aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/Android.mk
Commit message (Collapse)AuthorAgeFilesLines
* eap_proxy: Extend Android.mk to support additional librariesNaresh Jayaram2013-12-081-1/+5
| | | | | | | | Allow addition static and shared libraries to be specified from the eap_proxy_*.mk file for Android build. In addition use $(LOCAL_PATH) as a prefix for that Android makefile part. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Reset MD5OBJS value before += operationDmitry Shmidt2013-11-091-0/+1
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Sync Android.mk with MakefileJouni Malinen2013-11-081-0/+4
| | | | | | | This brings in commit 411f56705019ac5b13b4daf62f423fceb3c703e2 changes to allow libdl to be linked in after OpenSSL. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Set proper path to keystore include dirDmitry Shmidt2013-11-081-4/+1
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Fix CONFIG_EAP_PROXY option and move it to right placeDmitry Shmidt2013-11-081-6/+7
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add CONFIG_IEEE80211AC option to makefileDmitry Shmidt2013-11-081-2/+8
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add CONFIG_EAP_UNAUTH_TLS option to makefileDmitry Shmidt2013-11-081-0/+11
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add liblogYing Wang2013-11-081-3/+3
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Switch keystore to binderKenny Root2013-11-081-1/+1
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Get rid of LOCAL_MODULE_TAGS := userJoe Onorato2013-11-081-1/+0
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Restore OpenSSL ENGINE supportKenny Root2013-11-081-3/+0
| | | | | | We now use an OpenSSL ENGINE to support keystore functionality. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Remove obsolete WPA_UNICODE_SSID defineDmitry Shmidt2013-11-071-3/+0
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Fix compilation without BOARD_WPA_SUPPLICANT_DRIVERDmitry Shmidt2013-11-071-6/+2
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add ANDROID_P2P define under BOARD_WLAN_DEVICEDmitry Shmidt2013-11-071-0/+13
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Fix CFLAGS -> L_CFLAGSDmitry Shmidt2013-11-071-2/+2
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add dfs.c into buildJouni Malinen2013-10-181-0/+1
| | | | | | | This fixes Android build after commit e76da5052980f301fe61f2fc0e1e7a5789716061 that added the new dfs.c file. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* EAP-EKE: Add peer implementationJouni Malinen2013-07-071-0/+16
| | | | | | This adds a new password-based EAP method defined in RFC 6124. Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove CONFIG_NO_WPA2 build parameterJouni Malinen2013-06-071-5/+1
| | | | | | | | | | There is not much use for enabling WPA without WPA2 nowadays since most networks have been upgraded to WPA2. Furthermore, the code size savings from disabling just WPA2 are pretty small, so there is not much justification for maintaining this build option. Remove it to get rid of undesired complexity. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Clarify keystore include directoriesJouni Malinen2013-05-181-0/+2
| | | | | | | | | This updates hostapd to build using the new keystore header file location and adds a note that the old frameworks/base/cmds/keystore can be removed at some point in the future when old Android releases do not need to be supported. Signed-hostap: Jouni Malinen <j@w1.fi>
* WNM: Enable CONFIG_WNM in Android.mkVinayak Kamath2013-05-161-1/+4
| | | | Signed-hostap: Vinayak Kamath <vkamat@codeaurora.org>
* Android: Use CONFIG_WNM mode consistentlyJouni Malinen2013-03-171-6/+2
| | | | | | | | Replace CONFIG_IEEE80211V with CONFIG_WNM to get more consistent build options for WNM-Sleep Mode operations. This is similar to the Makefile change in commit ad3872a3720df13d8fc1a4345a5f0a8c3a204b4e. Signed-hostap: Jouni Malinen <j@w1.fi>
* Android: Fix CONFIG_WNM use in Android.mkJouni Malinen2013-03-171-4/+4
| | | | | | | | This code was within ifdef CONFIG_AP and did not get included unless AP mode support was also enabled. This is similar to the Makefile change in commit 2dfb9a447c7b71e03d4f4a318b4f8d67244d57d1. Signed-hostap: Jouni Malinen <j@w1.fi>
* Android: Update Android.mk based on Makefile changesJouni Malinen2013-03-171-4/+37
| | | | | | | This brings the Android makefiles a bit closer to the Makefile changes that had been missed in the past. Signed-hostap: Jouni Malinen <j@w1.fi>
* Android: Sync makefile changes for HT/VHT overridesJouni Malinen2013-03-101-0/+8
| | | | | | | CONFIG_HT_OVERRIDES and CONFIG_VHT_OVERRIDES were already mentioned in android.config, but Android.mk did not yet know about them. Signed-hostap: Jouni Malinen <j@w1.fi>
* eap_proxy: Add mechanism for allowing EAP methods to be offloadedDeepthi Gowri2013-02-081-0/+6
| | | | | | | | | In addition to the offload mechanism, the Android configuration and makefiles are extended to allow this to be configured for the build by dropping in platform specific configuration files and makefile without having to modify any existing files. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Fix EAP-pwd server file name for wpa_supplicant AP buildsJouni Malinen2013-01-131-1/+1
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* SAE: Add support for FFC groupsJouni Malinen2013-01-121-0/+1
| | | | | | | | | | This allows FFC groups to be used with SAE. Though, these groups are not included in the default sae_groups value based on what is available since the FFC groups have the additional requirement of using a safe prime with the current implementation (or specification of the group order). Signed-hostap: Jouni Malinen <j@w1.fi>
* SAE: Use crypto wrappers instead of direct OpenSSL callsJouni Malinen2013-01-121-0/+5
| | | | | | | This makes the SAE implementation independent of the crypto/bignum library. Signed-hostap: Jouni Malinen <j@w1.fi>
* SAE: Add generation of the commit message fieldsJouni Malinen2013-01-121-0/+1
| | | | | | | This adds derivation of PWE and the needed commit values so that the full SAE commit message can be built. Signed-hostap: Jouni Malinen <j@w1.fi>
* Fix CONFIG_NO_WPA build with TLSJouni Malinen2012-12-181-0/+4
| | | | | | | The SHA1 and MD5 functions need to be included in builds that use TLS even if WPA support is removed. Signed-hostap: Jouni Malinen <j@w1.fi>
* Android: Fix AP builds to include the new eap_user_db.cJouni Malinen2012-11-211-0/+1
| | | | | | | This is needed to fix the builds after commit ee431d77a51b361b4697f2b737bcf46a1860a6fe. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* WPS: Remove deprecated UFD config method and OOB ctrl_ifaceJouni Malinen2012-11-111-6/+0
| | | | | | | | | | The UFD (USB flash drive) configuration method was deprecated in WSC 2.0. Since this is not known to be used, remove the UFD implementation from hostapd and wpa_supplicant to allow the WPS implementation to be cleaned up. This removes the now unused OOB operations and ctrl_iface commands that had already been deprecated by the new NFC operations. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Remove old OOB NFC interfaceJouni Malinen2012-10-281-9/+0
| | | | | | | | | | The old WPS interface for using NFC has no known deployments and even the binary libraries referenced here are not easily available anymore. Since the new interface for using NFC with WPS covers the same functionality, remove the old implementation to clean up WPS implementation. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add initial parts for SAEJouni Malinen2012-09-301-0/+4
| | | | | | | | | | | | | This introduces new AKM for SAE and FT-SAE and adds the initial parts for going through the SAE Authentication frame exchange. The actual SAE algorithm and new fields in Authentication frames are not yet included in this commit and will be added separately. This version is able to complete a dummy authentication with the correct authentication algorithm and transaction values to allow cfg80211/mac80211 drivers to be tested (all the missing parts can be handled with hostapd/wpa_supplicant changes). Signed-hostap: Jouni Malinen <j@w1.fi>
* Android: Add Wi-Fi Display into the makefileJouni Malinen2012-08-311-0/+5
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Include Hotspot 2.0 support in the default buildJouni Malinen2012-08-311-0/+12
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Add new keystore include path for JBJouni Malinen2012-08-311-0/+1
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* FIPS: Remove md5-non-fips.cJouni Malinen2012-08-191-3/+0
| | | | | | | | | | | Commit c9e08af24fd7dda3f21674cdc744579b8c38fa28 removed the only user of the special case MD5 use that would be allowed in FIPS mode in tls_prf_sha1_md5(). Commit 271dbf1594bea461ea2ea7946a773a30bfa254aa removed the file from the build, but left the implementation into the repository. To clean things up even further, remove this functionality completely since it is not expected to be needed for FIPS mode anymore. Signed-hostap: Jouni Malinen <j@w1.fi>
* OpenSSL: Implement SHA256 HMAC functions using HMAC APIJouni Malinen2012-08-161-0/+2
| | | | | | | Use the OpenSSL HMAC implementation instead of the internal sha256.c implementation of HMAC with SHA256. Signed-hostap: Jouni Malinen <j@w1.fi>
* Move SHA256-based PRF function into a separate C fileJouni Malinen2012-08-161-0/+1
| | | | | | | This makes it easier to conditionally build in SHA256 functions based on which TLS/crypto library is used. Signed-hostap: Jouni Malinen <j@w1.fi>
* FIPS: Use OpenSSL CMAC implementation instead of aes-omac1.cJouni Malinen2012-08-161-0/+5
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* FIPS: Mix in OpenSSL RAND_bytes() into random_get_bytes()Jouni Malinen2012-08-161-0/+4
| | | | | | | Make sure that the OpenSSL DRBG gets used when generating random numbers in FIPS mode. Signed-hostap: Jouni Malinen <j@w1.fi>
* OpenSSL: Implement SHA1 HMAC functions using HMAC APIJouni Malinen2012-08-161-0/+2
| | | | | | | Use the OpenSSL HMAC implementation instead of the internal sha1.c implementation of HMAC with SHA1. Signed-hostap: Jouni Malinen <j@w1.fi>
* Move SHA1-based PRF function into a separate C fileJouni Malinen2012-08-161-0/+1
| | | | | | | This makes it easier to conditionally build in SHA1 functions based on which TLS/crypto library is used. Signed-hostap: Jouni Malinen <j@w1.fi>
* OpenSSL: Use library function for PBKDF2 passphrase-to-PSKJouni Malinen2012-08-161-0/+2
| | | | | | | Use the OpenSSL PKCS5_PBKDF2_HMAC_SHA1() function instead of the internal implementation in sha1-pbkdf2.c. Signed-hostap: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Add optional remote access for ctrl_ifaceJanusz Dziedzic2012-08-051-0/+5
| | | | | | | | | Add new option for ctrl iface: CONFIG_CTRL_IFACE=udp-remote. This enables remote access to control interface via UDP port(s). This should be used for testing purpose only since there is no authentication or access control on the commands. Signed-hostap: Janusz Dziedzic <janusz.dziedzic@tieto.com>
* EXT PW: Add framework for supporting external password storageJouni Malinen2012-08-031-0/+11
| | | | | | | | | | | This new mechanism can be used to make wpa_supplicant using external storage (e.g., key store in the operating system) for passwords, passphrases, and PSKs. This commit is only adding the framework part needed to support this, i.e., no actual configuration parameter can yet use this new mechanism. In addition, only a simple test backend is added to allow developer testing of the functionality. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add a simple periodic autoscan moduleTomasz Bursztyka2012-06-261-0/+6
| | | | | | | This module will sets a fixed scanning interval. Thus, the parameter to this module is following this format: <fixed interval> Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
* Add autoscan module named exponentialTomasz Bursztyka2012-06-261-0/+6
| | | | | | | This module will compute the interval on a base exponential. Thus, params to this module are following this format: <base>:<limit> Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
* Add automatic scanning supportTomasz Bursztyka2012-06-261-0/+5
| | | | | | | | | | | | | | | | | | | Like bgscan, autoscan is an optional module based feature to automate scanning but while disconnected or inactive. Instead of requesting directly a scan, it only sets the scan_interval and the sched_scan_interval. So, if the driver supports sched_scan, autoscan will be able to tweak its interval. Otherwise, the tweaked scan_interval will be used. If scan parameters needs to be tweaked, an autoscan_params pointer in wpa_s will provide those. So req_scan / req_sched_scan will not set the scan parameters as they usually do, but instead will use this pointer. Modules will not have to request a scan directly, like bgscan does. Instead, it will need to return the interval it wants after each notification. Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>