- 05 Dec, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit 'adaa28a8': Return only full network line in list_networks
-
- 04 Dec, 2014 4 commits
-
-
Vinit Deshpande authored
* commit '68c7ea4c': List all networks despite message limit of 4096 bytes
-
Jithu Jance authored
* commit 'a7c60b4c': nl80211: Ignore Connect failure for the previous association
-
Dmitry Shmidt authored
-
Vinit Deshpande authored
-
- 03 Dec, 2014 3 commits
-
-
Jithu Jance authored
Suppose there are two APs (AP1 & AP2) and user attempted to connect to AP2 before the previous connection with AP1 could succeed. Now, if the connection event comes for the older AP with failed status, we should just ignore it as the wpa_supplicant state has moved to "ASSOCIATING" with the new AP (AP2). This is a similar to the case where a disconnection event is ignored for a case where local disconnect request can cause the extra event to show up during the next association process following that command. Signed-off-by:
Jithu Jance <jithu@broadcom.com> Signed-off-by:
vandwalle <vandwalle@google.com>
-
Dmitry Shmidt authored
Change-Id: I81a74db1ba1e4e48397ce779687fffda42cbd8ac Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Vinit Deshpande authored
This change creates 'LIST_NETWORK LAST_ID=x' form to allow retrieval of all networks saved in the system. Without this form, only first few (whatever fills in first 4096 bytes) can be retrieved. Signed-off-by:
Vinit Deshpande <vinitd@google.com>
-
- 18 Nov, 2014 1 commit
-
-
Jouni Malinen authored
* commit 'fee0f928': Work around AP misbehavior on EAPOL-Key descriptor version
-
- 17 Nov, 2014 2 commits
-
-
Jouni Malinen authored
* commit '658fb4ad': Work around AP misbehavior on EAPOL-Key descriptor version
-
Jouni Malinen authored
It looks like some APs are incorrectly selecting descriptor version 3 (AES-128-CMAC) for EAPOL-Key frames when version 2 (HMAC-SHA1) was expected to be used. This is likely triggered by an attempt to negotiate PMF with SHA1-based AKM. Since AES-128-CMAC is considered stronger than HMAC-SHA1, allow the incorrect, but stronger, option to be used in these cases to avoid interoperability issues with deployed APs. This issue shows up with "WPA: CCMP is used, but EAPOL-Key descriptor version (3) is not 2" in debug log. With the new workaround, this issue is ignored and "WPA: Interoperability workaround: allow incorrect (should have been HMAC-SHA1), but stronger (is AES-128-CMAC), descriptor version to be used" is written to the log. Bug: 18411110 Change-Id: I9ae12e8882adc9e785f6e4cef9f30b89bf72dcd2 Signed-off-by:
Jouni Malinen <jouni@qca.qualcomm.com>
-
- 11 Nov, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit '2e425d69': Cumulative patch from commits: a7f5271 and 7465640
-
- 10 Nov, 2014 1 commit
-
-
Dmitry Shmidt authored
a7f5271 Update pending connect radio work BSS pointer on scan update 7465640 Invoke connect work done for all the connection failure cases Bug: 18312770 Change-Id: I5e59edaac24c30bbfdab2e38e8ea902300b0308d Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 27 Oct, 2014 3 commits
-
-
Jouni Malinen authored
* commit '907fe1cb':
-
Dmitry Shmidt authored
* commit 'a3015e7a':
-
- 10 Oct, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit 'a7b06faf': Cumulative patch to Release 2.3
-
- 09 Oct, 2014 1 commit
-
-
Dmitry Shmidt authored
724fce8 Change version information for the 2.3 release 5cb1440 Update ChangeLog files for v2.3 2b28ef6 browser-wpadebug: Use more robust mechanism for starting browser 3d8a3ff browser-android: Use more robust mechanism for starting browser 17dc39a browser-system: Use more robust mechanism for starting browser 4a274f4 DFS: Allow 80+80 MHz be configured for VHT Change-Id: I5562ac22e5bf8a55d0f7f8944ca0d9c8ebd8d13f Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 08 Oct, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit '9ead16e2': Cumulative patch from commit d5fe4e6c18d94465e8fb4527d51df6e8539c4d6a
-
- 07 Oct, 2014 5 commits
-
-
Jouni Malinen authored
* commit '3bbb6494': Cumulative security CVE-2014-3686 patch
-
Jouni Malinen authored
* commit '772e12cf': Cumulative security CVE-2014-3686 patch
-
Dmitry Shmidt authored
d5fe4e6 Reserve QCA vendor specific nl80211 commands 34..49 a256506 AES: Extend key wrap implementation to support longer data eefec1e AES: Extend key wrap design to support longer AES keys 98a1571 OpenSSL: Clean up one part from the BoringSSL patch a857296 Support building with BoringSSL 1236eda Android: Remove ctrl_interface=wlan0 from config template 9ffd512 Android: Set pmf=1 to default template 45d8501 Fix out of bounds memory access when removing vendor elements a61fcc1 Clean up authenticator PMKSA cache implementation cb129db Clear PMKSA cache entry data when freeing them 8c8d26a Remove unnecessary PMKSA cache freeing step 9c82990 Fix authenticator OKC fetch from PMKSA cache to avoid infinite loop 47ea24c Fix PMKSA cache timeout from Session-Timeout in WPA/WPA2 cases dc152f3 wpa_supplicant: Enable HT for IBSS 4ec6837 wpa_supplicant: Use hostapd_freq_params in assoc_params 43f02e6 wpa_ctrl: Update wpa_ctrl_recv() documentation for non-block behavior 1274ec2 dbus: Add an interface configuration entry to set the WPS methods 3e0272c nl80211: Re-read MAC address on RTM_NEWLINK 5dfbd72 nl80211: Add get_bss_ifindex() helper f1a6131 P2P: Use only the -m config for P2P management device 08d7665 TDLS: Use WMM IE for propagating peer WMM capability 17729b0 TDLS: Fix concurrent setup test for mac80211 drivers 984dadc TDLS: Set the initiator during tdls_mgmt operations 01cb5df Sync with wireless-testing.git include/uapi/linux/nl80211.h ca3c6b4 nl80211: Fix compatibility with older version of libnl d76426c TDLS: Filter AID value properly for VHT peers Change-Id: Ia2156628a590c502d9111de2727da642ff435d9a Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Jouni Malinen authored
* commit '772e12cf': Cumulative security CVE-2014-3686 patch
-
Jouni Malinen authored
0cf0fcc Add os_exec() helper to run external programs 12b6e6a wpa_cli: Use os_exec() for action script execution 515fa39 hostapd_cli: Use more robust mechanism for action script execution Bug: 17880188 Change-Id: I0c6162f5339b1f3d8d2cc59203b919455abd592b Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 02 Oct, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit '661b4f78': Cumulative patch from commit a313d17de943cbaf12cbf67d666af14791be8ad2
-
- 30 Sep, 2014 1 commit
-
-
Dmitry Shmidt authored
a313d17 Extend random MAC address support to allow OUI to be kept 1cbdb9d Add helper function for generating random MAC addresses with same OUI 97ed9a0 nl80211: Remove bridge FDB entry upon sta_remove() 39323bc AP: hostapd_setup_bss() code clean-up 1595eb9 P2P: Add support for 60 GHz social channel b6ebdfb Extend STATUS command with frequency information 375f4a3 hostapd: Avoid dead code with P2P not enabled 6a60488 dbus: Add a global property to set or unset WFD IEs 4bd7e16 wifi_display: Add a utility function to set WFD subelements from IEs d417744 wifi_display: Add a utility function to get the sub-elements as IEs a8833b8 util: Don't use "\e" 8c6f4a5 ap_config.c: fix typo for "capabilities" 6e252b0 WPS: Fix WPS-in-search check when STA_AUTOCONNECT is disabled e5fdc05 P2P: Remove unecessary sanity check for global p2p ee285df P2P: Flush services based on global p2p init and not p2p ifaces 7139cf4 P2P: Decrement sd_pending_bcast_queries when sd returns success dbdc9a1 nl80211: Fix memory leak on start radar detection error path ed8e005 hostap: nl80211 use nl80211_put_freq_params c267753 Add support for using random local MAC address 4d8fb63 Add helper function for generating random MAC addresses fee354c nl80211: Add command for changing local MAC address e49cabc P2P: Set timeout when starting GO Negotiation from Probe Req RX 7549c17 P2P: Clear pending_listen_freq when starting GO Neg/Invite b497a21 nl80211: Ignore auth/assoc events when testing driver-SME 79e2b1c Add PMKSA_FLUSH ctrl_iface command 55c2bfa wpa_cli: Support action scripts with global ctrl_iface 063f850 wpa_cli: Increase event buffer size to 4096 bytes fa0e917 wpa_cli: Fix PING in interactive mode with ifname_prefix c53a9bf Check for driver's DFS offload capability before handling DFS 068e387 STA: Update scan results for ap_scan=1 skip-selection case also 7a4a93b dbus: Add SignalPoll() method to report current signal properties a6ab82d Android: Add NO_EVENTS parameter to status command df2508d P2P: Check os_get_random() return value more consistently 54461f3 RADIUS server: Remove unreachable code e4474c1 FT: Fix hostapd with driver-based SME to authorize the STA 0800f9e nl80211: Add roaming policy update using QCA vendor command 0ef023e Add support for driver command to update roaming policy 0cd9846 nl80211: Print debug info on STA flag changes 17e2091 P2P: Fix radio work issue with wait-for-peer GO Negotiation 76db5b6 Work around broken AP PMKSA caching implementation b08d5fa WPS: Set EAPOL workarounds dynamically based on association 8511a0f WPS: Extend internal entropy pool help for key/snonce derivation abc0553 Remove WPA_EVENT_SCAN_STARTED message from MSG_INFO log c45dabb P2P: Deauth p2p client just after dbus notify 3ee1856 nl80211: Register eloop after hs20 action frame 3bd3257 dbus: add BSS Age property to indicate last-seen time 5c61d21 openssl: Fix memory leak in openssl ec deinit 10e7948 Fix hostapd GET_CONFIG wpa_pairwise_cipher value 3a413e0 RADIUS client: Check getsockname() return value 9c196f7 HTTP: Fix OCSP status check cb5ef95 SME: Verify that os_get_random() succeeds for SA Query c9cd78e RADIUS server: Fix IPv6 radiusAuthClientAddress mask 5e62cfd P2P: Verify that os_get_random() succeeds 6473e80 EAP-PAX server: Add explicit CID length limit 6a6566c Remove unnecessarily shadowed local variable df756b3 hostapd: Remove unused variable assignment e47abdb TDLS: Decline Setup Request with status code 37 if BSSID does not match ce2002a TDLS: Add RSN and Timeout interval IEs in TDLS Discovery Response frame 1c2aa04 P2P: Do not add P2P IEs on P2P disabled interface f2e9083 nl80211: Add more RTM_NEWLINK/DELLINK debug messages 728ff2f nl80211: Fix RTM_DELLINK processing for bridge events e5a4b85 WPS: Merge mixed-WPA/WPA2 credentials if received in same session db9418b Add printf NULL checks to silence static analyzer 4e53675 P2P: Overwrite pending interface only after verifying BSS entry 04a258e hostapd: Check that EVENT_ASSOC data is present before using it 1cc0d6a wpa_supplicant: Use freq_list scan filtar in sched_scan Change-Id: Ibc18f6761b3ccfe8fb4479f26f53e70942068bc8 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 26 Sep, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit '376e1c49': Android: Skip explicit conf_p2p_dev loading for main interface
-
- 25 Sep, 2014 1 commit
-
-
Dmitry Shmidt authored
* commit '376e1c49': Android: Skip explicit conf_p2p_dev loading for main interface
-
- 24 Sep, 2014 1 commit
-
-
Dmitry Shmidt authored
Bug: 17064125 Change-Id: Ib53daf22c84f2581b499462dc09a74ccfbac226a Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 17 Sep, 2014 1 commit
-
- 16 Sep, 2014 1 commit
-
- 15 Sep, 2014 1 commit
-
-
vandwalle authored
It also allows to use the STATUS command with default behavior, say for debug, i.e., don't generate a "fake" CONNECTION and SUPPLICANT_STATE_CHANGE events with the new STATUS-NO_EVENTS case. Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 05 Sep, 2014 2 commits
-
-
Dmitry Shmidt authored
* commit 'fe06c00f': Android: Remove ctrl_interface=wlan0 from config template
-
Dmitry Shmidt authored
Bug: 14391322 Change-Id: I349727fa4d02925772081d29fcc9a181baf08526 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 04 Sep, 2014 3 commits
-
-
Dmitry Shmidt authored
* commit 'faa2d7a5': Set pmf=1 to default template
-
Dmitry Shmidt authored
Bug: 17294530 Change-Id: Iffafed5332d04edd59b602395b8433cdbc82fb83 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Dmitry Shmidt authored
* commit '0207e233': hostapd: Add wowlan_triggers config param
-
- 03 Sep, 2014 1 commit
-
-
Dmitry Shmidt authored
New kernels in wiphy_suspend() will call cfg80211_leave_all() that will eventually end up in cfg80211_stop_ap() unless wowlan_triggers were set. Bug: 17269024 Change-Id: I14d2191eda090cd86cabe1e5f059975fdf2f69e8 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 20 Aug, 2014 2 commits
-
-
Jithu Jance authored
* commit '57cea1a4': P2P: Avoid trunction of extended listen due to offchan tx
-
Jithu Jance authored
On receiving the cancel remain on channel event, the pending_tx is scheduled immediately and returned. This was preventing the wpas_p2p_listen_start function from execution thereby resulting in termination of the extended listen. Bug: 17027752 Change-Id: Ib12425f144364e92b3a5539fba3a850779b4fe2b Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-