aboutsummaryrefslogtreecommitdiff
path: root/hs20
diff options
context:
space:
mode:
authorSunil Ravi <sunilravi@google.com>2023-01-17 23:58:31 +0000
committerSunil Ravi <sunilravi@google.com>2023-02-16 16:50:59 +0000
commit38ad1edd94f7b4f3c3937dd21a9b7ef52140babf (patch)
tree45456687842b82540100cfdaddba9a86ea7d49ae /hs20
parent1d9b41ed87583852244c7aedd236cc110d2917f5 (diff)
downloadwpa_supplicant_8-38ad1edd94f7b4f3c3937dd21a9b7ef52140babf.tar.gz
[wpa_supplicant] Cumulative patch from commit 257b119c2
Bug: 217966931 Test: Verify Passpoint ANQP functionality and Passpoint association Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic Test: Regression test b/218404053 (Bug: TBD) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open sourcie 257b119c2 QCA vendor attribute of update roaming cached statistics info 18436f393 Enhance QCA vendor interface for Concurrent AP Policy for XR 58fba11e1 Enhance QCA vendor interface with new hang reason codes 0f3f9cdca dpp-nfc: Try to request with alternative URL in additional cases 8b36248cd Add QCA vendor command to get the monitor mode status 0dd8bcef8 QCA vendor attributes for MLO and EHT capabilities e5602989c QCA vendor attributes to configure EHT capabilities d9d5e55c5 DPP: Respond to GAS on the same channel it was received on 651c9e957 Add new status code strings 3a2d27552 Make MFPR value from an associated STA available as hostapdMFPR 546debd5e Force MFPR=1 to be used on the 6 GHz band f9c6ab834 P2P: Support preferred GO band based optimization for scanning 093bedc05 P2P: Allow persistent group join retry limit to be configured via D-Bus 8717110db Do not flush PMKSA cache on restoring dedicated per-ESS MAC address 1d4027fdb Make random MAC address style parameters use common enum values 681856c35 Check both sec and usec values to see if MAC address was changed bdbb6e003 wpa_supplicant: Handle MAC address randomization changes for same ESS 4bd1efe07 dbus: Do not bring down primary interface when removing created AP interface f4096e7cd EHT: Update EHT Operation element to P802.11be/D2.3 in AP settings e869fdfee wpa_supplicant: Use MLD address in SAE authentication 8c0f83ae8 SME: Accept Authentication frame from an MLD AP 23039f5e4 SME: Add support for handling association with MLD 8f89661df SME: Add support for handling authentication with MLD 694a1c687 SAE: Make sme_sae_auth() return IE offset 870edfd67 WPA3: Update transition disable bitmap based on port authorized event 8fdf3c447 Sync with wireless-next.git include/uapi/linux/nl80211.h f9804e306 nl80211: Enforce unique address for AP iftype 87bad8afa dbus: Pass in MAC address in CreateInterface method b0722cf75 dbus: Fix a memory leak on error path in CreateInterface method a7f6b8518 crypto: Check if crypto_bignum_to_bin() is successful 2749a2c6b nl80211: Actually get and store TX retries 998aeca3c crypto: Clear secrets from stack in hmac_sha256_vector() 909864ab1 HS 2.0: Restore ifdef for DEFINE_STACK_OF in est.c af0ab435a PASN: Use the assigned status code from IEEE P802.11az/D7.0 3d798ff2a PASN: Align RSNXE with IEEE P802.11az/D7.0 definitions ab2cb379d Define all assigned BSS membership selector values ed0a7b480 wpa_supplicant: Implement HE membership selector check 054fcfab6 hostapd: Add require_he configuration c46351d10 DFS: Clear cac_started when AP is disabled 3df42cf3c EHT: Use HE operating channel width in MCS length calculation 23e31eb68 SAE: Support cross AKM roaming between SAE AKMs in external auth case a17026707 PASN: Avoid clearing secure context for the PASN deauthentication event 75a9c4bd4 Add new attributes in SCS rule config QCA vendor subcommand 7d8b96dcf wpa_supplicant: Apply same restrictions for MLD as for 6 GHz BSS 7216f79b9 nl80211: Support get_sta_mlo_info for SME-in-wpa_supplicant drivers 06eb608d5 nl80211: Handle scan results with MLD connection 033a57d26 nl80211: Get MLO support capability 32b745448 wpa_supplicant: Make valid_links u16 a2c4c0b1b nl80211: Support MLD association request a134b4dc5 nl80211: Add support for MLD authentication e3e68668c ctrl_iface: Report RNR and ML in BSS command 5f17763ad common: Combine definitions for Multi-Link and per STA profile control 7a7ce9574 dbus: Emit more information over D-Bus ad4fa5dd3 Add more nl80211 info to struct wpa_signal_info 090f0f8c7 mbssid: Indicate MBSSID information in RNR a1c4adda1 mbssid: Add nl80211 support 54b1352ef mbssid: Make the AID space shared 10749c3c4 mbssid: Process Known BSSID element 15690faad mbssid: Add MBSSID Configuration element fc2e4bac5 mbssid: Set extended capabilities a004bf2cd mbssid: Configure parameters and element data c5a09b051 mbssid: Add Non-Inheritance element 920b56322 mbssid: Functions for building Multiple BSSID elements 931e5d4f9 mbssid: Configure all BSSes before beacon setup 78d0b9899 mbssid: Retrieve driver capabilities 7452e5447 mbssid: Add new configuration option bb67d5b52 AP: Add testing option to delay EAPOL Tx 1897abad9 dbus: Add D-Bus property for current MAC address 1a800a940 EAP-TEAP server: Allow tunneled EAP method sequence to be optimized f791b5bbc EAP-TEAP peer: Process Crypto-Binding TLV before EAP Payload TLV 5a9bd8a06 EAP-TEAP: Use EAP-FAST-MSCHAPv2 in the tunnel 364b6500b EAP-FAST: Move EAP-MSCHAPv2 special MSK handling into MSCHAPv2 81dedfbd7 nl80211: Increase the scan frequencies buffer 9a2781f24 wpa_supplicant: Support throughput estimation for EHT rates 755aaeb97 wpa_supplicant: Add missing memory allocation checks 69725c4cf OpenSSL: Fix BN_rshift() argument order e9b4ad236 OpenSSL: Apply connection flags before reading certificates bbd5a4689 SAE: Add an enum for defining sae_pwe parameter values 3a0edb2cd SAE: Enable H2E for 6 GHz BSS 20bfd4feb AP: Enable H2E on 6 GHz when SAE is used b43e19f3f WPS: Cross band overlap detection with multiple interfaces e2d88f86e DPP: Expose own and peer bootstrap info ids on authentication success 043dedee8 DPP: Expose enrollee pubkey hash for identification 2d8974e31 DPP: Move DPP_EVENT_AUTH_SUCCESS to a helper d8d2b3a33 Implement read-only mode for SSIDs from the additional config (-I) 4cb23b66d ACS: Allow selecting a better channel when using 40/80/160 MHz 472101684 ACS: introduce acs_adjust_secondary 60e2934cb ACS: Introduce acs_get_bw_center_chan() ed8e13dec ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan() 9025def55 wpa_supplicant: Add support for pregenerated MAC 5da3e1ca4 mesh: Do not allow open mode key in 6 GHz 50a9b7d3d P2P: Include only 6 GHz PSCs in full scan 0d6cd88ee DPP: Use existing TCP connection to replay duplicate Presence Announcement 6af717f73 DPP: Don't close TCP connection for duplicate Presence Announcements 46e6b72b7 Add a callback to notify added PMKSA cache entry details af1528a12 hostapd: Add RELOAD_BSS bc2b88b25 hostapd: Add config_id to GET_CONFIG output b37c3fbad hostapd: Add config_id parameter 46f6a3277 Split BSS-specific hostapd_clear_old_bss() from hostapd_clear_old() 2afb9b1a5 dbus: Add dbus notify when wpa_s->key_mgmt changes 98e9d553f nl80211: Check previous MAC address for locally-generated-deauth 87ffa1bec wpa_supplicant: Convert SSID into printable form before printing 416386060 Mark authorization completed on driver indication during 4-way HS offload da2ec9459 D-Bus: Split set_cred_properties() into two functions f5ce680ee D-Bus: Hotspot 2.0 credentials with multiple domains 2f739c71c ctrl: Fix compilation with UDP control interface 6d4548187 RSN: Split EAPOL-Key msg 3/4 processing for WPA(v1) 5b7957b7e RSN: Split EAPOL-Key msg 1/4 processing for WPA(v1) e5dfce38f RSN: Split EAPOL-Key group msg 1/2 processing more completely for WPA(v1) 5ab43c738 RSN: Split WPA(v1) processing of EAPOL-Key frames into a separate function f7fd891c7 Fix a typo in driver ops poll() documentation 3268ec0ac HS20: Use required_home_ois in hs20-osu-client 58eb905ad HS20: Support credentials with multiple home OIs 0143dc1cb OpenSSL: Load OpenSSL 3.0 legacy provider but let default be loaded fef4c6cb0 OpenSSL: Don't provide implementation of DES/RC4 for FIPS builds 1d42dafce RSN: Do not include RC4 use in FIPS builds df5ae2aad Add more detailed description of RADIUS attributes in EAP user file 0ba266d86 dbus: Add virtual interface create/remove logic to be inline with ctrl_iface 5102d7411 wpa_passphrase: Disable terminal echo when reading from stdin 86ab28217 PASN: Fix passing own address and peer address to pasn_deauthenticate() a9062432e wpa_cli: Fix PASN control interface commands b6d3fd05e FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP) ef70f814a Add a new QCA vendor attribute to configure wifi calling (wfc) state 05ec48568 WPS: Pick WPS AP based on latest received WPS IE ca4fa867d Enable PMF automatically if OCV is enabled c823197bd SAE: Use Challenge Failure status code in confirm message failure cases 65c8633d9 Allow a lower priority BSS to be tried after network disabling e91ac53d5 DFS: Do not allow channel checks to go beyond the channel list f96dfdeef PASN: Fix missing libraries for libpasn.so on Android 91d148f50 PASN: Fix is_pasn_auth_frame() for mgmt tx status frames b6c38cee9 Skip CAC if the driver switches channel to non-DFS 080afc03d Add hostapd control interface command to stop logging to file 0fd13c90e Add QCA vendor interface for AP doze mode configuration 4e1f55a11 Roam control configuration for 6 GHz in full scan only on prior discovery 34d93b0c9 HS 2.0: Deauthenticate STA on deauth-imminent more quickly if no URL 2e40f969b nl80211: Fix wrong requested links bitmap in sta_mlo_info.req_links b6e226496 MLD STA: Fix IGTK and BIGTK MLO KDEs validation 2050130be Add a vendor attribute for roam control configuration for full scan 12f16c27b TLS: Fix unsigned int underflow in internal TLS 1.0/1.1 implementation 802b67bce Update tls_connection_set_verify() documentation to verify_peer=2 0202b9774 DPP: Fix memory leak of intro.peer_key in station handling f723f7f8a P2P: Check dev pointer consistently when building PD Response 30403e965 WPS: Check NDEF record length fields separately cd0e8653a TDLS: Use stored FTE length in MIC calculation 7e85e24f3 TDLS: Use stored peer RSNE length in MIC calculation 40a42613e FT: Simplify FTE parsing for FT-SAE-EXT-KEY using MIC Length subfield 5ea7a2f54 DPP: Drop PMKSA entry if AP reject association due to invalid PMKID 4840b45a2 Fix empty pmksa_cache_get() 3abd0c471 SAE: Print rejection of peer element clearly in debug log 9ff778fa4 Check for own address (SPA) match when finding PMKSA entries 9f04a9c8d Store own MAC address (SPA) in supplicant PMKSA cache entries 309765eb6 PASN: Use separate variables for BSSID and peer address 42f0c44d8 PASN: Use peer address instead of BSSID as the destination for initiator 15583802b nl80211: Allow up to 64-byte PMK in NL80211_CMD_SET_PMKSA bbe5f0c1e FT: Do not try to use FT protocol between mobility domains b92f61885 Don't use default RSNE/RSNXE when the driver indicates cross SSID roaming d7febe33f MLO: Remove unnecessary debug prints about clearing AP RSNE/RSNXE 16d913bfd Define AFC vendor commands and events 46f5cf928 OpenSSL: Fix additional HPKE corner cases bdc35acd5 SAE: Allow loading of the password from an external database 48dd8994a Fix external passwords with 4-way handshake offloading e5a7c852c systemd: Use interface name in description of interface-specific units a0628f8a5 OpenSSL: Remove unused assignment from HPKE expand 3e1a04afa nl80211: Check that attribute addition succeeds in offloaded PASN case 0658a22ef GAS: Try to make buffer length determination easier for static analyzers 271ce71c7 FT: Fix PMK-R0 derivation for FT-SAE-EXT-KEY with SHA512 2f61d703a MLD STA: Group key handshake processing for GTK/IGTK/BIGTK rekeying f0760aa6d MLD STA: Use AP MLD address as destination for 4-way handshake EAPOL-Key frames 8f2e493be MLD STA: Validation of MLO KDEs for 4-way handshake EAPOL-Key frames f15cc834c MLD STA: Processing of EAPOL-Key msg 3/4 frame when using MLO 08512e5f3 MLD STA: Extend key configuration functions to support Link ID a4adb2f3e MLD STA: Configure TK to the driver using AP MLD address fa5cad61a MLD STA: Use AP MLD address in PMKSA entry 052bf8a51 MLD STA: Use AP MLD address to derive pairwise keys e78437256 MLD STA: Add MLO KDEs for EAPOL-Key msg 2/4 and 4/4 472a0b8d6 MLD STA: Set MLO connection info to wpa_sm cc2236299 nl80211: Get all requested MLO links information from (re)association events 1ca5c2ec2 PASN: Fix spelling of RSNE in debug messages a43536a72 PASN: Verify explicitly that elements are present before parsing 7e3852407 PASN: Fix MIC check not to modify const data 8481c7509 PASN: Fix Authentication frame checks f899d7f37 dbus: Apply PMK properties immediately c6f8af507 Add option to disable SAE key_mgmt without PMF 7ad757ec0 Document crypto_ec_key_get_subject_public_key() to use compressed format 6527a7656 DPP: Stop listen mode for chirp-initiated Authentication exchange 2e7339442 P2P: Discount current operating frequency when scanning new connection 00a762c26 Do not drop connection attempt when reconnecting to the same ESS 368de263b P2P: Skip Extended Listen timeout to allow scans during group formation cff55f348 P2P: Clone sae_pwe config to new group interface config ae517789f P2P: Allow PSC channel to be used for 6 GHz BW40 9c830d917 P2P: Track peer 6 GHz capability more robustly 1ca403a8b Add QCA vendor subcommand to notify about primary netdev 70d89f90e A vendor roam control configuration for delaying hand off for RX fff81a468 PASN: Change pasn_use_384() to be a non-static function ea241cbe9 PASN: Rename struct wpas_pasn to pasn_data 6be84343a PASN: Add pairing verification wrapper function for Wi-Fi Aware 325236948 PASN: Mark wpas_pasn_start() comeback argument const b1ed44b6a PASN: Allow extra elements to be added into PASN Authentication frames 08abcdf4e PASN: Makefile and Android.mk changes for libpasn.so 78c5bb7f5 PASN: Move responder functionality into a separate file c7edfce79 PASN: Move initiator changes into a separate file 975b7a02c Move SAE comeback token functionality into a separate file 1711fe912 PASN: Compute MIC from RSNE and RSNXE of the frame for Wi-Fi Aware 6f80014b1 PASN: Allow custom PMKID in Authentication frames for Wi-Fi Aware e99047da2 PASN: Add a handler func to send mgmt frames to the driver from AP 4022ffc5d PASN: Store AKMP in the PTKSA cache c55eadede PASN: Remove hapd dependency in processing PASN Authentication frames 6dc833bc5 PASN: Remove hapd dependency for PASN and SAE comeback 1861f5716 PASN: Remove hapd dependency for pasn_derive_keys() 1fa266e99 PASN: Remove hapd dependency for SAE and FILS wrapped data bc9fbe1b2 PASN: Common wpas_pasn structure for initiator and responder 14b5ebce7 PASN: Add a common header file for initiator and responder af5eec3b3 PASN: Function handler to transmit Authentication frames 629bbc91b PASN: Remove dependency of wpa_ssid for initiator e7f45ca11 PASN: Remove wpa_s dependency for wpas_pasn_start() 0be131265 PASN: Remove wpa_s dependency for wpas_pasn_build_auth_1() 086ccdc59 PASN: Remove wpa_s dependency for the functions processing RX frames e2e87b90b PASN: Remove wpa_s dependency for wpas_pasn_auth_tx_status() de4b73a36 PASN: Remove wpa_s dependency for FILS wrapped data 90bb73c51 PASN: Remove wpa_sm dependency to add an entry to PMKSA cache 5313e5a79 PASN: Remove unused wpa_s parameter for wpas_pasn_sae_setup_pt() f636cbd04 PASN: Remove wpa_s dependency for SAE wrapped data functions 5535fbcfa PASN: Add wpa_pasn_reset() to eliminate need for struct wpa_supplicant 10e455c44 Enable use of PMKSA caching independent of RSN supplicant state machine 1d0ee1908 Fix the vendor ID assignment for configuring periodic sounding b17b86da4 QCA vendor attribute to configure periodic sounding 6f3efa21c MLD STA: Fix crash caused by NULL wpa_s->current_ssid ef5a9a009 nl80211: Fix parsing PASN peer and src addresses from vendor nl attributes 2c55c9273 More debug prints for EAPOL-Key message generation (Authenticator) 90cef4f21 MLD STA: Fully clear MLO info to avoid use of uninitialized members 496a1ced1 MLD STA: Use MLD addresses for sending non-Public Action frames 17ae98873 MLD STA: Support processing of M1 received before association event 9dafad1ea EHT: Definitions for STA Control fields of Basic Multi-Link element 1fbea7d43 EHT: Multi-Link element defragmentation ec03b71ee common: Refactor element defragmentation 347ea8f0a EHT: Parse Multi-Link elements 73f540b6a MLD STA: Fetch MLO association Link ID info to core wpa_supplicant ee46b7d6d nl80211: Check MLO link status info in NL80211_CMD_CONNECT 6e015cd45 RADIUS: Add Filter-Id attribute 06800f612 Add QCA vendor attributes for EHT support in external ACS 042368663 Vendor attribute to configure QoS/AC upgrade for UDP frames e5d15e225 EHT: Allow EHT to be disabled using disable_eht=1 in wpa_supplicant 041f6cea9 SAE: Accept FT and -EXT-KEY AKMs for external auth b72922796 P2P: Get cached scan results on iface creation to avoid scan 8392ea9e7 SAE: Fix AKM suite selector check for external authentication ebe6a7c94 FT: Cover variable length KCK in function documentation eda4ba081 FT: Reassociation Response frame validation for FT-SAE-EXT-KEY 0f7253d35 FT: Response processing for FT-SAE-EXT-KEY a1eb1bb0e FT: Supplicant side FTE generation for FT-SAE-EXT-KEY 883e33594 FT: Authentication request frame processing for FT-SAE-EXT-KEY 879363bbc FT: Reassociation Request frame parsing for FT-SAE-EXT-KEY e8f23c948 FT: Association Response frame FTE generation for FT-SAE-EXT-KEY a76a314c1 FT: Extend PMK-R0 derivation for FT-SAE-EXT-KEY 79cd846b2 FT: Extend PTK derivation for FT-SAE-EXT-KEY 39b60f334 FT: Extend PMK-R1 derivation for FT-SAE-EXT-KEY fb4fc704c FT: Debug print FTE subelements during parsing 25b52e5f8 FT: Extend FTE parsing for FT-SAE-EXT-KEY 4f58afee9 FT: Extend MIC derivation for FT-SAE-EXT-KEY dcd46edf5 FT: Extend PMKR1Name derivation for FT-SAE-EXT-KEY 9fd245564 FT: Support longer SAE PMK for FT in INITPSK AP c41bd98be FT: AP mode FTE writing to support FT-SAE-KEY-EXT efa0f51d3 FT: Accept 512-bit PMK-R1 from RRB eb0821c90 Add service class id attribute in SCS rule config vendor subcommand 5607abe2e WNM: Print unsupported neighbor report subelements in debug log fcdd76fa2 Interworking: Print unsupported inner EAP-TTLS method in debug log f8a05de66 Move default action from after switch to within 7614fcebe ACS: Filter out 6 GHz channels if HE or EHT is not enabled 1864664ca Android: Delay QCA roam+auth event until NL80211_CMD_ROAM is received 5f3cdc064 Override ieee80211w from pmf for AP mode in wpa_supplicant 2b972a35b DPP: Require PMF when profile is for SAE without PSK 8219d2b7d PASN: Fix CONFIG_PASN=y build without CONFIG_IEEE80211R=y Change-Id: Ifd6be0d096df54c13162fdda164cd8e804a51692
Diffstat (limited to 'hs20')
-rw-r--r--hs20/client/est.c2
-rw-r--r--hs20/client/osu_client.c11
2 files changed, 8 insertions, 5 deletions
diff --git a/hs20/client/est.c b/hs20/client/est.c
index c3f27e1e..5c6e2f67 100644
--- a/hs20/client/est.c
+++ b/hs20/client/est.c
@@ -218,7 +218,9 @@ typedef struct {
} d;
} AttrOrOID;
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L
DEFINE_STACK_OF(AttrOrOID)
+#endif
typedef struct {
int type;
diff --git a/hs20/client/osu_client.c b/hs20/client/osu_client.c
index 01e7b755..2ca85f96 100644
--- a/hs20/client/osu_client.c
+++ b/hs20/client/osu_client.c
@@ -1231,12 +1231,13 @@ static void set_pps_cred_home_sp_oi(struct hs20_osu_client *ctx, int id,
homeoi, required);
if (required) {
- if (set_cred(ctx->ifname, id, "required_roaming_consortium",
- homeoi) < 0)
- wpa_printf(MSG_INFO, "Failed to set cred required_roaming_consortium");
+ if (set_cred_quoted(ctx->ifname, id, "required_home_ois",
+ homeoi) < 0)
+ wpa_printf(MSG_INFO,
+ "Failed to set cred required_home_ois");
} else {
- if (set_cred(ctx->ifname, id, "roaming_consortium", homeoi) < 0)
- wpa_printf(MSG_INFO, "Failed to set cred roaming_consortium");
+ if (set_cred_quoted(ctx->ifname, id, "home_ois", homeoi) < 0)
+ wpa_printf(MSG_INFO, "Failed to set cred home_ois");
}
xml_node_get_text_free(ctx->xml, homeoi);