aboutsummaryrefslogtreecommitdiff
path: root/README
AgeCommit message (Collapse)Author
2022-03-15[wpa_supplicant] Cumulative patch from commit ac1e3a7f0Hai Shalom
Bug: 217966931 Test: Verify Passpoint ANQP functionality and Passpoint association Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic Test: Regression test b/218404053 (Bug: TBD) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source ac1e3a7f0 Add QCA vendor MCC channel quota command and event 1d1e3184b Whitespace/coding style cleanup for QCA vendor attribute definitions 1646883f4 Vendor command to configure rate mask 2faaa193f Rename moderate latency level to XR latency level in vendor attributes f9905f8d9 nl80211: Clear frequency information on leaving mesh 1f26a0a34 DPP: Use a 120 second timeout for GAS query 07e26b292 GAS server: Increase query timeout to 60 seconds for DPP a6d157b6f DPP: Start a listen operation for GAS server if needed da65e7136 nl80211: Add a handler for NL80211_CMD_FRAME_WAIT_CANCEL events 9aaf3e1d1 P2P: Update GO operating frequency after interface setup is completed 033ad6ffa DPP: Allow Configurator parameters to be provided during config exchange d4961a775 GAS server: Asynchronous request handler comeback time indication 9a90aab12 DPP: Store Enrollee config request information 6751fb060 DPP: Make dpp_netrole_str() non-static 34575ad72 EAP-pwd: Fix the prefix in a debug message e07000e74 nl80211: Partial support for radio_disable 33cb47cf0 DPP: Fix connection result reporting when using TCP 1822bd378 DPP: Testing capability for invalid Protocol Version in Network Intro d7be74933 DPP3: PKEX over TCP bdcccbc27 DPP: Change PKEX version configuration design 9d3f347a2 DPP3: Add PKEX initiator retries and fallback from v2 to v1 for hostapd 3f67ab587 DPP: Handle TX status events for broadcast DPP messages 802136299 DPP3: Start with PKEXv2 and fall back to v1 f32f99df1 P2P: Send response frame on channel where the request is received b678a3aa3 Extend QCA_NL80211_VENDOR_SUBCMD_PEER_FLUSH_PENDING fc4bc342e Replace "blacklist" with "denylist" in vendor interface definition bc9fd8adc Replace "whitelist" with "allowlist" in vendor interface definition ffe80cb8e wpa_supplicant: ap: Update comment c76545033 The main branch is now used for v2.11 development cff80b4f7 Preparations for v2.10 release 7a57eb315 Update copyright notices for the new year 2022 9b14aed90 crypto: Remove unused crypto_ec_point_solve_y_coord() 8c502336d EAP-pwd: Derive the y coordinate for PWE with own implementation 6c380f4c8 SAE: Derive the y coordinate for PWE with own implementation 8ebd8aacc SAE: Move sqrt() implementation into a helper function 41c7f3f20 Defined a driver interface for periodic TSF sync feature 5758d0929 Add a QCA vendor attribute to indicate ACS over EHT 7ffcbd08c Clear roam/BSS TM in progress flags for additional cases 16b5ea9e9 Reject authentication start during BSS TM requests af6d4031d D-Bus: Fix build without CONFIG_INTERWORKING 58bbcfa31 OpenSSL: Update security level drop for TLS 1.0/1.1 with OpenSSL 3.0 682fce579 OpenSSL: Fix compressed form encoding for subjectPublicKey with 3.0 ff2eccbdf OpenSSL: Load legacy provider when needed for OpenSSL 3.0 ddcdd6286 OpenSSL: Clean up EVP_PKEY_get{0,1}_EC_KEY() use 384aa245e OpenSSL: Speed up crypto_ec_point_compute_y_sqr() b26f5c0fe DPP: Remove dpp-listen radio work when stopping 3f8c83a65 SAE: Make sure BSS entry is available to determine RSNXE information 43f600a1f Add new vendor attributes to avoid coex unsafe frequencies cab51021c DPP3: Update version capability indication for hostapd bc24a8a09 Update supported channel width set (HT40) after channel switch ff7e403f0 Fix channel switch wrapper when switching from HT to VHT/HE 5606ede12 Update ieee80211ac when channel switching e6db1bc5d mesh: Make forwarding configurable 5ef9277d0 ACS/DFS: Support min_tx_power configuration 5530688b9 MBO: Fix the allowed range of mbo_assoc_disallow values c8e4283f9 D-Bus: Interworking network selection b44e19967 D-Bus: Interworking/Hotspot 2.0 credential operations 4262e6ca4 Move credential removal operations into helper functions e232d9777 HS 2.0: Crypto engine support for creds 97607de5e D-Bus: Capture group ifname before switching to global P2P instance 36973aac2 SME: No need for OBSS scan if HT40 is disabled 7db757aac Revert "Extract BSS coex 40 MHz check into a separate function" e480321f8 Revert "STA OBSS: Add check for overlapping BSSs" b57273d06 DPP2: PKEXv2 core protocol changes b21b31014 DPP: Testing functionality to omit Protocol Version from Peer Discovery 341e7cd66 DPP3: Verify version match during Network Introduction f26fd5ee6 DPP3: Use Connector version instead of current version in Peer Discovery 0cfb72689 DPP3: Add version member to Connector 77ddd38b6 DPP3: Add build option for version 3 functionality 14ab4a816 Reject ap_vendor_elements if its length is odd 2c2bfebca Fix bool type values for setband 7dc7b8814 P2P: Remove 6 GHz channels from full scan if 6 GHz not enabled for P2P 147932add Add a QCA vendor attribute to indicate puncture pattern in ACS 0b853303a Update AKMP, cipher, PMF for driver-based SME while roaming c8b94bc7b mesh: Enable 160 MHz bandwidth support for 6 GHz in IEEE 802.11s mesh ab0af709d mesh: Enable MFP by default for 6 GHz 11s mesh d10a01e22 mesh: Enable 80 MHz support for 11s mesh in 6 GHz d6c5feb8c mesh: Change channel to frequency based lookup for starting mesh b16b88acd RNR: Do not allow FILS Discovery and unsolicited Probe Response simultaneously 15f099ec7 RNR: Allow Probe Response frame for a colocated 6 GHz AP f17f7ca4e RNR: Update Beacon frames for 6 GHz colocation 01efcc292 RNR: Addition in Beacon, Probe Response, and FILS Discovery frames 0c9457ee2 RNR: Additions for a 6 GHz AP b2bbedcb2 RNR: Add co-located BSSes a7c152d6b RNR: Add data from neighbor database 847f76760 RNR: Add configuration option 3db24e4ee RNR: Define element format b389d88a7 Share a common error path for SET_NEIGHBOR control interface command 1b8eb3975 RNR: Add bss_parameters to the neighbor_db 9d0948ecc RNR: Short SSID assignment 8d881d942 Update AKMP and proto for driver-based SME while roaming f969bd22d Add QCA vendor attribute to configure ARP/NS offload feature 8f4d7e8f0 OpenSSL: Fix build with OpenSSL 1.0.2 2086ae46b DPP: Replace dpp_bootstrap_key_der() with crypto_ec_key_get_subject_public_key() e9f8f81a8 DPP: Use ECDH from crypto.h 4aed5668b OpenSSL: Clear the correct flag in crypto_ec_key_get_ecprivate_key() bf161b660 Ignore CONFIG_WIFI_DISPLAY without CONFIG_P2P b306a92df Fix compiler error on CONFIG_AP without CONFIG_P2P builds 726eda65f wolfSSL: Fix a link error when WPS NFC is disabled b8402ab08 DPP: Use crypto_ec_key_get_subject_public_key() when possible d51939f2c DPP: Move CSR routines to use crypto.h d56352b55 DPP: Move dpp_pkcs7_certs() into crypto_pkcs7_get_certificates() b89176fa6 DPP: Move debug print of EC key to crypto.h 87f2fb886 DPP: Remove direct call to OpenSSL in dpp_test_gen_invalid_key() c88b7fcae DPP: Add crypto_ec_key_cmp() in crypto.h and use it 984faf963 DPP: Use crypto_ec_key_group() to compare EC key's group f5334f9b5 DPP: Use crypto API for reconfig part eac41656e DPP: Update connector signing to use crypto.h da63d3099 DPP: Remove unused EVP_PKEY_CTX variable 4767de3a4 DPP: Use crypto.h for authentication computation 0d1d74107 DPP: Update PKEX part to use crypto.h API 50708770f DPP: Use crypto_ec_key_parse_priv() when possible e294a73d0 DPP: Use crypto_ec_key_parse_pub() in dpp_get_subject_public_key() 9c1632908 DPP: Move dpp_set_pubkey_point_group() to crypto.h e84b143e1 OpenSSL: Add Brainpool curves to crypto_ec_key_group() c6f2103ca DPP: Replace dpp_get_pubkey_point() with crypto_ec_key_get_pubkey_point() 2d5772e69 DPP: Factorize conversion to ASN.1 ECPrivateKey 63bf3d25a OpenSSL: Mark crypto_ec_key_gen() key compressed 86cde01cb DPP: Move dpp_gen_keypair() to crypto 0517948d7 DPP: Replace EVP_PKEY by struct crypto_ec_key cd0c1d256 OpenSSL: Use EVP_PKEY as struct crypto_ec_key 15275c53d Complete documentation in crypto.h cb285e80c SAE: Fix sm->cur_pmksa assignment aa5c4f932 Add QCA vendor attribute to configure priority of vendor scan aca4d4963 Fix handling of complex configuration lines with mixed "" and # 0ae677c7b eloop: Extend overflow check in eloop_register_timeout() to cover usec 979f19716 WNM: Allow specifying dialog token for BSS transition request 3f6c02f29 Use pkg-config for libpcsclite linkage flags e797959b8 systemd: Order wpa_supplicant after dbus 95bf9fc93 Remove extra slash from BIN/INC/LIBDIR defaults 5a4ae6e3a Replace "native" with a more specific description 2fb33ce4b wpa_supplicant: hostapd: Remove man-in-the-middle 2e122945f DPP2: Do not try to remove Controller TCP connection twice on error 5bac420e5 DPP2: Clean up Controller on hostapd interface removal d8b3d0815 macsec_qca: Support macsec secy id getting from driver 08bdf4f90 proxyarp: Fix compilation with Hotspot 2.0 disabled b0f457b61 SAE: Do not expire the current PMKSA cache entry f332f6951 wpa_supplicant: Try all drivers by default 4775a5f82 Add support to reconfigure or flush PMKSA cache on interface enable 6f634b003 PMKSA: Make sure reauth time is not greater than expiration time 973f3e244 Fix hostapd segfault on WPS_CONFIG control interface command to non-WPS AP 9ef8491d9 Add TWT attribute to configure TWT related parameters 321dc403e Replace "dummy" with "stub" in crypto/random 95e140e20 Replace "dummy" with "stub" in NDIS driver interface c53fa9225 Replace "dummy" with "stub" in EAP-TEAP testing 575dc1f3b Replace "dummy" with "stub" in preauth_test ed5e1b722 Replace "dummy" with "stub" in comments/documentation 3955d2af7 Replace "dummy" with "stub" in wps_testing_dummy_cred 77dd71243 Replace "dummy" with "stub" in Authenticator group keys fb1bae2a7 Replace "dummy" with "stub" in SAE e69ea242a hostap: Remove unused driver enum values with "master" in them 7b50f2f04 Replace "sanity" with "validity" 891bb1305 P2P: Enforce SAE-H2E for P2P GO in 6 GHz afcadbbf4 wpa_cli: Add support for SCS, MSCS, and DSCP commands bcaa1ea08 HE: Disable HE in hostapd_set_freq_params() if driver does not support fe1d743a1 Add QCA vendor attributes to indicate 320 MHz spectral scan capabilities 2b3e64a0f Update ciphers to address GTK renewal failures while roaming 9cf4bb0ef Vendor command to configure/trigger the roam events dd3a2960a Add TWT vendor attribute to configure announce timeout value afa0b9b6c P2P: Make p2p_check_pref_chan_no_recv() easier for static analyzers 857c4dfa8 Make get_mode() easier for static analyzers 9651deba5 Support vendor element configuration for AP mode from wpa_supplicant d144b7f34 DSCP: Add support to send DSCP Policy Query frame c903257fb DSCP: Parse WFA Capabilities element in (Re)Association Response frame a4aae9f9b DSCP: Indicate DSCP Policy support in (Re)Association Request frame d57456c1f DSCP: Allow DSCP Policy Response Action frame to be sent 2033e318e DSCP: Parsing and processing of DSCP Policy Request frames fe2a44485 DSCP: DSCP policy capability configuration 8471d940e Move pmf_in_use() into a more generic file 41ec97cd0 HE: Use a random BSS Color if not defined in the config file 1518638b7 QCA vendor command to configure the parameters for monitor mode 8f7b2c898 Add attributes to support MBSSID multi groups notifications a75fdcdcd Extend the roam reason codes in QCA vendor attribute 9ff0c8af5 Correct the documentation in enum qca_roam_reason ce267f4da P2P: DFS offload for the autonomous GO 6ba665c5c Reserve QCA vendor sub command id 201 51d73d991 Add QCA vendor interface to configure background scan parameters 61c075761 EDMG: Validate pri channel lookup result before using it a95144cf3 Add frequency to operating class determination for 5 GHz channel 144 e5173e8b1 P2P: Enable multiple channel widths for P2P in 6 GHz band f725254cc P2P: Enhance determination of secondary offset to support 6 GHz channels 575a8e6ca P2P: Clone 6 GHz related parameters to new group interface config f18433760 Add TWT attribute to send Responder PM Mode value to userspace 11a342775 Add time slice duty cycle attribute into QCA vendor command d408e3d19 Update QCA mDNS Offload vendor command 2341585c3 ACS: Fix channel 100 frequency ed369613f P2P: Align p2p_buf_add_pref_channel_list() prototype with definition 75a6d44a4 hostapd: Allow HT40 on 5 GHz channels 173 and 177 7dd2e2369 hostapd: Always allow HE AP with a 20 MHz channel width 9f2217c51 P2P: Consider p2p_no_go_freq for GO preferred frequency 882c53be5 P2P: Avoid integer overflow in channel a58f7e61c Add QCA vendor interface to configure allowed bands for roaming be81bbdc3 doc: Fix grammar in wpa_supplicant overview 362d9a49d utils: FreeBSD supports fdatasync(2) 9bd943410 nl80211: Fix send_mlme to use monitor interface only for AP interface f02ac5140 HE: Option to disable HE ER SU in HE operation in AP mode 63f043f4f Generalize the function name as it is not dealing with only TX & RX params 3cdc6d381 mesh: Show peer connected time in the wpa_cli STA cmd output for Mesh mode eddcd2753 Fix some compiler warnings on 32 bit platform 4c80937c7 nl80211: Reduce the number of nlctrl name resolution calls cce33c7e7 openssl: Support private_key blob in PEM encoded PKCS#8 format 0030590fb Generate an event when a network is added or removed f23861061 Add a --conf option to eapol_test.py 99c1789ab PASN: Fix ASAN error in ptksa_cache_add() e2e9adc3d openssl: Disable padding after initializing the cipher suite d265dd2d9 openssl: Remove deprecated functions from des_encrypt() 46b60299a wpa_supplicant: src: Replace Sane with Valid. 12388313a RADIUS client: Fix void-pointer-to-enum-cast warning e433d06dd Allow MSCS support to be disabled for testing purposes 025f8ab52 SCS: Processing of SCS Response frames b4e01ae92 Allow SCS supported to be disabled for testing purposes c005283c4 SCS: Sending of SCS Request frames 445dbe2cd P2P: Do not stop Listen state if it is moving to correct channel e99aaf706 Add QCA vendor attribute for TWT termination due to power save exit a147951ee Add QCA vendor attribute indicating the spectral scan bandwidth 51f89565f Add QCA vendor interface to fetch thermal statistics from the driver 24774dcc2 P2P: Require PMF for P2P GO in the 6 GHz band 49442194c SAE: Derive H2E PT while reconnecting to same SSID also ac79ed499 HE: Obtain correct AP mode capabilities for hw_mode with 6 GHz support dfabf1e5c QCA vendor command for mDNS offload 1071f7539 DPP2: Fix channel 6 inclusion for chirping with non-2 GHz interfaces 84b3de809 TDLS: Support TDLS operations in HE mode for 6 GHz 1990ee7ee QCA vendor attributes to configure BTWT and Rx control frame to MultiBSS f5f2985a2 Update TWT attribute to send TSF value in TWT setup command b4f7506ff FILS: Flush external-PMKSA when connection fails without ERP keys 80bcd7ecd FILS: Flush PMKSA entries on FILS connection failure 914a2f518 SAE: Report authentication rejection over control interface 9557ba336 AP: Don't increment auth_transaction upon SAE authentication failure 84f6492ea Extend QCA vendor command for TSF to enable and disable auto report 7ef420058 QCA vendor attribute to configure BSS max idle support ef83e0f90 QCA vendor attribute to use BSSID in Probe Request frame RA e2ff06c91 Add channel load percentage attribute into QCA vendor command ac6a0293d Add uplink delay attribute in QCA vendor command get_sta_info responses 84f894773 PTKSA: Fix a potential hostapd memory leak during reconfiguration 311091eb4 P2P: Use SAE+PMF for P2P connection in 6 GHz f0cdacacb P2P: Allow connection on 6 GHz channels if requested b36142a74 P2P: Add allow_6ghz parameter to control interface f7d4f1cbe P2P: Add a mechanism for allowing 6 GHz channels in channel lists 6423c23e3 P2P: Allow 6 GHz channels to be included in the P2P_FIND operation a06c7d50f P2P: Helper functions to check for WFD capability of a P2P device eaf850867 P2P: Extend channel determination/validation to 6 GHz channels 9b50746f5 P2P: Introduce 6 GHz band capability bit in P2P Device Capability 9f901e65b WNM: Ignore SSID check for hidden SSID in transition candidates 525ec045f P2P: Use correct return type for has_channel() 09fb9b0cb DFS offload: Use hostapd_is_dfs_required() to check if DFS required e8662e9d4 Use a helper function to remove struct wpa_bss_tmp_disallowed entries ecaacb47b OCE: Remove AP from driver disallow list with sufficient AP RSSI c25b50306 hostapd: Reject 40 MHz channel config if regulatory rules do not allow it 20a522b9e AP: Add user configuration for TWT responder role 9efed6684 Android: Pass the vendor events to $(BOARD_HOSTAPD_PRIVATE_LIB) 39a1d55b7 Add QCA vendor interface to transport CFR data using netlink events da3335c92 QCA vendor attribute to configure keep alive data type 98f1259cd QCA vendor attribute to configure ER SU PPDU type e2e2655ce FILS: Fix PMKID derivation for OKC 6abfb1418 Use estimated throughputs irrespective of RSSI delta for 6 GHz APs 5e1e4cceb Add QCA vendor attribute to enable/disable FT over DS 586afb8fa Add QCA interface to configure band specific RSSI thresholds for roaming 800e34550 Fix documentation for QCA_WLAN_VENDOR_ATTR_TWT_SETUP_MAC_ADDR 7d2302f87 Add EAPOL-4WAY-HS-COMPLETED indication to AP 1c5aa2579 Add EAPOL_TX command to extend ext_eapol_frame_io possibilities 7f0a2e422 Report EAPOL-RX events for testing purposes 04283cf36 Add REKEY_PTK to allow upper layer request to force PTK rekeying 82d8d631e Skip GTK rekeying request if rekeying already in process de4d62dbc Add QCA vendor definitions for DFS radar history 46f897619 Prefer 6 GHz APs for connection in BSS selection 84008457e Add support to calculate estimated throughputs for HE rates 658b6a0b0 Add support to estimate throughput for VHT 160/80+80 MHz supporting APs 1d2118b50 Check local supported features for estimating BSS throughputs accurately 2950851ac Rename the Frame Control field subfield Order define to +HTC 11821ab3d Add QCA vendor interface to query usable channels 6ae0d78b8 Determine 6 GHz bandwidth in AP mode ACS using op_class parameter 0822de037 Add AP mode ACS support for the 6 GHz band bef5eee4f Convert channel to frequency based selection for AP mode ACS 15742566f 6 GHz: Fix operating class in Supported Operating Classes element 79e8f0c16 hostapd: Update 160 MHz center freq calculation in 6 GHz 9c6b0a941 hostapd: Disable VHT/HE when WMM is not enabled 15b1831a2 nl80211: Map internal TDLS_PEER_* to NL80211_TDLS_PEER_* 742018f44 Add support to indicate TDLS peer's HE capability to driver 2be5777a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h 1f2fbf41d Fix UPDATE_BEACON processing when disabled b8d337c63 DPP2: Fix channel 6 inclusion for chirping with non-2 GHz interfaces 80d975695 DPP2: Get DPP Relay Controller context based on hostapd callback context e63d45690 Add vendor reason code for TWT setup reject due to scan in progress 7d513b5b2 Add vendor hang reason code for tasklet/credit latency a6cae954e Vendor command to configure concurrent STA connection policies c2d7b027b DPP2: Close incomplete Relay connections f91680c15 OpenSSL: Fix compilation for version < 1.1.0 without CONFIG_ECC d675d3b15 Add helper functions for parsing RSNXE capabilities 663e190b7 SAE: Remove now unused password identifier argument from non-H2E case 79f87f473 PASN: Change PASN flows to use SAE H2E only 8c786e068 PASN: Derive KDK only when required 655edc19c Vendor attributes to configure broadcast TWT parameters 49ad86b0c Add vendor reason codes for TWT setup reject on roaming/channel switch 0bae16122 Set last_eapol_matches_bssid=1 on a roam+auth indication from driver 527be9ce7 SAE: Increment the Sc counter before generating each Confirm 47f51c8ba tests: Update SAE test vector to IEEE Std 802.11-2020 5f082c158 nl80211: Support larger number of MAC ACL entries f1fc9cf74 nl80211: Fix the size of the maximum MAC ACL size 93576264b WPS: Share a single error handling path in wps_set_ie() 2445e18b6 tests: assoc+auth driver event 00bec7b5b tests: IEEE 802.1X and FORCE_UNAUTH state e72e32253 hostapd: Enable WMM automatically when HE is configured 8ca330bd7 Flush pending control interface message for an interface to be removed 4a841a218 Fix WNM-Sleep Mode exit debug print of BIGTK 354f87e2e MSCS: Fix MSCS Response frame Status field parsing b8673baea Add REGISTER_FRAME hostapd control interface command for testing purposes 60974eb3f Allow AP mode extended capabilities to be overridden 7365eb43e Make hostapd_config_fill() easier to auto indent 8ca09293e Simplify extended capability determination in AP mode 37306a004 PASN: Use a helper function to free radio work data 349e9eafb PASN: Mark pubkey/comeback arguments constant for frame construction 67014b3f7 PASN: Add support for comeback flow to wpa_supplicant ab623ac75 PASN: Add support for comeback flow in AP mode 4ed10754e DPP: Fix GAS client error case handling in hostapd 3ae18d4bd EAP-SIM/AKA: Fix check for anonymous decorated identity 512d973cc DPP: Indicate authentication success on ConfReqRX if needed (hostapd) 6c8842f0e Fix full EAP authentication after PMKSA cache add failure 6bbbd9729 DPP2: Fix connection status result wait in hostapd c0c74f0c6 Testing functionality for airtime policy 2f7789149 nl80211: Debug print error from airtime weight configuration 38fa5e657 More documentation for HE Spatial Reuse Parameter Set configuration 73d9891bd EAP-SIM/AKA peer: Support decorated anonymous identity prefix 7831b10a8 Introduce reason code for TWT teardown due to concurrency eaeec4da2 PASN: Add support for deauthentication flow in station 4f436d537 nl80211: Allow sending Deauthentication frame with off channel for PASN 1ca1c3cfe AP: Handle deauthentication frame from PASN station 166e357e6 AP: Enable anti clogging handling code in PASN builds without SAE 6fe0d56e8 AP: Rename SAE anti clogging variables and functions b86678633 PASN: For testing purposes allow to corrupt MIC 2efa60344 PASN: Encode the public key properly cd0813763 PASN: Include PMKID in RSNE in PASN response from AP da3ac9809 PASN: Fix setting frame and data lengths in AP mode PASN response c733664be EAP peer: Make EAP-Success handling more robust against race conditions 72a17937c DPP: Add init/respond retries parameter configuration to hostapd 6ed0c212e TLS: Fix highest TLS version disabling with internal TLS client 57550cb27 DPP2: Use ASN.1 helper functions 626035bec TLS: Use ASN.1 helper functions d4e1d76db X509: Use ASN.1 helper functions 173e7eede RSA: Use ASN.1 helper functions 72b0217ab PKCS: Use ASN.1 helper functions a0541334a ASN.1: Validate DigestAlgorithmIdentifier parameters 94beb8e36 ASN.1: Fix AlgorithmInfo parsing for signatures ee76493bb ASN.1: Reject invalid definite long form length values in DER encoding 3af75f23b ASN.1: Reject invalid extended tags in DER encoding d6831a0e9 ASN.1: Explicitly validate constructed bit while parsing DER b421a7cf2 ASN.1: Use the helper functions for recognizing tags and debug prints 9a990e8c4 ASN.1: Add helper functions for recognizing tag values 9bf4c0539 ASN.1: Verify that NULL value has zero length f629bfe22 ASN.1: Add helper functions for debug printing identifier/length info 429f725d9 ASN.1: Define tag value for TIME 4481b03ee ASN.1: Fix a typo in a not-used tag name 2f2a57075 nl80211: Restore station mode on deinit only if station when started a746393dc TWT: Allow specifying Control field value in TWT Request a6b2007c2 nl80211: Support disabling HE in infrastructure BSS as station 01f2e54ce P2P: Clear pending_listen_freq when stopping listen 82a348eda wpa_supplicant: Don't process EAPOL frames while disconnecting e80e6a2f1 eapol_test: Add address family for IPv4 in Windows build cd2f8151e Add support to return bandwidth for channel 2 of the 6 GHz band 6b4e32da8 New vendor attribute to configure TWT mantissa in microseconds 7fd2f2496 TWT: Support sending TWT Setup and Teardown Action frames edbaffc4f wpabuf: Add helper functions for writing 64-bit integers 17d85158c Fix hostapd PMKSA_ADD with Authenticator disabled 147d6d372 Update VHT capabilities info on channel switch event dc587c479 nl80211: Determine secondary channel offset for CS to 80+80 MHz 0a8095d72 nl80211: Debug print for channel switch request parameters a20ace3a1 nl80211: Add command-to-string mapping for previously missed commands 0f37b8142 More specific set_freq_params debug prints for 80/80+80 MHz errors ab8929192 nl80211: Use process_bss_event() for the nl_connect handler 7c5442e74 DPP: Clear hapd->gas pointer on deinit 076e0abdd SQLite: Fix temporary eap_user data freeing on interface restart 2da3105ac Fix use after free with hapd->time_adv on interface restart 5ac977758 Reject authentication start during explicit roam requests 800fb6997 QCA vendor attribute to allow 6 GHz connection with all security types 1a60099f2 QCA vendor attribute to ignore SAE H2E requirement mismatch e9d598d8a Update old link to ACS wiki documentation b5e3d92ee OCV: Fix OCV-FAILURE event address for FT Reassociation Response frame 40551a15c Fix a memory leak in WPS with ap_scan=2 900adb3c9 FILS: Simplify code paths 4a5f6e88b SAE: Use more explicit IE payload validation steps 57fec19da Use more consistent iface->conf checks b8211e1e7 PASN: Avoid unreachable code with CONFIG_NO_RADIUS 9a1136b7f FILS: Fix RSN info in FD frame for no-group-addressed 6035969e0 Fix dynamic EAP library building a826ff2d9 Ignore group-addressed SA Query frames d314213f6 P2P: Pick a 5 GHz channel from more possible channels 205c35cef nl80211: Allow compilation with both vendor do_acs() handlers 61a258e78 nl80211: Add ACS support for Broadcom device 827b43b3c RADIUS client: Support SO_BINDTODEVICE 3a05f89ed Android: Add DRIVER command support on hostapd and hostapd_cli 50baf345b TDLS: Support TDLS operations in HE mode 184c82468 P2P: Add device address to the debug entry on oldest peer removal 8460e3230 P2P: Fix a corner case in peer addition based on PD Request Change-Id: Ieec0678b1a5c72fef3f3363cb54b20ac1cb8ab7f Merged-In: Ieec0678b1a5c72fef3f3363cb54b20ac1cb8ab7f (cherry picked from commit a20dcd72df8e8aef2465106ecae535fea07515e2)
2019-02-15[wpa_supplicant] Cumulative patch from fe468b071Hai Shalom
Bug: 124017368 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP functional test. Test: Regression test passed (Bug: 124301325) fe468b071 HE: Fix set_he_cap() parsing of config options for MU EDCA Params f3a841bbf Do not disassociate not-associated STA on timeout 91205c8eb OpenSSL: Fix uninitialized variable in CRL reloading corner case 092a19222 Use for_each_element() in ieee802_11_parse_elems() b50a63896 common: Use for_each_element_id/_extid for get_ie/get_ie_ext/get_vendor_ie b64479742 common: Use for_each_element_id() in mb_ies_info_by_ies() 9008048f0 common: Use for_each_element_id() in ieee802_11_vendor_ie_concat() eb84238df common: Use for_each_element() in ieee802_11_ie_count() 0e0c31bdc common: Add strongly typed element iteration macros 525923b1d tests: EAPOL-Key fuzzing tool 02a0a2393 RSN: Do not start preauthentication timer without candidates 1e5506588 JSON: Fix string parsing when \\ escape is at the end of buffer 0dedcb315 JSON: Fix parsing of a number from the end of the buffer 79fa1b453 tests: JSON parser fuzzer 62269c8d8 TLS: Fix X.509 certificate name conversion into empty string 3eae9766b TLS: Fix ASN.1 parsing with no room for the header fbc2123a1 TLS: Fix AlertDescription for missing partial processing case 1ac9c020b tests: TLS fuzzing tool f3cca8b1e TLS server: Check credentials have been configured before using them 19dd7a736 TLS server: Local failure information on verify_data mismatch f08ab18bf TLS server: Add internal callbacks get_failed, get_*_alerts b642ab406 TLS server: More complete logging of ClientHello decode errors fdd8a2f0b TLS client: Fix peer certificate event checking for probing e5bffe1aa OpenSSL: Add more handshake message names to debug 21cd8f831 nl80211: Use wpa_ssid_txt() for debug messages more consistently bbdb50146 Note HT overrides in debug log only if set f2a6ac63e P2P: Update find_start timer only when p2p_scan is started. c4e90da6d MBO: Move the WNM-Notification subtype definitions to common location 105b14f54 HS 2.0: Update the T&C Acceptance subtype value 65b487ae5 HS 2.0: Add QUIET=1 support for building hs20-osu-client 73f285dad Add FT-PSK to GET_CAPABILITY key_mgmt 6110753b1 nl80211: Clear PMKID add command message buffer 0fa33e05b nl80211: Clear connect command message buffer b14e8ea1d nl80211: Request kernel to trim off payload of netlink requests from acks 789b48bb4 EAP peer: Clear temporary message buffers before freeing 8f99a3c26 Clear config item writing buffer before freeing it a68e9b698 D-Bus: Fix P2P DeleteService dict iteration 0607346f1 D-Bus: Fix a memory leak in DeleteService handler d05dda61d PEAP: Explicitly clear temporary keys from memory when using CMK 4e1cd3468 EAP-PEAP: Derive EMSK and use 128-octet derivation for MSK d8c20ec59 DPP: Clear dpp_listen_freq on remain-on-channel failure 59fa20538 P2P: Allow the avoid channels for P2P discovery/negotiation e34cd9f06 WNM: Fix WNM-Sleep Mode Request bounds checking 159a7fbde crl_reload_interval: Add CRL reloading support 83c860813 AP: Add wpa_psk_file reloading in runtime ec5c39a55 AP: Allow identifying which passphrase station used with wpa_psk_file b08c9ad0c AP: Expose PMK outside of wpa_auth module 89896c000 tests: Use python3 compatible print statement bab493b90 tests: Use python3 compatible "except" statement 0dab47733 Write multi_ap_backhaul_sta to wpa_supplicant config 98251c6f2 dbus: Document more possible BSS/RSA/KeyMgmt values 1e591df06 Check supported types in wpas_mac_addr_rand_scan_set() c85249aa1 Fix test compilation error related to sme_event_unprot_disconnect() 42d308635 SAE: Advertise Password Identifier use 59c693064 HS 2.0 server: Command line option to fetch the version information 2d1762fa4 HS 2.0 server: Alternative subrem updateNode for certificate credentials d97cf2a11 HS 2.0 server: Use noMOUpdate in client certificate subrem 13a200a92 FILS: Remove notes about experimental implementation 86d4e0537 dbus: Expose support of SAE key management in BSS properties Change-Id: Id507b73f1f4a2e356cbcd3bfcfb9dcd23c8fd9e0
2019-02-11Revert "[wpa_supplicant] Cumulative patch from c4e90da6d"Hai Shalom
This reverts commit 39bc25d3a79c1375de430a7918d949c1a86f70c6. Test: Compilation Change-Id: Iae7670429466958911b5296cb1359bceecc0b03e Exempt-From-Owner-Approval: Revert since it's breaking the build
2019-02-11[wpa_supplicant] Cumulative patch from c4e90da6dHai Shalom
Bug: 124017368 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP functional test. Test: Regression test passed (Bug: 124052942) c4e90da6d MBO: Move the WNM-Notification subtype definitions to common location 105b14f54 HS 2.0: Update the T&C Acceptance subtype value 65b487ae5 HS 2.0: Add QUIET=1 support for building hs20-osu-client 73f285dad Add FT-PSK to GET_CAPABILITY key_mgmt 6110753b1 nl80211: Clear PMKID add command message buffer 0fa33e05b nl80211: Clear connect command message buffer b14e8ea1d nl80211: Request kernel to trim off payload of netlink requests from acks 789b48bb4 EAP peer: Clear temporary message buffers before freeing 8f99a3c26 Clear config item writing buffer before freeing it a68e9b698 D-Bus: Fix P2P DeleteService dict iteration 0607346f1 D-Bus: Fix a memory leak in DeleteService handler d05dda61d PEAP: Explicitly clear temporary keys from memory when using CMK 4e1cd3468 EAP-PEAP: Derive EMSK and use 128-octet derivation for MSK d8c20ec59 DPP: Clear dpp_listen_freq on remain-on-channel failure 59fa20538 P2P: Allow the avoid channels for P2P discovery/negotiation e34cd9f06 WNM: Fix WNM-Sleep Mode Request bounds checking 159a7fbde crl_reload_interval: Add CRL reloading support 83c860813 AP: Add wpa_psk_file reloading in runtime ec5c39a55 AP: Allow identifying which passphrase station used with wpa_psk_file b08c9ad0c AP: Expose PMK outside of wpa_auth module 89896c000 tests: Use python3 compatible print statement bab493b90 tests: Use python3 compatible "except" statement 0dab47733 Write multi_ap_backhaul_sta to wpa_supplicant config 98251c6f2 dbus: Document more possible BSS/RSA/KeyMgmt values 1e591df06 Check supported types in wpas_mac_addr_rand_scan_set() c85249aa1 Fix test compilation error related to sme_event_unprot_disconnect() 42d308635 SAE: Advertise Password Identifier use 59c693064 HS 2.0 server: Command line option to fetch the version information 2d1762fa4 HS 2.0 server: Alternative subrem updateNode for certificate credentials d97cf2a11 HS 2.0 server: Use noMOUpdate in client certificate subrem 13a200a92 FILS: Remove notes about experimental implementation 86d4e0537 dbus: Expose support of SAE key management in BSS properties Change-Id: I83ffca34ff5349c226db6215ff1ae35c3b7ab335
2017-01-09Cumulative patch from commit 05e5e615e6a26d7a9f5bd0569a0baeae1bcdee49Dmitry Shmidt
05e5e615e AP: Skip authentication/deauthentication phase for DMG/IEEE 802.11ad 0c4b9025c AP: Do not look for supported rates in DMG/IEEE 802.11ad e72faadb4 bgscan_simple: Fix short_scan_count comparison 517b5f928 nl80211: Zero num_modes if nl80211_get_hw_feature_data() fails 39c5da328 nl80211: Use correct attribute for scan flags in vendor scan c167662d7 eap_proxy: On SIM error flush PMKSAs only for SIM/AKA/AKA' networks 6657bb158 Fix OOM handling in neighbor report response handling 7187e2093 Allow LCI request with no subelements d73420143 RRM: Enable beacon report with active/passive scan for all drivers ec45927b8 Report received beacon report with BEACON-RESP-RX event f3383366a Report beacon request TX status as control interface event 90d9d7c32 Beacon request through hostapd control interface 73a27a634 Add hostapd configuration parameter rrm_beacon_report de6ec8b55 Enable Beacon Report using beacon table for all drivers 6774c6a9f Update copyright notices for the new year 2017 f56877414 Do not add own BSS in neighbor report with invalid op_class/channel aeff0645d FILS: Fix FILS Realm Information ANQP-element construction 76196ddb2 wpa_supplicant: Add support for Beacon Report Radio Measurement b3060bf99 common: Add helper function to convert RSSI to RCPI 1ac4dba31 wpa_supplicant: Extend verify_channel() and make it global c9ff8e5f6 common: Add function to get an operating class by its number and country e4f1d879c common: Add non-global to global operating classes conversion 96a5f14ee nl80211: Add support for additional scan parameters for beacon report c16b9f8d3 driver: Add scan support to beacon report 3c716fdbd wpa_supplicant: Refactor wpas_rrm_build_lci_report() e1b96e112 wpa_supplicant: Send rejection for unsupported radio measurements 0c73e410d wpa_supplicant: Limit RRM response size to MMPDU size 9664ab8b7 wpa_supplicant: Refactor Radio Measurement Request handling 332bf5d3f wpa_supplicant: Validate RRM request frame format ec493469f wpa_supplicant: Move RRM implementation to a dedicated file d1c74f8c9 Add RRM definitions for beacon report measurement 6a31440b8 Fix LCI request subelement processing ce691a8d9 Add CONFIG_MESH into wpa_supplicant defconfig 67129ab9e wpa_cli: Add commands to use PMKSA_GET/ADD bbad185c1 P2P: Fix compilation warning in p2p_add_device() 2977f5193 GAS: Remove unnecessarily duplicate gas_frag_limit configuration 1940559ea FT: Drop FT Action frames if ft_over_ds=0 d8de90487 Remove deprecated tx_queue_* params from hostapd.conf notes 78022c836 Fix memory leak on hostapd eap_user_file parsing error paths 02f999c6d hostapd: Remove unnecessary NULL check from parser functions fd5f29e7e Fix memory leak in hostapd BSS_TM_REQ error path handling 95de34a10 Remove trailing whitespace 45997cce4 hostapd: Add TERMINATE as per-interface command 546680f81 hostapd: Do not update dtim_period with invalid value 356773058 RADIUS server: Increase maximum number of sessions a5861afcb hostapd: Do not update invalid wep_key_len_unicast f78402ace hostapd: Do not update rejected wep_key_len_broadcast e0ba7efe5 hostapd: Do not update eapol_version with rejected value 9266d00bf hostapd: Reject invalid macaddr_acl value 8628555f9 hostapd: Check driver parameter before replacing previous value 1dfd25a68 Fix hostapd SIGHUP processing before interface is enabled 34e29dfd4 Remove unnecessary NULL check from hostapd_config_read_wpa_psk() call 65dfa8728 mka: Make MKA actor priority configurable 9bcfd5be8 Document new D-Bus WPS properties 77fcbf7ff D-Bus: Use a helper function to get possibly NULL strings dbf524946 D-Bus: Add DeviceType in WPS property 266097fda D-Bus: Add device serial number in WPS property 3ee6a3ab3 D-Bus: Add model number in WPS property ae66822cd D-Bus: Add WPS model name as property 318d4b5be D-Bus: Add WPS manufacturer as property b20f031c6 D-Bus: Add WPS device name as property 4a45dc192 mesh: Show [MESH] flag in print_bss_info() c04a67deb hostapd_cli: Add completion for get command bf4167b9d hostapd_cli: Add completion for set command 86adff09e hostapd_cli: Completion for further commands with STA parameter 4f59ad069 hostapd_cli: Use common completion for commands that use stations 62b95eb67 hostapd_cli: Add missing command help descriptions 04f02faac Fix wpa_cipher_to_alg() return type 9187b13ad wpa_supplicant: Add BSS CURRENT control interface command d7f12e4eb OpenSSL: Make sure local certificate auto chaining is enabled 4be02b71b OpenSSL: Remove SSL_{CTX_,}_clear_options ifdefs 7655bd738 P2P: Do not use wait_time for SD Response TX without fragmentation 1f0fdaf0e Fix race condition between AssocResp callback and 4addr event a6f3761f7 eap_proxy: Add support for SIM state change indication from eap_proxy 79a54ab9f eap_proxy: Fix eap_proxy_init() prototype to use const eapol_cb 4e118c847 D-Bus: Add 'freq' option to P2P Find method to specify starting channel e414f4f02 PeerKey: Fix STK 4-way handshake regression 28fb9bb19 PeerKey: Fix EAPOL-Key processing dfc773172 Android: Add p2p_add_cli_chan=1 option 7508c2ad9 PAE: Make KaY specific details available via control interface b54f43390 FILS: Make FILS Indication element information available in BSS output 8183aee6c FILS: Add support for building FILS Realm Information ANQP-element 9cad61867 FILS: Add Realm Information ANQP-element in BSS data 26bf70e3d FILS: Separate FILS realm configuration from ERP domain 42b847ac1 FILS: Fix hashed realm name derivation 29062f293 Update various definitions based on IEEE Std 802.11-2016 aaa9c60bc Fix preauth_test build by updating add_pmkid/remove_pmkid callbacks 0babae87a Fix wpa_supplicant build error with IEEE8021X_EAPOL unset 19810d29b Make Beacon IEs available in wpa_supplicant BSS command 274e76f22 mesh: Fix channel configuration in pri/sec switch case cebda0e3e Make debug print clearer for AP/mesh mode secondary channel issues 3459381dd External persistent storage for PMKSA cache entries c57931273 Add PMKSA-CACHE-ADDED/REMOVED events to wpa_supplicant 655dc4a43 Send "TERMINATING" event from hostapd 5149a0f04 P2P: Set p2p_persistent_group=1 at the time of reading disabled=2 065c029a5 Remove MBO dependency from Supported Operating Classes element 62cd9d792 nl80211: Specify the BSSID in the QCA vendor scan 444930e5b Define an attribute to do a specific BSSID QCA vendor scan cea761472 Add QCA vendor command definitions for IDs 61-73 cb0cc6efa Define QCA Beacon miss threshold attributes for 2.4 and 5 GHz bands c313c8a5d Fix QCA vendor command values for SAR power limits a5c723adc Interworking: Clear SCANNING state if no network selected a1836de64 SME: Fix IBSS setup after shared key/FT/FILS association f49c852b5 P2P: Fix a theoretical out of bounds read in wpas_p2p_select_go_freq() 944d48588 P2P: Fix a theoretical out of bounds read in wpas_p2p_setup_freqs() 0a6c9dc70 P2P: Send P2P-DEVICE-FOUND event on peer changing device name 9a431d493 WFD: Clear wfd_subelems when P2P peer stops sending them 6e374bd44 Ignore scan results from ongoing scan when FLUSH command is issued 71ac93453 Make update_idx available in BSS control interface command 49aa88bb5 P2P: Clear PEER_WAITING_RESPONSE on GO Negotiation success c79238b6a Define a QCA vendor command to configure SAR Power limits 0f5eb69f8 Use eloop timeout for post-EAP-Failure wait before disconnection 20b1a9e23 Allow hostapd wep_key# parameters to be cleared 5ec3d510e wpa_passphrase: Reject invalid passphrase Test: Wifi Suite Change-Id: Ida52ca4e43bbc326a89d4c9848529df2d545b692 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2016-01-07Cumulative patch from commit 21cb63fffd1e766c8b989125394ed0bfb05e5a4bDmitry Shmidt
21cb63f OpenSSL: Fix client certificate chain building after PKCS#12 use 12a81b6 ACS: Remove unreachable case from a debug print 896607d Remove a pointer check that can never be true a95cc47 ACS: Be more consistent with iface->current_mode checks 6014e59 P2P: Print find_start in debug log when ignoring old scan results 64845c1 l2_packet: Extend bridge workaround RX processing to cover two frames 4a539ab l2_packet: Improve bridge workaround RX processing 7a36f11 EAP-PAX: Check hmac_sha1_vector() return value 1d20c66 P2P: Clear groups first on FLUSH command 27446e4 mesh: Do not force another peering exchange on driver event cc64fe7 mesh: Do not clear link state on driver event if exchange was started b5f5c32 mesh: Add some more details to MPM debug messages 7d41907 nl80211: Add a missing space to a debug message 6174de6 mesh: Connection and group started/removed events into debug log 2da4a56 Add more hostapd.conf documentation for hw_mode with HT/VHT acc3943 EAP-PEAP peer: Cryptobinding in fast-reconnect case with inner EAP cba9ebf P2P: Try SD Query with each non-ACK peer only once per search iteration e9ccfc3 Clear wpa_supplicant state to DISCONNECTED on FLUSH command aeb408f HS 2.0: Add some documentation for OSEN and network block use 4f6cd3f Fix wpa_supplicant AP mode P2P IE handling if P2P is disabled 92acb40 Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 15c5606 Update copyright notices for the new year 2016 6e379c6 WPS: Testing mechanism to force auth/encr type flags ea31912 WPS: Add a workaround for WPA2PSK missing from Enrollee auth flags db671e0 WPS: Do not build Credential with unsupported encr combination on AP d7c3347 HS 2.0: Postpone WNM-Notification sending by 100 ms 750f5d9 EAP-FAST: Enable AES256-based TLS cipher suites with OpenSSL 1ebb24b OpenSSL: Share a single openssl_tls_prf() implementation dea2051 OpenSSL: Clean up function to fetch client/server random 9a42d85 OpenSSL: Drop support for OpenSSL 1.0.0 de213e8 OpenSSL: Drop support for OpenSSL 0.9.8 e79eb0c P2P: Fix P2P_FIND while waiting for listen ROC to start in the driver 944f693 P2P: Stop offchannel TX wait on P2P_STOP_FIND/P2P_LISTEN 8edd9f1 P2P: Add an option to specify group SSID in P2P_CONNECT join case 70e0cb3 P2P: Provide group SSID, if specified, to P2P Client join step 438be60 P2P: Do not accept any GO BSS entry if SSID is specified for join 35510d5 P2P: Use join SSID in the skip-PD cases 8b8d4f4 P2P: Do not accept any BSS entry for join if SSID is already known b875276 P2P: Use group SSID, if known, for join operation even if no BSS entry aa256cb P2PS: Add group SSID, if known, to the P2PS-PROV-DONE event 071e3bf FST: Fix handling of Rx FST Setup Request when session already exists Change-Id: Ia48764e8663232291160fb24153fa367b9ed3015 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2015-01-27Cumulative patch from commit 3f56a2b7460a57a2b68b48b936be134bf04aa36dDmitry Shmidt
3f56a2b Ignore pmf=1 default if driver does not support PMF fa38860 nl80211: Fix build with libnl 1.1 937403b Update copyright notices for the new year 2015 399e613 Add Suite B AKMs to key_mgmt capability list 5e3b519 Add Suite B 192-bit AKM 97ae35a Add HMAC-SHA384 98cd3d1 Preparations for variable length KCK and KEK 30bff1d Extend AES-CMAC routines to support 256-bit keys 86f9b1c nl80211: Fix default group key management index configuration b5f045d Show supported group_mgmt capabilities 893e152 Interworking: More debug messages f45bae5 Interworking: Add logging to track nai_realm_find_eap failures 5a5aab7 Interworking: Remove unnecessary NULL check 400de9b hostapd: Debug messages for dodgy RADIUS servers ad905e4 wpa_gui: Sort frequency and signal numerically in the scan results dialog c35e35e Add passive_scan configuration parameter bff162a P2P: Fix NULL pointer dereference with SD query cancellation 630b323 nl80211: Increase netlink receive buffer size Change-Id: I32d4bd934ad76e24c646e9925bb839b1ba2a148e Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2014-02-13Cumulative patch from commit 7ae7a84eefd43ed9385e2f8f520a918468f87178Dmitry Shmidt
7ae7a84 NFC: Workaround nfcpy message debug exception 6ceb95c Avoid NULL dereference in ieee802_1x_get_mib_sta() printf 97efe70 wpa_supplicant: Fix NULL dereference in tls_verify_cb() c0c11af wpa_supplicant: Fix NULL dereference in eap_fast_parse_end() 93a1cae Remove unnecessary NULL check 1e2ffc6 Fix theoretical NULL dereference in debug printf cbf21c7 P2P: Avoid compiler warning in p2p_supplicant.c 5479ff9 DFS: Avoid compiler warnings in src/ap/dfs.c 5e6aa04 wpa_supplicant: Fix memory leak in wfd_subelems error path 88853ae Fix CONFIG_WPS_NFC=y build without CONFIG_P2P=y 7ac7fd4 Add bssid/freq hint for driver-based BSS selection 92484e2 Start using unodified Developer Certificate of Origin v1.1 56ec49c Sync with wireless-testing.git include/uapi/linux/nl80211.h b64afe2 Fix SAE state validation on AP d6bfaaa NFC: Add summary and success file options for nfcpy scripts 25cfc6f P2P NFC: Add p2p-nfc.py --handover-only option 7bea076 P2P NFC: Clean up p2p-nfc.py error handling b0d18bc WPS: Make UUID-from-MAC Address easily available 825fb6b P2P: Do not indicate P2P_FIND failure if p2p_scan is in progress 8c18fcc WPS: Add more debug information to M7 AP Settings d7a15d5 WPS: Indicate current AP settings in M7 in unconfigurated state d55fc03 P2P: Handle unexpected GO Neg Req reject message more cleanly 062a7c0 Fix persistent P2P connection failure in case channel list changes Change-Id: I5c400a6503f9f00d259ff225999593958322a1ba Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2014-01-14Cumulative patch from commit 95fb2db2420d8fa291fd6423cc6dbcd042f4eb46Dmitry Shmidt
95fb2db P2P: Reject group formation on WPS provisioning failure 6fc61e1 Fix TX status processing during AP mode shutdown in wpa_supplicant 90a545c nl80211: Clean up netlink parsing and debug prints b6a9590 Interworking: Keep up to two pending GAS_REQUEST responses 090b8e3 Update copyright notices for the new year 2014 991aa9c nl80211: Move CS supported flag to wpa_driver_capa f0cbb98 Add DRIVER-STATUS command for hostapd 188ebcd EAP-IKEv2 peer: Fix a memory leak in notify round a190189 Remove PEAPv2 support 16a19dd EAP-pwd peer: Allow fragmentation limit to be configured 60bf585 EAP-IKEv2 peer: Allow fragmentation limit to be configured ea6fc58 WPS: Convert printf() debug print to use wpa_printf() c4b8c71 EAP-GPSK: Report CSuite negotiation failure properly 5a0f596 EAP-GPSK: Allow forced algorithm selection to be configured 5f01c3c EAP peer: Improve failure reporting from METHOD with no eapRespData 7271ee8 Fix EAP-GPSK server compilation for SHA256 cipher suite 356d148 Interworking: Add optional freq argument to INTERWORKING_SELECT a09ffd5 Fix req_scan-deplete-timeout and update eloop API for this 083916c P2P: Clear p2p_disabled and p2p_per_sta_psk on FLUSH command 3f45fc4 P2P: Clear services on FLUSH command 1f965e6 Allow external programs to request wpa_radio work items 6428d0a Do not start wpa_radio work during externally triggered scan 6470f47 Remove unneeded scan delay on connection-in-progress 4bb2321 Remove unneeded GAS query delay on connection-in-progress 6ac4b15 Use wpa_radio work for connection b9e6d70 Use radio work for GAS requests e05e130 P2P: Use radio work to protect offchannel Action frame exchanges e1d1c8e Use radio work for P2P Listen requests 1b5d471 Use radio work for P2P scan requests d12a51b Use radio work for scan requests b1ae396 Add framework for exclusive radio operations dd43aaa Add helper functions for cloning and freeing scan parameters 06f9acc Ignore externally triggered scan results with scan_res_handler c9b5559 Clean up ctrl_iface debug prints for monitor events d31b5ac Use cleaner debug print for ctrl_iface commands with private info 9595151 Remove duplicated RX ctrl_iface hexdump 9b85079 Fix scan-cache-clearing operation to avoid unnecessary cases 2f30cac Avoid unnecessary key clearing operations 466bcf9 Remove some unnecessary EAPOL port (un)authorized callbacks 949938a Ask driver to report only new scan results if requested a1a31b6 Remove hostapd dump_file functionality ea23df6 Make EAPOL dump data available through ctrl_iface STA command 96ea74b Convert EAPOL authenticator dump into easier to parse format ca3b71c Remove hostapd dump_file data that is available through ctrl_iface 4c03a2b Make RADIUS server MIB available through control interface f538be3 Add more STA information into the ctrl_iface STA command 101bdc2 Remove forgotten notes about already removed driver wrappers 7006753 Update EAP-FAST note regarding OpenSSL support 17b79e6 nl80211: Initial support for vendor commands and events 5890fa8 WPS: Fix clear-from-timeout handling to avoid race condition c64e3a0 P2P: Send received Presence Response information to ctrl_iface monitors f7fb676 ACS: Mark acs_fail() static 3cf06c9 OpenSSL: Include sha1/sha256 header files to verify declarations 5ace51a WNM: Clean up le16 variable use to avoid sparse warnings c583868 Mark wpas_wps_er_nfc_handover_sel() static 8cf1e68 Move declaration of hostapd_acs_completed() into correct header file 0187c41 Declare wpa_debug_* variables in src/utils/wpa_debug.h fcc6123 Declare wpa_drivers in src/drivers/driver.h 0d79b50 Clear EAPOL Logoff state on FLUSH command 327b01d nl80211: Add driver param for forcing monitor and connect APIs 6f06766 nl80211: Fix nl_mgmt handling in partial error case 4ea6a47 nl80211: Prefer newer scan result over older during duplicate removal 2eef517 nl80211: Report set_supp_port failures in debug log a0bdd19 nl80211: Share a helper function for connect and associate commands e00d546 Remove unnecessary build #ifdef from definitions 4848a38 Get rid of duplicated cipher suite and AKM definitions de4ed4a nl80211: Use helper functions for cipher suite mapping a565084 nl80211: Set control port for NL80211_CMD_COMMAND ef93abd WPS: Clean up UUID debug print 35f3d3e nl80211: Clean up regulatory rule debug prints 880de88 nl80211: Print frame registration match on same debug line 03ed332 Interworking: Allow cred blocks not to be saved to a file 04f7ecc Reset WPA parameters to default values on FLUSH command 152cff6 P2P: Remove WPA_DRIVER_FLAGS_P2P_MGMT option 538d6f4 WPS: Use shorter scan interval during pre-provisioning search 3187fd9 WPS: Replace wpas_wps_in_progress with identical wpas_wps_searching 4414d9e SAE: Fix ECC element y coordinate validation step 069fb47 EAP-EKE: Allow forced algorithm selection to be configured 3a88914 Remove unused information element parsing data dbfb8e8 Remove unnecessary EVENT_RX_ACTION 1450e1e Define __maybe_unused 912b34f Do not process Action frames twice in hostapd SME/MLME 006309b Fix whitespace style 6780713 WPS: Remove unused send_wpabuf() e912986 tests: Verify concurrent WPS protocol run with assigned PIN 8aaafce Make local UUID available through ctrl_iface STATUS command 0e22b8d WPS: Make sure reconfiguration timeout is not left behind on deinit 75d1d0f WPS: Allow testing mode to disable 2.0 functionality f7e2542 Remove unused wps_device_data_dup() c89d9db Remove unnecessary extra tracking of eloop registration c86bf16 Replace unnecessary hex_value() with hex2byte() 7b02375 Clear wps_fragment_size on FLUSH command aa189ac Enable FT with SAE 2d2ecf5 nl80211: Fix protected Action frame reporting for AP mode db76aa6 Fix PeerKey 4-way handshake 7732729 Fix PeerKey deinit behavior 8d321a7 WNM: Move disassociation imminent sending to wnm_ap.c b76f4c2 hostapd: Make STA flags available through ctrl_iface STA command aa03dbd Remove IEEE80211_REQUIRE_AUTH_ACK 121f2ab Remove unused STA flags 3578e66 WNM: Add STA flag to indicate the current WNM-Sleep-Mode state 4776897 WNM: Fix AP processing without wnm_oper driver callback 2025cad WNM: Move ESS Disassoc Imminent sending to a helper function 28ab64a WNM: Minimal processing of BSS Transition Management Query/Response 2cd0f6a WNM: Add Target BSSID into BSS Transition Management Response a8a6a35 WNM: Use nonzero dialog token in BSS Transition Management Query 629edfe WNM: Fix Sleep Mode AP processing in open network 3c1060f WNM: Add debug logs to get the RSSI from the scan results dff1e28 Initial handling of GTK-not-used cipher suite 51e3eaf OpenSSL: Do not accept SSL Client certificate for server 6bf61fb OpenSSL: Use certificates from TLS authentication in OCSP stapling c962947 WPS ER: Fix deinit timeout handling with delayed/failing unsubscribe 7b75c30 WPS: Reschedule AP configuration reload on EAP completion c511b32 WPS: Remove old duplicate network even if key is different 9d2cb3e Make CONFIG_TESTING_OPTIONS=y enable all testing options 662b40b WPS: Reduce scan wait time during WPS processing 015af91 Do not use results from externally requested scan for network selection 1cd93ff Reschedule own scan request if an externally started one is in progress dc3906c Show timing information about scan requests in debug log d81c73b Optional scan id for ctrl_iface SCAN requests a5f40ef Track whether scan was started by us or an external program 18ae237 Fix comment format 88c2d48 Allow passive scan to be requested with SCAN passive=1 3ae3ec2 nl80211: Add scanned frequencies/SSIDs into debug log 69278f7 Remove unused last_scan_full 1f5d2dd Interworking: Allow EAP-FAST to be used 6ffa168 Add GAS-QUERY-START and GAS-QUERY-DONE event messages 93827f4 hostapd: Allow external management frame processing or testing fee5234 Allow channel list to be specified for SCAN command 98eda9c Move int_array helpfer functions to utils/common.c a4cfb48 Add make lcov-html to generate code coverage report bee25cc nl80211: Fetch cipher capabilities from the driver 4daa011 Clean up cipher capability prints 35c2006 Convert wpa_hexdump functions to use void pointer instead of u8 * 5f9c134 Remove obsolete license notifications bd1e328 Android: Remove old WEXT extensions bad5cdf Verify that beacon setup succeeds before proceeding 7d7f7be Verify group key configuration for WPA group 30675c3 Add definitions for new cipher suites from IEEE Std 802.11ac-2013 13b24a7 VHT: Use status code 104 to indicate VHT required ab41595 wpa_supplicant: Fix crash when terminating all interfaces 76aab03 Add secondary channel IE for CSA 8f4713c Store entire CS freq_params and not only freq 13daed5 Include driver.h in hostapd.h a12d345 wpa_supplicant: Use monotonic time for last_scan check 51bffab WPS: Use monotonic time for AP connection attempt 6473e5c wpa_supplicant: Use relative time for TKIP Michael MIC failures 4e1eae1 wpa_supplicant: Use monotonic time for temp-disabled networks 151ab80 P2P: Use monotonic time for GO client waiting 3326f19 IBSS RSN: Use monotonic time for reinit detection 196a217 WPS_UPNP: Use monotonic time for event debouncing 864c9af wps_registrar: Use monotonic time for PBC workaround 61e98e9 wps_registrar: Use monotonic time for PBC session timeout 3647e5a wps_registrar: Use monotonic time for PIN timeout 3618618 rsn_supp: Use monotonic time for PMKSA cache expiry c2be937 wpa_supplicant: Use monotonic time for EAPOL RX workaround e72a001 bgscan: Use monotonic time e05f060 rsn_supp: Do not track expiration time 5870717 RADIUS server: Use monotonic time 4012804 RADIUS client: Use monotonic time acb69ce wpa_supplicant: Use monotonic time for RX/BSS times 46b8d4c wpa_supplicant: Use monotonic time for SA query timeout f073fde EAP server: Remove SIM-DB pending timestamp 636e19a wpa_ctrl: Use monotonic time for request retry loop 7ffe7d2 AP: Use monotonic time for MMIC failure/TKIP countermeasures dd4e32b AP: Use monotonic time for PMKSA cache 0fc545a AP: Use monotonic time for STA accounting 3e06180 bgscan_learn: Start scanning from the first freq f4c73ae bgscan_learn: Fix initial interval 7dab119 bgscan_learn: Avoid redundant frequencies 3727123 bgscan: Stop bgscan only on disassociation b2838ba Update IBSS documentation to include RSN option 429dd9a Advertise QoS Map support based on driver capability 049105b nl80211: Add support for QoS Map configuration 74ddd64 nl80211: Sync with mac80211-next.git 9fcd300 nl80211: Sync with wireless-testing.git Change-Id: Iabdd88d9cabd478a41c3cb0a8d061b425cc1beca Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2013-11-05Cumulative patch from commit 2b6623ab134fff6d96114f5fe329a2f87d5e893aDmitry Shmidt
2b6623a hostapd: Do not terminate process on dynamic interface add failure 217cf49 P2P: Add more debug prints for frequency selection 4dd3f86 P2P: Fix bug in GO frequency selection 9804873 wpa_supplicant: Fix bug in get_shared_radio_freqs 3342c26 wpa_supplicant: Fix updating GO beacons on WFD subelements change 72c12c1 EAPOL: Fix static analyzer warnings for pac_opaque_encr_key 3139270 bgscan: Add global bgscan configuration efc58df eap_proxy: Re-read IMSI from proxy in Interworking functionality Change-Id: I006abd3b52fbbd1a7b97059364c72ab0386d5f63 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2012-08-09Minor cleaning to be closer to mainstreamJouni Malinen
Change-Id: I4aed30c59c549c2ce7488f12df4e68c6154f0ffe Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
2011-05-09wpa_supplicant: Initial Revision 0.8.XDmitry Shmidt
Based on: commit 0725cc7b7efc434910e89865c42eda7ce61bbf08 Author: Jouni Malinen <j@w1.fi> Date: Thu Apr 21 20:41:01 2011 +0300 Enable CONFIG_DRIVER_NL80211=y in the default configuration nl80211 should be preferred over WEXT with any recent Linux kernel version. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>