aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-06-14Map extension AKMs in AIDL to main AKMandroid14-devSunil Ravi
Supplicant sends the connected AKM type in state change event "COMPLETED". And this AKM is used to map to the security type. There are some extension AKMs which are not defined in AIDL interface. When STA connects to AP in those extended AKMs, framework fails to find the AKM and derive the security type. So to fix the issue, mapped the undefined extension AKMs to main AKM. Bug: 285633920 Test: Connect STA to AP in WPA2, WPA3, WPA3 enterprise, WPA2 enterprise passpoint & WPA3 192 bit mode. Change-Id: I99d4bb7e3ca85135193bb455a08c8638d4858485
2023-06-07Merge "SCS: Don't convert source and dst IP addresses for adding scs ↵Gabriel Biren
policies" into udc-dev
2023-06-06SCS: Don't convert source and dst IP addresses for adding scs policiesSwarn Singh
Don't convert source and destination IP address to Inet format, while adding QOS Scs policies. As AIDL interface already sending source and destination IP addresses into required format. Bug: 286041846 Test: Manual test - send an IPv4 and an IPv6 address from the framework. Check that the supplicant data structures have the correct values. Change-Id: I3002ac6a7e7bb14ceaf25e316a6fa6d02283f307
2023-06-02Restore early AIDL initialization if theGabriel Biren
-B daemonize option is not being used. AIDL initialization was moved in ag/22511957, but this causes issues if interfaces are added before the delayed AIDL initialization. Bug: 285101633 Test: Manual test - enable and disable the -B daemonize option. Check that AIDL is initialized at the right time for each case. Change-Id: I6ba6dc0e6ae3d4ba7b42a0998fe9b0f3f72f82d7
2023-05-22Use MLD address in nl80211_port_authorized for MLOkensun
Bug: 281876487 Test: Manual. Change-Id: I1bb5f78deb76dc2c8b746e3919a5e67aa607ab69
2023-05-12Merge "Add callback path from wpa_supplicant core to ↵Gabriel Biren
AidlManager::listAliases." into udc-dev
2023-05-11Add callback path from wpa_supplicant core to AidlManager::listAliases.Xinyue Ling
Order of calls is: 1. wpas_list_aliases (notify.c) 2. wpas_aidl_list_aliases (aidl.cpp) 3. listAliases (aidl_manager.cpp) Bug: 281566895 Test: m Change-Id: If9b97f8cf1088ac001891e1722871761601c61a7
2023-05-05Fix p2p on DFS channel issue: p2p_dfs_chan_enable is NOT enabled on p2p ↵Shuibing Dai
interface When wpa_supplicant init p2p dev interface, it reads config items from p2p_supplicant_overlay.conf. But when init p2p wlan interface, the config file name is null. We have to save the config items to global p2p data struct. Bug: 272298287 Test: Manually verified it working from logs Change-Id: I211a36515bfa76ea23c077cc9e43fc811d9e139f
2023-05-02Merge "Add a new config item p2p_dfs_chan_enable for WFD GO" into udc-devShuibing Dai
2023-05-01Add a new config item p2p_dfs_chan_enable for WFD GOShuibing Dai
The item can be overwritten by p2p_supplicant_overlay.conf Bug: 272298287 Test: Manually verified it working from logs. Change-Id: I3de7ee1523ceae4116830afd7a4bae4794f81274
2023-04-28Merge "[wpa_supplicant] Generate more cert notification events" into udc-devHai Shalom
2023-04-26Fix link id in MLO signal pollmaheshkkv
Bug: 273355708 Test: m Change-Id: I7941ae56c20c01bff195bedb912bb0d2b1079dcc
2023-04-24[wpa_supplicant] Generate more cert notification eventsHai Shalom
Starting a TOFU connection with the Android trust store is desirable because it would allow authenticating networks that use globally trusted Root CAs and not sending the Root CA during the TLS handshake. 1. Do not drop certificate events if the sytem CA path was set. 2. Generate certificate events for the entire chain if validation againts the trust store fails - this happens when the network has its own private Root CA. The framework needs to do its own validation before accepting a full chain. Bug: 271921032 Test: Connect successfully and securely to WPA-Enterprise networks: * Globally trusted Root CA * Private Root CA with intermediates * Partial / leaf only chain Change-Id: Ia0540ca382f9587d89ec265d76aa9f366bab3303
2023-04-18Merge changes from topic "supplicant-cert-crash" into udc-devGabriel Biren
* changes: Pass current EAP state machine to BIO_from_keystore(). Move tls_data and tls_connection struct declarations to before BIO_from_keystore.
2023-04-17Pass current EAP state machine toGabriel Biren
BIO_from_keystore(). Previously, we would retrieve the EAP SM from tls_global. However, there may be an issue if the underlying EAP SM object is de-initialized using tls_deinit(), but tls_global is not cleared out. Bug: 276478806 Test: Manual test - see b/276478806#comment15 Change-Id: I519de8f189f7f3834f494e2906a4e63e11a8382f
2023-04-17Move tls_data and tls_connection structGabriel Biren
declarations to before BIO_from_keystore. Will allow us to use these structs in the next CL. Bug: 276478806 Test: m Change-Id: Ib3e50060b7cf10756071b9b93aea9a35ee668675
2023-04-14AIDL: Implement QoS SCS policy stub APIsSwarn Singh
Add implementation for QoS SCS policy APIs and callbacks: - addQosPolicyRequestForScs - removeQosPolicyForScs - removeAllQosPoliciesForScs - onQosPolicyResponseForScs Bug: 236182432 Test: m Change-Id: Ie6c66e2e6783c20c8754ce9e7bfdd31eacc4f29e
2023-04-12Merge "[wpa_supplicant] cumilative patch from commit bb945b98f" into udc-devTreehugger Robot
2023-04-12[wpa_supplicant] cumilative patch from commit bb945b98fSunil Ravi
Bug: 275651698 Test: Connect to open, WPA2, WPA3 and passpoint network Test: Establish P2P connection Test: Basic SoftAp tests Test: Regression test (b/275948027) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from opne source bb945b98f Add 40 and 80 MHz channels 165 and 173 for 5 GHz IBSS/mesh 0059fa5ba 6 GHz: Fix secondary channel setting 744295c8b Add 6 GHz channel validation during channel switching 5349a45d3 Set interface state as inactive if mesh bringup fails a4af79624 Handle signal termination in hostapd_cli for all cases cf8f13ac8 Add support to send 320 MHz bandwidth through vendor subcmd a0403c023 EHT: Validate the puncturing bitmap for ACS af0f60e7d EHT: Calculate puncturing bitmap for ACS f3206fbe9 EHT: Configuration option for ACS puncturing threshold e3621867c EHT: Process puncturing bitmap from channel switch event e277e577c nl80211: Send EHT puncturing bitmap to the driver for switch command 29a882bed EHT: Configure puncturing bitmap during channel switch 4942b19ff EHT: Send puncturing bitmap to the driver for AP bring up f9fc2eabb EHT: Add puncturing bitmap to EHT Operation element 46a5d989d EHT: Downgrade bandwidths for VHT and HE when using puncturing 7618269ec EHT: Validate puncturing bitmap 9102fda31 EHT: Add configuration option for puncturing in AP mode 9e79439fc nl80211: Retrieve driver support for EHT puncturing 507be376c Sync with wireless-next.git include/uapi/linux/nl80211.h 591256a8c FILS: 320 MHz support in FD frame 903e3a1e6 FILS: Fix maximum NSS calculation for FD frame ecae45ff6 FILS: Make HE a requirement for FILS discovery 4e86692ff AP: Fix 6 GHz AP setup after disable-enable a34b8477a ml80211: Put wiphy idx to obtain correct country code 1491fc64a Define QCA vendor per-enum 64-bit pad attributes 55e31699e qca-vendor: Add QCA_WLAN_VENDOR_ATTR_LL_STATS_IFACE_NF_CAL_VAL b1f85957c Add QCA vendor commands to set and get MLO links state information 44b32a752 mesh: Add EHT support c4cb62ca8 WPA_AUTH: MLO: Add functions to get the AA and SPA cab963e9f AP: Split check_assoc_ies() 7a7a2256c common: Support parsing link specific association request b39e35693 common: Add support for clearing elements 0b2fc4268 common: Split ieee8021_parse_elems() df6561ec0 nl80211: AP MLD support for adding multi link stations b8b4ceb8d nl80211: Properly stop and deinit MLO AP 2f8fc46ed nl80211: Provide link_id in EAPOL_RX and RX_MGMT events 821374d43 nl80211: Introduce and implement a callback to add an MLO link for AP MLD 47269be36 nl80211: Refactor i802_bss to support multiple links eb146ee80 AP: Add some bridge port attribute settings f628e6b30 nl80211: Make sure scan frequency debug buffer is NUL terminated 41d23254b nl80211: Fix frequencies array boundary check for scanned frequencies a9012070a Android: Add wowlan_disconnect_on_deinit to template configuration e2ea0fd70 EST: Write the RSA private key using the standard PRIVATE KEY format bfd236df2 webkit2: Avoid deprecated function call 2c3202682 P2P: Filter out 6 GHz frequencies if not allowed for P2P connection b2bf7e39e Update PMK in wpa_sm when roam+auth event indicated with authorized flag 6b9c86466 nl80211: Replace the channel flags for VHT support 6f63aca7b DPP: Allow both STA and AP configObject to be set 7292e30b7 DPP: Fix @CONF-OBJ-SEP@ parsing for multiple configs c31600ce1 P2P: Allow GO BSSID to be specified for P2P_GROUP_ADD commands 0430756e6 P2P: Optimize join scan frequency b3921db42 nl80211: Add frequency info in start AP command 40c139664 macsec_linux: Add support for MACsec hardware offload 6d24673ab mka: Allow configuration of MACsec hardware offload 3081a9cb6 hostapd: Output country_code and country3 when using STATUS 91ad7a309 FT: Store PTKSA entry for the correct BSSID in the FT protocol case 3f3e356fa Mark addr argument to storing PTKSA const 242c3ad99 FT: Store PTKSA from FT protocol ba6954874 Mark wpa_auth_remove_ptksa() static 3b1ad1334 FT: Include KDK in FT specific PTK derivation on the AP 870a5bdc0 nl80211: Report guard interval and dual carrier modulation edcad193a dbus: Add inactive time to D-Bus signal info a678a510f dbus: Add D-Bus signal for PSK mismatch heuristics 691f729d5 P2P: Make invitation flow less aggressive f4a7e2a07 Rework IBSS/mesh 80 MHz channel selection f91f971bd Fix creating 6 GHz IBSS/mesh on 5/6 GHz-capable PHYs c623cee42 Make arrays static const in ibss_mesh_select_*() 64043e615 Split ibss_mesh_setup_freq() into multiple functions 8085a7e65 wpa_supplicant: Add option to explicitly set 4addr mode 1ffc7d1c6 Apply bias towards 6 GHz in roaming faa410292 WNM: Event report handling for BSS color collision and in-use 97405be96 Small textual improvements to wpa_supplicant man page ec02a0e93 hostapd: Output hw_mode when using STATUS 390e24c6c EAP-TTLS server: Add Ident field to MS-CHAP-Error 4ae798a22 P2P: Pick the best driver pref freq for invitation process 6c75f1dfa Send broadcast Probe Response frames on the 6 GHz band edfcb2f1a MLD STA: Indicate MLO support in NL80211_CMD_CONNECT c91852044 MLD STA: Add support for SAE external authentication offload to userspace 575712450 qca-vendor: Add QCA_WLAN_VENDOR_MCC_QUOTA_TYPE_LOW_LATENCY ba150059d FT: Store PMK-R0/PMK-R1 after EAPOL-Key msg 2/4 MIC validation 56662f36d Refine vendor subcmd QCA_NL80211_VENDOR_SUBCMD_ROAM_STATS 72b8193f4 MACsec: Remove EAP Session-Id length constraint 3915e8834 hostapd: Report error on unknown ACCEPT_ACL/DENY_ACL commands 2cff340d1 utils: Move log2pcap to python3 12de8112b Fix BSS age underflow d31c2b43a Fix segfault in case of an invalid configuration a32b424a3 MLD STA: Use AP MLD address in PMKSA cache attempts for driver-SME case 8c4790cef MLD STA: Store PMKSA with AP MLD address for MLO connection event bf124a03d SAE: Update PT value at later point for SME cases, if needed 1aadcca0a P2P: Enable SAE-H2E for client when joining a 6 GHz group 37f8257c4 SAE: Extend automatic enabling of H2E on 6 GHz to additional cases 89377c6b9 OCV: Fix build without CONFIG_OCV=y 2e47ea22c P2P: Fix handling Service Discovery Response received by GO device dc7e330e0 Set OCV capability based on Association Request frame RSNE 831be6514 WPS: Do not indicate incorrect PBC overlap based on partner link c9fc12425 P2P: Make wpas_p2p_notif_pbc_overlap() static Change-Id: I1eb61fc82b98b937a2ff37a30e60e28129fe143d Merged-In: I1eb61fc82b98b937a2ff37a30e60e28129fe143d
2023-04-06Do AIDL initialization after daemonizing the processKiran Kumar Lokere
Supplicant start from command line is failing when -B option used to daemonize the supplicant process due to process forked for daemonizing is not able access the AIDL file decriptor. To avoid this do AIDL initialization after daemonizing the process. Bug: 270241817 Test: Manual test. See comments in pa/2427759 Change-Id: I7d8c5c7863f9bf5ac95d3bf141a31c01d71609af
2023-04-05[automerger skipped] Security fix for out of bound read in p2p_invite am: ↵Sunil Ravi
1d9ae9a554 am: 34e4630ad2 -s ours am skip reason: Merged-In I00f8ba9bea7bd36b52ae66250233230cac22ae83 with SHA-1 947b5e2ed3 is already in history Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/22442334 Change-Id: I13a9415484a2e05e4d6a248bcdaf6ce354821681 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-04-04Security fix for out of bound read in p2p_invite am: 1d9ae9a554Sunil Ravi
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/22442334 Change-Id: I80039e074a385280d2c98bc78cbfb05bfad544cd Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-04-04Security fix for out of bound read in p2p_inviteandroid-13.0.0_r82android-13.0.0_r81android-13.0.0_r80android-13.0.0_r74android-13.0.0_r73android-13.0.0_r72android-13.0.0_r66android-13.0.0_r65android-13.0.0_r64android-13.0.0_r60android-13.0.0_r59android-13.0.0_r58android13-qpr3-c-s8-releaseandroid13-qpr3-c-s7-releaseandroid13-qpr3-c-s6-releaseandroid13-qpr3-c-s5-releaseandroid13-qpr3-c-s4-releaseandroid13-qpr3-c-s3-releaseandroid13-qpr3-c-s2-releaseandroid13-qpr3-c-s12-releaseandroid13-qpr3-c-s11-releaseandroid13-qpr3-c-s10-releaseandroid13-qpr3-c-s1-releaseSunil Ravi
Check the p2p GO device address length before sending the invite request to core supplicant. Bug: 274443441 Test: Compile Test: Manual - P2P persistent connection Change-Id: I00f8ba9bea7bd36b52ae66250233230cac22ae83 Merged-In: I00f8ba9bea7bd36b52ae66250233230cac22ae83 (cherry picked from commit 947b5e2ed339224aa5f3751ca3b22370face0967)
2023-04-04Merge "Security fix for out of bound read in p2p_invite" into udc-devSunil Ravi
2023-04-03Security fix for out of bound read in p2p_inviteSunil Ravi
Check the p2p GO device address length before sending the invite request to core supplicant. Bug: 274443441 Test: Compile Test: Manual - P2P persistent connection Change-Id: I00f8ba9bea7bd36b52ae66250233230cac22ae83
2023-03-28Merge "Add log messages to the certificate callback path." into udc-devGabriel Biren
2023-03-28Add log messages to the certificate callback path.Gabriel Biren
Logs are meant to test 2 theories regarding the SIGSEGV in the attached bug: 1. Failure is happening somewhere in the middle of the call path from tls_openssl to AIDL. 2. sm struct becomes stale before the callback is used. Bug: 275293332 Test: Connect to WPA-Enterprise network and verify logs. Change-Id: I7b654d2a63f7f453f05b586f84c42702ac899d1e
2023-03-25WiFi: Modify OWNERS filesRoger Wang
add kumachang@ in OWNERS file Bug: 274850026 Test: None Change-Id: I7240cb977f14c0d962b2727fde1185db07ffb920
2023-03-16Update fixed-size arrays in the supplicant serviceGabriel Biren
to use std::array<>. Bug: 273964536 Test: atest VtsHalWifiSupplicantStaIfaceTargetTest \ VtsHalWifiSupplicantStaNetworkTargetTest \ VtsHalWifiSupplicantP2pIfaceTargetTes Change-Id: I9b2d666e77fd5590956b69acc88c501bd21ef428
2023-03-15Merge "Force EAP-TLSv1.2 for WPA3-Enterprise 192-bit RSA networks" into udc-devHai Shalom
2023-03-14Force EAP-TLSv1.2 for WPA3-Enterprise 192-bit RSA networksHai Shalom
Implement a WPA3-Enterprise 192-bit mode workaround to force the connection to EAP-TLSv1.2 due to interoperability issues in TLSv1.3 which disables the SSL_SIGN_RSA_PKCS1_SHA384 signature algorithm, and has its own set of incompatible cipher suites which the current WPA3 specification doesn't specify. The only specified cipher suites in the WPA3 specifications are: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_DHE_RSA_WITH_AES_256_GCM_SHA384. See boringssl/include/openssl/tls1.h for TLSv1.3 cipher suites. If the configuration is explictly setting TLSv1.3, then use it anyway, but removed the invalid signature algorithm configuration from the flow. Bug: 271643008 Test: m Test: Connect to WPA3-Enterprise 192-bit mode setup with RSA 3K. Test: Connect to WPA3-Enterprise 192-bit mode setup with ECDSA. Test: Connect to WPA3-Enterprise mode setup with RSA 3K. Test: Verify correct TLS configuration settings from the logs. Change-Id: I78f6b66ab2327a5a4e0da5c851c7a760f15b0bba
2023-03-15[automerger skipped] Merge "Merge Android 13 QPR2" am: ba0a83cf95 -s ours ↵Xin Li
am: c9ae1fc66f -s ours am: 7fd1479b85 -s ours am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: I46b005a3ecdfee4b59caab6c4c033fa879aa9f49 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-15[automerger skipped] Merge Android 13 QPR2 am: 5c453ca9fb -s ours am: ↵Xin Li
3f26a293db -s ours am: 6bd2f20d79 -s ours am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: I01f4a27aaa43860ede364901187200ddc2d2e357 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-14[automerger skipped] Merge "Merge Android 13 QPR2" am: ba0a83cf95 -s ours ↵Xin Li
am: c9ae1fc66f -s ours am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: I4c9262ee1f34f0c392f4b031ea1a4fe04a8b4240 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-14[automerger skipped] Merge Android 13 QPR2 am: 5c453ca9fb -s ours am: ↵Xin Li
3f26a293db -s ours am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: I2b131dfe1f977ce09f4d6db3dd0a03fc8dd8a854 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-14[automerger skipped] Merge "Merge Android 13 QPR2" am: ba0a83cf95 -s oursXin Li
am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: I3d943d27b357270e2674e5d94d4c75937f955947 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-14[automerger skipped] Merge Android 13 QPR2 am: 5c453ca9fb -s oursXin Li
am skip reason: Merged-In Ibb258b001c75ce34f623ff8bdee638c091b9af7d with SHA-1 f7595fe164 is already in history Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2487215 Change-Id: Ic13d6ea27c4d73a08958490b4b81d2cb86baddb9 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2023-03-14Merge "Merge Android 13 QPR2"android-u-beta-1-gplXin Li
2023-03-13Merge Android 13 QPR2Xin Li
Bug: 273316506 Merged-In: Ibb258b001c75ce34f623ff8bdee638c091b9af7d Change-Id: I20a4ea312451e331c410168421efe0ebab79d455
2023-03-13Merge "Set minimum TLS version fix for v1.0" into udc-devHai Shalom
2023-03-13Set minimum TLS version fix for v1.0Hai Shalom
Check the parameter correctly, and skip processing if the TLS version is 1.0, no need to initalize wpa_ssid->eap.phase1 to an empty string, it should be left as NULL. Bug: 273307153 Test: m Test: functional test Change-Id: I696f4919eef2554eb0bb3ca2022eca61176c120e
2023-03-09Remove unused method removeAllQosPoliciesForScsGabriel Biren
from wpa_supplicant. Bug: 267819850 Test: m Change-Id: I5bdbfa1473a0e869773fdcf3988b34097decd78b
2023-02-24Merge "Do AIDL initialization after daemonizing the process" into udc-devTreeHugger Robot
2023-02-24Do AIDL initialization after daemonizing the processVeerendranath Jakkam
SAP start from command line is failing when -B option used to daemonize the hostapd process due to process forked for daemonizing is not able access the AIDL file decriptor. To avoid this do AIDL initialization after daemonizing the process. Bug: 270241817 Test: Start hostapd both with and without the -B option. Change-Id: I7db15fe0e92148ae59d7c2d67c3b4fa745431f99
2023-02-17[wpa_supplicant] Cumulative patch from commit 257b119c2Sunil Ravi
Bug: 265294868 Test: Verify Passpoint ANQP functionality and Passpoint association Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic Test: Regression test b/218404053 (Bug: TBD) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open sourcie 257b119c2 QCA vendor attribute of update roaming cached statistics info 18436f393 Enhance QCA vendor interface for Concurrent AP Policy for XR 58fba11e1 Enhance QCA vendor interface with new hang reason codes 0f3f9cdca dpp-nfc: Try to request with alternative URL in additional cases 8b36248cd Add QCA vendor command to get the monitor mode status 0dd8bcef8 QCA vendor attributes for MLO and EHT capabilities e5602989c QCA vendor attributes to configure EHT capabilities d9d5e55c5 DPP: Respond to GAS on the same channel it was received on 651c9e957 Add new status code strings 3a2d27552 Make MFPR value from an associated STA available as hostapdMFPR 546debd5e Force MFPR=1 to be used on the 6 GHz band f9c6ab834 P2P: Support preferred GO band based optimization for scanning 093bedc05 P2P: Allow persistent group join retry limit to be configured via D-Bus 8717110db Do not flush PMKSA cache on restoring dedicated per-ESS MAC address 1d4027fdb Make random MAC address style parameters use common enum values 681856c35 Check both sec and usec values to see if MAC address was changed bdbb6e003 wpa_supplicant: Handle MAC address randomization changes for same ESS 4bd1efe07 dbus: Do not bring down primary interface when removing created AP interface f4096e7cd EHT: Update EHT Operation element to P802.11be/D2.3 in AP settings e869fdfee wpa_supplicant: Use MLD address in SAE authentication 8c0f83ae8 SME: Accept Authentication frame from an MLD AP 23039f5e4 SME: Add support for handling association with MLD 8f89661df SME: Add support for handling authentication with MLD 694a1c687 SAE: Make sme_sae_auth() return IE offset 870edfd67 WPA3: Update transition disable bitmap based on port authorized event 8fdf3c447 Sync with wireless-next.git include/uapi/linux/nl80211.h f9804e306 nl80211: Enforce unique address for AP iftype 87bad8afa dbus: Pass in MAC address in CreateInterface method b0722cf75 dbus: Fix a memory leak on error path in CreateInterface method a7f6b8518 crypto: Check if crypto_bignum_to_bin() is successful 2749a2c6b nl80211: Actually get and store TX retries 998aeca3c crypto: Clear secrets from stack in hmac_sha256_vector() 909864ab1 HS 2.0: Restore ifdef for DEFINE_STACK_OF in est.c af0ab435a PASN: Use the assigned status code from IEEE P802.11az/D7.0 3d798ff2a PASN: Align RSNXE with IEEE P802.11az/D7.0 definitions ab2cb379d Define all assigned BSS membership selector values ed0a7b480 wpa_supplicant: Implement HE membership selector check 054fcfab6 hostapd: Add require_he configuration c46351d10 DFS: Clear cac_started when AP is disabled 3df42cf3c EHT: Use HE operating channel width in MCS length calculation 23e31eb68 SAE: Support cross AKM roaming between SAE AKMs in external auth case a17026707 PASN: Avoid clearing secure context for the PASN deauthentication event 75a9c4bd4 Add new attributes in SCS rule config QCA vendor subcommand 7d8b96dcf wpa_supplicant: Apply same restrictions for MLD as for 6 GHz BSS 7216f79b9 nl80211: Support get_sta_mlo_info for SME-in-wpa_supplicant drivers 06eb608d5 nl80211: Handle scan results with MLD connection 033a57d26 nl80211: Get MLO support capability 32b745448 wpa_supplicant: Make valid_links u16 a2c4c0b1b nl80211: Support MLD association request a134b4dc5 nl80211: Add support for MLD authentication e3e68668c ctrl_iface: Report RNR and ML in BSS command 5f17763ad common: Combine definitions for Multi-Link and per STA profile control 7a7ce9574 dbus: Emit more information over D-Bus ad4fa5dd3 Add more nl80211 info to struct wpa_signal_info 090f0f8c7 mbssid: Indicate MBSSID information in RNR a1c4adda1 mbssid: Add nl80211 support 54b1352ef mbssid: Make the AID space shared 10749c3c4 mbssid: Process Known BSSID element 15690faad mbssid: Add MBSSID Configuration element fc2e4bac5 mbssid: Set extended capabilities a004bf2cd mbssid: Configure parameters and element data c5a09b051 mbssid: Add Non-Inheritance element 920b56322 mbssid: Functions for building Multiple BSSID elements 931e5d4f9 mbssid: Configure all BSSes before beacon setup 78d0b9899 mbssid: Retrieve driver capabilities 7452e5447 mbssid: Add new configuration option bb67d5b52 AP: Add testing option to delay EAPOL Tx 1897abad9 dbus: Add D-Bus property for current MAC address 1a800a940 EAP-TEAP server: Allow tunneled EAP method sequence to be optimized f791b5bbc EAP-TEAP peer: Process Crypto-Binding TLV before EAP Payload TLV 5a9bd8a06 EAP-TEAP: Use EAP-FAST-MSCHAPv2 in the tunnel 364b6500b EAP-FAST: Move EAP-MSCHAPv2 special MSK handling into MSCHAPv2 81dedfbd7 nl80211: Increase the scan frequencies buffer 9a2781f24 wpa_supplicant: Support throughput estimation for EHT rates 755aaeb97 wpa_supplicant: Add missing memory allocation checks 69725c4cf OpenSSL: Fix BN_rshift() argument order e9b4ad236 OpenSSL: Apply connection flags before reading certificates bbd5a4689 SAE: Add an enum for defining sae_pwe parameter values 3a0edb2cd SAE: Enable H2E for 6 GHz BSS 20bfd4feb AP: Enable H2E on 6 GHz when SAE is used b43e19f3f WPS: Cross band overlap detection with multiple interfaces e2d88f86e DPP: Expose own and peer bootstrap info ids on authentication success 043dedee8 DPP: Expose enrollee pubkey hash for identification 2d8974e31 DPP: Move DPP_EVENT_AUTH_SUCCESS to a helper d8d2b3a33 Implement read-only mode for SSIDs from the additional config (-I) 4cb23b66d ACS: Allow selecting a better channel when using 40/80/160 MHz 472101684 ACS: introduce acs_adjust_secondary 60e2934cb ACS: Introduce acs_get_bw_center_chan() ed8e13dec ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan() 9025def55 wpa_supplicant: Add support for pregenerated MAC 5da3e1ca4 mesh: Do not allow open mode key in 6 GHz 50a9b7d3d P2P: Include only 6 GHz PSCs in full scan 0d6cd88ee DPP: Use existing TCP connection to replay duplicate Presence Announcement 6af717f73 DPP: Don't close TCP connection for duplicate Presence Announcements 46e6b72b7 Add a callback to notify added PMKSA cache entry details af1528a12 hostapd: Add RELOAD_BSS bc2b88b25 hostapd: Add config_id to GET_CONFIG output b37c3fbad hostapd: Add config_id parameter 46f6a3277 Split BSS-specific hostapd_clear_old_bss() from hostapd_clear_old() 2afb9b1a5 dbus: Add dbus notify when wpa_s->key_mgmt changes 98e9d553f nl80211: Check previous MAC address for locally-generated-deauth 87ffa1bec wpa_supplicant: Convert SSID into printable form before printing 416386060 Mark authorization completed on driver indication during 4-way HS offload da2ec9459 D-Bus: Split set_cred_properties() into two functions f5ce680ee D-Bus: Hotspot 2.0 credentials with multiple domains 2f739c71c ctrl: Fix compilation with UDP control interface 6d4548187 RSN: Split EAPOL-Key msg 3/4 processing for WPA(v1) 5b7957b7e RSN: Split EAPOL-Key msg 1/4 processing for WPA(v1) e5dfce38f RSN: Split EAPOL-Key group msg 1/2 processing more completely for WPA(v1) 5ab43c738 RSN: Split WPA(v1) processing of EAPOL-Key frames into a separate function f7fd891c7 Fix a typo in driver ops poll() documentation 3268ec0ac HS20: Use required_home_ois in hs20-osu-client 58eb905ad HS20: Support credentials with multiple home OIs 0143dc1cb OpenSSL: Load OpenSSL 3.0 legacy provider but let default be loaded fef4c6cb0 OpenSSL: Don't provide implementation of DES/RC4 for FIPS builds 1d42dafce RSN: Do not include RC4 use in FIPS builds df5ae2aad Add more detailed description of RADIUS attributes in EAP user file 0ba266d86 dbus: Add virtual interface create/remove logic to be inline with ctrl_iface 5102d7411 wpa_passphrase: Disable terminal echo when reading from stdin 86ab28217 PASN: Fix passing own address and peer address to pasn_deauthenticate() a9062432e wpa_cli: Fix PASN control interface commands b6d3fd05e FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP) ef70f814a Add a new QCA vendor attribute to configure wifi calling (wfc) state 05ec48568 WPS: Pick WPS AP based on latest received WPS IE ca4fa867d Enable PMF automatically if OCV is enabled c823197bd SAE: Use Challenge Failure status code in confirm message failure cases 65c8633d9 Allow a lower priority BSS to be tried after network disabling e91ac53d5 DFS: Do not allow channel checks to go beyond the channel list f96dfdeef PASN: Fix missing libraries for libpasn.so on Android 91d148f50 PASN: Fix is_pasn_auth_frame() for mgmt tx status frames b6c38cee9 Skip CAC if the driver switches channel to non-DFS 080afc03d Add hostapd control interface command to stop logging to file 0fd13c90e Add QCA vendor interface for AP doze mode configuration 4e1f55a11 Roam control configuration for 6 GHz in full scan only on prior discovery 34d93b0c9 HS 2.0: Deauthenticate STA on deauth-imminent more quickly if no URL 2e40f969b nl80211: Fix wrong requested links bitmap in sta_mlo_info.req_links b6e226496 MLD STA: Fix IGTK and BIGTK MLO KDEs validation 2050130be Add a vendor attribute for roam control configuration for full scan 12f16c27b TLS: Fix unsigned int underflow in internal TLS 1.0/1.1 implementation 802b67bce Update tls_connection_set_verify() documentation to verify_peer=2 0202b9774 DPP: Fix memory leak of intro.peer_key in station handling f723f7f8a P2P: Check dev pointer consistently when building PD Response 30403e965 WPS: Check NDEF record length fields separately cd0e8653a TDLS: Use stored FTE length in MIC calculation 7e85e24f3 TDLS: Use stored peer RSNE length in MIC calculation 40a42613e FT: Simplify FTE parsing for FT-SAE-EXT-KEY using MIC Length subfield 5ea7a2f54 DPP: Drop PMKSA entry if AP reject association due to invalid PMKID 4840b45a2 Fix empty pmksa_cache_get() 3abd0c471 SAE: Print rejection of peer element clearly in debug log 9ff778fa4 Check for own address (SPA) match when finding PMKSA entries 9f04a9c8d Store own MAC address (SPA) in supplicant PMKSA cache entries 309765eb6 PASN: Use separate variables for BSSID and peer address 42f0c44d8 PASN: Use peer address instead of BSSID as the destination for initiator 15583802b nl80211: Allow up to 64-byte PMK in NL80211_CMD_SET_PMKSA bbe5f0c1e FT: Do not try to use FT protocol between mobility domains b92f61885 Don't use default RSNE/RSNXE when the driver indicates cross SSID roaming d7febe33f MLO: Remove unnecessary debug prints about clearing AP RSNE/RSNXE 16d913bfd Define AFC vendor commands and events 46f5cf928 OpenSSL: Fix additional HPKE corner cases bdc35acd5 SAE: Allow loading of the password from an external database 48dd8994a Fix external passwords with 4-way handshake offloading e5a7c852c systemd: Use interface name in description of interface-specific units a0628f8a5 OpenSSL: Remove unused assignment from HPKE expand 3e1a04afa nl80211: Check that attribute addition succeeds in offloaded PASN case 0658a22ef GAS: Try to make buffer length determination easier for static analyzers 271ce71c7 FT: Fix PMK-R0 derivation for FT-SAE-EXT-KEY with SHA512 2f61d703a MLD STA: Group key handshake processing for GTK/IGTK/BIGTK rekeying f0760aa6d MLD STA: Use AP MLD address as destination for 4-way handshake EAPOL-Key frames 8f2e493be MLD STA: Validation of MLO KDEs for 4-way handshake EAPOL-Key frames f15cc834c MLD STA: Processing of EAPOL-Key msg 3/4 frame when using MLO 08512e5f3 MLD STA: Extend key configuration functions to support Link ID a4adb2f3e MLD STA: Configure TK to the driver using AP MLD address fa5cad61a MLD STA: Use AP MLD address in PMKSA entry 052bf8a51 MLD STA: Use AP MLD address to derive pairwise keys e78437256 MLD STA: Add MLO KDEs for EAPOL-Key msg 2/4 and 4/4 472a0b8d6 MLD STA: Set MLO connection info to wpa_sm cc2236299 nl80211: Get all requested MLO links information from (re)association events 1ca5c2ec2 PASN: Fix spelling of RSNE in debug messages a43536a72 PASN: Verify explicitly that elements are present before parsing 7e3852407 PASN: Fix MIC check not to modify const data 8481c7509 PASN: Fix Authentication frame checks f899d7f37 dbus: Apply PMK properties immediately c6f8af507 Add option to disable SAE key_mgmt without PMF 7ad757ec0 Document crypto_ec_key_get_subject_public_key() to use compressed format 6527a7656 DPP: Stop listen mode for chirp-initiated Authentication exchange 2e7339442 P2P: Discount current operating frequency when scanning new connection 00a762c26 Do not drop connection attempt when reconnecting to the same ESS 368de263b P2P: Skip Extended Listen timeout to allow scans during group formation cff55f348 P2P: Clone sae_pwe config to new group interface config ae517789f P2P: Allow PSC channel to be used for 6 GHz BW40 9c830d917 P2P: Track peer 6 GHz capability more robustly 1ca403a8b Add QCA vendor subcommand to notify about primary netdev 70d89f90e A vendor roam control configuration for delaying hand off for RX fff81a468 PASN: Change pasn_use_384() to be a non-static function ea241cbe9 PASN: Rename struct wpas_pasn to pasn_data 6be84343a PASN: Add pairing verification wrapper function for Wi-Fi Aware 325236948 PASN: Mark wpas_pasn_start() comeback argument const b1ed44b6a PASN: Allow extra elements to be added into PASN Authentication frames 08abcdf4e PASN: Makefile and Android.mk changes for libpasn.so 78c5bb7f5 PASN: Move responder functionality into a separate file c7edfce79 PASN: Move initiator changes into a separate file 975b7a02c Move SAE comeback token functionality into a separate file 1711fe912 PASN: Compute MIC from RSNE and RSNXE of the frame for Wi-Fi Aware 6f80014b1 PASN: Allow custom PMKID in Authentication frames for Wi-Fi Aware e99047da2 PASN: Add a handler func to send mgmt frames to the driver from AP 4022ffc5d PASN: Store AKMP in the PTKSA cache c55eadede PASN: Remove hapd dependency in processing PASN Authentication frames 6dc833bc5 PASN: Remove hapd dependency for PASN and SAE comeback 1861f5716 PASN: Remove hapd dependency for pasn_derive_keys() 1fa266e99 PASN: Remove hapd dependency for SAE and FILS wrapped data bc9fbe1b2 PASN: Common wpas_pasn structure for initiator and responder 14b5ebce7 PASN: Add a common header file for initiator and responder af5eec3b3 PASN: Function handler to transmit Authentication frames 629bbc91b PASN: Remove dependency of wpa_ssid for initiator e7f45ca11 PASN: Remove wpa_s dependency for wpas_pasn_start() 0be131265 PASN: Remove wpa_s dependency for wpas_pasn_build_auth_1() 086ccdc59 PASN: Remove wpa_s dependency for the functions processing RX frames e2e87b90b PASN: Remove wpa_s dependency for wpas_pasn_auth_tx_status() de4b73a36 PASN: Remove wpa_s dependency for FILS wrapped data 90bb73c51 PASN: Remove wpa_sm dependency to add an entry to PMKSA cache 5313e5a79 PASN: Remove unused wpa_s parameter for wpas_pasn_sae_setup_pt() f636cbd04 PASN: Remove wpa_s dependency for SAE wrapped data functions 5535fbcfa PASN: Add wpa_pasn_reset() to eliminate need for struct wpa_supplicant 10e455c44 Enable use of PMKSA caching independent of RSN supplicant state machine 1d0ee1908 Fix the vendor ID assignment for configuring periodic sounding b17b86da4 QCA vendor attribute to configure periodic sounding 6f3efa21c MLD STA: Fix crash caused by NULL wpa_s->current_ssid ef5a9a009 nl80211: Fix parsing PASN peer and src addresses from vendor nl attributes 2c55c9273 More debug prints for EAPOL-Key message generation (Authenticator) 90cef4f21 MLD STA: Fully clear MLO info to avoid use of uninitialized members 496a1ced1 MLD STA: Use MLD addresses for sending non-Public Action frames 17ae98873 MLD STA: Support processing of M1 received before association event 9dafad1ea EHT: Definitions for STA Control fields of Basic Multi-Link element 1fbea7d43 EHT: Multi-Link element defragmentation ec03b71ee common: Refactor element defragmentation 347ea8f0a EHT: Parse Multi-Link elements 73f540b6a MLD STA: Fetch MLO association Link ID info to core wpa_supplicant ee46b7d6d nl80211: Check MLO link status info in NL80211_CMD_CONNECT 6e015cd45 RADIUS: Add Filter-Id attribute 06800f612 Add QCA vendor attributes for EHT support in external ACS 042368663 Vendor attribute to configure QoS/AC upgrade for UDP frames e5d15e225 EHT: Allow EHT to be disabled using disable_eht=1 in wpa_supplicant 041f6cea9 SAE: Accept FT and -EXT-KEY AKMs for external auth b72922796 P2P: Get cached scan results on iface creation to avoid scan 8392ea9e7 SAE: Fix AKM suite selector check for external authentication ebe6a7c94 FT: Cover variable length KCK in function documentation eda4ba081 FT: Reassociation Response frame validation for FT-SAE-EXT-KEY 0f7253d35 FT: Response processing for FT-SAE-EXT-KEY a1eb1bb0e FT: Supplicant side FTE generation for FT-SAE-EXT-KEY 883e33594 FT: Authentication request frame processing for FT-SAE-EXT-KEY 879363bbc FT: Reassociation Request frame parsing for FT-SAE-EXT-KEY e8f23c948 FT: Association Response frame FTE generation for FT-SAE-EXT-KEY a76a314c1 FT: Extend PMK-R0 derivation for FT-SAE-EXT-KEY 79cd846b2 FT: Extend PTK derivation for FT-SAE-EXT-KEY 39b60f334 FT: Extend PMK-R1 derivation for FT-SAE-EXT-KEY fb4fc704c FT: Debug print FTE subelements during parsing 25b52e5f8 FT: Extend FTE parsing for FT-SAE-EXT-KEY 4f58afee9 FT: Extend MIC derivation for FT-SAE-EXT-KEY dcd46edf5 FT: Extend PMKR1Name derivation for FT-SAE-EXT-KEY 9fd245564 FT: Support longer SAE PMK for FT in INITPSK AP c41bd98be FT: AP mode FTE writing to support FT-SAE-KEY-EXT efa0f51d3 FT: Accept 512-bit PMK-R1 from RRB eb0821c90 Add service class id attribute in SCS rule config vendor subcommand 5607abe2e WNM: Print unsupported neighbor report subelements in debug log fcdd76fa2 Interworking: Print unsupported inner EAP-TTLS method in debug log f8a05de66 Move default action from after switch to within 7614fcebe ACS: Filter out 6 GHz channels if HE or EHT is not enabled 1864664ca Android: Delay QCA roam+auth event until NL80211_CMD_ROAM is received 5f3cdc064 Override ieee80211w from pmf for AP mode in wpa_supplicant 2b972a35b DPP: Require PMF when profile is for SAE without PSK 8219d2b7d PASN: Fix CONFIG_PASN=y build without CONFIG_IEEE80211R=y Change-Id: Ifd6be0d096df54c13162fdda164cd8e804a51692 Merged-In: Ifd6be0d096df54c13162fdda164cd8e804a51692 (cherry picked from commit 38ad1edd94f7b4f3c3937dd21a9b7ef52140babf)
2023-02-15Update MLO link info with more paramsmaheshkkv
Framework populates MLO link information from scan cache. In roaming use cases, framework may not have the scan result for the roamed AP. So, use the MLO link info from the supplicant if the BSSID is not in scan cache. Bug: 268230307 Test: m Change-Id: I73dd255841c3040d78ec3ae36c4e2acba3a637ee
2023-02-15Add BSSID of the AP in PMKSA cache added eventSunil Ravi
Deprecated onPmkCacheAdded() callback function and added a new onPmkSaCacheAdded() callback function to include the connected AP BSSID. This will help framework to include BSSID information as a key to store PMKSA. Bug: 260042356 Test: atest vts Test: Manual - Tested WPA3 STA - AP connection multiple times and confirmed that PMKSA cache is added and supplicant is using the PMKSA cache entries for open authentication. Change-Id: I1992791d46156ff7e9ca25025338b40530934978
2023-02-14Merge "Add method in wpa_supplicant to call listAliases."Gabriel Biren
2023-02-11Add method in wpa_supplicant to call listAliases.Gabriel Biren
Bug: 205764502 Test: Manual test - store several aliases in the certificate store. Call the new method to verify that the expected aliases are retrieved when the corresponding prefix is passed in. Change-Id: I3ae57f5cce9a4fecb8145abb0ba7bf6542b1f03f
2023-02-10IP Address Allocation in EAPOL-Key FramesSunil Ravi
Implementation of Wi-Fi P2P Technical Specification v1.7 - Section 4.2.8 "IP Address Allocation in EAPOL-Key Frames (4-Way Handshake)". Changes includes, 1. Configure the IP addresses in supplicant for P2P GO to provide the IP address to client in EAPOL handshake. 2. Send the received IP address information to framework. Bug: 170056953 Test: Manual - Establish P2P connection & confirmed from sniffer logs and logcat logs that IP addresse is allocated via EAPOL exchange. Ping works after connection. Change-Id: I5978708b098e57e48db52dae14f9bbba28199f2d