aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-12-25Snap for 6096803 from b6aaecce75ee949b03da891a6a0c4ad382f7b4ee to ↵android-10.0.0_r36android-10.0.0_r35android-10.0.0_r34android-10.0.0_r33android-10.0.0_r32android-10.0.0_r31android-10.0.0_r30android10-qpr2-s4-releaseandroid10-qpr2-s3-releaseandroid10-qpr2-s2-releaseandroid10-qpr2-s1-releaseandroid10-qpr2-releaseandroid-build-team Robot
qt-qpr2-release Change-Id: I43b6ba140f6273bf955d42f6bd595828a343fef2
2019-12-24p2p: check p2p instance in all asynchronized callbacksJimmy Chen
If cancelConnect is not called, the scan retry callback would be called several times. If P2P is disabled in this period, these asynchronized callbacks would access de-initialized p2p instance and result in native crash. Bug: 141773120 Test: atest VtsHalWifiSupplicantP2pV1_2TargetTest Change-Id: Ifc1b397a6c48044b3ef10f110cd89186e2e27a8d
2019-12-12Snap for 6066307 from eee89435cb5f722da6a4298d9fa19144f5bcdf10 to ↵android-build-team Robot
qt-qpr2-release Change-Id: I38d1a1de33404009fd8121102f8b877a31f4a4c9
2019-12-10p2p: early return if p2p interface is not available yet.Jimmy Chen
addGroup_1_2 would access global p2p instance in several places internally. If p2p interface is not available, just return failure at the beginning. Fixes: 141773120 Bug: 141773120 Test: atest VtsHalWifiSupplicantP2pV1_2TargetTest Change-Id: I424d5fd35c6f2dd84833141262988a052bf00871
2019-10-31Snap for 5977604 from 0d03c17ee5f547ecbb3654330bb37d12475194f7 to ↵android-build-team Robot
qt-qpr2-release Change-Id: I526cb5373891a6c796c99cfe326188aa4e779f5e
2019-10-29p2p: handle terminated p2p interface during join scanJimmy Chen
Fixes: 141773120 Bug: 141773120 Test: atest VtsHalWifiSupplicantP2pV1_2TargetTest Change-Id: I5162fabeea9acb5910b3d8da463a0fcfc8f25cdb
2019-10-17Snap for 5945193 from a434a5e73983647993194e4c6a04cd55c8f11e47 to ↵android-build-team Robot
qt-qpr2-release Change-Id: I6bf91c09384237028226eb952cbda9b343076433
2019-10-15Merge "Revert Revert "wpa_supplicant(hidl): Set 'ieee80211w' when PMF ↵Sunil Ravi
required"" into qt-qpr1-dev
2019-10-15Revert Revert "wpa_supplicant(hidl): Set 'ieee80211w' when PMF required"Sunil Ravi
This commit reverts I4e72f720eeb311e039c94c5a67ecb49d92969741. Reason for revert: Wifi connection fails when AP advertize PMF required. This is bringing back Change id Ie5efcb41bbdd4d88ae28d9665d5fc621535dabbe. ie, Global opt 'pmf' determines whether to enable/require PMF by default. This can be overwrite by the per-network opt 'ieee80211w'. Now hidl always sets 'ieee80211w' to 'disabled' or 'PMF required', which makes the global opt 'pmf' not take effect. Change hidl to set 'ieee80211w' only when PMF required, and in other cases, PMF is determined by global opt 'pmf' The IOT issue faced with Ie5efcb41bbdd4d88ae28d9665d5fc621535dabbe is solved through supplicant workaround 824cb5a530a8fc07666f940f104353458f257612, which ignores the IGTK configuration errors due to wrong IGTK keyidx. Bug: 131267738, 140372352 Test: Regression test Change-Id: I4c120e1f094a7b039837779f58d15cfc7f68d697 Merged-In: I4c120e1f094a7b039837779f58d15cfc7f68d697
2019-10-05Snap for 5922641 from b18a958c2e1e80bc802ecc298965b2658486737c to ↵android-build-team Robot
qt-qpr2-release Change-Id: Ibf7fae7d19b3788a2b37f5bb98532b1dcbcf71e9
2019-10-03WPS: Update MAC address on address changesMikael Kanstrup
The WPS component keeps a copy of the network interface MAC address. When MAC address is changed the WPS copy was not updated so WPS M1 message contained the old address. Some devices check this field and fail connection attempts. Update the WPS MAC address on interface MAC address changes. (cherry-picked from 8788a314d7897c90195c6f94810f55b2ba6e7190) Bug: 140748809 Test: manually test with some TVs (WFD sink) Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sony.com> Signed-off-by: Daichi Ueura <daichi.ueura@sony.com> Change-Id: Id8b7ec54bdbbf8b18416af6e3063af163344f5b1
2019-08-13Do not clear anonymous id when anonymous@<realm> is usedHai Shalom
am: ef6ae566f2 Change-Id: Ifee32ee5b3b07bbda7edcead7898baa88710f74d
2019-08-13Do not clear anonymous id when anonymous@<realm> is usedHai Shalom
If the EAP-SIM/AKA server does not provide a new pseudonym and the locally configured "pseudonym" in anonymous_identity is actually an anonymous identity instead of a real EAP-SIM/AKA pseudonym, do not clear the anonymous_identity network profile parameter. This is needed to avoid forgetting the anonymous identity when going through EAP-SIM/AKA authentication and then reverting back to using IMSI-based (e.g., encrypted) identity. Bug: 138610772 Test: Associate to <carrier> AP, get out of range, reassociate Test: Associate to <carrier> AP, pop SIM, reinsert, reassociate Change-Id: I41819a22005848d37d5247ebf6543bb66ea78fce (cherry picked from commit afd394b5a79e48be55dd82fcaf6782e7ed6cc77a)
2019-08-02Do not clear anonymous id when anonymous@<realm> is usedHai Shalom
If the EAP-SIM/AKA server does not provide a new pseudonym and the locally configured "pseudonym" in anonymous_identity is actually an anonymous identity instead of a real EAP-SIM/AKA pseudonym, do not clear the anonymous_identity network profile parameter. This is needed to avoid forgetting the anonymous identity when going through EAP-SIM/AKA authentication and then reverting back to using IMSI-based (e.g., encrypted) identity. Cherry picked from master. Bug: 138610772 Test: Associate to <carrier> AP, get out of range, reassociate Test: Associate to <carrier> AP, pop SIM, reinsert, reassociate Change-Id: I41819a22005848d37d5247ebf6543bb66ea78fce
2019-06-26p2p: return FAILURE_ARGS_INVALID if MAC randomization is not supportedJimmy Chen
am: cf890b898d Change-Id: Ic5378a02a67beb7916f9a7f6b7b38ca7874740b9
2019-06-26p2p: return FAILURE_ARGS_INVALID if MAC randomization is not supportedandroid10-devJimmy Chen
Bug: 135247522 Test: atest VtsHalWifiSupplicantP2pV1_2TargetTest Change-Id: I7b2875a2eab33c85859f80774c7946011ce5c947
2019-05-30Merge "[wpa_supplicant] Add support for anonymous@<realm>" into qt-devEtan Cohen
am: 811b01bb75 Change-Id: I68339a86b473cc19a34b295e66375762fe87f07b
2019-05-30Merge "[wpa_supplicant] Add support for anonymous@<realm>" into qt-devEtan Cohen
2019-05-30[wpa_supplicant] Fix a regression in storing of external_auth SSID/BSSIDHai Shalom
am: 6690473353 Change-Id: If4e12166ae4d143a97881712d1e540e94ea936a1
2019-05-29[wpa_supplicant] Fix a regression in storing of external_auth SSID/BSSIDHai Shalom
An earlier change in drivers_ops API for struct external_auth broke the way SSID and BSSID for an external authentication request were stored. The implementation depended on the memory array being available in the API struct with a use of memcpy() to copy the full structure even though when only SSID and BSSID was needed. Fix this by replacing that easy-to-break storing mechanism with explicit arrays for the exact set of needed information. Bug: 133798691 Test: Associate/disassociate to/from WPA3 SAE APs Cherry-picked from: d42df8d6ce81d47aea8059c45e3db5c51897f7e8 Change-Id: I02e2703a3b0a8b6dd3163783a196ded4b8f200d3
2019-05-29[wpa_supplicant] Add support for anonymous@<realm>Hai Shalom
SIM based EAP authentication with IMSI encryption requires a special EAP Identity response: anonymous@realm. Then the server sends AKA-Identity request which is answered with the encrypted IMSI. Add logic that indicates if the special anonymous identity is used. Otherwise, this field is used for storing the pseudonym. Test: Connect to Carrier Wi-Fi, verify correct behavior from captures Test: Connect to non IMSI encrypted EAP-AKA AP, verify pseudonym usage Bug: 133431451 Change-Id: Ifb7fdde0bed8e066037bc71184426fe689295a77
2019-05-02Merge "[wpa_supplicant] Cherry-pick security fixes (April 29, 2019)" into qt-devTreeHugger Robot
2019-05-01[wpa_supplicant] Cherry-pick security fixes (April 29, 2019)Hai Shalom
09ab81b9e WPA: Clear authenticator keys for a STA on deinit/disconnection 7958223fd EAP-pwd: Use const_time_memcmp() for pwd_value >= prime comparison 8e14b030e SAE: Use const_time_memcmp() for pwd_value >= prime comparison c3805fb62 Ignore channel switch event if AP interface is not yet ready eb314e8af Verify that channel info is available in hostapd_hw_get_channel() b9058266f Clear cached extended_capa pointers on hapd_deinit() call Bug: 129344244 Test: Connect to SAE network Test: Connect to EAP network Test: Enable/disable SoftAP Test: Regression test (Bug: 131703857) Change-Id: Iac0d8a7972b905da0d0f0f7414f1eea910b8986b
2019-05-01Merge "[wpa_supplicant] Fix merge error that broke ↵TreeHugger Robot
VtsHalWifiSupplicantP2pV1_0Target" into qt-dev
2019-04-30[wpa_supplicant] Fix merge error that broke VtsHalWifiSupplicantP2pV1_0TargetHai Shalom
Fix merge error in notify.c that broke VTS test case VtsHalWifiSupplicantP2pV1_0Target. Revert the code, and remove code related to old dbus interface which has been removed from the upstream version. Bug: 131376215 Test: vts-tradefed run commandAndExit vts --skip-all-system-status-check --primary-abi-only --skip-preconditions --module VtsHalWifiSupplicantP2pV1_0Target Test: vts-tradefed run commandAndExit vts --skip-all-system-status-check --primary-abi-only --skip-preconditions --module VtsHalWifiSupplicantV1_0Host Change-Id: I8248ebb3d7b66a2584408b74bc3ac6bba6877a6e
2019-04-23Merge "Enable SAE Fast Transition key management in HIDL" into qt-devTreeHugger Robot
2019-04-23Enable SAE Fast Transition key management in HIDLHai Shalom
Enable SAE Fast Transition key management in HIDL. Keep FT/PSK and FT/EAP in the framework for backward compatibility with older supplicant HALs. Bug: 131102354 Test: Connect to WPA2-Personal network Test: Connect to WPA3-Personal network Test: Connect to WPA3-Enterprise network Test: Connect to OWE network Test: Connect to Open network Test: DPP ACTS: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: atest SupplicantStaNetworkHalTest Change-Id: Ia43799bdd4be8a6efd5aad643fc33574801b0ee4
2019-04-23p2p: use calloc to ensure the zero-terminatorJimmy Chen
The fequency parameter of scan function is a list. The last one must be zere to indicate the end of the list. Bug: 130624119 Test: CtsVerifier - WiFi Direct fixed frequency test Change-Id: Ic25a95cec97ffa1be755e81d233c1aac3b3a4634
2019-04-19Merge "[wpa_supplicant] Cumulative patch from 6151c9b90" into qt-devTreeHugger Robot
2019-04-18[wpa_supplicant] Cumulative patch from 6151c9b90Hai Shalom
Bug: 130813391 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Regression test passed (Bug: 130831127) 6151c9b90 EAP-pwd server: Remove unused srandom() call d2d1a324c EAP-pwd peer: Fix reassembly buffer handling fe76f487e EAP-pwd server: Fix reassembly buffer handling a9d224f56 EAP-pwd server: Fix a memory leak on error path 90ee1bf5f EAP-MSCHAPv2: Propagate GetAsymetricStartKey() failures up from getKey() 824cb5a53 RSN: Ignore IGTK configuration errors with swapped KeyID values dfdabd917 RSN: Report completion only after IGTK configuration bce3d4f70 autoscan: Disable when we move above WPA_SCANNING state eb3234c07 SAE: Use open authentication to reassociate for PMKSA caching fe01cd006 Fix FILS ERP association event with 4-way HS offload drivers 323a51cc0 nl80211: Handle NL80211_CMD_PROBE_CLIENT command response 28f19a3ae nl80211: More detailed PROBE_CLIENT debug print 31cf52bf2 Do not clear FT IEs twice in sme_deinit() 01ac337b3 Stop SA Query on disconnection 7a206c504 Add debug print on stopping SA Query procedure 710c69238 P2PS: Cleanup pending_p2ps_group flag 0be8b9238 mka: Avoid memory leak in unexpected case in RECEIVE 984d5b7e1 mesh: Fix random llid generation in an error case 10cf866ba mesh: Fix operations after SAE state machine removing the STA 153d4c501 mesh: Fix SAE reauthentication processing 2f6805139 Fix hostapd BSS_TM_REQ handling of bss_term parameter e6ac47b47 Fix debug print in GET_PREF_FREQ_LIST handler 2e70e807c D-Bus: Fix P2P GroupStarted signal not to use uninitialized IP buffer c5fff8bbd nl80211: Update assoc_freq and bss->freq based on real association info 091c22771 nl80211: Clear bss->freq on station mode disconnection cb5db189e Remove the unused crypto_ec_cofactor() function 8b093db2c EAP-pwd: Remove unused checks for cofactor > 1 cases 92e1b96c2 EAP-pwd: Disallow ECC groups with a prime under 256 bits 6fe3ee722 tests: EAP-pwd local failure in crypto_bignum_rand() 6570949b2 OpenSSL: Fix server side openssl_ecdh_curves configuration with 1.0.2 52b1cb5d7 tests: crypto_hash_finish() failure in eap_pwd_kdf() 56ac1f9df RRM: Set last beacon report indication in the last element only 6f484978f Document BSS expiration configurables 8f36c84a2 bsd: Fix a typo in error message dd1a8cef4 Remove unnecessary copying of SSID and BSSID for external_auth 4ffb0fefe hostapd: Support external authentication offload in AP mode 236e793e7 nl80211: External authentication in driver-based AP SME mode 2ab19f4be Reset beacon_set_done on disabling interface Change-Id: I5642b46d79aee83dd4f4307bf781d57b318831bd
2019-04-17Revert "wpa_supplicant(hidl): Set 'ieee80211w' when PMF required"Kumar Anand
This reverts commit 9df0f4fb550e51de9b1c82a6cc076d6ca41e3008. Reason for revert: Wifi connection failure, See b/130449698, b/129881116, b/129925214 Bug: 129936178 Change-Id: I4e72f720eeb311e039c94c5a67ecb49d92969741
2019-04-10[wpa_supplicant] Cumulative patch from 89bbe6f87Hai Shalom
Bug: 130294744 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Regression test passed (Bug: 130312227) 89bbe6f87 EAP-pwd: Get rid of unnecessary allocation of temporary buffer 4396f74a3 EAP-pwd: Enforce 1 < rand,mask < r and rand+mask mod r > 1 72056f69a tests: Module tests for const_time_*() functions 16d4f1069 EAP-pwd: Check element x,y coordinates explicitly 8ad8585f9 EAP-pwd client: Verify received scalar and element d63edfa90 EAP-pwd server: Detect reflection attacks 70ff850e8 EAP-pwd server: Verify received scalar and element ac8fa9ef1 SAE: Fix confirm message validation in error cases cff138b07 SAE: Use constant time operations in sae_test_pwd_seed_ffc() f8f20717f SAE: Use const_time selection for PWE in FFC 90839597c SAE: Mask timing of MODP groups 22, 23, 24 362704dda SAE: Avoid branches in is_quadratic_residue_blind() 6513db3e9 SAE: Minimize timing differences in PWE derivation aaf65feac EAP-pwd: Use constant time and memory access for finding the PWE c93461c1d OpenSSL: Use constant time selection for crypto_bignum_legendre() 6e34f618d Add helper functions for constant time operations d42c477cc OpenSSL: Use constant time operations for private bignums 242e85728 Extend domain_match and domain_suffix_match to allow list of values dcc0ccd5b wolfSSL: Fix dNSName matching with domain_match and domain_suffix_match 83f13e4ff tests: Fix build without CONFIG_SAE 3580ed826 RADIUS server: Accept ERP keyName-NAI as user identity bbde461d7 Fix a typo in the Multiple BSSID Index element ID define 1326cb765 DPP: Fix a regression in non-DPP, non-OpenSSL builds db54db11a SAE: Reject unsuitable groups based on REVmd changes 6bb9d9a8d AP: Avoid NULL use with snprintf string 0a42f1ede scan: Use normal scans after connection failure bbed23aee hostapd: Reduce minimum beacon interval from 15 to 10 TUs 048796715 OWE: Fix a possible memory leak on error path 277fa92b3 crypto: Fix unreachable code in tls_prf_sha1_md5() 3d93e26e6 tests: SAE test vector from IEEE P802.11-REVmd/D2.1, Annex J.10 e5711b618 Add a QCA vendor attribute to carry the reason for roaming 005585d60 nl80211: Add SAE, FT-SAE, FT-EAP-SHA384 AKMs in connect request edcaf16f9 P2P: Enable HE for both 2G and 5G bands 822c756e8 MBO: Update connect params with new MBO attributes to driver 74f8e768f MBO: Always include Non-preferred Channel Report attribute in AssocReq bd23daa8e DPP: Move GAS encapsulation into dpp_build_conf_req() be609c6fc SAE: Fix commit message override with external authentication 9af1eea37 Prefer FT-SAE over FT-PSK if both are enabled 853bd19f2 Add more debug prints on suite selector selection 6d77014e7 Suite B: Prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 ab3aebcce SAE: Fix PMKSA cache entry search for FT-SAE case 253ce212e Add AKM info in the debug message noting PMKSA caching entry addition 6fe3f0f79 FT-SAE: Use PMK as XXKey in AP when SAE PMKSA caching is used bcf190005 FT-SAE: Enable external auth support for FT-SAE also 6d14b98fc nl80211: Do not add WMM parameters when updating an existing STA entry 2ffd8076d FT/RRB: Pad RRB messages to at least minimum Ethernet frame length 555c93e2d FT/RRB: Add more debug prints for RRB message encryption/decryptiom 76fd782ab SAE: Reorder SAE and FT-SAE AKM selection to prefer the FT option 322d328e7 FT: Fix SAE + FT-SAE behavior in association parameter selection 87d8435cf DPP: Common configurator/bootstrapping data management 08dc8efd2 Fix memcpy regression in PMK handling 130444738 FILS: Fix KEK2 derivation for FILS+FT bf84e78cb OpenSSL: Fix build with current BoringSSL b750dde64 OWE: Move Association Response frame IE addition to appropriate place 10ec6a5f3 DPP2: PFS for PTK derivation ecacd9ccd DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in context 16a4e931f OWE: Allow Diffie-Hellman Parameter element to be included with DPP 808bdb308 Add TEST_FAIL() to aes_encrypt_init() with internal crypto 32f476066 TLS: Add support for RFC 5705 TLS exporter context with internal TLS a916ff5cd Add support for an optional context parameter to TLS exporter 18015fc8a DPP2: Support new legacy+DPP config object credentials dd6c59800 DPP: Support DPP and SAE in the same network profile 9305c2332 DPP: Clean up configuration parsing f5db77504 Remove pending connect and sme-connect radio works on disconnect c675397cc OpenSSL: Fix build with OpenSSL 1.0.2 ff5f54e15 SAE: Reduce queue wait time for pending Authentication frames 5e3a759cd SAE: Improved queuing policy for pending authentication frames 67b3bcc95 DPP2: Testing option for Config Object rejction 22f90b32f DPP2: Configuration Result message generation and processing c98617b48 DPP2: Make DPP version number support available over control interface 673631b8a More robust timer_tick_enabled tracking b5e57699a FILS+FT: STA mode validation of PMKR1Name in initial MD association 365366393 FILS+FT: AP mode processing of PMKR1Name in initial MD association aabbdb818 FILS: Do not try to add PMKSA cache entry if caching is disabled 02bde9581 Vendor attribute to enable or disable TWT request support 4efade315 nl80211: Clear keys from heap memory before freeing it for get_seqnum 2b7fa0355 P2P: Fix ACS offloading behavior with p2p_no_group_iface=1 c6ec9759c nl80211: Exclude PMK when sending NL80211_CMD_DEL_PMKSA explicitly 0b4a906de DPP2: Protocol version indication ce7effd08 DPP2: Build configuration flags for DPP version 2 support bf0021ede Allow fragmentation/RTS threshold to be disabled explicitly 48102f65e Add a vendor subcommand QCA_NL80211_VENDOR_SUBCMD_MPTA_HELPER_CONFIG f10a4af1b Add QCA vendor command/event and attributes for peer rate statistics 56a33496f Sync with mac80211-next.git include/uapi/linux/nl80211.h 841205a1c OpenSSL: Add 'check_cert_subject' support for TLS server 0173423f4 Use char pointers for EAP configuration parameters without length cd6a5866e Remove forgotten os_strncpy() implementations ca9efe113 roboswitch: Check some read operation results 9571f945c mesh: Check that SAE state initialization succeeded for PMKID check fafad8527 defconfig: Enable DBus 6a8dee76d wpa_supplicant: Drop the old D-Bus interface support 954c535a5 DPP: Update wpa_supplicant configuration file after provisioning 4d379be4a Clarify AP mode Action frame handling cc833a236 Minor cleanup to return after WNM Action frame handling 700b3f395 Move SA Query frame length check to the shared handler function 002edb630 Fix AP MLME in driver handling of FT and SA Query Action frames 1e653daa3 EAP-pwd server: Fix memory leak with salted passwords 96d6dfa8e SAE: Add Finite Cyclic Group field in status code 77 response fda766010 EAP-pwd: Fix a memory leak in hunting-and-pecking loop 339dc8bd6 WPS: Allow SAE configuration to be added automatically for PSK fc30f99b3 WPS: Allow AP SAE configuration to be added automatically for PSK b9cd4f5e7 Vendor feature capability for TWT (Target Wake Time) 877502a6a Vendor attribute to indicate a set_blacklist of BSSID only as a hint a9247bcdf Vendor attribute to configure HE testbed default capabilities 8a7510cc0 Vendor attribute to configure support to enable VHT in 2.4G band 8919ec616 Vendor attribute to configure HE OMI UL MU data disable f21436158 SAE: Reuse previously generated PWE on a retry with the same STA fd8308912 SAE: Reuse previously generated PWE on a retry with the same AP a9af1da0b SAE: Enforce single use for anti-clogging tokens ff9f40aee SAE: Process received commit message through a queue a9fe13035 SAE: Enable only groups 19, 20, and 21 in station mode 941bad5ef SAE: Enable only group 19 by default in AP mode b11fa98bc Add explicit checks for peer's DH public key 4a9531a75 bignum: Fix documentation for bignum_cmp_d() 611308365 defconfig: Enable IEEE 802.11w management frame protection (wpa_supplicant) 9515fa925 defconfig: enable IEEE 802.11r fast BSS transition (wpa_supplicant) 6b7a0da75 defconfig: Enable IEEE 802.11n and 802.11ac (wpa_supplicant) 467004d63 defconfig: Enable Hotspot 2.0 (wpa_supplicant) ec52faa2b defconfig: Enable RSN on IBSS networks (wpa_supplicant) 67d99d2e0 defconfig: Remove obsolete notes about OpenSSL requirements for EAP-FAST eafc5fec2 defconfig: Enable a handful of EAP methods (wpa_supplicant) f64050da0 defconfig: Enable logging to file and syslog (wpa_supplicant) ae5240db8 defconfig: Enable simple bgscan module (wpa_supplicant) 2d6d47219 defconfig: Enable AP (wpa_supplicant) f87450a73 defconfig: Enable WPS (wpa_supplicant) d989e67d0 defconfig: Fix typos in Wi-Fi Display description c4eafad09 defconfig: Enable P2P and Wi-Fi Display (wpa_supplicant) bf46c6fca defconfig: Add SAE (wpa_supplicant) ca098ee45 defconfig: Add DPP (wpa_supplicant) 2f7bc0681 UBSan: Avoid a warning on unsigned integer overflow bb05d0360 Fix a regression from VLAN assignment using WPA/WPA2 passphrase/PSK 429ed54a3 UBSan: Avoid a warning on signed left shift b3957edbe UBSan: Split loop index decrementation into a separate step 5ac13f6d0 atheros: Avoid clang compiler warning on address of array check aaa6b1498 Avoid compiler warning about potentially unaligned pointer value cce974d36 UBSan: Define FST LLT macros without integer overflow 9140caf5f UBSan: Avoid integer overflow in a loop index counter 8fc22fdde UBSan: Avoid NULL pointer dereferences on an error path 43216777e UBSan: Avoid unsigned integer overflow in base64 encoding fed7d8fcb UBSan: Avoid unsigned integer overflow in utf8_{,un}escape() cc4cdefc7 UBSan: Avoid unnecessary warning a9377bc38 UBSan: Avoid memcpy(ptr, NULL, 0) 5a23c2528 UBSan: Avoid an unsigned integer overflow warning abde4eba4 UBSan: Pack MACsec peer id structure c4fccfc7a UBSan: Avoid memcmp(ptr, NULL, 0) 1b85cad29 UBSan: Use typecast to avoid unsigned integer overflow e3b5bd81b UBSan: Fix RRM beacon processing attempt without scan_info 01d01a311 UBSan: Avoid size_t variable overflow in control interface ec2e7c4cf UBSan: Avoid unsigned integer overflow is throughput estimation 3b6b3ae58 Modify dl_list_for_each() to not use unaligned access with WPA_TRACE 1415d4b82 Multi-AP: Avoid memcpy(ptr, NULL, 0) in WPS Registrar initialization 2c129a1b7 Fix cipher suite selector default value in RSNE for DMG 239794018 Add new QCA vendor attributes for coex configuration d939a8cb4 Add a vendor attribute for specifying ethernet protocol type 8682f384c hostapd: Add README-MULTI-AP 66819b07b hostapd: Support Multi-AP backhaul STA onboarding with WPS 83ebf5586 wpa_supplicant: Support Multi-AP backhaul STA onboarding with WPS 56a2d788f WPS: Add multi_ap_subelem to wps_build_wfa_ext() bfcdac1c8 Multi-AP: Don't reject backhaul STA on fronthaul BSS 7ad7aa0e1 HS 2.0: Make hs20-osu-client SP and <FQDN> directories group writable 0f9632ceb mesh: More consistent checking of wpa_s->ifmsh in completion handler 2fae58fdc Fix wpa_psk_file parser error case handling b0e91e387 SAE: VLAN assignment based on SAE Password Identifier 947b5a153 P2P: Stop listen state if Action frame TX is needed on another channel b3e8ca65a P2P: Fix a typo in a debug message 464064c7e hostapd: Document openssl_ecdh_curves configuration parameter 31ee2992c Add QCA vendor subcmd/attribute to check wlan firmware state 3f8ceff54 Indicate wifi_generation in wpa_supplicant STATUS output ccaf77476 Add HE Capabilities into ieee802_11_parse_elems() 5d68c0acd nl80211: (Re)Association Request frame IEs from association event dbfa691df VLAN assignment based on used WPA/WPA2 passphrase/PSK dd2aedeb5 HS 2.0 server: Add X-WFA-Hotspot20-Filtering header line to T&C Change-Id: I4efde950845354673694f025ca07c3dddb6039e9
2019-04-03Merge master@5406228 into git_qt-dev-plus-aosp.Bill Rassieur
am: 7dbb8382fe Change-Id: I09f7ec13e952a2fbd2873f4b3515c0104a51147e
2019-03-29Merge master@5406228 into git_qt-dev-plus-aosp.Bill Rassieur
Change-Id: I1b38d8622315c51f0425cfbc88c8a674147de705 BUG: 129345239
2019-03-25Merge "p2p: finetune group join scan process"TreeHugger Robot
2019-03-21bss: fix missing config bss_no_flush_when_downJimmy Chen
This is Android-specific feature to avoid removing bss on interface down. This config is removed unexpectedly in last upstream merge. Bug: 128935493 Test: manually switch between two access points Change-Id: I718d375f189d2e3bc974f40382c45c48f1d7707c
2019-03-19p2p: finetune group join scan processJimmy Chen
Sometimes scan might be occupied by WiFi, we just need to fire the scan later but not abort the whole connecting. No need to check scan res handler since we can also use previous scan results with updated request. Bug: 125390567 Test: manually test with FileGo Change-Id: I31a99dfa6c9860d95f25a2b3c8ab8d91e64ffbde
2019-03-18[automerger skipped] Merge "[wpa_supplicant] Cumulative security patch for ↵Hai Shalom
clearing keys" into pi-dev am: 1bbc2f1635 am: 0c5f9dd650 -s ours am skip reason: change_id Id507b73f1f4a2e356cbcd3bfcfb9dcd23c8fd9e0 with SHA1 74f70d4688 is in history Change-Id: I4e86d62f96184ebc4d9940dffe9d7776863f7026
2019-03-18Merge "[wpa_supplicant] Cumulative security patch for clearing keys" into pi-devHai Shalom
am: 1bbc2f1635 Change-Id: I2333aa4490b382937b0d7efcf5684801ae94fcd9
2019-03-18Merge "[wpa_supplicant] Cumulative security patch for clearing keys" into pi-devTreeHugger Robot
2019-03-15[WPA3] WPA3-Enterprise fails to connectHai Shalom
Missing CONFIG_SUITEB in android.config and incorrect string used for wpa_supplicant configuration, SUITE_B_192 instead of SUITEB192. Bug: 128628779 Test: Successfully connect to WPA3-Enterprise AP with 3072bit RSA certs Change-Id: I5c94749ae9dfa273046581ac0fc46ea0379b7a60
2019-03-13Merge "[wpa_supplicant] Revert patch b686745c from wpa_ctrl.c"TreeHugger Robot
2019-03-13[wpa_supplicant] Revert patch b686745c from wpa_ctrl.cHai Shalom
Revert patch b686745c76b8fe88a6d4adda1be136d2d74f094c from wpa_ctrl.c which breaks QCNEA. Bug: 125843423 Test: Verified that errors do not appear in logs Test: Associated and disassociated with WPA2 and WPA3 networks. Change-Id: Ia965474922e9154b86dbf3d74b1aceb640f605bd
2019-03-10Merge "p2p: change wildcard mac address to 02:00:00:00:00:00"TreeHugger Robot
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Hai Shalom
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 am: 14e95b5516 am: 7157e49952 am: 695afc101c am: 8a6c2503ce am: 39dbb0b8a1 Change-Id: I4be6614c9db7a3bd94b16b2fb4fe9c94f28b25b1
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Hai Shalom
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 am: 14e95b5516 am: 7157e49952 am: 695afc101c am: 8a6c2503ce Change-Id: I69ccf50227c34878853da241852ef7fdde6594f2
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Hai Shalom
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 am: 14e95b5516 am: 7157e49952 am: 695afc101c Change-Id: Iab3235586938d6d0a90535486f6772aadb98e7ab
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Hai Shalom
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 am: 14e95b5516 am: 7157e49952 Change-Id: Ief1ee5441a068c943e78c9ad02921e28e2896479
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Hai Shalom
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 am: 14e95b5516 Change-Id: Icc8ba78773373eaaac38f6e1307e8ba351eb7fee
2019-03-07[automerger] [wpa_supplicant] Fix security vulnerability ↵Android Build Merger (Role)
wpa_supplicant/wnm_sta.c:376 am: 5e6e3f710f am: a80eaabb6b am: e2411dbf1e am: 24b4de62be am: d0d047b774 Change-Id: Ifab126a362ebcd4beab5dd5847a51a329d4649d3