aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'cm-11.0' into stable/cm-11.0cm-11.0-XNPH05Q-tomato-9828f8e9cccm-11.0-XNPH05Q-bacon-5229c4ef56stable/cm-11.0-XNF9Xstable/cm-11.0-XNF8Ystable/cm-11.0shipping/cm-11.0Brint E. Kriebel2014-11-0310-46/+107
|\
| * P2P: Fix segfault when PBC overlap is detectedAvraham Stern2014-10-134-11/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | If a separate P2P group interface is used, PBC overlap during group formation causes the group interface to be removed, which ends up with the interface context becoming invalid. Fix this by scheduling a timeout to process the PBC overlap and interface removal instead of removing the interface directly before the connection operation has returned. Signed-off-by: Avraham Stern <avraham.stern@intel.com> Git-commit: ace0fbdb69b492a3aa6f24d07f0d6d4dffc4b7dc Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Iee452eb1ea731c7e216e0ec25a7c7235756589ac CRs-fixed: 670339
| * X.509: Fix internal TLS/X.509 validation of PKCS#1 signatureJouni Malinen2014-10-131-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | Verify that there is no extra data after the hash field. This is needed to avoid potential attacks using additional data to construct a value that passes the RSA operation and allows the hash value to be forged. CRs-Fixed: 654804 Change-Id: Iee0a8de08fd0f7d66b3bfd0c4396637d9b70e92f Git-commit: 9c29d48725fd40a82407a89f193cf009aeef9745 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * P2P: Extend the listen time based on the active concurrent sessionRashmi Ramanna2014-10-131-1/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | A P2P Device while in the Listen state waiting to respond for the obtained group negotiation request shall give a fair chance for other concurrent sessions to use the shared radio by inducing an idle time between the successive listen states. However, if there are no concurrent operations, this idle time can be reduced. CRs-Fixed: 606348 Git-commit: a2d63657603b8f0714274f34bea45cb5d0c0a7b9 Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ifbc6b7687889055764ef462abb710ef9a6c580a8
| * hostapd_cli: Use os_exec() for action script executionJouni Malinen2014-10-091-17/+8
| | | | | | | | | | | | | | | | | | | | Use os_exec() to run the action script operations to avoid undesired command line processing for control interface event strings. Previously, it could have been possible for some of the event strings to include unsanitized data which is not suitable for system() use. (CVE-2014-3686) Change-Id: If46d6cfcb9d7fc9700965e818315e5aa50fa11a5 Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * wpa_cli: Use os_exec() for action script executionJouni Malinen2014-10-091-17/+8
| | | | | | | | | | | | | | | | | | | | Use os_exec() to run the action script operations to avoid undesired command line processing for control interface event strings. Previously, it could have been possible for some of the event strings to include unsanitized data which is not suitable for system() use. (CVE-2014-3686) Change-Id: I0005ed08e4b06ba3d2ebe95b9240050e47ed2e8c Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * Add os_exec() helper to run external programsJouni Malinen2014-10-093-0/+68
| | | | | | | | | | Change-Id: I579af1fa8c2f85622ffddb186ba799dcb9ac4b6f Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
* | Merge branch 'cm-11.0' into stable/cm-11.0Brint E. Kriebel2014-09-306-2/+41
|\|
| * WNM: Check wpa_s->current_bss more consistentlyJouni Malinen2014-09-091-3/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | The scan result comparison routine would not make much sense without current BSS level known, so return from the function without going through the iteration that could have dereferenced the pointer if wpa_s->current_bss == NULL. CRs-Fixed: 684325 Change-Id: Ifb12fb53f5ca193e0d1c23c3115e3507108cbf00 Git-commit: 67adcd266c4ef3f9356190ef2c0727303f9532cb Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <j@w1.fi>
| * WNM: Add debug logs to get the RSSI from the scan resultsSudha Daram2014-09-091-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | This commit adds few more debug prints to log the RSSI information from the scanned BSSIDs and the current connected BSSID when comparing neighbor results during WNM Transition Management Request processing. CRs-Fixed: 684325 Change-Id: Id67bd7d898540d029ea7c67f992834dde140358f Git-commit: 3c1060ff8fec3d5f8b14ccfd9b37ed6b682434e6 Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
| * P2P: Refrain from performing extended listen during PDJouni Malinen2014-09-091-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | Extend the previous commit 0f1034e3889e7b8f54ed59317f1234db8167d12e to skip extended listen also based on ongoing provision discovery operation (which does not show up as a separate P2P module state and as such, was not coveraged by the previous commit). CRs-Fixed: 661586 Git-commit: 7e68be38e46d8f6cc7d5bc8083fe470d0418fb4f Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Icdf4aac5b4b7c5600459f07a680f1171f8191dd0
| * P2P: Refrain from performing extended listen during P2P connection.Sunil Dutt2014-09-093-0/+23
| | | | | | | | | | | | | | | | | | | | | | | | Do not perform extended listen period operations when either a P2P connection is in progress. This makes the connection more robust should an extended listen timer trigger during such an operation. CRs-Fixed: 661586 Git-commit: 0f1034e3889e7b8f54ed59317f1234db8167d12e Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I1f51d34e956fa2d6529c15c6b6dcb6cea1b3de41
| * Fix hostapd segfault on beacon hint eventJouni Malinen2014-09-092-1/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit 795baf773f6d53bae3cfae4df6edda63e5022344 ('hostapd: Filter channel list updated events after country code change') uses the EVENT_CHANNEL_LIST_CHANGED data pointer, but it updated only one of the callers to provide that data. NL80211_CMD_REG_BEACON_HINT event was still sending the event without the initiator data and resulted in NULL pointer dereference, e.g., if a scan was run while hostapd was running and the driver was in world roaming state and enabled a channel for active scans. CRs-Fixed: 662554 Git-commit: 8597ebdbd44dd4dfb680a17a1d71c183377a0223 Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I947dc781166a627c8f80b08d43c094fe34a49279
* | Merge branch 'cm-11.0' into stable/cm-11.0cm-11.0-XNPH44S-bacon-5fa8c79c0bBrint E. Kriebel2014-09-022-20/+0
|\|
| * Revert "wpa_supplicant_8 - Hostapd: Android related changes for sockets"Michael Bestas2014-07-302-20/+0
| | | | | | | | | | | | | | | | | | This is not present in wpa_supplicant_8_ti variant anymore. Improves WiFi AP behaviour on wl12xx devices This reverts commit 4d11042be9623f74660d930c7bcb82ae6e6fd4df. Change-Id: I56da55fe63fb9417e142a19a7c3a9f3fad2f49a1
* | Merge branch 'cm-11.0' into stable/cm-11.0cm-11.0-XNPH33R-bacon-3628510d76cm-11.0-XNPH30O-bacon-4f280f505aBrint E. Kriebel2014-06-3045-385/+3793
|\|
| * PKCS #1: Enforce minimum padding for decryption in internal TLSnextJouni Malinen2014-06-121-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | Follow the PKCS #1 v1.5, 8.1 constraint of at least eight octets long PS for the case where the internal TLS implementation decrypts PKCS #1 formatted data. Similar limit was already in place for signature validation, but not for this decryption routine. CRs-Fixed: 654804 Change-Id: I54f6d90ca931c55a8fa52f836bca891cae2250f2 Git-commit: 6c5be116dd6997f68e524247751cff53c74519d7 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * PKCS #1: Allow only BT=01 for signature in internal TLSJouni Malinen2014-06-121-19/+10
| | | | | | | | | | | | | | | | | | | | | | | | Based on PKCS #1, v1.5, 10.1.3, the block type shall be 01 for a signature. This avoids a potential attack vector for internal TLS/X.509 implementation. CRs-Fixed: 654804 Change-Id: I1f3b4efb636828d27c06cfcbcb22a9af989bf164 Git-commit: e6d83cc7babb978ba53ae8686159b41ab0f448cc Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * X.509: Fix internal TLS/X.509 validation of PKCS#1 signatureJouni Malinen2014-06-121-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | Verify that there is no extra data after the hash field. This is needed to avoid potential attacks using additional data to construct a value that passes the RSA operation and allows the hash value to be forged. CRs-Fixed: 654804 Change-Id: Iee0a8de08fd0f7d66b3bfd0c4396637d9b70e92f Git-commit: 9c29d48725fd40a82407a89f193cf009aeef9745 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * WNM: Fix neighbor report subelement parser to not leak memoryJouni Malinen2014-06-121-0/+8
| | | | | | | | | | | | | | | | | | | | | | | | If a subelement is unexpectedly included multiple times, the parser must not re-allocate memory for the entry without first freeing the old allocation. CRs-Fixed: 651033 Change-Id: Ib9dc7e0ba282546e29b32491db7da4a281cadf3c Git-commit: e9cb7b9275951c1b7f70aba2d83fec91f4923f1b Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * WNM: Fix neighbor report subelement parserJouni Malinen2014-06-122-5/+15
| | | | | | | | | | | | | | | | | | | | | | | | Only the Neighbor Report element should be included here, so verify that the element id matches. In addition, verify that each subelement has valid length before using the data. CRs-Fixed: 651033 Change-Id: I7179f4ab62f62864d13ef011dbf3a59156a2c7f1 Git-commit: 1aa6f953bb7b9093decc5817a2a7eaacf2eae61b Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * WNM: Fix deinit path to clean neighbor report countJouni Malinen2014-06-121-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | wnm_deallocate_memory() left wnm_num_neighbor_report set while freeing the allocated buffer of neighbor reports. If this function was called twice in a row without having went through new neighbor report parsing, invalid pointers could have been freed resulted in segfault. CRs-Fixed: 651033 Change-Id: If11be7c57365bedc65d3c5fe31f42aceec65c74a Git-commit: ec331d09a29c6b0dd5c59123688cd55f6dcdc31a Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * P2P: Fix scan optimization for GO during persistent group invocationRashmi Ramanna2014-06-121-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | Commit 41d5ce9e0b7b37dd84fbf3c1aa5ed571c32321d4 was intended to scan for GO on the negotiated channel for few iterations, but it did not work correctly due to incorrect operator being used. Fix this by requiring both conditions to be met for the single channel scan. CRs-Fixed: 661483 Git-commit: 28fa4eb2b2dd971321e49591aade07d56695cf3e Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ie1dcfb569b7fd08e0166812ec2506a3fea8fb309
| * eap_proxy: enhance the proxy layer to support DSDS and SS featureNaresh Jayaram2014-06-123-133/+322
| | | | | | | | | | | | | | | | | | Mainline the DSDS feature support on host side and also enhance the proxy layer to support both single SIM and multi SIM (DSDS) feature. Change-Id: If8087763db7bfa18232ce526c783521dc1bb9cdd CRs-Fixed: 631880
| * Add SIM identifier to the network profile and cred blockNaresh Jayaram2014-06-128-0/+35
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows the specific SIM to be identified for authentication purposes in multi-SIM devices. This SIM number represents the index of the SIM slot. This SIM number shall be used for the authentication using the respective SIM for the Wi-Fi connection to the corresponding network. CRs-Fixed: 631880 Git-commit: 13f6a07efc3e737d8fcb8f7014cb961ce77e64ee Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I82becee92043e4da5a672353b1fdac6cf0bc531a
| * eap_proxy: EAP-SIM feature for single SIM.Naresh Jayaram2014-06-123-0/+1897
| | | | | | | | | | | | | | | | EAP-SIM, EAP-AKA and EAP-AKA_PRIME feature request for single SIM. Change-Id: I037827b485bc9acd6f01a6a5ea4053548713cda9 CRs-fixed: 585456
| * P2P: Clear p2p_in_invitation on cancelJouni Malinen2014-06-122-0/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit 41d5ce9e0b7b37dd84fbf3c1aa5ed571c32321d4 added scan optimizations for P2P invitation cases. However, it left a path where the invitation state was not cleared and as such, introduced potential issues for following scans that ended up getting incorrectly optimized for a single channel regardless of parameters. Fix this by clearing p2p_in_invitation more carefully, especially on p2p_cancel command. p2p_cancel is now also run from the FLUSH command to avoid issues with hwsim test cases (e.g., persistent_group_per_sta_psk followed by ap_open_tdls resulted in an error due to p2p_in_invitation remaining set after FLUSH). Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: f05cee9714ae87d315d893699a536b60a5aa73a9 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I7eea172ca77faa43c0a93cfb5e0f2f542fb0959a CRs-fixed: 645171
| * P2P: Mark the scan in p2p_in_invitation as p2p_probeSunil Dutt2014-06-121-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Mark the scan performed by the P2P Client in search of the GO during the persistant reinvocation as a p2p_probe to avoid unnecessary use of 802.11b rates. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 8235f89f3f7302a930ab8c2bc1c140a64b6b04f2 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I6174c01e7d0379934b48d42770660a9f63ae4851 CRs-fixed: 645171
| * Pass TDLS peer capability information in tdls_mgmtSunil Dutt2014-06-127-22/+60
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | While framing the TDLS Setup Confirmation frame, the driver needs to know if the TDLS peer is VHT/HT/WMM capable and thus shall construct the VHT/HT operation / WMM parameter elements accordingly. Supplicant determines if the TDLS peer is VHT/HT/WMM capable based on the presence of the respective IEs in the received TDLS Setup Response frame. The host driver should not need to parse the received TDLS Response frame and thus, should be able to rely on the supplicant to indicate the capability of the peer through additional flags while transmitting the TDLS Setup Confirmation frame through tdls_mgmt operations. CRs-fixed: 643677 Git-commit: 96ecea5eb14cc1362cb01b914ac4163324294a28 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ibf0147a13d3c32d097fcac9fe66e1eb22e83ba4d
| * TDLS: Use QoS info from WMM IE obtained in TDLS framesSunil Dutt2014-06-123-0/+77
| | | | | | | | | | | | | | | | | | | | | | | | | | TDLS Setup Request/Response frames from the peers include the WMM IE, hence parse the same and consider the QoS Info from the WMM IE. The qos_info obtained in the WMM IE overwrites the one obtained through WLAN_EID_QOS attribute. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: dda8be71148efd24d751b38810b89ff9ae546ee3 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I360c0ad2a0d9831db2d798449290ee18f7378ff5 CRs-fixed: 605666
| * Sync with wireless-testing.git include/uapi/linux/nl80211.hJouni Malinen2014-06-121-12/+36
| | | | | | | | | | | | | | | | | | | | | | This brings in nl80211 definitions as of 2014-03-25. CRs-fixed: 643677 Git-commit: 78cd7e69de0c2eaa990a6878fa918914562bfbc3 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <j@w1.fi> Change-Id: I322b3bad9035c06420e4abb65866f78584a2529b
| * Sync with wireless-testing.git include/uapi/linux/nl80211.hJouni Malinen2014-06-121-5/+47
| | | | | | | | | | | | | | | | | | | | | | This brings in nl80211 definitions as of 2014-02-12. CRs-fixed: 643677 Git-commit: 56ec49c540ba8000a758521bfef9314c4f7e4e55 Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <j@w1.fi> Change-Id: I9b4da58df3f3d1fbabb8c733dc70f34bc6fbd6bf
| * nl80211: Pass station supported channel and oper class infoSunil Dutt2014-06-121-0/+17
| | | | | | | | | | | | | | | | | | | | | | | | Pass station supported channel and operating class information to kernel for TDLS peers. CRs-fixed: 610530 Git-commit: efc64886b8a285440e9954b5395a5370d8c5f84f Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ife98114bf4b71a8eef65346861b1eeecb9589b7e
| * Set the station to authorized on assoc event for open authenticationSunil Dutt Undekari2014-06-121-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This was done in handle_assoc_cb() in ieee802_11.c for drivers that use hostapd SME/MLME. However, drivers that include SME/MLME implementation do not use that function and the STA flag needs to be set when processing the association notification. This is needed to get the STA entry into showing the proper authorized state and to get the AP-STA-CONNECTED/DISCONNECTED events on the control interface. CRs-Fixed: 608957 Git-commit: 113318ad574a47d41dcb1f160d11500e2d140d7d Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I7effbe5bfdb4838b4cc8c79a745dc5a0ad4fe78f Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * P2P: Report dev_found event (if not yet done) from GO Neg Req RXSunil Dutt Undekari2014-06-121-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | p2p_find removes P2P_DEV_REPORTED flag from every existing P2P peer entry. Thus, if a GO Negotiation Request frame is received before the peer is re-discovered based on Probe Response frame, report P2P-DEVICE-FOUND indication prior to the P2P-GO-NEG-REQUEST similarly to how this is done the first time the peer is found. CRs-Fixed: 629481 Git-commit: 3a8ec7382e31b5b04f0124c55e828ddf8f00ff84 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I5894cee02b912a497ad210e08bd5adc531ed180b
| * P2P: Set a timeout for a persistent reinvoke on a P2P ClientSunil Dutt Undekari2014-06-121-1/+7
| | | | | | | | | | | | | | | | | | | | | | Use P2P group formation timeout to wait for the 4-way handshake to complete on a persistent reinvocation on a P2P Client. CRs-Fixed: 621209 Git-commit: 91364b7f10c0c91fc44dc050eb09b2fb859481b4 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ib1de5aa722a5983f3bf43eddff9f25548486bc04
| * P2P: Optimize scan for GO during persistent group invocationRashmi Ramanna2014-06-127-14/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | Scan for GO on the negotiated operating channel for few iterations before searching on all the supported channels during persistent group reinvocation. In addition, use the already known SSID of the group in the scans. These optimizations reduce group formation time. CRs-Fixed: 621209 Git-commit: 41d5ce9e0b7b37dd84fbf3c1aa5ed571c32321d4 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ib081d459336981fbcd265eca6ef5b91e57d06839
| * TDLS: Work around interop issues with supported operating classSunil Dutt Undekari2014-06-121-2/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It looks like some deployed devices may send an invalid supported operating class element (length = 0) in TDLS Setup messages. With cfg80211, this results in the NL80211_CMD_SET_STATION command failing due to an invalid argument (cfg80211 mandates supported operating classes information to have a length of 2..253 octets). Work around this interop issue by ignoring the Supported Operating Class element if it has invalid length. CRs-Fixed: 623628 Git-commit: 1578796a31b4a2d2f0e8a83cf0d714cf7763ddba Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I4d2db24bf365b46e567fc0cbdef1ea0626a093ea Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
| * TDLS: Pass peer's Supported channel and oper class info during sta_addSunil Dutt2014-06-128-7/+116
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The information of the peer's supported channel and operating class is required for the driver to do TDLS off channel operations with a compatible peer. Pass this information to the driver when the peer station is getting added. CRs-Fixed: 610530 Git-commit: 3ed97271ba4e119c4413b2a77c64adbbb666a46f Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I558681da231f2fe4381e9f0c1b6155d184648d3f
| * P2P: Don't expire the peer, if GO Negotiation is in progressJithu Jance2014-06-121-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | This adds one more case of active P2P peer detection so that p2p_expire_peers() cannot hit a case where a GO Negotiation peer would be removed. Signed-hostap: Jithu Jance <jithu@broadcom.com> Git-commit: a691d99ff58e7b0f6cbc2aacfbde7ac985538483 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I0b81958298aecef1c42e0ab3fd3060cd0a10b3f3 CRs-fixed: 620842
| * Allow channel list to be specified for SCAN commandJouni Malinen2014-06-124-28/+108
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The new freq=<frequency ranges> parameter to the SCAN command can be used to request a scan to be performed on the specified set of channels instead of on all channels. For example, "wpa_cli scan freq=2400-2500,5180" would scan channels 1-14 and 36. Only the channels that the driver indicates as enabled and that are within the specified ranges are included in the request. Git-commit: fee5234284345f7c27db7e726ed729b7317ee5b8 Git-repo : git://w1.fi/srv/git/hostap.git CRs-fixed:593066 Signed-hostap: Jouni Malinen <j@w1.fi> Change-Id: I924cfe107d2bfd8c8ebb09dd22ca24ff1e95a95a
| * Restore scan_req if sta scan is rescheduled in the scan results eventLoic Poulain2014-06-123-7/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | On scan results event if a concurrent P2P scan was triggered previously, scan results processing is canceled, p2p_find executed, and a new sta scan is triggered (pending scan). However, this new sta scan does not restore the scan_req value of the previous scan (whose scan result has been canceled). If we are currently connected to an AP and use ap_scan=2, the new triggered scan will cause an associtation-without-scan in wpa_supplicant_scan: (ap_scan == 2 & scan_req != MANUAL_SCAN_REQ) => wpa_supplicant_assoc_try() causing an association error and a disconnection. This patch fixes this issue by restoring the previous scan_req value. Git-commit:1245503188621df81d98801987471f2dabe1b382 Git-repo : git://w1.fi/srv/git/hostap.git CRs-fixed:593066 Signed-off-by: Loic Poulain <loicx.poulain@intel.com> Change-Id: I76600c5f2b632b1ab449dfce8ba1ef5c85a0f9d9
| * Move int_array helpfer functions to utils/common.c.Jouni Malinen2014-06-123-68/+96
| | | | | | | | | | | | | | | | | | | | | | These can be useful outside scan.c, so make them available. Git-commit: 98eda9c26d8ed4f8fd8449da9cdc359418253df7 Git-repo : git://w1.fi/srv/git/hostap.git CRs-fixed:593066 Signed-hostap: Jouni Malinen <j@w1.fi> Change-Id: Id4b2a67e4947636871e6a6c4f84df22c51d61d59
| * P2P: Cancel action frame offchan wait after recv GO Neg ConfEyal Shapira2014-06-121-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The missing call to scan_action_done() may keep us off-channel for 250 ms following sending GO Negotiation Response. In case the operating channel is different from this channel and we're GO, a race could lead to start beaconing while off-channel. This could potentially cause the Beacon frames to go out on incorrect channel with some drivers. Signed-hostap: Eyal Shapira <eyal@wizery.com> Git-commit: 472fa2168a950315cb939029252cd75366eb113a Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I1ca89e56aa32ce1dfbacb7f9769c0f536d5b9b3e CRs-fixed: 620894
| * WPS: Remove old duplicate network even if key is differentJouni Malinen2014-06-121-25/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, WPS credential provisioning removed duplicated network entries only if they had identicical SSID, security parameters, and the keys. However, it is possible that the AP has changes its keys and leaving the old entry behind can result in connectibity issues (e.g., with 4-way handshake failing due to use of the old PSK). Fix this by allowing the old network entry to be removed even if the keys (passphrase, PSK, WEP keys) are different. CRs-Fixed: 611698 Git-commit: c511b321f38957cdece4739968c97a1be001b8ca Git-repo : git://w1.fi/srv/git/hostap.git Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: Ie4dbeb41c3404249803627a208519917f98a4129
| * P2P: Allow GO Negotiation Request to update peer entry after PDPo-Lun Lai2014-06-121-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, GO Negotiation Request frame was used to update a peer entry if only a Probe Request from that peer had been received. However, it would be possible, even if unlikely, for a peer to be discovered based on receiving Provision Discovery Request frame from it and no Probe Request frame. In such a case, the Listen frequency of the peer would not be known and group formation could not be (re-)initialized with that peer. Fix this by allowing the GO Negotiation Request frame to update peer entry if the current peer entry does not include Listen or Operating frequency. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 3eaaca1a0b372f31ddc43d152c3681dce48889bb Git-repo: git://w1.fi/srv/git/hostap.git CRs-Fixed: 597384
| * P2P: Apply unsafe frequency rules to available channelsArif Hussain2014-06-129-1/+148
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds a QCA vendor specific nl80211 event to allow the driver to indicate a list of frequency ranges that should be avoided due to interference or possible known co-existance constraints. Such frequencies are marked as not allowed for P2P use to force groups to be formed on different channels. If a P2P GO is operating on a channel that the driver recommended not to use, a notification about this is sent on the control interface and upper layer code may decide to tear down the group and optionally restart it on another channel. As a TODO item, this could also be changed to use CSA to avoid removing the group. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 253f2e37957e726677d545f5598aad56d7d33bf5 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I2608f48bf1f127a5d2b379ce381de15f900f4f29 CRs-Fixed: 598923
| * Add a header file defining QCA OUI and vendor extensionsJouni Malinen2014-06-122-0/+50
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This file is used as a registry of identifier assignments from the Qualcomm Atheros OUI 00:13:74 for purposes other than MAC address assignment. One of the first uses will be for nl80211 vendor commands/events which is reason for the preparation change in driver_nl80211.c Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 1682c6236017f28b8fdb3b791565c835e988a559 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I25a164a2541a57511c9e737d582b14975fc550b3 CRs-Fixed: 598923
| * nl80211: Fix sizeof check in vendor command/event handlingMax Stepanov2014-06-121-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | Fix sizeof in a validity comparison of nl80211_vendor_cmd_info size. The incorrect version happened to work on 64-bit builds due the structure being eight octets, but this was incorrect and would not used with 32-bit builds. Signed-hostap: Max Stepanov <Max.Stepanov@intel.com> Git-commit: 080cc445df897592f493d33224f6c3ec01b4a821 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Iba566678c00ecca3d18f79b6a101660e79258488 CRs-Fixed: 598923
| * nl80211: Initial support for vendor commands and eventsJouni Malinen2014-06-121-0/+92
| | | | | | | | | | | | | | | | | | | | | | Print into the debug log the list of vendor commands and events that the driver supports. In addition, add a generic handler for vendor events. This can be extended for each vendor/subcmd. Signed-hostap: Jouni Malinen <j@w1.fi> Git-commit: 17b79e65a9491a02a3d28411f1432481e8af564b Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ic649ebc25a30f0a6e3bfaae58fb917217f28f3c6