject p2p_group_add if forced frequency is not acceptable Change-Id: Icb4541a371b05c270e80440d7a7fdea7f33ff61e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
fc41cadcff448cdd2b60e376fc6e7378e2e57b5e |
|
28-Sep-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
nl80211: Add get_noa() support for WFD certification (BRCM) BUG: b/5367351 Change-Id: I14ed79e10ade205c5dd4cdc0d2e888ed1279d1bb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
dca3979ccdf869f140f096b83df322a0efc84f22 |
|
06-Sep-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
P2P fixes for BRCM 1. Fix for stopping any on-going P2P-FIND, while doing a P2P-GROUP-ADD. 2. Fix for Supplicant crash. The crash was due to socket being closed during P2P-GROUP-REMOVE. 3. Append P2P DEV ADDR during AP-STA-CONNECTED Event for P2P Devices. For legacy STA, the event format would remain the same. BUG: b/5262575 Change-Id: I8faf2159d35538fd07e42dba82d367b581cf2164 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
44da0253a740e0329b18f60c196e1f2dcacfccea |
|
23-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
BRCM P2P update - IFNAME for monitor interface is changed to m. from mon. This will give extra space for incrementing X in IFNAME (p2p-wlan0-X). Also, we have synced the reset of IFNAME w.r.t. monitor interface name. - Fixed continuous P2P_DEV_FOUND events coming from GO. Removed the BRCM specific change for this. - Fixed STATUS command for p2p interface. Change-Id: I04210dd0b2bdba06b0192c0a61edfa0e5b47ab72 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
e15c7b57cc7a214d5adaa0fc1d7204378eaf62a5 |
|
04-Aug-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Send termination message only in case of wpa_supplicant_deinit() call Change-Id: I276e339a35a9b693b604082bd211f6bd7b093808 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
497c1d5e50162d6b3c1cce5dbd9c5fd9da69aaef |
|
22-Jul-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
Add P2P support for BRCM CFG80211 driver Change-Id: Iafec4bedbd33836d0a64e7ea054d8a46ef8ec204 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
75ecf5267604f166b85a7ee2cf0d9cb682966680 |
|
28-Jun-2011 |
Jouni Malinen <jouni@qca.qualcomm.com> |
Accumulative patch from commit 20a0b03debef66cc57b0c34a05f8be5229be907c atheros: Fix auth_alg configuration for static WEP nl80211: Implement set_rate_sets for non-hostapd AP case nl80211: Enable more AP callbacks for non-hostapd AP mode nl80211: Re-order functions to group AP/hostapd specific code Remove compiler warning for non-P2P builds random: Add support for maintaining internal entropy store over restarts Fix a compiler warning on WPS-AP-without-UPnP builds P2P: Retry provision discovery requests in IDLE state P2P: Add callback for provision discovery failure P2P: Add wpas_notify_p2p_provision_discovery() P2P: Add group started notification DBus: Move wpas_dbus_new_decompose_object_path() DBus: Refactor array adding, add binary arrays DBus: Add support for P2P primitives DBus: Fix some typos on comments Fix CONFIG_AP=y build without CONFIG_P2P=y Fix non-P2P D-Bus build nl80211: Add support for driver-based PMKSA cache P2P: Start GO without extra scan step Remove a compiler warning on uninitialized variable Add EVENT_RX_ACTION handler for hostapd Fix hostapd build without NEED_AP_MLME=y Fix AP selection to check privacy mismatch and IBSS with WPA/RSN IE bsd: Fix set_key() sequence number endian issue Add a copyright and license statement for a radiotap header file Use nl80211 as an example instead of WEXT Add notes for CONFIG_WPS_ER build configuration option Fix CONFIG_NO_WPA_PASSPHRASE=y build hostapd: Don't mask out non-symmetric STA HT caps P2P: Enable P2P capability advertisement on D-Bus P2P: Update D-Bus network object semantics during group formation P2P: Show P2P peer signal level in D-Bus P2P device properties P2P: Fix P2P device signal level type in D-Bus P2P: Add dissasoc_low_ack in P2P device properties P2P: More complete persistent group management over D-Bus P2P: Add WpsFailed signal in P2P D-Bus P2P: Update listen and operating channel from P2P D-Bus P2P: Fix WpsFailed signal in P2P D-Bus atheros: Fix glibc 'invalid pointer' error when WPA_TRACE is enabled Clear WPA and EAPOL state machine config pointer on network removal 20a0b03debef66cc57b0c34a05f8be5229be907c Change-Id: I2b83bf86ba9c7a9a218638be7b4de31d209cdde1 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
87fd279308af3f806848c8f2ab65ef18c6ac4c30 |
|
16-May-2011 |
Jouni Malinen <jouni.malinen@atheros.com> |
Accumulative patch from commit 6d28fb9627155929012cda944aacd5a52ce7051a nl80211: Fetch assoc_freq from scan table for connect event nl80211: Filter out duplicated BSS table entries from scan results Update BSS table entry if roaming event indicates frequency change WPS: Remove obsolete note about lack for WPS ER support P2P: Include operating class 124 (channels 149,153,157,161) Include nl80211 driver wrapper in default configuration for hostapd Better messages when channel cannot be used in AP mode WPS: Add a workaround for Windows 7 capability discovery for PBC WPS UPnP: Fix UPnP initialization for non-bridge case with some drivers Fix regression in RSN pre-authentication candidate list generation commit 6d28fb9627155929012cda944aacd5a52ce7051a Change-Id: I3c68dad5fe323b1d86aa585c564a75e4fc1a2ea1
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|
8d520ff1dc2da35cdca849e982051b86468016d8 |
|
09-May-2011 |
Dmitry Shmidt <dimitrysh@google.com> |
wpa_supplicant: Initial Revision 0.8.X Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
/external/wpa_supplicant_8/wpa_supplicant/p2p_supplicant.c
|