| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
| |
Fix Security Vulnerability - Security Report - [Out of bounds read in
wnm_parse_neighbor_report_elem in external/wpa_supplicant_8/wpa_supplicant/wnm_sta.c:376]
Bug: 122074159
Test: Connect to AP, run traffic
Test: Run poc_wnm_sta_376 on device, comfirm new error message appears
Change-Id: If0ff673d2536135469144ee69b3f4e1831be73bf
(cherry picked from commit cb95c3f41acb3bcdd6477b59f945554bc1849465)
(cherry picked from commit 5e6e3f710fd8f317f479fc9b7a5bfed1bef89f9f)
|
| |
|
|
|
|
|
| |
Bug: 117508900
Change-Id: I4889513c0671ff2b689f1beca8084d6f149d473d
Test: Existing tests pass
(cherry picked from commit 29d54b87f121c79d5df87b0b2bcd7a1eb6090c1f)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ieee802_11_rx_wnmsleep_req() might be called for a short frame that has
no more payload after the Public Action field, i.e., with len == 0. The
bounds checking for the payload length was done only for the information
elements while the one octet Dialog Token field was read
unconditionally. This could result in reading one octet beyond the end
of the received frame data.
Depending on driver interface specific mechanism used for fetching the
frame, this could result in reading one octet beyond the end of a
stack/hash buffer or reading an uninitialized octet from within a
buffer. The actual value that was read as the Dialog Token field is not
used since the function returns immediately after having read this value
when there is no information elements following the field.
This issue was initially added in commit d32d94dbf47a ("WNM: Add
WNM-Sleep Mode implementation for AP") (with CONFIG_IEEE80211V=y build
option) and it remained in place during number of cleanup and fix
changes in this area and renaming of the build parameter to
CONFIG_WNM=y. The impacted function was not included in any default
build without one of the these optional build options being explicitly
enabled. CONFIG_WNM=y is still documented as "experimental and not
complete implementation" in hostapd/defconfig. In addition, commit
114f2830d2c2 ("WNM: Ignore WNM-Sleep Mode Request in wnm_sleep_mode=0
case") made this function exit before the impact read if WNM-Sleep Mode
support was not explicitly enabled in runtime configuration
(wnm_sleep_mode=1 in hostapd.conf).
Fix this by explicitly checking the frame has enough payload before
reading the Dialog Token field.
Bug: 111893132
Change-Id: I4b61e22c39d1a5683923eff34e43bb0c509913d4
Merged-In: I4b61e22c39d1a5683923eff34e43bb0c509913d4
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
(cherry picked from commit 7a543744db8ece2376b019040b5668ede68ebd8b)
|
| |
|
|
|
|
|
|
|
| |
pmksa_cache_add_entry() may actually free old_entry if the PMKSA cache
is full. This can result in the PMKSA cache containing entries with
corrupt expiration times.
Change-Id: Ibfc5d285eb4ae8efe4ccdf29f34e484485604778
Signed-off-by: Andrew Elble <aweits@rit.edu>
|
| |
|
|
|
|
|
|
|
|
| |
Instead of setting the default PMK length for the cleared PMK, set the
length to 0 and explicitly check for this when deriving PTK to avoid
unexpected key derivation with an all-zeroes key should it be possible
to somehow trigger PTK derivation to happen before PMK derivation.
Change-Id: Ib5e1e22b2713a8b0d50683a5bfdf9cfad2023eaf
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
| |
This makes it easier to understand the cases where PMK gets configured
based on information from upper layer call (e.g., a PSK).
Change-Id: Ib3d86a1c0fde5e41211531aa942cff5fb5a07fbe
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Currently, reinstallations of the PTK are prevented by (1) assuring the
same TPTK is only set once as the PTK, and (2) that one particular PTK
is only installed once. This patch makes it more explicit that point (1)
is required to prevent key reinstallations. At the same time, this patch
hardens wpa_supplicant such that future changes do not accidentally
break this property.
Change-Id: Ib8d2a4dc2c6ccd634866f0b3b01ca3d73f73bcaa
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This was originally added to allow the IEEE 802.11 protocol to be
tested, but there are no known fully functional implementations based on
this nor any known deployments of PeerKey functionality. Furthermore,
PeerKey design in the IEEE Std 802.11-2016 standard has already been
marked as obsolete for DLS and it is being considered for complete
removal in REVmd.
This implementation did not really work, so it could not have been used
in practice. For example, key configuration was using incorrect
algorithm values (WPA_CIPHER_* instead of WPA_ALG_*) which resulted in
mapping to an invalid WPA_ALG_* value for the actual driver operation.
As such, the derived key could not have been successfully set for the
link.
Since there are bugs in this implementation and there does not seem to
be any future for the PeerKey design with DLS (TDLS being the future for
DLS), the best approach is to simply delete all this code to simplify
the EAPOL-Key handling design and to get rid of any potential issues if
these code paths were accidentially reachable.
Change-Id: I19d3a084cbf4645b2d4cf39958a70728de954bd6
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
| |
This allows ext_mgmt_frame_handling=1 cases with hostapd to process TX
status events based on external processing. This is useful for increased
test coverage of management frame processing.
Change-Id: Ie15d9e2adf710cb104c950395b10e20231896fa0
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
The driver is expected to not report a second association event without
the station having explicitly request a new association. As such, this
case should not be reachable. However, since reconfiguring the same
pairwise or group keys to the driver could result in nonce reuse issues,
be extra careful here and do an additional state check to avoid this
even if the local driver ends up somehow accepting an unexpected
Reassociation Response frame.
Change-Id: I2dd48a7cab3e960accf74a7d20394a25356d4683
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Commit 03ed0a52393710be6bdae657d1b36efa146520e5 ('WNM: Ignore WNM-Sleep
Mode Response if WNM-Sleep Mode has not been used') started ignoring the
response when no WNM-Sleep Mode Request had been used during the
association. This can be made tighter by clearing the used flag when
successfully processing a response. This adds an additional layer of
protection against unexpected retransmissions of the response frame.
Change-Id: I6218023ad0e82ec50b7e47b72cdc0b73ee9157a8
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Do not try to reconfigure the same TPK-TK to the driver after it has
been successfully configured. This is an explicit check to avoid issues
related to resetting the TX/RX packet number. There was already a check
for this for TPK M2 (retries of that message are ignored completely), so
that behavior does not get modified.
For TPK M3, the TPK-TK could have been reconfigured, but that was
followed by immediate teardown of the link due to an issue in updating
the STA entry. Furthermore, for TDLS with any real security (i.e.,
ignoring open/WEP), the TPK message exchange is protected on the AP path
and simple replay attacks are not feasible.
As an additional corner case, make sure the local nonce gets updated if
the peer uses a very unlikely "random nonce" of all zeros.
Change-Id: I45fdbb8219dcab511b4390d7164cae8aacc1e2fa
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
The Authenticator state machine path for PTK rekeying ended up bypassing
the AUTHENTICATION2 state where a new ANonce is generated when going
directly to the PTKSTART state since there is no need to try to
determine the PMK again in such a case. This is far from ideal since the
new PTK would depend on a new nonce only from the supplicant.
Fix this by generating a new ANonce when moving to the PTKSTART state
for the purpose of starting new 4-way handshake to rekey PTK.
Change-Id: I3edfba00ac8e89ec4c93585f3fa206935c87a742
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Properly track whether a PTK has already been installed to the driver
and the TK part cleared from memory. This prevents an attacker from
trying to trick the client into installing an all-zero TK.
This fixes the earlier fix in commit
ad00d64e7d8827b3cebd665a0ceb08adabf15e1e ('Fix TK configuration to the
driver in EAPOL-Key 3/4 retry case') which did not take into account
possibility of an extra message 1/4 showing up between retries of
message 3/4.
Change-Id: I143d328f2a28e6b9ed6681e1dd6ecdc06ddf1c5d
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
|
| |
|
|
|
|
|
|
|
|
|
| |
This extends the protection to track last configured GTK/IGTK value
separately from EAPOL-Key frames and WNM-Sleep Mode frames to cover a
corner case where these two different mechanisms may get used when the
GTK/IGTK has changed and tracking a single value is not sufficient to
detect a possible key reconfiguration.
Change-Id: I065f456dc5efb8d8db1795b65db0922be8b466f4
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
|
|
|
|
|
|
|
| |
Track the current GTK and IGTK that is in use and when receiving a
(possibly retransmitted) Group Message 1 or WNM-Sleep Mode Response, do
not install the given key if it is already in use. This prevents an
attacker from trying to trick the client into resetting or lowering the
sequence counter associated to the group key.
Change-Id: Idd83d1ee8fa070ca949ba23caee5ef11ec56c0af
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Do not reinstall TK to the driver during Reassociation Response frame
processing if the first attempt of setting the TK succeeded. This avoids
issues related to clearing the TX/RX PN that could result in reusing
same PN values for transmitted frames (e.g., due to CCM nonce reuse and
also hitting replay protection on the receiver) and accepting replayed
frames on RX side.
This issue was introduced by the commit
0e84c25434e6a1f283c7b4e62e483729085b78d2 ('FT: Fix PTK configuration in
authenticator') which allowed wpa_ft_install_ptk() to be called multiple
times with the same PTK. While the second configuration attempt is
needed with some drivers, it must be done only if the first attempt
failed.
Change-Id: I5b6de9e9519fc3487069fcb2f202cad60669794d
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
|
| |
|
|
|
|
|
|
|
|
|
|
| |
P802.11i/D3.0 described the Key Length as having value 16 for the group
key handshake. However, this was changed to 0 in the published IEEE Std
802.11i-2004 amendment (and still remains 0 in the current standard IEEE
Std 802.11-2016). We need to maintain the non-zero value for WPA (v1)
cases, but the RSN case can be changed to 0 to be closer to the current
standard.
Change-Id: Iaeea9354da2c530dbf836c0a4d4af22af304c369
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| |
|
|
| |
Change-Id: I3a7806e0b4f407b8de646ed172cde37152d2f158
|
| |
|
|
|
|
|
|
|
|
| |
in progress
This creates a race-condition between credentials management and association,
often kicking the connection state into a loop.
This does not apply if the EAP connection is proxied.
Change-Id: Ie43612c6112438dbdacad2a0f585c11674f5b53d
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This code can't be built without linking to some proprietary libs
and headers. Split it off so a prebuilt can be distributed for
OSS builds
Ref: CYNGNOS-428
Change-Id: I430dda72e8cb156d86ef286244230bb3f511ca23
Fix dependencies
Change-Id: I86c5e41e4d6987e432cb2f129ad585149228b04a
wpa_supplicant: Remove unnecessary QMI linkage
* The QMI libraries are linked with the intermediate lib, we don't
need to link them directly to the executable.
Change-Id: Ifedf5c480af6b5f0309cd36da719e98ae3a69750
|
| |\
| |
| |
| | |
Change-Id: I2b46cf6887ebcae5edaae27ba9ad6963e53878d4
|
| | |\
| | |
| | |
| | |
| | |
| | |
| | | |
CRs Change ID Subject
--------------------------------------------------------------------------------------------------------------
Change-Id: I70c86cff2a4cf1fd1f5ee812a447e0b0ae957c5a
|
| | | |\
| | |/
| |/|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
To Backport the N-Mr1 Changes
Merge remote-tracking branch 'origin/wlan-aosp-service.lnx.2.0.c1-rel' into wlan-aosp-service.lnx.2.0.c1-dev
* origin/wlan-aosp-service.lnx.2.0.c1-rel:
Update channel information after channel switch
Restart PNO/sched_scan on channel list update.
Share a common helper function for restarting sched_scan.
wpa_supplicant: Cancel sched_scan on SELECT_NETWORK initiated scan
nl80211: Allow TDLS trigger modes to be configured to the host driver
QCA vendor command to configure the TDLS behavior in the host driver
Do not exceed scan ssid max size advertised by driver
P2P: Check if the pref_freq reported by the driver supports P2P
EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status command.
MBO: Add support to send ANQP request to get cellular preference
MBO: Do not add reason_detail in non_pref_chan attr (STA)
WNM: Add testing option to reject BSS Transition Management Request
MBO: Add support to ignore association disallowed set by AP
MBO: Remove unused assignment
MBO: Improve supported operating class generation
MBO: Mark verify_channel() static
DO NOT MERGE Dont exceed scan ssid max size advertised by driver
Fix use-after-free in qca_nl80211_get_features
nl80211: Register for only for specific Action frames in AP mode [DO NOT MERGE]
DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability
Change-Id: If55136276bd00b829422e81a2dd4715da7c1b56e
CRs-Fixed: 1099470
|
| | |\ \
| | | |
| | | |
| | | | |
Change-Id: Ib1acc45655e32b0f80400cb7f173d58d4f203fe2
|
| | | |\ \
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Conflicts:
src/drivers/driver_nl80211_capa.c
Change-Id: Iafddee9e8245f7683ce45b523cdd3e1f1d1479f5
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Currently |wpa_set_scan_ssids| fully exhausts
|wpa_driver_scan_params.ssid| list when hidden network ID's
are provided via the control interface. This results in us
exceeding the max size for the list advertised by the driver when we add
the "wildcard" scan ssid entry. So, ensure that we leave space for one
more scan ssid entry in the list when we exit out of |wpa_set_scan_ssids|.
BUG: 29502964
Change-Id: If2cdd11951a7855e73d8bb7b6f8cae504931fa56
Signed-off-by: Roshan Pius <rpius@google.com>
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Any data accessible from nla_data is freed before the
send_and_recv_msgs function returns, therefore we need to allocate
space for info.flags ourselves.
BUG=29237626
Change-Id: I622d1c624cce785ca7ed76f5c0ea8c5011c9be45
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This makes changes such that hostapd (and wpa_supplicant AP mode)
registers to kernel for specific Action frames instead of generically
registering for all Action frames. This makes it easier for other
programs to register for some Action frames that hostapd does not handle
today without having to somehow coordinate directly with hostapd.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
BUG: 28973012
Change-Id: I05e5ea4b1176d5f0f4b7b9da2d322885c9c8a17c
|
| | | | |\ \
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
capability am: 0fbcc4cde5 -s ours am: 0261db291a -s ours
am: e00d5291c6 -s ours
* commit 'e00d5291c64e84e34964c196cfb90b14005e0a94':
DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability
Change-Id: I0e4fb71faf8c3f4da22592d34733c11319137f2e
|
| | | | |/| |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
capability am: 0fbcc4cde5 -s ours
am: 0261db291a -s ours
* commit '0261db291a46b21b557187e17368be5aabbe74ee':
DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability
Change-Id: I3388e5f77d034c121e8e78d810b77dd1f0a713ca
|
| | | | | |\ \
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
capability
am: 0fbcc4cde5 -s ours
* commit '0fbcc4cde5f93d092d62366ef9615b3edb8fa5f6':
DO NOT MERGE ANYWHERE Fix max number of sched scan SSIDs based on driver capability
Change-Id: Iae4610d3bc1a237c7234e0515fa6b188fe1ccee9
|
| | | | | |/ /
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
capability
Bug: 26700796
Change-Id: I00a780ff01cc2c1f05da5bce1893ea6ea397c086
Signed-off-by: Ben Fennema <fennema@google.com>
|
| | |\| | | |
| | | | | |
| | | | | |
| | | | | | |
Change-Id: I9dafa8a067101626d667cbc3b8d51c6b2ab13769
|
| | | |\ \ \ \
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
CRs Change ID Subject
--------------------------------------------------------------------------------------------------------------
1085011 Icfba638a2946f1d2f9650326999c233b3bd8b861 wpa_supplicant: Cancel sched_scan on SELECT_NETWORK init
1083327 I12a264ce247185a5f783fda570eb3c52f063322b QCA vendor command to configure the TDLS behavior in th
1065138 Ibdf6c9e64cd706283ff59d7b472e3ac596272e69 Do not exceed scan ssid max size advertised by driver
1085011 I8ec15cae6990e416edba2fe20fddbf86780e138b Restart PNO/sched_scan on channel list update.
1085011 I964d6625ab19736d8a4c8b1c53fa3f522a760416 Share a common helper function for restarting sched_scan
1085565 I05ebbc3bd01c370f925ae5a6fb732ea5da40709c Update channel information after channel switch
1081648 I289bc3a2ff88d5be767fc59d83d888fa1fa121e9 P2P: Check if the pref_freq reported by the driver suppo
1083327 Ib26415efb34a99f98296d9e7a7a8987691e30cd2 nl80211: Allow TDLS trigger modes to be configured to th
1078066 Ie4299dbece378a7d87e27b00cf6bcf0d1e13a086 EAP-Proxy: Consider EAP-AKA' in SelectedMethod of Status
Change-Id: I21a87c33f6f6a36e814711e35d3fe8f8b6036011
CRs-Fixed: 1081648, 1065138, 1078066, 1083327, 1085011, 1085565
|
| | | | |\ \ \ \
| | | | | | | |
| | | | | | | |
| | | | | | | | |
wlan-aosp-service.lnx.2.0-dev
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
When channel switch happens, driver wrapper's internal channel
information needs to be updated so that the new frequency will be used
in operations using drv->assoc_freq. Previously, only bss->freq was
updated and the new frequency was also indicated in the EVENT_CH_SWITCH
event. This could potentially leave out couple of cases that use
drv->assoc_freq at least as a fallback mechanism for getting the current
operating frequency.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: c2ad5b9218f33d6f4b97d779c4928d71d82ad02c
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-fixed: 1085565
Change-Id: I05ebbc3bd01c370f925ae5a6fb732ea5da40709c
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
As the scan channels might need to change when the channel list has been
updated by the kernel. Use the simulated sched_scan timeout
(wpas_scan_restart_sched_scan()) to handle a possible race where an
ongoing sched_scan has stopped asynchronously while trying to restart a
new sched_scan.
Signed-off-by: Arik Nemtsov <arikx.nemtsov@intel.com>
Git-commit: ebf59eb549827ecfb7a42281721a1af9cfa0d7a1
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-fixed: 1085011
Change-Id: I8ec15cae6990e416edba2fe20fddbf86780e138b
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
This code sequence was already used at two different places (and an
additional one has been proposed), so add a common helper function to
avoid having to copy-paste this functionality in multiple locations.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 5bb7327a697108c880dd31c9e421df386c904b1a
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-fixed: 1085011
Change-Id: I964d6625ab19736d8a4c8b1c53fa3f522a760416
|
| | | | |/ / / /
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
If a scheduled scan is running on select network command,
cancel and reset it before kicking off a regular scan request.
Signed-off-by: Max Stepanov <Max.Stepanov@intel.com>
Git-commit: be7ebd892ee7c47ff291de4e7802c14758f02a3d
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-fixed: 1085011
Change-Id: Icfba638a2946f1d2f9650326999c233b3bd8b861
|
| | | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
This commit adds a control interface command to configure the TDLS
trigger mode to the host driver. This TDLS mode is configured through
the "SET tdls_trigger_control" control interface command.
Git-commit: 2e4e4fb71cce29181623f60d65bcb264059e24c7
Git-repo : git://w1.fi/srv/git/hostap.git
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Change-Id: Ib26415efb34a99f98296d9e7a7a8987691e30cd2
CRs-fixed: 1083327
|
| | | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Git-commit: 14cd203ffff4d2f831a8c58829b7d3fd068ed748
Git-repo : git://w1.fi/srv/git/hostap.git
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Change-Id: I12a264ce247185a5f783fda570eb3c52f063322b
CRs-fixed: 1083327
|
| | | | |\ \ \ \
| | | | | | | |
| | | | | | | |
| | | | | | | | |
wlan-aosp-service.lnx.2.0-dev
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Previously, wpa_set_scan_ssids() fully exhausted
wpa_driver_scan_params.ssid list when hidden network IDs are provided
via the control interface. This results in us exceeding the max size for
the list advertised by the driver when we add the "wildcard" scan SSID
entry. So, ensure that we leave space for one more scan SSID entry in
the list when we exit out of wpa_set_scan_ssids().
Signed-off-by: Roshan Pius <rpius@google.com>
Git-commit: ef60f643ec50a3746b47aede5ae9f52410c7aa8e
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-fixed: 1065138
Change-Id: Ibdf6c9e64cd706283ff59d7b472e3ac596272e69
|
| | | | |\| | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
wlan-aosp-service.lnx.2.0-dev
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Filter out get_pref_freq_list() (i.e.,
QCA_NL80211_VENDOR_SUBCMD_GET_PREFERRED_FREQ_LIST) output in case of
channel negotiation by removing channels that do not allow P2P operation
at all. Previously, only the explicitly disallowed channels were removed
and that could have resulted in selecting an operating channel that is
not allowed for P2P and failing to complete the operation to start the
group.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 783c2920cc9117b663506dc82223867bfa792a5d
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: I289bc3a2ff88d5be767fc59d83d888fa1fa121e9
CRs-fixed: 1081648
|
| | | | |\| | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
into wlan-aosp-service.lnx.2.0-dev
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Instead of printing "Unknown", this prints EAP-AKA' in SelectedMethod
of "status" command, if eap_type is "EAP_TYPE_AKA_PRIME".
Change-Id: Ie4299dbece378a7d87e27b00cf6bcf0d1e13a086
CRs-Fixed: 1078066
|
| | | |\| | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
CRs Change ID Subject
--------------------------------------------------------------------------------------------------------------
1070010 Ic242de6aa946ced65dd2c954af29b763a8af3757 MBO: Add support to send ANQP request to get cellular pr
1070010 I0b470892c535fd061b3b3f72c83dd3fe453d14c2 MBO: Do not add reason_detail in non_pref_chan attr (STA
1070010 I8afc22e53dc35ebc527b86390dc69470a6174e80 MBO: Remove unused assignment
1070010 I62855a556e6e04ae05a39ec7731075f74ffcbd73 WNM: Add testing option to reject BSS Transition Managem
1070010 I0c16d8d63b755d5169ddc8c5c7e96d8388f35d37 MBO: Improve supported operating class generation
1070010 Ic4e0d0309f44cfdc73f0e9406867caffb20eb706 MBO: Add support to ignore association disallowed set by
1070010 Ic68560fff749ccef6e3a2ab6efed8fa6440d0e4e MBO: Mark verify_channel() static
Change-Id: I21dabc828bd1cbdffb76ab64b37648cd3f891e70
CRs-Fixed: 1070010
|
| | | | |\ \ \ \ \
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
* changes:
MBO: Add support to send ANQP request to get cellular preference
MBO: Do not add reason_detail in non_pref_chan attr (STA)
WNM: Add testing option to reject BSS Transition Management Request
|