aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* nl80211: Extract driver offchannel simultaneous capabilityKanchanapally, Vidyullatha2016-04-012-0/+16
| | | | | | | | | | | Make the driver offchannel simultaneous capability available to wpa_supplicant. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 8e5097456af34c43beee03e63ef7ab10aabd9680 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I76dbc6b6f9d871b3703030f0e204eb10ccc90fa3 CRs-fixed: 909284
* nl80211: Support vendor scan together with normal scanKanchanapally, Vidyullatha2016-04-015-18/+71
| | | | | | | | | | | | | | Allow wpa_supplicant to use vendor scan (if supported by the driver) together with the normal nl80211 scan and handling external scan events. Since this results in possibility of concurrent scan operations, some of the operations related to scan results need to check more carefully when an event is relevant for a specific interface. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: adcd7c4b0bd02bead77f884f52782a813f5243bb Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I78be8d12a6f0ae1fef82a035a525929e2e15c972 CRs-fixed: 909284
* Add QCA vendor definitions for simultaneous offchannelKanchanapally, Vidyullatha2016-04-011-0/+3
| | | | | | | | Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 94fb165c3ac317b93ddb9a96c620fcf87a2c68e2 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I0a284ec156b742ee3aac6411ce2e93e7be85221a CRs-fixed: 909284
* nl80211: Driver interaction for QCA vendor scanKanchanapally, Vidyullatha2016-04-014-0/+316
| | | | | | | | | | | | This commit contains the necessary changes for supporting the QCA vendor scan implementation, i.e., sending the vendor scan command to underlying driver and handling the vendor scan events from the driver. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: f22a080cdc19ba1dee1f85f1d71d2a9c0e699a56 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: Iaa5c47f5e5fa800afc8662314e0889af679a72ef CRs-fixed: 909284
* Add QCA vendor definitions for vendor scan supportKanchanapally, Vidyullatha2016-04-011-0/+54
| | | | | | | | | | | Introduce definitions for QCA vendor specific subcommands and attributes to support vendor scan request. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: b48567195d7eb4e1f6a18ae88a2af4db2afa193b Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: Ia7f92909b4e09240f866fbb5aaf707943b65d627 CRs-Fixed: 909284
* P2P: Support driver preferred freq list for invitation caseAhmad Kholaif2016-04-013-3/+20
| | | | | | | | | | | | When using P2P invitation to re-invoke a persistent P2P group without specifying the operating channel, query the driver for the preferred frequency list, and use it to select the operating channel of the group. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: fbcddaed9aa62587e7b74cd22df4b4cdaca6b101 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I2fcf33980771e57e11539ee580cf4fe783b6719f CRs-fixed: 887890
* P2P: Process preferred frequency list as part of GO Neg Req/RespAhmad Kholaif2016-04-011-0/+202
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When processing a GO Negotiation Request and Response, if local driver supports the preferred channel list extension, then: - Check if peer's preference for operating channel is already included in our preferred channel list and if so, take the oper_channel as is. - If peer's preference for operating channel is not in local device's preferred channel list and peer device has provided its preferred frequency list in the GO Negotiation Request/Response, then find a channel that is common for both preferred channel lists and use it for oper_channel. - If peer's preference for operating channel is not in local device's preferred channel list and peer device doesn't use preferred channel list extension, i.e., no preferred channel list in GO Negotiation Request/Response, then look for a channel that is common for local device's preferred channel list and peer's list of supported channels and use it for oper_channel. - In case no common channel is found, use the peer's preference for oper_channel as is. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 6cc364946cd30681cd1e3a2ca061173be3227d11 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I2ba4cddfd03c741ee82ecbefe64617080e720d3e CRs-fixed: 887890
* P2P: Expose driver preferred frequency list fetch to P2PAhmad Kholaif2016-04-011-0/+14
| | | | | | | | | | | | This adds a callback function that can be used from the P2P module to request the current preferred list of operating channels from the driver. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: fc71f7d99db620097296720af1d46b1b94afb0f8 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I8135b44c91bdaa89fe80a3e4f802dadfbe557662 CRs-fixed: 842468
* P2P: Do not omit known operating channel preference from GO Neg RespAhmad Kholaif2016-04-011-1/+1
| | | | | | | | | | | | | | | | | | | | Add an extra condition to omit operating channel preference when building GO Negotiation Response. If the local device supports the preferred frequency list extension, then when sending a GO Negotiation Response frame, advertise the preferred operating channel unless local device is assuming the P2P Client role and has an empty preferred frequency list, in which case local device can omit its preference for the operating channel. This change helps make use of the preferred frequency list and the calculated best channel for both negotiating parties of the P2P connection. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 0ef54bd30e3d6d66fe060098c45c61dfaf87e00e Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I2192ac1fcac9253876fae3f54f10f5a89d0e3bac CRs-fixed: 842468
* P2P: Parse preferred frequency list extensionAhmad Kholaif2016-04-012-0/+6
| | | | | | | | Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: def8f7035d0a89bd7f5799b4bbf9113e38437d19 Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: I55ff714b3a213005f10a9e8959e78da71e2b26e3 CRs-fixed: 842468
* P2P: Add preferred frequency list extension to GO Neg ReqAhmad Kholaif2016-04-013-0/+44
| | | | | | | | | | | | | When sending a GO Negotiation Request, advertise the preferred frequency list in a new vendor specific IE. This can be used to extend the standard P2P behavior where a single preferred channel can be advertised by allowing a priority list of channels to be indicated. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: b841cf2fa6886de7749477ad71e3f8b6dc3f8bb9 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I0657fe4e8ebf7cf51a2127450130ae6718a12d98 CRs-fixed: 842468
* P2P: Use preferred frequency list from the local driverAhmad Kholaif2016-04-013-0/+29
| | | | | | | | | | | | | If the driver supports the preferred frequency list extension, use this information from the driver when no explicitly configured preference list (p2p_pref_chan) is present for P2P operating channel selection. This commit adds this for GO Negotiation and Invitation use cases. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 370017d968e071522357ea88c0c6aaed02853222 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Idd39a8276daaf450b8d720a9fdf617f6427f5e48 CRs-fixed: 842468
* Add parsing of preferred frequency list elementAhmad Kholaif2016-04-012-0/+17
| | | | | | | | | | | | This adds parsing of QCA vendor specific elements and as the first such element to be parsed, stores pointers to the preferred frequency list element that can be used to enhance P2P channel negotiation behavior. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 9baaac2d8495d56040a27063afe84f460525c2b3 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ie2da6d2dd9dc107f5ff3bb4763608fa5374c7539 CRs-fixed: 842468
* nl80211: Add means to query preferred channelsAhmad Kholaif2016-04-014-1/+172
| | | | | | | | | | | | Extend the QCA vendor specific nl80211 interface to query the preferred frequency list from driver and add a new wpa_cli command to query this information. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 983422088f0066068fd364013623d1e475031e6b Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I71de761d267f9d46ab6ae9cd35cc08daf5d2bd99 CRs-Fixed: 842468
* P2P: Inform driver of the operating channel following group formationAhmad Kholaif2016-04-014-0/+63
| | | | | | | | | | | | Upon GO Negotiation completion, if the remote peer becomes GO, send a hint event over QCA vendor specific interface to inform the driver of the likely operating channel of the P2P GO. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 7c813acf9ca69f3c6d442ce820237249a6216201 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ic3cbb824e1c8bac94839cde7819de75a03d75765 CRs-Fixed: 842468
* nl80211: Add concurrency capabilities to driver statusAhmad Kholaif2016-04-013-2/+30
| | | | | | | | | | | | Extend the nl80211 interface command "driver status" to retrieve the concurrency capabilities from the driver using the QCA vendor extensions. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 079a28f7b88bef62249872f0d7b7947ba1d77ac9 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Iade4acbe723b7c1c36c886f305b476172535e850 CRs-Fixed: 842468
* Fix generating offloaded ACS channel list when hw_mode is set to anyPeng Xu2016-04-014-15/+69
| | | | | | | | | | | | | When ACS is offloaded to device driver and the hw_mode parameter is set to any, the current_mode structure is NULL which fails the ACS command. Fix this by populating the ACS channel list with channels from all bands when current_mode is NULL. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: d0cdccd30785b2471c632c341caef68ab1bc62db Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ia8a5ef25184788f836daec2e009eb5bc64108e5d CRs-fixed: 842468
* Define new registry for QCA vendor specific elementsJouni Malinen2016-04-011-0/+30
| | | | | | | | | | | | | | The new enum qca_vendor_element_id registry is used to manage assignments of vendor specific elements using the QCA OUI 00:13:74. The initial assignment is for the purpose for extending P2P functionality for cases where the wpa_supplicant implementation is used by both ends of an exchange Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: b43b2b520370b251ee3fdce3ade0f66950292281 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Icd2cf14cbc5d1b781f12453ebcbf8ee147a3117e CRs-fixed: 842468
* eap_proxy: Add gettid syscall wrapperAmarnath Hullur Subramanyam2016-03-241-0/+17
| | | | | | | | | | gettid system calls doesn't have a wrapper in glibc. Bionic library provides wrapper so there is no issue in Android platform however non-Android platform throws linker error. This commit addresses this by implementing a wrapper of gettid. Change-Id: I996d8aa8ed21fabbefa9190c1132362e7b92e877 CRs-Fixed: 994742
* eap_proxy: include qmi-framework for QCCI migrationBala Krishna Bhamidipati2016-03-231-0/+4
| | | | | | | | | | | qmi-framework will generate qmi_cci library needed by eap_proxy for QCCI interface APIs. add qmi-framework to PKG_CONFIG to link this library. This change will also add flags to support DSDS and eap-AKA' feature on mdm. Change-Id: Ibbf38f85f315fc0a33b190e3992cacd4843a1eea CRs-Fixed: 952339
* eap_proxy: move UIM info into eap_proxyBala Krishna Bhamidipati2016-02-192-59/+43
| | | | | | | | QMI initialization is done on a separate thread per eap_proxy. Hence, moving the wpa_uim data structures to eap_proxy_sm struct. Change-Id: I510132f038f3119b8393b47525c6e21fa4cd3933 CRs-Fixed: 977372
* Merge "eap_proxy: use a separate thread for qmi initialization." into ↵Linux Build Service Account2016-02-102-7/+40
|\ | | | | | | wlan-service.lnx.1.0-dev.1.0
| * eap_proxy: use a separate thread for qmi initialization.Bala Krishna Bhamidipati2016-02-092-7/+40
| | | | | | | | | | | | | | | | | | QMI initialization , if done in eloop context , affects supplicant functionality. Since this QMI initialization takes more time , a separate thread is spawned for the same Change-Id: Id877ad8da5c73cabfef3bf4f4a2cd2a776ddd443 CRs-Fixed: 971522
* | nl80211: Add support for aborting an ongoing scanKanchanapally, Vidyullatha2016-02-094-0/+29
| | | | | | | | | | | | | | | | | | | | | | This adds the driver interface commands for issuing a request to abort an ongoing scan operation. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 4f30addb3866a8bb9393c1cfd42e012150c36a8e Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ic032fa52bdd801514b3b74b12b903c3bdf8fc663 CRs-fixed: 930855
* | Sync with mac80211-next.git include/uapi/linux/nl80211.hJouni Malinen2016-02-091-3/+65
| | | | | | | | | | | | | | | | | | | | This brings in nl80211 definitions as of 2015-11-26. Signed-off-by: Jouni Malinen <j@w1.fi> Git-commit: 5ef0b843555389d5d02b85d661c7b3b9165f3c4d Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I749e12852c48f9d99ab1f787582e61bd3f9854b0 CRs-fixed: 930855
* | Sync with mac80211-next.git include/uapi/linux/nl80211.hJouni Malinen2016-02-091-14/+19
|/ | | | | | | | | | This brings in nl80211 definitions as of 2015-05-06. Signed-off-by: Jouni Malinen <j@w1.fi> Git-commit: dd9a42efbc39a7ff425a7b3d5a69cf55d64a19f3 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: I3c8495b2f37fe7e1091bdb8223085779944b49a6 CRs-fixed: 930855
* eap_proxy: Handle crash if eap method is nullBala Krishna Bhamidipati2016-01-291-16/+21
| | | | | | | | | While conencting to eap SIM/AKA, if eap method, is not set in config file , supplicant will crash accessing eap_method in conf. Refer to eap methoods only if they are not NULL Change-Id: Idd1f49157700948d6f3c6aa494c2dfa9ff125a41 CRs-Fixed: 969387
* HTTP (curl): OCSP with BoringSSLJouni Malinen2016-01-111-0/+33
| | | | | | | | | | | | | This adds experimental support for using OCSP with libcurl that is built against BoringSSL. This needs small modifications to libcurl to allow CURLOPT_SSL_VERIFYSTATUS to be used to call SSL_enable_ocsp_stapling(connssl->handle) in ossl_connect_step1(). Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 8d27efa814e8f2c8bb4e26c1389a0cb60f8c6991 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ib73d598d2f9a31adfa9881d6a0ff9afb262e7adf CRs-fixed: 960177
* HTTP (curl): Fix compilation with BoringSSLJouni Malinen2016-01-111-0/+23
| | | | | | | | | | | Define the sk_*_{num,value}() macros in BoringSSL style if BoringSSL is used instead of OpenSSL. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: cc2994024d859ecf60a48e81723e9b5838012dd3 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ib63e49df46392fa677e0562ba866f9e1feb1b6f4 CRs-fixed: 960177
* BoringSSL: Move OCSP implementation into a separate fileJouni Malinen2016-01-113-820/+868
| | | | | | | | | | | | This makes it easier to share the OCSP implementation needed for BoringSSL outside tls_openssl.c. For now, this is mainly for http_curl.c. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 213e158ca8d466c5bf1403eec83b9af56cf28dff Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ifee0388a823c9f7312e168d33f1a0cd93ca14f4c CRs-fixed: 960177
* BoringSSL: Implement support for OCSP staplingJouni Malinen2016-01-111-0/+847
| | | | | | | | | | | | | | | | | | | | BoringSSL has removed the OpenSSL OCSP implementation (OCSP_*() functions) and instead, provides only a minimal mechanism for include the status request extension and fetching the response from the server. As such, the previous OpenSSL-based implementation for OCSP stapling is not usable with BoringSSL. Add a new implementation that uses BoringSSL to request and fetch the OCSP stapling response and then parse and validate this with the new implementation within wpa_supplicant. While this may not have identical behavior with the OpenSSL-based implementation, this should be a good starting point for being able to use OCSP stapling with BoringSSL. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: bdee6ca0e0fb66c472a6dacb1415898fc54b7f35 Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ib2e1f191a7c6bbdaa6a962b2440958aaf71ab138 CRs-fixed: 960177
* OpenSSL: Reject OCSP-required configuration if no OCSP supportJouni Malinen2016-01-111-0/+10
| | | | | | | | | | | This is needed at least with BoringSSL to avoid accepting OCSP-required configuration with a TLS library that does not support OCSP stapling. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 355a5c8ec55434858ee9158298a2e984c2abde5c Git-repo : git://w1.fi/srv/git/hostap.git Change-Id: Ia72ce79f16178de5cca1116ab9bca8fc9c9ef603 CRs-fixed: 960177
* P2P: Filter control chars in group client device name similarly to peerHu Wang2016-01-043-11/+26
| | | | | | | | | | | | | | | | P2P device discovery can add peer entries based on a message directly from a peer and from a Probe Response frame from a GO for all the P2P Clients in the group. The former case for filtering out control characters from the device name while the latter was not. Make this consistent and filter both cases in the same way to avoid confusing external programs using the device name of a P2P peer. CRs-fixed: 930000 Git-commit: 5d1d69a10f60eec624689408ec85fbe93657156d Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Change-Id: I5a22c6bbcc060c5e9b30b977a04915836b04f36f
* nl80211: Cancel all pending TX frame cookiesJouni Malinen2015-12-302-4/+44
| | | | | | | | | | | | These needs to be cancelled so that the kernel driver does not get left with all old entries blocking other offchannel operations Git-commit: 759a8a3a99845af1c5c10685ec7cb9cf4daa4593 Git-repo : git://w1.fi/srv/git/hostap.git Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> CRs-Fixed: 950786 Change-Id: Ia9a964c407c72384b606dbb1f033e110b8091b5c
* Merge 1a0fa705d4ab3bd90f108fe0127fb9dc7c94e396 on remote branchLinux Build Service Account2015-12-212-0/+62
|\ | | | | | | Change-Id: I449d779ba8ad9357af6942b1ea7f45b9bff8f813
| * Merge tag 'android-6.0.1_r3' into 601r3David Ng2015-12-091-0/+11
| |\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Android 6.0.1 release 3 * tag 'android-6.0.1_r3': RSN: Stop connection attempt on apparent PMK mismatch Throttle control interface event message bursts Add wpa_supplicant EVENT_TEST control interface command hostapd: Global control interface notifications Add debug prints for wpa_supplicant ctrl_iface socket send operations Update AP WPA/RSN IE on all associations if driver can select BSS Conflicts: wpa_supplicant/ctrl_iface_unix.c Change-Id: I8c5a51afff761112ba36ae21b94fd21f07d4c18a
| | * RSN: Stop connection attempt on apparent PMK mismatchJouni Malinen2015-10-211-0/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If WPA2-Enterprise connection with full EAP authentication (i.e., no PMKSA caching used) results in a PMKID that does not match the one the AP/Authenticator indicates in EAPOL-Key msg 1/4, there is not much point in trying to trigger full EAP authentication by sending EAPOL-Start since this sequence was immediately after such full authentication attempt. There are known examples of authentication servers with incorrect MSK derivation when TLS v1.2 is used (e.g., FreeRADIUS 2.2.6 or 3.0.7 when built with OpenSSL 1.0.2). Write a clear debug log entry and also send it to control interface monitors when it looks likely that this case has been hit. After doing that, stop the connection attempt by disassociating instead of trying to send out EAPOL-Start to trigger new EAP authentication round (such another try can be tried with a new association). b/24253154 From upstream commit bddc51e8e422463dc96c263666b6fc4c26375cb6 Change-Id: I1e72c9d0232492103a10c0f4125170c000754ac5 Signed-off-by: Jouni Malinen <j@w1.fi>
| | * hostapd: Global control interface notificationsAnton Nayshtut2015-10-063-0/+44
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit implements hostapd global control interface notifications infrastructure. hostapd global control interface clients issue ATTACH/DETACH commands to register and deregister with hostapd correspondingly - the same way as for any other hostapd/wpa_supplicant control interface. Bug: 24270573 Change-Id: I46da39e8262a446e7779a1adfbcb08b5bfa382d7 Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
| * | Merge "Merge tag 'android-6.0.0_r26' into HEAD"Linux Build Service Account2015-12-091-0/+51
| |\ \
| | * | Merge tag 'android-6.0.0_r26' into HEADDavid Ng2015-11-301-0/+51
| | |\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Android 6.0.0 release 26 * tag 'android-6.0.0_r26': Update AP WPA/RSN IE on all associations if driver can select BSS Add QCA vendor command support to set band to driver nl80211: Use beacon TSF if it is newer than Probe Response TSF Conflicts: src/common/qca-vendor.h Change-Id: Ibab1bc3eda788f001e2a7a0a866c3a9af2a47dce
| | | * Add QCA vendor command support to set band to driverRavi Joshi2015-08-286-0/+127
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add vendor command to pass SET setband command to the driver and read the updated channel list from driver when this notification succeeds. This allows the driver to update its internal channel lists based on setband configuration. For merge compatibility it has 3 patches: 844dfeb Add QCA vendor command support to set band to driver 6b0ceee Add QCA vendor definitions for multi-port concurrency d71bdfb Add QCA vendor command for updating gateway parameters Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> Bug: 23261230 Change-Id: I4ce6307c54b27d3d2f54d435fc0cae5480bdf23c
| | | * am 447c7ff8: Make sure configuration is saved to storage deviceMitchell Wills2015-08-265-0/+45
| | | |\ | | | | | | | | | | | | | | | | | | | | * commit '447c7ff83da0d89ffa70c378be2a4a58f9b14d3b': Make sure configuration is saved to storage device
| | | * | nl80211: Use beacon TSF if it is newer than Probe Response TSFSrinivas Dasari2015-08-241-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | cfg80211 sends TSF information with the attribute NL80211_BSS_BEACON_TSF if the scan results include information from Beacon frame. Probe Response frame information is included in NL80211_BSS_TSF. If the device receives only Beacon frames, NL80211_BSS_TSF might not carry updated TSF, which results an older TSF being used in wpa_supplicant. Fetch both possible TSF values (if available) and choose the latest TSF for the BSS entry. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> Bug: 22412559 Change-Id: I21a28265d5a9a2efec7a0deb51b353df368c4706
| * | | | FST: Make FST peer connection check more permissive in hostapdAnton Nayshtut2015-12-016-10/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Modify the FST peer connection check so it won't skip peers without MB IEs making it more permissive for peers that didn't provide MB IEs during association request. This can be helpful, e.g., in cases where a STA's interface connected before it was added to the FST group. This allows the AP to receive FST Action frames and initiate session with a STA via STA's interface that doesn't expose MB IEs. The adjusted FST protocol is still safe, as it protects itself in many other ways (checking band info and it's accordance to the interfaces, Setup IDs, connection states of the interfaces involved, etc.) effectively avoiding all types of invalid situations. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: b47d05aa458ed7c7dfbfe09fc2a2af1f2fee7fc7 Git-repo : git://w1.fi/srv/git/hostap.git CRs-Fixed: 945518 Change-Id: Ie1a94890d55dcd7027947cedd4313eddebe3d487
| * | | | FST: Fix STA MB IEs creationAnton Nayshtut2015-12-011-26/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | FST STA should always expose its MB IEs regardless of its connection state and whether the connected AP is currently FST-enabled or not. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: f231b3d816aa9818432b06b65e71114613b68a91 Git-repo : git://w1.fi/srv/git/hostap.git CRs-Fixed: 945518 Change-Id: Ie505405ed91b34fca17a1a6fe56b2a20357d3d64
| * | | | hostapd: Process MAC ACLs on a station association event (SME in driver)Anton Nayshtut2015-12-013-16/+44
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | now hostapd will use station MAC-based permissions according to the macaddr_acl policy also for drivers which use AP SME offload, but do not support NL80211_CMD_SET_MAC_ACL for offloading MAC ACL processing. It should be noted that in this type of case the association goes through and the station gets disconnected immediately after that. Change-Id: I88044e351c27dc5af0fc44a6e26c33c550fb84b0 Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 0603bcb7fe8babf183362518238c142afe8e2036 Git-repo: git://w1.fi/srv/git/hostap.git CRs-Fixed: 934469
* | | | FST: Make FST peer connection check more permissive in hostapdAnton Nayshtut2015-12-026-10/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Modify the FST peer connection check so it won't skip peers without MB IEs making it more permissive for peers that didn't provide MB IEs during association request. This can be helpful, e.g., in cases where a STA's interface connected before it was added to the FST group. This allows the AP to receive FST Action frames and initiate session with a STA via STA's interface that doesn't expose MB IEs The adjusted FST protocol is still safe, as it protects itself in many other ways (checking band info and it's accordance to the interfaces, Setup IDs, connection states of the interfaces involved, etc.) effectively avoiding all types of invalid situations. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: b47d05aa458ed7c7dfbfe09fc2a2af1f2fee7fc7 Git-repo : git://w1.fi/srv/git/hostap.git CRs-Fixed: 945518 Change-Id: Ie1a94890d55dcd7027947cedd4313eddebe3d487
* | | | FST: Fix STA MB IEs creationAnton Nayshtut2015-12-021-26/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | FST STA should always expose its MB IEs regardless of its connection state and whether the connected AP is currently FST-enabled or not. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: f231b3d816aa9818432b06b65e71114613b68a91 Git-repo : git://w1.fi/srv/git/hostap.git CRs-Fixed: 945518 Change-Id: Ie505405ed91b34fca17a1a6fe56b2a20357d3d64
* | | | hostapd: Process MAC ACLs on a station association event (SME in driver)Anton Nayshtut2015-12-023-16/+44
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | now hostapd will use station MAC-based permissions according to the macaddr_acl policy also for drivers which use AP SME offload, but do not support NL80211_CMD_SET_MAC_ACL for offloading MAC ACL processing. It should be noted that in this type of case the association goes through and the station gets disconnected immediately after that. Change-Id: I88044e351c27dc5af0fc44a6e26c33c550fb84b0 Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Git-commit: 0603bcb7fe8babf183362518238c142afe8e2036 Git-repo: git://w1.fi/srv/git/hostap.git CRs-Fixed: 934469
* | | | EAP-pwd server: Fix last fragment length validationJouni Malinen2015-12-021-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | All but the last fragment had their length checked against the remaining room in the reassembly buffer. This allowed a suitably constructed last fragment frame to try to add extra data that would go beyond the buffer. The length validation code in wpabuf_put_data() prevents an actual buffer write overflow from occurring, but this results in process termination. (CVE-2015-5314) Signed-off-by: Jouni Malinen <j@w1.fi> Git-commit: bef802ece03f9ae9d52a21f0cf4f1bc2c5a1f8aa Git-repo: git://w1.fi/srv/git/hostap.git Change-Id: Ia283ce184fc880e2fcf7e60e40952cbfc2961709 CRs-Fixed: 937515