hostap/src/rsn_supp
Pradeep Reddy POTTETI bb24229b26 TDLS: Pass peer's capability info to the driver in open mode
Commit 96ecea5eb1 did not consider
to pass the VHT/HT/WMM capabilities of the peer for BSS with
open mode.
Address this issue by passing the capabilities irrespective of
the security mode.

Signed-off-by: Pradeep Reddy POTTETI <c_ppotte@qti.qualcomm.com>
2014-04-29 17:08:13 +03:00
..
Makefile Add CONFIG_CODE_COVERAGE=y option for gcov 2013-11-24 19:16:12 +02:00
peerkey.c Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
peerkey.h rsn_supp: Do not track expiration time 2013-12-24 07:33:25 +02:00
pmksa_cache.c rsn_supp: Use monotonic time for PMKSA cache expiry 2013-12-24 07:50:26 +02:00
pmksa_cache.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
preauth.c Skip network disabling on expected EAP failure 2014-01-08 16:42:15 +02:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Pass peer's capability info to the driver in open mode 2014-04-29 17:08:13 +03:00
wpa.c Reduce the amount of time PTK/TPTK/GTK is kept in memory 2014-04-16 01:29:27 +03:00
wpa.h Remove unused wpa_sm_get_param() function 2014-04-05 20:42:12 +03:00
wpa_ft.c Enable FT with SAE 2013-12-29 10:00:31 +02:00
wpa_i.h Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
wpa_ie.c Allow management group cipher to be configured 2014-03-14 21:58:45 +02:00
wpa_ie.h TDLS: Use QoS info from WMM IE obtained in TDLS frames 2014-03-12 22:39:11 +02:00