aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* [wpa_supplicant] Fix security vulnerability wpa_supplicant/wnm_sta.c:376cm-14.1Hai Shalom2019-05-071-0/+4
| | | | | | | | | | | | Fix Security Vulnerability - Security Report - [Out of bounds read in wnm_parse_neighbor_report_elem in external/wpa_supplicant_8/wpa_supplicant/wnm_sta.c:376] Bug: 122074159 Test: Connect to AP, run traffic Test: Run poc_wnm_sta_376 on device, comfirm new error message appears Change-Id: If0ff673d2536135469144ee69b3f4e1831be73bf (cherry picked from commit cb95c3f41acb3bcdd6477b59f945554bc1849465) (cherry picked from commit 5e6e3f710fd8f317f479fc9b7a5bfed1bef89f9f)
* Use BoringSSL to get random bytesRich Cannings2019-02-212-0/+8
| | | | | | | Bug: 117508900 Change-Id: I4889513c0671ff2b689f1beca8084d6f149d473d Test: Existing tests pass (cherry picked from commit 29d54b87f121c79d5df87b0b2bcd7a1eb6090c1f)
* WNM: Fix WNM-Sleep Mode Request bounds checkingJouni Malinen2019-01-081-0/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ieee802_11_rx_wnmsleep_req() might be called for a short frame that has no more payload after the Public Action field, i.e., with len == 0. The bounds checking for the payload length was done only for the information elements while the one octet Dialog Token field was read unconditionally. This could result in reading one octet beyond the end of the received frame data. Depending on driver interface specific mechanism used for fetching the frame, this could result in reading one octet beyond the end of a stack/hash buffer or reading an uninitialized octet from within a buffer. The actual value that was read as the Dialog Token field is not used since the function returns immediately after having read this value when there is no information elements following the field. This issue was initially added in commit d32d94dbf47a ("WNM: Add WNM-Sleep Mode implementation for AP") (with CONFIG_IEEE80211V=y build option) and it remained in place during number of cleanup and fix changes in this area and renaming of the build parameter to CONFIG_WNM=y. The impacted function was not included in any default build without one of the these optional build options being explicitly enabled. CONFIG_WNM=y is still documented as "experimental and not complete implementation" in hostapd/defconfig. In addition, commit 114f2830d2c2 ("WNM: Ignore WNM-Sleep Mode Request in wnm_sleep_mode=0 case") made this function exit before the impact read if WNM-Sleep Mode support was not explicitly enabled in runtime configuration (wnm_sleep_mode=1 in hostapd.conf). Fix this by explicitly checking the frame has enough payload before reading the Dialog Token field. Bug: 111893132 Change-Id: I4b61e22c39d1a5683923eff34e43bb0c509913d4 Merged-In: I4b61e22c39d1a5683923eff34e43bb0c509913d4 Signed-off-by: Jouni Malinen <jouni@codeaurora.org> (cherry picked from commit 7a543744db8ece2376b019040b5668ede68ebd8b)
* PMKSA: Fix use-after-free in pmksa_cache_clone_entry()Andrew Elble2018-02-071-1/+2
| | | | | | | | | pmksa_cache_add_entry() may actually free old_entry if the PMKSA cache is full. This can result in the PMKSA cache containing entries with corrupt expiration times. Change-Id: Ibfc5d285eb4ae8efe4ccdf29f34e484485604778 Signed-off-by: Andrew Elble <aweits@rit.edu>
* Clear PMK length and check for this when deriving PTKJouni Malinen2017-10-162-3/+9
| | | | | | | | | | Instead of setting the default PMK length for the cleared PMK, set the length to 0 and explicitly check for this when deriving PTK to avoid unexpected key derivation with an all-zeroes key should it be possible to somehow trigger PTK derivation to happen before PMK derivation. Change-Id: Ib5e1e22b2713a8b0d50683a5bfdf9cfad2023eaf Signed-off-by: Jouni Malinen <j@w1.fi>
* Add debug prints on PMK configuration in WPA supplicantJouni Malinen2017-10-161-0/+6
| | | | | | | | This makes it easier to understand the cases where PMK gets configured based on information from upper layer call (e.g., a PSK). Change-Id: Ib3d86a1c0fde5e41211531aa942cff5fb5a07fbe Signed-off-by: Jouni Malinen <j@w1.fi>
* WPA: Extra defense against PTK reinstalls in 4-way handshakeMathy Vanhoef2017-10-161-0/+8
| | | | | | | | | | | | Currently, reinstallations of the PTK are prevented by (1) assuring the same TPTK is only set once as the PTK, and (2) that one particular PTK is only installed once. This patch makes it more explicit that point (1) is required to prevent key reinstallations. At the same time, this patch hardens wpa_supplicant such that future changes do not accidentally break this property. Change-Id: Ib8d2a4dc2c6ccd634866f0b3b01ca3d73f73bcaa Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
* Remove all PeerKey functionalityJouni Malinen2017-10-1645-2123/+42
| | | | | | | | | | | | | | | | | | | | | | | | | This was originally added to allow the IEEE 802.11 protocol to be tested, but there are no known fully functional implementations based on this nor any known deployments of PeerKey functionality. Furthermore, PeerKey design in the IEEE Std 802.11-2016 standard has already been marked as obsolete for DLS and it is being considered for complete removal in REVmd. This implementation did not really work, so it could not have been used in practice. For example, key configuration was using incorrect algorithm values (WPA_CIPHER_* instead of WPA_ALG_*) which resulted in mapping to an invalid WPA_ALG_* value for the actual driver operation. As such, the derived key could not have been successfully set for the link. Since there are bugs in this implementation and there does not seem to be any future for the PeerKey design with DLS (TDLS being the future for DLS), the best approach is to simply delete all this code to simplify the EAPOL-Key handling design and to get rid of any potential issues if these code paths were accidentially reachable. Change-Id: I19d3a084cbf4645b2d4cf39958a70728de954bd6 Signed-off-by: Jouni Malinen <j@w1.fi>
* Add MGMT_TX_STATUS_PROCESS command for testing purposesJouni Malinen2017-10-162-2/+75
| | | | | | | | | This allows ext_mgmt_frame_handling=1 cases with hostapd to process TX status events based on external processing. This is useful for increased test coverage of management frame processing. Change-Id: Ie15d9e2adf710cb104c950395b10e20231896fa0 Signed-off-by: Jouni Malinen <j@w1.fi>
* FT: Do not allow multiple Reassociation Response framesJouni Malinen2017-10-163-0/+12
| | | | | | | | | | | | | The driver is expected to not report a second association event without the station having explicitly request a new association. As such, this case should not be reachable. However, since reconfiguring the same pairwise or group keys to the driver could result in nonce reuse issues, be extra careful here and do an additional state check to avoid this even if the local driver ends up somehow accepting an unexpected Reassociation Response frame. Change-Id: I2dd48a7cab3e960accf74a7d20394a25356d4683 Signed-off-by: Jouni Malinen <j@w1.fi>
* WNM: Ignore WNM-Sleep Mode Response without pending requestJouni Malinen2017-10-161-1/+3
| | | | | | | | | | | | Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used') started ignoring the response when no WNM-Sleep Mode Request had been used during the association. This can be made tighter by clearing the used flag when successfully processing a response. This adds an additional layer of protection against unexpected retransmissions of the response frame. Change-Id: I6218023ad0e82ec50b7e47b72cdc0b73ee9157a8 Signed-off-by: Jouni Malinen <j@w1.fi>
* TDLS: Reject TPK-TK reconfigurationJouni Malinen2017-10-161-2/+36
| | | | | | | | | | | | | | | | | | | | Do not try to reconfigure the same TPK-TK to the driver after it has been successfully configured. This is an explicit check to avoid issues related to resetting the TX/RX packet number. There was already a check for this for TPK M2 (retries of that message are ignored completely), so that behavior does not get modified. For TPK M3, the TPK-TK could have been reconfigured, but that was followed by immediate teardown of the link due to an issue in updating the STA entry. Furthermore, for TDLS with any real security (i.e., ignoring open/WEP), the TPK message exchange is protected on the AP path and simple replay attacks are not feasible. As an additional corner case, make sure the local nonce gets updated if the peer uses a very unlikely "random nonce" of all zeros. Change-Id: I45fdbb8219dcab511b4390d7164cae8aacc1e2fa Signed-off-by: Jouni Malinen <j@w1.fi>
* Fix PTK rekeying to generate a new ANonceJouni Malinen2017-10-161-3/+21
| | | | | | | | | | | | | | The Authenticator state machine path for PTK rekeying ended up bypassing the AUTHENTICATION2 state where a new ANonce is generated when going directly to the PTKSTART state since there is no need to try to determine the PMK again in such a case. This is far from ideal since the new PTK would depend on a new nonce only from the supplicant. Fix this by generating a new ANonce when moving to the PTKSTART state for the purpose of starting new 4-way handshake to rekey PTK. Change-Id: I3edfba00ac8e89ec4c93585f3fa206935c87a742 Signed-off-by: Jouni Malinen <j@w1.fi>
* Prevent installation of an all-zero TKMathy Vanhoef2017-10-163-4/+3
| | | | | | | | | | | | | | | Properly track whether a PTK has already been installed to the driver and the TK part cleared from memory. This prevents an attacker from trying to trick the client into installing an all-zero TK. This fixes the earlier fix in commit ad00d64e7d8827b3cebd665a0ceb08adabf15e1e ('Fix TK configuration to the driver in EAPOL-Key 3/4 retry case') which did not take into account possibility of an extra message 1/4 showing up between retries of message 3/4. Change-Id: I143d328f2a28e6b9ed6681e1dd6ecdc06ddf1c5d Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
* Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode casesJouni Malinen2017-10-162-15/+40
| | | | | | | | | | | This extends the protection to track last configured GTK/IGTK value separately from EAPOL-Key frames and WNM-Sleep Mode frames to cover a corner case where these two different mechanisms may get used when the GTK/IGTK has changed and tracking a single value is not sufficient to detect a possible key reconfiguration. Change-Id: I065f456dc5efb8d8db1795b65db0922be8b466f4 Signed-off-by: Jouni Malinen <j@w1.fi>
* Prevent reinstallation of an already in-use group keyMathy Vanhoef2017-10-163-44/+87
| | | | | | | | | | | Track the current GTK and IGTK that is in use and when receiving a (possibly retransmitted) Group Message 1 or WNM-Sleep Mode Response, do not install the given key if it is already in use. This prevents an attacker from trying to trick the client into resetting or lowering the sequence counter associated to the group key. Change-Id: Idd83d1ee8fa070ca949ba23caee5ef11ec56c0af Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
* hostapd: Avoid key reinstallation in FT handshakeMathy Vanhoef2017-10-165-4/+37
| | | | | | | | | | | | | | | | | | | Do not reinstall TK to the driver during Reassociation Response frame processing if the first attempt of setting the TK succeeded. This avoids issues related to clearing the TX/RX PN that could result in reusing same PN values for transmitted frames (e.g., due to CCM nonce reuse and also hitting replay protection on the receiver) and accepting replayed frames on RX side. This issue was introduced by the commit 0e84c25434e6a1f283c7b4e62e483729085b78d2 ('FT: Fix PTK configuration in authenticator') which allowed wpa_ft_install_ptk() to be called multiple times with the same PTK. While the second configuration attempt is needed with some drivers, it must be done only if the first attempt failed. Change-Id: I5b6de9e9519fc3487069fcb2f202cad60669794d Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
* Set EAPOL-Key Key Length field to 0 for group message 1/2 in RSNJouni Malinen2017-10-161-2/+4
| | | | | | | | | | | | P802.11i/D3.0 described the Key Length as having value 16 for the group key handshake. However, this was changed to 0 in the published IEEE Std 802.11i-2004 amendment (and still remains 0 in the current standard IEEE Std 802.11-2016). We need to maintain the non-zero value for WPA (v1) cases, but the RSN case can be changed to 0 to be closer to the current standard. Change-Id: Iaeea9354da2c530dbf836c0a4d4af22af304c369 Signed-off-by: Jouni Malinen <j@w1.fi>
* wpa_supplicant_conf: Let devices provide their own templatestaging/cm-14.1-cafrebaseRicardo Cerqueira2017-01-011-1/+1
| | | | Change-Id: I3a7806e0b4f407b8de646ed172cde37152d2f158
* eap: Don't force reassociation when getting the identity and handshakes are ↵Ricardo Cerqueira2017-01-011-1/+5
| | | | | | | | | | in progress This creates a race-condition between credentials management and association, often kicking the connection state into a loop. This does not apply if the EAP connection is proxied. Change-Id: Ie43612c6112438dbdacad2a0f585c11674f5b53d
* eap_peer: Make the QMI EAP proxy a standalone libRicardo Cerqueira2017-01-012-0/+36
| | | | | | | | | | | | | | | | | | | | | This code can't be built without linking to some proprietary libs and headers. Split it off so a prebuilt can be distributed for OSS builds Ref: CYNGNOS-428 Change-Id: I430dda72e8cb156d86ef286244230bb3f511ca23 Fix dependencies Change-Id: I86c5e41e4d6987e432cb2f129ad585149228b04a wpa_supplicant: Remove unnecessary QMI linkage * The QMI libraries are linked with the intermediate lib, we don't need to link them directly to the executable. Change-Id: Ifedf5c480af6b5f0309cd36da719e98ae3a69750
* Merge b44fce87cb2071d9f90e14793396eeed51d3441e on remote branchLinux Build Service Account2016-12-1519-75/+444
|\ | | | | | | Change-Id: I2b46cf6887ebcae5edaae27ba9ad6963e53878d4
| * Promotion of wlan-aosp-service.lnx.2.0.c1-00008.Linux Build Service Account2016-12-100-0/+0
| |\ | | | | | | | | | | | | | | | | | | CRs Change ID Subject -------------------------------------------------------------------------------------------------------------- Change-Id: I70c86cff2a4cf1fd1f5ee812a447e0b0ae957c5a
| | * To Backport the N-Mr1 ChangesAnjaneedevi Kapparapu2016-12-0919-75/+444
| | |\ | | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To Backport the N-Mr1 Changes Merge remote-tracking branch 'origin/wlan-aosp-service.lnx.2.0.c1-rel' into wlan-aosp-service.lnx.2.0.c1-dev * origin/wlan-aosp-service.lnx.2.0.c1-rel: Update channel information after channel switch Restart PNO/sched_scan on channel list update. Share a common helper function for restarting sched_scan. wpa_supplicant: Cancel sched_scan on SELECT_NETWORK initiated scan nl80211: Allow TDLS trigger modes to be configured to the host driver QCA vendor command to configure the TDLS behavior in the host driver Do not exceed scan ssid max size advertised by driver P2P: Check if the pref_freq reported by the driver supports P2P EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status command. MBO: Add support to send ANQP request to get cellular preference MBO: Do not add reason_detail in non_pref_chan attr (STA) WNM: Add testing option to reject BSS Transition Management Request MBO: Add support to ignore association disallowed set by AP MBO: Remove unused assignment MBO: Improve supported operating class generation MBO: Mark verify_channel() static DO NOT MERGE Dont exceed scan ssid max size advertised by driver Fix use-after-free in qca_nl80211_get_features nl80211: Register for only for specific Action frames in AP mode [DO NOT MERGE] DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability Change-Id: If55136276bd00b829422e81a2dd4715da7c1b56e CRs-Fixed: 1099470
| * | Merge N-MR1 to remote branch.Naveen Kumar2016-12-082-5/+52
| |\ \ | | | | | | | | | | | | Change-Id: Ib1acc45655e32b0f80400cb7f173d58d4f203fe2
| | * \ Merge commit 'e382b88ddec8ed658cb462a6a49ec54e0d0e564c' into remoteLalit Kansara2016-12-062-5/+52
| | |\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: src/drivers/driver_nl80211_capa.c Change-Id: Iafddee9e8245f7683ce45b523cdd3e1f1d1479f5
| | | * | DO NOT MERGE Dont exceed scan ssid max size advertised by driverRoshan Pius2016-07-011-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Currently |wpa_set_scan_ssids| fully exhausts |wpa_driver_scan_params.ssid| list when hidden network ID's are provided via the control interface. This results in us exceeding the max size for the list advertised by the driver when we add the "wildcard" scan ssid entry. So, ensure that we leave space for one more scan ssid entry in the list when we exit out of |wpa_set_scan_ssids|. BUG: 29502964 Change-Id: If2cdd11951a7855e73d8bb7b6f8cae504931fa56 Signed-off-by: Roshan Pius <rpius@google.com>
| | | * | Fix use-after-free in qca_nl80211_get_featuresPaul Stewart2016-06-101-2/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Any data accessible from nla_data is freed before the send_and_recv_msgs function returns, therefore we need to allocate space for info.flags ourselves. BUG=29237626 Change-Id: I622d1c624cce785ca7ed76f5c0ea8c5011c9be45
| | | * | nl80211: Register for only for specific Action frames in AP mode [DO NOT MERGE]Kanchanapally, Vidyullatha2016-05-261-5/+47
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This makes changes such that hostapd (and wpa_supplicant AP mode) registers to kernel for specific Action frames instead of generically registering for all Action frames. This makes it easier for other programs to register for some Action frames that hostapd does not handle today without having to somehow coordinate directly with hostapd. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> BUG: 28973012 Change-Id: I05e5ea4b1176d5f0f4b7b9da2d322885c9c8a17c
| | | * | DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver ↵Ben Fennema2016-04-190-0/+0
| | | |\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | capability am: 0fbcc4cde5 -s ours am: 0261db291a -s ours am: e00d5291c6 -s ours * commit 'e00d5291c64e84e34964c196cfb90b14005e0a94': DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability Change-Id: I0e4fb71faf8c3f4da22592d34733c11319137f2e
| | | | * | DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver ↵Ben Fennema2016-04-190-0/+0
| | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | capability am: 0fbcc4cde5 -s ours am: 0261db291a -s ours * commit '0261db291a46b21b557187e17368be5aabbe74ee': DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability Change-Id: I3388e5f77d034c121e8e78d810b77dd1f0a713ca
| | | | * | DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver ↵Ben Fennema2016-04-190-0/+0
| | | | |\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | capability am: 0fbcc4cde5 -s ours * commit '0fbcc4cde5f93d092d62366ef9615b3edb8fa5f6': DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability Change-Id: Iae4610d3bc1a237c7234e0515fa6b188fe1ccee9
| | | | | * | DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver ↵Ben Fennema2016-04-081-3/+11
| | | | |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | capability Bug: 26700796 Change-Id: I00a780ff01cc2c1f05da5bce1893ea6ea397c086 Signed-off-by: Ben Fennema <fennema@google.com>
| * | | | | Merge 194ea1a6484cff72c6fc4db5282592e710863264 on remote branchLinux Build Service Account2016-12-0619-70/+392
| |\| | | | | | | | | | | | | | | | | | | | | | Change-Id: I9dafa8a067101626d667cbc3b8d51c6b2ab13769
| | * | | | Promotion of wlan-aosp-service.lnx.2.0-00017.Linux Build Service Account2016-11-0812-25/+228
| | |\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CRs Change ID Subject -------------------------------------------------------------------------------------------------------------- 1085011 Icfba638a2946f1d2f9650326999c233b3bd8b861 wpa_supplicant: Cancel sched_scan on SELECT_NETWORK init 1083327 I12a264ce247185a5f783fda570eb3c52f063322b QCA vendor command to configure the TDLS behavior in th 1065138 Ibdf6c9e64cd706283ff59d7b472e3ac596272e69 Do not exceed scan ssid max size advertised by driver 1085011 I8ec15cae6990e416edba2fe20fddbf86780e138b Restart PNO/sched_scan on channel list update. 1085011 I964d6625ab19736d8a4c8b1c53fa3f522a760416 Share a common helper function for restarting sched_scan 1085565 I05ebbc3bd01c370f925ae5a6fb732ea5da40709c Update channel information after channel switch 1081648 I289bc3a2ff88d5be767fc59d83d888fa1fa121e9 P2P: Check if the pref_freq reported by the driver suppo 1083327 Ib26415efb34a99f98296d9e7a7a8987691e30cd2 nl80211: Allow TDLS trigger modes to be configured to th 1078066 Ie4299dbece378a7d87e27b00cf6bcf0d1e13a086 EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status Change-Id: I21a87c33f6f6a36e814711e35d3fe8f8b6036011 CRs-Fixed: 1081648, 1065138, 1078066, 1083327, 1085011, 1085565
| | | * \ \ \ Merge "Update channel information after channel switch" into ↵Service qcabuildsw2016-11-041-0/+1
| | | |\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | wlan-aosp-service.lnx.2.0-dev
| | | | * | | | Update channel information after channel switchJouni Malinen2016-11-031-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When channel switch happens, driver wrapper's internal channel information needs to be updated so that the new frequency will be used in operations using drv->assoc_freq. Previously, only bss->freq was updated and the new frequency was also indicated in the EVENT_CH_SWITCH event. This could potentially leave out couple of cases that use drv->assoc_freq at least as a fallback mechanism for getting the current operating frequency. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: c2ad5b9218f33d6f4b97d779c4928d71d82ad02c Git-repo: git://w1.fi/srv/git/hostap.git CRs-fixed: 1085565 Change-Id: I05ebbc3bd01c370f925ae5a6fb732ea5da40709c
| | | * | | | | Restart PNO/sched_scan on channel list update.Arik Nemtsov2016-11-031-7/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As the scan channels might need to change when the channel list has been updated by the kernel. Use the simulated sched_scan timeout (wpas_scan_restart_sched_scan()) to handle a possible race where an ongoing sched_scan has stopped asynchronously while trying to restart a new sched_scan. Signed-off-by: Arik Nemtsov <arikx.nemtsov@intel.com> Git-commit: ebf59eb549827ecfb7a42281721a1af9cfa0d7a1 Git-repo: git://w1.fi/srv/git/hostap.git CRs-fixed: 1085011 Change-Id: I8ec15cae6990e416edba2fe20fddbf86780e138b
| | | * | | | | Share a common helper function for restarting sched_scan.Jouni Malinen2016-11-033-10/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This code sequence was already used at two different places (and an additional one has been proposed), so add a common helper function to avoid having to copy-paste this functionality in multiple locations. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 5bb7327a697108c880dd31c9e421df386c904b1a Git-repo: git://w1.fi/srv/git/hostap.git CRs-fixed: 1085011 Change-Id: I964d6625ab19736d8a4c8b1c53fa3f522a760416
| | | * | | | | wpa_supplicant: Cancel sched_scan on SELECT_NETWORK initiated scanMax Stepanov2016-11-033-0/+21
| | | |/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If a scheduled scan is running on select network command, cancel and reset it before kicking off a regular scan request. Signed-off-by: Max Stepanov <Max.Stepanov@intel.com> Git-commit: be7ebd892ee7c47ff291de4e7802c14758f02a3d Git-repo: git://w1.fi/srv/git/hostap.git CRs-fixed: 1085011 Change-Id: Icfba638a2946f1d2f9650326999c233b3bd8b861
| | | * | | | nl80211: Allow TDLS trigger modes to be configured to the host driverSunil Dutt2016-11-014-0/+71
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit adds a control interface command to configure the TDLS trigger mode to the host driver. This TDLS mode is configured through the "SET tdls_trigger_control" control interface command. Git-commit: 2e4e4fb71cce29181623f60d65bcb264059e24c7 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ib26415efb34a99f98296d9e7a7a8987691e30cd2 CRs-fixed: 1083327
| | | * | | | QCA vendor command to configure the TDLS behavior in the host driverSunil Dutt2016-11-011-0/+93
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Git-commit: 14cd203ffff4d2f831a8c58829b7d3fd068ed748 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I12a264ce247185a5f783fda570eb3c52f063322b CRs-fixed: 1083327
| | | * | | | Merge "Do not exceed scan ssid max size advertised by driver" into ↵Service qcabuildsw2016-10-281-0/+6
| | | |\ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | wlan-aosp-service.lnx.2.0-dev
| | | | * | | | Do not exceed scan ssid max size advertised by driverRoshan Pius2016-10-261-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, wpa_set_scan_ssids() fully exhausted wpa_driver_scan_params.ssid list when hidden network IDs are provided via the control interface. This results in us exceeding the max size for the list advertised by the driver when we add the "wildcard" scan SSID entry. So, ensure that we leave space for one more scan SSID entry in the list when we exit out of wpa_set_scan_ssids(). Signed-off-by: Roshan Pius <rpius@google.com> Git-commit: ef60f643ec50a3746b47aede5ae9f52410c7aa8e Git-repo: git://w1.fi/srv/git/hostap.git CRs-fixed: 1065138 Change-Id: Ibdf6c9e64cd706283ff59d7b472e3ac596272e69
| | | * | | | | Merge "P2P: Check if the pref_freq reported by the driver supports P2P" into ↵Service qcabuildsw2016-10-261-2/+4
| | | |\| | | | | | | | | | | | | | | | | | | | | | | | | | | | wlan-aosp-service.lnx.2.0-dev
| | | | * | | | P2P: Check if the pref_freq reported by the driver supports P2PSunil Dutt2016-10-251-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Filter out get_pref_freq_list() (i.e., QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) output in case of channel negotiation by removing channels that do not allow P2P operation at all. Previously, only the explicitly disallowed channels were removed and that could have resulted in selecting an operating channel that is not allowed for P2P and failing to complete the operation to start the group. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 783c2920cc9117b663506dc82223867bfa792a5d Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I289bc3a2ff88d5be767fc59d83d888fa1fa121e9 CRs-fixed: 1081648
| | | * | | | | Merge "EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status command." ↵Service qcabuildsw2016-10-241-6/+10
| | | |\| | | | | | | | | | | | | | | | | | | | | | | | | | | | into wlan-aosp-service.lnx.2.0-dev
| | | | * | | | EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status command.Purushottam Kushwaha2016-10-231-6/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Instead of printing "Unknown", this prints EAP-AKA' in SelectedMethod of "status" command, if eap_type is "EAP_TYPE_AKA_PRIME". Change-Id: Ie4299dbece378a7d87e27b00cf6bcf0d1e13a086 CRs-Fixed: 1078066
| | * | | | | | Promotion of wlan-aosp-service.lnx.2.0-00011.Linux Build Service Account2016-10-209-45/+170
| | |\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CRs Change ID Subject -------------------------------------------------------------------------------------------------------------- 1070010 Ic242de6aa946ced65dd2c954af29b763a8af3757 MBO: Add support to send ANQP request to get cellular pr 1070010 I0b470892c535fd061b3b3f72c83dd3fe453d14c2 MBO: Do not add reason_detail in non_pref_chan attr (STA 1070010 I8afc22e53dc35ebc527b86390dc69470a6174e80 MBO: Remove unused assignment 1070010 I62855a556e6e04ae05a39ec7731075f74ffcbd73 WNM: Add testing option to reject BSS Transition Managem 1070010 I0c16d8d63b755d5169ddc8c5c7e96d8388f35d37 MBO: Improve supported operating class generation 1070010 Ic4e0d0309f44cfdc73f0e9406867caffb20eb706 MBO: Add support to ignore association disallowed set by 1070010 Ic68560fff749ccef6e3a2ab6efed8fa6440d0e4e MBO: Mark verify_channel() static Change-Id: I21dabc828bd1cbdffb76ab64b37648cd3f891e70 CRs-Fixed: 1070010
| | | * | | | | Merge changes Ic242de6a,I0b470892,I62855a55 into wlan-aosp-service.lnx.2.0-devLinux Build Service Account2016-10-178-30/+102
| | | |\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * changes: MBO: Add support to send ANQP request to get cellular preference MBO: Do not add reason_detail in non_pref_chan attr (STA) WNM: Add testing option to reject BSS Transition Management Request