| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
| |
Make the driver offchannel simultaneous capability available to
wpa_supplicant.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 8e5097456af34c43beee03e63ef7ab10aabd9680
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I76dbc6b6f9d871b3703030f0e204eb10ccc90fa3
CRs-fixed: 909284
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Allow wpa_supplicant to use vendor scan (if supported by the driver)
together with the normal nl80211 scan and handling external scan events.
Since this results in possibility of concurrent scan operations, some of
the operations related to scan results need to check more carefully when
an event is relevant for a specific interface.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: adcd7c4b0bd02bead77f884f52782a813f5243bb
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I78be8d12a6f0ae1fef82a035a525929e2e15c972
CRs-fixed: 909284
|
| |
|
|
|
|
|
|
| |
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 94fb165c3ac317b93ddb9a96c620fcf87a2c68e2
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I0a284ec156b742ee3aac6411ce2e93e7be85221a
CRs-fixed: 909284
|
| |
|
|
|
|
|
|
|
|
|
|
| |
This commit contains the necessary changes for supporting the QCA vendor
scan implementation, i.e., sending the vendor scan command to underlying
driver and handling the vendor scan events from the driver.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: f22a080cdc19ba1dee1f85f1d71d2a9c0e699a56
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: Iaa5c47f5e5fa800afc8662314e0889af679a72ef
CRs-fixed: 909284
|
| |
|
|
|
|
|
|
|
|
|
| |
Introduce definitions for QCA vendor specific subcommands
and attributes to support vendor scan request.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: b48567195d7eb4e1f6a18ae88a2af4db2afa193b
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: Ia7f92909b4e09240f866fbb5aaf707943b65d627
CRs-Fixed: 909284
|
| |
|
|
|
|
|
|
|
|
|
|
| |
When using P2P invitation to re-invoke a persistent P2P group without
specifying the operating channel, query the driver for the preferred
frequency list, and use it to select the operating channel of the group.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: fbcddaed9aa62587e7b74cd22df4b4cdaca6b101
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I2fcf33980771e57e11539ee580cf4fe783b6719f
CRs-fixed: 887890
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When processing a GO Negotiation Request and Response, if local driver
supports the preferred channel list extension, then:
- Check if peer's preference for operating channel is already included
in our preferred channel list and if so, take the oper_channel as is.
- If peer's preference for operating channel is not in local device's
preferred channel list and peer device has provided its preferred
frequency list in the GO Negotiation Request/Response, then find a
channel that is common for both preferred channel lists and use it
for oper_channel.
- If peer's preference for operating channel is not in local device's
preferred channel list and peer device doesn't use preferred channel
list extension, i.e., no preferred channel list in GO Negotiation
Request/Response, then look for a channel that is common for local
device's preferred channel list and peer's list of supported channels
and use it for oper_channel.
- In case no common channel is found, use the peer's preference for
oper_channel as is.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 6cc364946cd30681cd1e3a2ca061173be3227d11
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I2ba4cddfd03c741ee82ecbefe64617080e720d3e
CRs-fixed: 887890
|
| |
|
|
|
|
|
|
|
|
|
|
| |
This adds a callback function that can be used from the P2P module to
request the current preferred list of operating channels from the
driver.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: fc71f7d99db620097296720af1d46b1b94afb0f8
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I8135b44c91bdaa89fe80a3e4f802dadfbe557662
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add an extra condition to omit operating channel preference when
building GO Negotiation Response. If the local device supports the
preferred frequency list extension, then when sending a GO Negotiation
Response frame, advertise the preferred operating channel unless local
device is assuming the P2P Client role and has an empty preferred
frequency list, in which case local device can omit its preference for
the operating channel.
This change helps make use of the preferred frequency list and the
calculated best channel for both negotiating parties of the P2P
connection.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 0ef54bd30e3d6d66fe060098c45c61dfaf87e00e
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I2192ac1fcac9253876fae3f54f10f5a89d0e3bac
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
| |
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: def8f7035d0a89bd7f5799b4bbf9113e38437d19
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: I55ff714b3a213005f10a9e8959e78da71e2b26e3
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
When sending a GO Negotiation Request, advertise the preferred frequency
list in a new vendor specific IE. This can be used to extend the
standard P2P behavior where a single preferred channel can be advertised
by allowing a priority list of channels to be indicated.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: b841cf2fa6886de7749477ad71e3f8b6dc3f8bb9
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: I0657fe4e8ebf7cf51a2127450130ae6718a12d98
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
If the driver supports the preferred frequency list extension, use this
information from the driver when no explicitly configured preference
list (p2p_pref_chan) is present for P2P operating channel selection.
This commit adds this for GO Negotiation and Invitation use cases.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 370017d968e071522357ea88c0c6aaed02853222
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Idd39a8276daaf450b8d720a9fdf617f6427f5e48
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
| |
This adds parsing of QCA vendor specific elements and as the first such
element to be parsed, stores pointers to the preferred frequency list
element that can be used to enhance P2P channel negotiation behavior.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 9baaac2d8495d56040a27063afe84f460525c2b3
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ie2da6d2dd9dc107f5ff3bb4763608fa5374c7539
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Extend the QCA vendor specific nl80211 interface to query the preferred
frequency list from driver and add a new wpa_cli command to query this
information.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 983422088f0066068fd364013623d1e475031e6b
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: I71de761d267f9d46ab6ae9cd35cc08daf5d2bd99
CRs-Fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Upon GO Negotiation completion, if the remote peer becomes GO, send a
hint event over QCA vendor specific interface to inform the driver of
the likely operating channel of the P2P GO.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 7c813acf9ca69f3c6d442ce820237249a6216201
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ic3cbb824e1c8bac94839cde7819de75a03d75765
CRs-Fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Extend the nl80211 interface command "driver status" to retrieve the
concurrency capabilities from the driver using the QCA vendor
extensions.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 079a28f7b88bef62249872f0d7b7947ba1d77ac9
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Iade4acbe723b7c1c36c886f305b476172535e850
CRs-Fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
When ACS is offloaded to device driver and the hw_mode parameter is set
to any, the current_mode structure is NULL which fails the ACS command.
Fix this by populating the ACS channel list with channels from all bands
when current_mode is NULL.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: d0cdccd30785b2471c632c341caef68ab1bc62db
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ia8a5ef25184788f836daec2e009eb5bc64108e5d
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
The new enum qca_vendor_element_id registry is used to manage
assignments of vendor specific elements using the QCA OUI 00:13:74. The
initial assignment is for the purpose for extending P2P functionality
for cases where the wpa_supplicant implementation is used by both ends
of an exchange
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: b43b2b520370b251ee3fdce3ade0f66950292281
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Icd2cf14cbc5d1b781f12453ebcbf8ee147a3117e
CRs-fixed: 842468
|
| |
|
|
|
|
|
|
|
|
| |
gettid system calls doesn't have a wrapper in glibc. Bionic library
provides wrapper so there is no issue in Android platform however
non-Android platform throws linker error. This commit addresses this
by implementing a wrapper of gettid.
Change-Id: I996d8aa8ed21fabbefa9190c1132362e7b92e877
CRs-Fixed: 994742
|
| |
|
|
|
|
|
|
|
|
|
| |
qmi-framework will generate qmi_cci library needed by eap_proxy
for QCCI interface APIs. add qmi-framework to PKG_CONFIG to link
this library.
This change will also add flags to support DSDS and eap-AKA'
feature on mdm.
Change-Id: Ibbf38f85f315fc0a33b190e3992cacd4843a1eea
CRs-Fixed: 952339
|
| |
|
|
|
|
|
|
| |
QMI initialization is done on a separate thread per eap_proxy.
Hence, moving the wpa_uim data structures to eap_proxy_sm struct.
Change-Id: I510132f038f3119b8393b47525c6e21fa4cd3933
CRs-Fixed: 977372
|
| |\
| |
| |
| | |
wlan-service.lnx.1.0-dev.1.0
|
| | |
| |
| |
| |
| |
| |
| |
| |
| | |
QMI initialization , if done in eloop context , affects
supplicant functionality. Since this QMI initialization takes
more time , a separate thread is spawned for the same
Change-Id: Id877ad8da5c73cabfef3bf4f4a2cd2a776ddd443
CRs-Fixed: 971522
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This adds the driver interface commands for issuing a request to abort
an ongoing scan operation.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 4f30addb3866a8bb9393c1cfd42e012150c36a8e
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ic032fa52bdd801514b3b74b12b903c3bdf8fc663
CRs-fixed: 930855
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This brings in nl80211 definitions as of 2015-11-26.
Signed-off-by: Jouni Malinen <j@w1.fi>
Git-commit: 5ef0b843555389d5d02b85d661c7b3b9165f3c4d
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: I749e12852c48f9d99ab1f787582e61bd3f9854b0
CRs-fixed: 930855
|
| |/
|
|
|
|
|
|
|
|
| |
This brings in nl80211 definitions as of 2015-05-06.
Signed-off-by: Jouni Malinen <j@w1.fi>
Git-commit: dd9a42efbc39a7ff425a7b3d5a69cf55d64a19f3
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: I3c8495b2f37fe7e1091bdb8223085779944b49a6
CRs-fixed: 930855
|
| |
|
|
|
|
|
|
|
| |
While conencting to eap SIM/AKA, if eap method, is not set in
config file , supplicant will crash accessing eap_method in conf.
Refer to eap methoods only if they are not NULL
Change-Id: Idd1f49157700948d6f3c6aa494c2dfa9ff125a41
CRs-Fixed: 969387
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
This adds experimental support for using OCSP with libcurl that is built
against BoringSSL. This needs small modifications to libcurl to allow
CURLOPT_SSL_VERIFYSTATUS to be used to call
SSL_enable_ocsp_stapling(connssl->handle) in ossl_connect_step1().
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 8d27efa814e8f2c8bb4e26c1389a0cb60f8c6991
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ib73d598d2f9a31adfa9881d6a0ff9afb262e7adf
CRs-fixed: 960177
|
| |
|
|
|
|
|
|
|
|
|
| |
Define the sk_*_{num,value}() macros in BoringSSL style if BoringSSL is
used instead of OpenSSL.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: cc2994024d859ecf60a48e81723e9b5838012dd3
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ib63e49df46392fa677e0562ba866f9e1feb1b6f4
CRs-fixed: 960177
|
| |
|
|
|
|
|
|
|
|
|
|
| |
This makes it easier to share the OCSP implementation needed for
BoringSSL outside tls_openssl.c. For now, this is mainly for
http_curl.c.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 213e158ca8d466c5bf1403eec83b9af56cf28dff
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ifee0388a823c9f7312e168d33f1a0cd93ca14f4c
CRs-fixed: 960177
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
BoringSSL has removed the OpenSSL OCSP implementation (OCSP_*()
functions) and instead, provides only a minimal mechanism for include
the status request extension and fetching the response from the server.
As such, the previous OpenSSL-based implementation for OCSP stapling is
not usable with BoringSSL.
Add a new implementation that uses BoringSSL to request and fetch the
OCSP stapling response and then parse and validate this with the new
implementation within wpa_supplicant. While this may not have identical
behavior with the OpenSSL-based implementation, this should be a good
starting point for being able to use OCSP stapling with BoringSSL.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: bdee6ca0e0fb66c472a6dacb1415898fc54b7f35
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ib2e1f191a7c6bbdaa6a962b2440958aaf71ab138
CRs-fixed: 960177
|
| |
|
|
|
|
|
|
|
|
|
| |
This is needed at least with BoringSSL to avoid accepting OCSP-required
configuration with a TLS library that does not support OCSP stapling.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 355a5c8ec55434858ee9158298a2e984c2abde5c
Git-repo : git://w1.fi/srv/git/hostap.git
Change-Id: Ia72ce79f16178de5cca1116ab9bca8fc9c9ef603
CRs-fixed: 960177
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
P2P device discovery can add peer entries based on a message directly
from a peer and from a Probe Response frame from a GO for all the P2P
Clients in the group. The former case for filtering out control
characters from the device name while the latter was not. Make this
consistent and filter both cases in the same way to avoid confusing
external programs using the device name of a P2P peer.
CRs-fixed: 930000
Git-commit: 5d1d69a10f60eec624689408ec85fbe93657156d
Git-repo : git://w1.fi/srv/git/hostap.git
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Change-Id: I5a22c6bbcc060c5e9b30b977a04915836b04f36f
|
| |
|
|
|
|
|
|
|
|
|
|
| |
These needs to be cancelled so that the kernel driver does not get left
with all old entries blocking other offchannel operations
Git-commit: 759a8a3a99845af1c5c10685ec7cb9cf4daa4593
Git-repo : git://w1.fi/srv/git/hostap.git
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
CRs-Fixed: 950786
Change-Id: Ia9a964c407c72384b606dbb1f033e110b8091b5c
|
| |\
| |
| |
| | |
Change-Id: I449d779ba8ad9357af6942b1ea7f45b9bff8f813
|
| | |\
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Android 6.0.1 release 3
* tag 'android-6.0.1_r3':
RSN: Stop connection attempt on apparent PMK mismatch
Throttle control interface event message bursts
Add wpa_supplicant EVENT_TEST control interface command
hostapd: Global control interface notifications
Add debug prints for wpa_supplicant ctrl_iface socket send operations
Update AP WPA/RSN IE on all associations if driver can select BSS
Conflicts:
wpa_supplicant/ctrl_iface_unix.c
Change-Id: I8c5a51afff761112ba36ae21b94fd21f07d4c18a
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
If WPA2-Enterprise connection with full EAP authentication (i.e., no
PMKSA caching used) results in a PMKID that does not match the one the
AP/Authenticator indicates in EAPOL-Key msg 1/4, there is not much point
in trying to trigger full EAP authentication by sending EAPOL-Start
since this sequence was immediately after such full authentication
attempt.
There are known examples of authentication servers with incorrect MSK
derivation when TLS v1.2 is used (e.g., FreeRADIUS 2.2.6 or 3.0.7 when
built with OpenSSL 1.0.2). Write a clear debug log entry and also send
it to control interface monitors when it looks likely that this case has
been hit. After doing that, stop the connection attempt by
disassociating instead of trying to send out EAPOL-Start to trigger new
EAP authentication round (such another try can be tried with a new
association).
b/24253154
From upstream commit bddc51e8e422463dc96c263666b6fc4c26375cb6
Change-Id: I1e72c9d0232492103a10c0f4125170c000754ac5
Signed-off-by: Jouni Malinen <j@w1.fi>
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This commit implements hostapd global control interface notifications
infrastructure. hostapd global control interface clients issue
ATTACH/DETACH commands to register and deregister with hostapd
correspondingly - the same way as for any other hostapd/wpa_supplicant
control interface.
Bug: 24270573
Change-Id: I46da39e8262a446e7779a1adfbcb08b5bfa382d7
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
|
| | |\ \ |
|
| | | |\|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Android 6.0.0 release 26
* tag 'android-6.0.0_r26':
Update AP WPA/RSN IE on all associations if driver can select BSS
Add QCA vendor command support to set band to driver
nl80211: Use beacon TSF if it is newer than Probe Response TSF
Conflicts:
src/common/qca-vendor.h
Change-Id: Ibab1bc3eda788f001e2a7a0a866c3a9af2a47dce
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Add vendor command to pass SET setband command to the driver and read
the updated channel list from driver when this notification succeeds.
This allows the driver to update its internal channel lists based on
setband configuration.
For merge compatibility it has 3 patches:
844dfeb Add QCA vendor command support to set band to driver
6b0ceee Add QCA vendor definitions for multi-port concurrency
d71bdfb Add QCA vendor command for updating gateway parameters
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
Bug: 23261230
Change-Id: I4ce6307c54b27d3d2f54d435fc0cae5480bdf23c
|
| | | | |\
| | | | |
| | | | |
| | | | |
| | | | | |
* commit '447c7ff83da0d89ffa70c378be2a4a58f9b14d3b':
Make sure configuration is saved to storage device
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
cfg80211 sends TSF information with the attribute NL80211_BSS_BEACON_TSF
if the scan results include information from Beacon frame. Probe
Response frame information is included in NL80211_BSS_TSF. If the device
receives only Beacon frames, NL80211_BSS_TSF might not carry updated
TSF, which results an older TSF being used in wpa_supplicant. Fetch both
possible TSF values (if available) and choose the latest TSF for the BSS
entry.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
Bug: 22412559
Change-Id: I21a28265d5a9a2efec7a0deb51b353df368c4706
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Modify the FST peer connection check so it won't skip peers without MB
IEs making it more permissive for peers that didn't provide MB IEs
during association request. This can be helpful, e.g., in cases where a
STA's interface connected before it was added to the FST group. This
allows the AP to receive FST Action frames and initiate session with a
STA via STA's interface that doesn't expose MB IEs.
The adjusted FST protocol is still safe, as it protects itself in many
other ways (checking band info and it's accordance to the interfaces,
Setup IDs, connection states of the interfaces involved, etc.)
effectively avoiding all types of invalid situations.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: b47d05aa458ed7c7dfbfe09fc2a2af1f2fee7fc7
Git-repo : git://w1.fi/srv/git/hostap.git
CRs-Fixed: 945518
Change-Id: Ie1a94890d55dcd7027947cedd4313eddebe3d487
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
FST STA should always expose its MB IEs regardless of its connection
state and whether the connected AP is currently FST-enabled or not.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: f231b3d816aa9818432b06b65e71114613b68a91
Git-repo : git://w1.fi/srv/git/hostap.git
CRs-Fixed: 945518
Change-Id: Ie505405ed91b34fca17a1a6fe56b2a20357d3d64
|
| | |/ / /
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
now hostapd will use station MAC-based permissions according to the
macaddr_acl policy also for drivers which use AP SME offload, but do not
support NL80211_CMD_SET_MAC_ACL for offloading MAC ACL processing. It
should be noted that in this type of case the association goes through
and the station gets disconnected immediately after that.
Change-Id: I88044e351c27dc5af0fc44a6e26c33c550fb84b0
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 0603bcb7fe8babf183362518238c142afe8e2036
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-Fixed: 934469
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Modify the FST peer connection check so it won't skip peers without MB
IEs making it more permissive for peers that didn't provide MB IEs
during association request. This can be helpful, e.g., in cases where a
STA's interface connected before it was added to the FST group. This
allows the AP to receive FST Action frames and initiate session with a
STA via STA's interface that doesn't expose MB IEs
The adjusted FST protocol is still safe, as it protects itself in many
other ways (checking band info and it's accordance to the interfaces,
Setup IDs, connection states of the interfaces involved, etc.)
effectively avoiding all types of invalid situations.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: b47d05aa458ed7c7dfbfe09fc2a2af1f2fee7fc7
Git-repo : git://w1.fi/srv/git/hostap.git
CRs-Fixed: 945518
Change-Id: Ie1a94890d55dcd7027947cedd4313eddebe3d487
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
FST STA should always expose its MB IEs regardless of its connection
state and whether the connected AP is currently FST-enabled or not.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: f231b3d816aa9818432b06b65e71114613b68a91
Git-repo : git://w1.fi/srv/git/hostap.git
CRs-Fixed: 945518
Change-Id: Ie505405ed91b34fca17a1a6fe56b2a20357d3d64
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
now hostapd will use station MAC-based permissions according to the
macaddr_acl policy also for drivers which use AP SME offload, but do not
support NL80211_CMD_SET_MAC_ACL for offloading MAC ACL processing. It
should be noted that in this type of case the association goes through
and the station gets disconnected immediately after that.
Change-Id: I88044e351c27dc5af0fc44a6e26c33c550fb84b0
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Git-commit: 0603bcb7fe8babf183362518238c142afe8e2036
Git-repo: git://w1.fi/srv/git/hostap.git
CRs-Fixed: 934469
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
All but the last fragment had their length checked against the remaining
room in the reassembly buffer. This allowed a suitably constructed last
fragment frame to try to add extra data that would go beyond the buffer.
The length validation code in wpabuf_put_data() prevents an actual
buffer write overflow from occurring, but this results in process
termination. (CVE-2015-5314)
Signed-off-by: Jouni Malinen <j@w1.fi>
Git-commit: bef802ece03f9ae9d52a21f0cf4f1bc2c5a1f8aa
Git-repo: git://w1.fi/srv/git/hostap.git
Change-Id: Ia283ce184fc880e2fcf7e60e40952cbfc2961709
CRs-Fixed: 937515
|