aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* wpa_supplicant_8: fix IBSS (ad-hoc) mode in NL80211 drivercm-9.0.0Pawit Pornkitprasan2012-04-261-1/+4
| | | | Change-Id: I280ec749a5bdc330d7cc521a600a9c56b851d2f5
* disable android adhoc lock, only check if we aren't in mismatchhavlenapetr2012-04-251-2/+3
| | | | | | (cherry-picked from gingerbread) Change-Id: Id1b37ce9df2eb46516574744fb03b2050fa3c63d
* Enable EAP-PWD in wpa_supplicant.Partha N2012-01-011-0/+3
| | | | | | | | EAP-PWD (RFC 5931) has the simplicity of setting up a PSK-based network (no certificates involved, just username/password combination), but has the stronger security properties of EAP-based authentication methods. Change-Id: I6355066b6cf427001e086ad22eca639038f83e7d Signed-off-by: Partha N <parthan@gmail.com>
* Revert "nl80211: Add missing code in wpa_driver_nl80211_probe_req_report"Pawit Pornkitprasan2011-12-131-7/+0
| | | | | | | | | | | | This reverts commit fa43dd4b08bdb6edc40e40e0abbe74fee376eaa1. Breaks WPA tethering, so maybe that's why it was removed in the first place Conflicts: src/drivers/driver_nl80211.c Change-Id: Ife0c06d5be8f201e85f654ffd12f8cf9672ab2c8
* wpa_supplicant: enable ROAMING in configVishal Mahaveer2011-11-151-0/+4
| | | | | | | | CONFIG_ROAMING flag was added in Android for roaming and it is turned off by default. Change-Id: I3eb21cc5da656e7686e2f1f8d20df2e86696e788 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* Enable CONFIG_NO_RANDOM_POOL and CONFIG_IEEE80211N in .configVishal Mahaveer2011-11-151-0/+30
| | | | | Change-Id: I8fdc489aafc0709c2c1a7d53f264f9f2c38a1765 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* Sync nl80211_copy.h with R4-SP1 releaseVishal Mahaveer2011-11-151-20/+467
| | | | | | | Sync nl80211_copy.h with R4-SP1 release of TI. Change-Id: I10c0d69bd5b784fcc3c75cdc922bda40c90a71dd Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* P2P: use GO channel for Operating Channel IEEliad Peller2011-11-154-3/+9
| | | | | | Change-Id: I5285126515b47cd3b4cdce717310835f23a78f0a Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* hostap: allow action frames with unknown BSSID in GO modeArik Nemtsov2011-11-151-0/+4
| | | | | | | | | | P2P invitation responses are transmitted with the BSSID set to the peer address. Pass these action frames up to prevent the GO from getting stuck in an infinite invite loop. Change-Id: I042bcae1b27b0cde38b1da05f6cb1c5f20710046 Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* WPS2: Add WPS IE to Assoc Resp for cases of WLAN_STA_MAYBE_WPSGuy Eilam2011-11-151-0/+7
| | | | | | | | | | | | | | | | | Add a WPS IE to the Association Response even when the STA is only maybe trying to connect using WPS. This change is needed according to test 4.2.12 in the WSC 2.0 Testplan. A WPS IE is needed even in cases that a station which supports WPS1 tries to connect and doesn't have any WPS IE, RSN IE and WPA IE. This change might cause the WPS IE to be sent also in an Association Response when a STA tries to connect to an Open Network AP (which is configured to WPS). Change-Id: I5bb2dbea3e48bbc2d42fe072ca254957aeed5af7 Signed-off-by: Guy Eilam <guy@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* P2P: Do not reply to Probe Request frame indicating only 802.11b ratesJouni Malinen2011-11-151-0/+29
| | | | | | | | Per P2P specification 2.4.1, P2P Device shall shall not respond to Probe Request frames that indicate support for only 802.11b rates. Change-Id: I2c57f3f56dd715efe427b78492d1eaf947536000 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant AP: Enable uapsd in P2P GO mode if go_apsd was setEliad Peller2011-11-151-0/+5
| | | | | | | | | | If uapsd is explicitly enabled, set conf->bss->wmm_enabled and conf->bss->wmm_uapsd to enable (and advertise) uapsd. Change-Id: I7ad1d73efc57421d99ee82275a9eaa98df09efa4 Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* hostap: set ht_capab from wiphy when in P2P GO modeArik Nemtsov2011-11-151-3/+7
| | | | | | | | | Set the HT capabilities of a P2P GO according to the supported ones in wiphy. In addition enable WMM when 802.11n is enabled. Change-Id: I21b2a8a923b4f6760d64b81b88de9ba9420dfc01 Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant: add hard-coded HT capabilities for P2P GOArik Nemtsov2011-11-151-1/+3
| | | | | | | | | | Temporarily add hard-coded HT capabilities to wpa_supplicant to allow operating as a 11n GO. These will be determined automatically from the wiphy (the driver) in a future version. Change-Id: I83516abc24ecea08b7bda85a1ddf2735fe2cfb0b Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant: fix call to preauth candidate list generationGuy Eilam2011-11-151-1/+1
| | | | | | | | | | | | Moved the call to the processing of the scan results for RSN pre-authentication candidates to an earlier position. This call was ignored most of the times due to a skip that is issues whenever the supplicant decides that there is no need to roam. Change-Id: I2871c521994aae4de8c8800b7e683912a99d0872 Signed-off-by: Guy Eilam <guy@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant: prevent connection attempt while unfit security: STA open to ↵Shahar Levi2011-11-151-1/+1
| | | | | | | | | | | | secured peer In case STA set to open with ssid fit to secured peer the WPA select that peer for connection. Validate that the peer not secured before returning matching ssid. Change-Id: I5eeb7f552293f5fe0c34bf5490f580fae8ad77c4 Signed-off-by: Shahar Levi <shahar_levi@ti.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: implement hapd_set_ssid callbackArik Nemtsov2011-11-151-5/+14
| | | | | | | | | | | | | When operating in AP mode, this callback passes the SSID to the kernel driver. wl12xx cards handle probe requests in FW. When the SSID is not broadcast in beacon data (i.e. the SSID is hidden), the AP must know the real SSID in order to respond to directed probe requests. Change-Id: I1b0ada51a8e9176957728229b6423349aec934b1 Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: send uapsd_queues and max_sp values on sta additonEliad Peller2011-11-151-1/+15
| | | | | | | | When a new station is added, send its configured WME params. Change-Id: I6f0ea3029131533f6a9430ae9fd853cb854d949d Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* hostapd: add uapsd_queues and max_sp fieldsEliad Peller2011-11-155-6/+25
| | | | | | | | | | | Add uapsd_queues and max_sp fields to sta_info struct, and pass them to the sta_add callback. These values are determined by the WME ie in the assoc request. Change-Id: I47b638c9da1c854865fc11dc58947317e2333e8d Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* hostapd: Set STA flags when adding a new stationArik Nemtsov2011-11-154-3/+8
| | | | | | | | | | When adding a new station, set the STA flags as part of the sta_add() command. This ensures the flags are up to date when the station is added by lower level drivers. Change-Id: I73664a669773c86bfc6831cf3c8d93bf3518ba92 Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Send STA flags to kernel on station additionArik Nemtsov2011-11-151-17/+23
| | | | | | | | | Send STA flags to kernel when adding a new station. This ensures stations are added with up to date flags by kernel drivers. Change-Id: I39261826d2387c3004cc6df5aac0012530960982 Signed-off-by: Arik Nemtsov <arik@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Change vif type to P2P_CLI upon P2P authenticationEliad Peller2011-11-153-2/+12
| | | | | | | | | | | | | Currently, wpa_driver_nl80211_authenticate() changes the interface type to station. However, in case of P2P, we need to change the interface type to P2P_CLI. Add p2p field to the authentication params, and consider it for choosing the correct interface type. Change-Id: I966dad522bbc09c170416b1e35056d97d3b7e7b1 Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Consider P2P when changing vif typeEliad Peller2011-11-151-52/+62
| | | | | | | | | | | | | | | | Commit 9f51b11395646efeb5d6a75d2cabc0bf7626496f added support for P2P interfaces when adding a new interface. However, it didn't handle the case in which the same interface is being used and its type is being changed. Add support for this case. Consequently, when doing "ap_scan_as_station" we now need to save the actual AP interface type (AP/P2P GO) in order to restore it properly. For that, change ap_scan_as_station type from int to nl80211_iftype, and set it to NL80211_IFTYPE_UNSPECIFED when not used. Change-Id: Idae022ce53749809e9ea356d488ddf5e617502e5 Signed-off-by: Eliad Peller <eliad@wizery.com> Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Add missing code in wpa_driver_nl80211_probe_req_reportVishal Mahaveer2011-11-151-0/+7
| | | | | | | | | | Commit "6e933c1e09094a8972ef1e782c57f8b3c55c91d0" removed piece of code from wpa_driver_nl80211_probe_req_report API. Adding it back. Change-Id: I51bab24d5a84244c462539d0cd0b625e4281e92f Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Do not re-set iftype when initializing added interfaceJouni Malinen2011-11-151-1/+13
| | | | | | | | | There is no need to force the interface into station mode when wpa_supplicant adds a new interface (e.g., P2P group) with the correct iftype. Change-Id: If8a100ffff73cf932ca11e7e2eeba906ebefea92 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Add more debug info for iftype changesJouni Malinen2011-11-151-1/+28
| | | | | Change-Id: Iac57962593adc9e73623dba52ccd0e64fb18b8c5 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: Ignore ifdown event if mode change triggered itJouni Malinen2011-11-151-2/+11
| | | | | | | | | When driver_nl80211.c has to set the netdev down to change iftype, an RTM_NEWLINK event is generated. Do not generate EVENT_INTERFACE_DISABLED event based on that. Change-Id: Ifbc7ed1f7def0725f393b29c51777848cfdddfb7 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* nl80211: fix the "not disabled" case in disable_11b_rates()Guy Eilam2011-11-151-6/+4
| | | | | | | | | | | | the NL80211_ATTR_TX_RATES attribute should always be part of a NL80211_CMD_SET_TX_BITRATE_MASK command. In case the disabled parameter in the nl80211_disable_11b_rates() is false, the attribute that should be left out of the command message is NL80211_TXRATE_LEGACY - this way, the bitrate mask will be reset to its default. Signed-off-by: Guy Eilam <guy@wizery.com>
* p2p: disable 11b rates only on p2p interface creationRajkumar Manoharan2011-11-154-43/+13
| | | | | | | | | | 11b rates are disabled blindly during p2p init based on driver capability. This prevents use of CCK rates where p2p is not in use. This patch disables 11b rates during the p2p interface setup and also removes the disable_11b from global. Signed-off-by: Rajkumar Manoharan <rmanohar@qca.qualcomm.com> Signed-off-by: Guy Eilam <guy@wizery.com>
* nl80211: Add support to disable CCK rate for p2p probe and framesRajkumar Manoharan2011-11-151-0/+4
| | | | | | | | | | Add a new attribute to specify whether to use CCK rate or not during scan and sending management frames. This helps to send p2p probes at non-CCK rate. This ensures that P2P probe request/response/action frames are awlays sent at non CCK rates. Signed-off-by: Rajkumar Manoharan <rmanohar@qca.qualcomm.com> Signed-off-by: Guy Eilam <guy@wizery.com>
* P2P: Remove CCK supported rates when running P2P scanRajkumar Manoharan2011-11-153-2/+28
| | | | | | | | | | This allows drivers to disable CCK rates from Probe Request frames. For nl80211, this is currently applying only to the supported rates element(s), but this mechanism could be extended to address TX rate control masking, too, to lessen need for global rate disabling. Signed-off-by: Rajkumar Manoharan <rmanohar@qca.qualcomm.com> Signed-off-by: Guy Eilam <guy@wizery.com>
* Sync with include/linux/nl80211.hGuy Eilam2011-11-151-0/+20
| | | | Signed-off-by: Guy Eilam <guy@wizery.com>
* wpa_supplicant_8 - hostapd: Fix hostapd_cli for AndroidVishal Mahaveer2011-11-151-1/+15
| | | | | | | | | | | Changes for enabling use of hostapd_cli in Android. Similar to changes in wpa_cli. Usage: hostapd_cli -i<ifname> Change-Id: I04796f09a9585bcb66bb253d3b1337d4c0587e01 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant_8 - wpa_supplicant: wl12xx related change in Android.mkVishal Mahaveer2011-11-151-1/+3
| | | | | | | Since we are using TI chip, disable BRCM flag from Android.mk Change-Id: I2cc064b9bc3134a1de81c1566f4d8de2fa35baf4 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant_8 - Hostapd: Android related changes for socketsVishal Mahaveer2011-11-151-0/+4
| | | | | | | | Android related changes for socket handling. Similar to ctrl_iface.c in wpa_supplicant/ctrl_iface.c Change-Id: I3f72f5e4746ccdd007f647a923d41629afc17d94 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant_8 - hostapd: wl12xx related change in Android.mkVishal Mahaveer2011-11-151-1/+3
| | | | | | | Since we are using TI chip, disable BRCM flag from Android.mk Change-Id: I87da8a3eeaaa76625c91c348e6e1d49785b6a238 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* wpa_supplicant_8 - Hostapd: Android related changes for socketsVishal Mahaveer2011-11-152-0/+17
| | | | | | | | Android related changes for socket handling. Similar to ctrl_iface.c in wpa_supplicant/ctrl_iface.c Change-Id: I3f72f5e4746ccdd007f647a923d41629afc17d94 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
* Set ANDROID_LOG_NAME depending on applicationDmitry Shmidt2011-09-303-1/+11
| | | | | Change-Id: I8ef6f87c92b01a089817a4902d33bf5d0c3a5a7a Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* am fc41cadc: nl80211: Add get_noa() support for WFD certification (BRCM)Dmitry Shmidt2011-09-286-6/+117
|\ | | | | | | | | * commit 'fc41cadcff448cdd2b60e376fc6e7378e2e57b5e': nl80211: Add get_noa() support for WFD certification (BRCM)
| * nl80211: Add get_noa() support for WFD certification (BRCM)Dmitry Shmidt2011-09-286-6/+117
| | | | | | | | | | | | | | BUG: b/5367351 Change-Id: I14ed79e10ade205c5dd4cdc0d2e888ed1279d1bb Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* | WEXT: Add signal_poll command supportDmitry Shmidt2011-09-271-0/+2
|/ | | | | Change-Id: I9e407905ecde20d745acd41ec48d2e9f7ce84bca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* nl80211: Fix WFD and WPS certification problem for GO (BRCM)Dmitry Shmidt2011-09-271-32/+47
| | | | | Change-Id: I5bbac818aad7c0a14fddb3beb88a6a2d87c07ea0 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* nl80211: Prolong HANGED message to the wifi managerDmitry Shmidt2011-09-071-1/+10
| | | | | | | BUG: b/5167816 Change-Id: I6598304ed9634fc859d2970b0d86213b1dae3696 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* P2P fixes for BRCMDmitry Shmidt2011-09-064-5/+53
| | | | | | | | | | | | 1. Fix for stopping any on-going P2P-FIND, while doing a P2P-GROUP-ADD. 2. Fix for Supplicant crash. The crash was due to socket being closed during P2P-GROUP-REMOVE. 3. Append P2P DEV ADDR during AP-STA-CONNECTED Event for P2P Devices. For legacy STA, the event format would remain the same. BUG: b/5262575 Change-Id: I8faf2159d35538fd07e42dba82d367b581cf2164 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Set buffer length the same as in wpa_supplicant_ctrl_iface_process()Dmitry Shmidt2011-08-301-2/+2
| | | | | | | Bug: 5236589 Change-Id: Iae8405aa17d5cc6bbffcff3a37d81df74143aabe Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Use exact interface as socket parameter for initIrfan Sheriff2011-08-261-1/+1
| | | | | | | | | | | For p2p, there are virtual interfaces (like p2p-wlan0-X) created and that results in binding to the common init socket right now. Instead, have the init bind fail for p2p interfaces and create seperate sockets specified by the ctrl_interface path in config file Bug: 5002384 Change-Id: Ia155df079a0bcca1871b6bcab2ef7111f0cba6c1
* BRCM P2P updateDmitry Shmidt2011-08-2310-21/+94
| | | | | | | | | | | | - IFNAME for monitor interface is changed to m. from mon. This will give extra space for incrementing X in IFNAME (p2p-wlan0-X). Also, we have synced the reset of IFNAME w.r.t. monitor interface name. - Fixed continuous P2P_DEV_FOUND events coming from GO. Removed the BRCM specific change for this. - Fixed STATUS command for p2p interface. Change-Id: I04210dd0b2bdba06b0192c0a61edfa0e5b47ab72 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Fix reporting hidden APs during scanDmitry Shmidt2011-08-221-0/+2
| | | | | Change-Id: I2f3274c6f89ac0100331f4987c40e23f36577817 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* add cleanspec for hostapd failuresrepo sync2011-08-191-0/+1
| | | | | Bug: 5167816 Change-Id: Ic89fab506a119611ce1093eeac958538f9b97bb3
* Add CONFIG_ROAMING option (off by default)Dmitry Shmidt2011-08-162-0/+8
| | | | | Change-Id: I846edd8a48e6c5e948732f28caf821055490d320 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>