1. 30 Sep, 2013 7 commits
    • Sunil Dutt's avatar
      TDLS: Do not start concurrent TDLS setup · 73b28cc4
      Sunil Dutt authored
      A new TDLS request shall transmit TPK M1 frame with a unique INonce.
      Thus a new explicit request would fail an ongoing TDLS negotiation with
      the error "TDLS: FTIE SNonce in TPK M3 does not match with FTIE SNonce
      used in TPK M1" if the peer happens to receive two M1 frames before an
      M3 frame. Check for the ongoing negotiation with the peer and do not
      start a new one if we are already in a setup negotiation with the peer.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      73b28cc4
    • Sunil Dutt's avatar
      TDLS: Use wpa_tdls_disable_peer_link() in TPK M1 processing · 8b43e82b
      Sunil Dutt authored
      This function is used only with external setup, so this can cleaned up
      to use simpler design.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      8b43e82b
    • Sunil Dutt's avatar
      TDLS: Use wpa_tdls_disable_peer_link() to avoid peer search · d0ef38b5
      Sunil Dutt authored
      There is no need to go through the peer list when we already have a
      pointer to the specific peer entry.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      d0ef38b5
    • Sunil Dutt's avatar
      TDLS: Use helper function for disable link operation · 38ffd887
      Sunil Dutt authored
      This is called from number of locations and it is more efficient to use
      a new helper function instead of wpa_tdls_disable_link() that would do
      peer address search from the list of peers.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      38ffd887
    • Sunil Dutt's avatar
      TDLS: Clean up wpa_tdls_teardown_link() uses · 6a9f522e
      Sunil Dutt authored
      Making this function be used only for external setup case simplifies the
      implementation and makes core wpa_supplicant calls in ctrl_iface.c and
      events.c consistent.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      6a9f522e
    • Sunil Dutt's avatar
      TDLS: Do not modify RNonce for an TPK M1 frame with same INonce · 6102472d
      Sunil Dutt authored
      There is no point in updating the RNonce for every obtained TPK M1 frame
      (e.g., retransmission due to timeout) with the same INonce (SNonce in
      FTIE). Update RNonce only if a TPK M1 is received with a different
      INonce (new TDLS session) to avoid issues with two setup exchanges
      getting mixed and exchange failing due to mismatching nonces ("TDLS:
      FTIE ANonce in TPK M3 does not match with FTIE ANonce used in TPK M2").
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      6102472d
    • Sunil Dutt's avatar
      TDLS: Disable the created link on a failed TDLS handshake · adce9cf7
      Sunil Dutt authored
      Clear the peer information and disable the created link on a
      failed TDLS setup negotiation. This is needed to avoid leaving
      TDLS setup pending and to return to the AP path in case anything
      goes wrong during the setup attempt.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      adce9cf7
  2. 27 Sep, 2013 1 commit
    • Jouni Malinen's avatar
      Fix possible freed-memory use in BSS table updates · 7a6c830d
      Jouni Malinen authored
      If there are large number of BSSes in the scan results, BSS table update
      could have added a BSS entry to the last_scan_res in a case where that
      BSS entry got just deleted. This would happen only if there are more
      than bss_max_count (by default 200) BSSes and if at least bss_max_count
      of those BSSes are known (match a configured network). In such a case,
      wpa_bss_add() could end up allocating a new BSS entry and return a
      pointer to that entry even if it was the one that ended up getting freed
      to keep the BSS table length within the limit. This could result in
      freed memory being used and the process crashing (likely with segfault)
      when trying to access information from that BSS entry.
      
      Fix the issue by removing the oldest BSS entry before linking the new
      entry to the table. This makes sure the newly added entry will never get
      picked up as the one to be deleted immediately.
      
      Bug: 10964663
      
      Change-Id: I495dd2503127263746a69c9ef040c9e62fec0bda
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      7a6c830d
  3. 17 Sep, 2013 1 commit
    • Hardik Kantilal Patel's avatar
      P2P: Prefer 20 MHz operating channels on 5 GHz band over 2.4 GHz · 03b5cdf5
      Hardik Kantilal Patel authored
      When no other user preference is specified, opt to use an operating
      channel that allows 5 GHz band to be used rather than 2.4 GHz.
      Previously, this was already done in practice for HT40 channels since no
      such channel is enabled for P2P on 2.4 GHz. This commit extends this to
      apply 5 GHz preference for 20 MHz channels as well.
      
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      03b5cdf5
  4. 16 Sep, 2013 1 commit
  5. 12 Sep, 2013 2 commits
  6. 10 Sep, 2013 1 commit
  7. 09 Sep, 2013 1 commit
  8. 03 Sep, 2013 1 commit
    • Dmitry Shmidt's avatar
      Cumulative patch from commit b2b688d18d40cd667d0faa149b4a7172166b3bd4 · 391c59f0
      Dmitry Shmidt authored
      b2b688d P2P: Fix crash when failed to create GO interface
      6197169 WPS NFC: Fix build without CONFIG_AP=y
      e1ae5d7 SAE: Fix build without CONFIG_AP=y
      813e7b3 P2P: Remove group from timeout on PSK failure
      5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups
      eac8dab P2P: Document per-client keys and p2p_remove_client
      43c693c P2P: Do not store duplicate PSK entries for the same device
      f2c5660 P2P: Add a command for removing a client from all groups
      01a57fe P2P: Maintain list of per-client PSKs for persistent groups
      759fd76 P2P: Select PSK based on Device Address instead of Interface Address
      94ddef3 P2P: Make peer's P2P Device Address available to authenticator
      52177fb P2P: Store P2P Device Address in per-device PSK records
      05766ed P2P: Allow per-device PSK to be assigned
      698e921 wpa_cli: Add tab completion for p2p_set field values
      0b5fb86 P2P: Stop listen state when listen-only duration is over
      02a3e5c wpa_cli: Allow first...
      391c59f0
  9. 29 Aug, 2013 1 commit
  10. 26 Aug, 2013 1 commit
    • Dmitry Shmidt's avatar
      Cumulative patch from commit 853b49a030c00fd6b2dde14e183ca2bf108eaa16 · b7b4d0ec
      Dmitry Shmidt authored
      
      853b49a tests: Increase test_ap_wps_init connection timeout
      28de68a P2P: Update peer operating channel from GO Negotiation Confirm
      6701fdc P2P: Use the first pref_chan entry as operating channel preference
      99d7c76 P2P: Add more debug info on operating channel selection
      8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event
      2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls
      e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message
      4c55901 P2P: Add state info to global STATUS command
      ae8c27f Add STATUS command to global control interface
      42868f1 Add SAVE_CONFIG command to global control interface
      1b9b31c Add SET command for global control interface
      0185007 hostapd: Add survey dump support
      245e026 hostapd: Split up channel checking into helpers
      ba873bd wired: Wait for the link to become active before sending packets
      d393de1 P2P: Validate the freq in p2p_group_add
      973622c wpa_supplicant: Fix AP mode frequency initialization
      d99ca89 P2P: Skip non-P2P interface in p2p_group_remove *
      239abaf WPS: Set currently used RF band in RF Bands attribute
      bf83eab nl80211: Start P2P Device when rfkill is unblocked
      60b13c2 nl80211: Do not change type to station on P2P interfaces
      e0591c3 wpa_supplicant: Reduce wait time for control interfaces
      5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs
      5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data
      b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket
      a235aca Fix DETACH command debug prints to avoid use of freed memory
      8d6e035 Make global UNIX socket non-blocking for ctrl_iface
      86bd141 Change WEP network selection to reject WPA/WPA2 APs
      2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged
      3351a38 WPS: Add control interface command for fetching latest status
      e96872a WPS: Track peer MAC address from the last operations
      ae23935 WPS: Track PBC status
      61b6520 WPS: Track result of the latest WPS operation
      50396e2 WPS: Add PBC mode activated/disabled events
      961750c WPS: Share a common function for error strings
      30158a0 nl80211: Update the assoc_freq during connect
      83e7bb0 nl80211: Add more debug prints for DEL_STATION commands
      
      Bug: 9056601
      
      Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a
      Signed-off-by: default avatarDmitry Shmidt <dimitrysh@google.com>
      b7b4d0ec
  11. 16 Aug, 2013 1 commit
  12. 14 Aug, 2013 1 commit
  13. 08 Aug, 2013 1 commit
    • Dmitry Shmidt's avatar
      Cumulative patch from commit d2ba3d6bd9336ef8fd761a0cc7999824d4c4da41 · 5393a0f7
      Dmitry Shmidt authored
      
      d2ba3d6 VLAN: Simplify no-WEP with VLAN check
      d66dcb0 WEP: Remove VLAN support from hostapd
      646f12a bsd: Add a commit routine
      32dc6a3 bsd: Mark define sta_set_flags() only for hostapd
      70a867c bsd: Mark the interface down before opening the routing socket
      89f4690 bsd: Compute the RSSI level
      5dd82c6 bsd: Set IEEE80211_KEY_NOREPLAY in IBSS/AHDEMO mode
      cb76af8 bsd: Skip SIOCSIFFFLAGS ioctl when there is no change.
      7239ea7 nl80211: Add stop AP mode event API
      
      Change-Id: Ib1c41f2ed18299451f05d0adf808b8b560522c86
      Signed-off-by: default avatarDmitry Shmidt <dimitrysh@google.com>
      5393a0f7
  14. 05 Aug, 2013 1 commit
  15. 24 Jul, 2013 1 commit
    • Dmitry Shmidt's avatar
      Accumulative patch from commit 932659696e2755bb1ecd6a27e1968fd27eef4948 · c2ebb4b8
      Dmitry Shmidt authored
      
      9326596 nl80211: Remove unused WPA_DRIVER_FLAGS_MULTI_CHANNEL_CONCURRENT
      0d08efa P2P: Use the number of concurrent channels in P2P flows
      a21816a Use wpa_drv_shared_freq() if get_radio_name() is not supported
      53c5dfc Change share_vif_oper_freq() to handle multiple freqs
      4752147 nl80211: Report the number of concurrent support channels
      d7df0fa Clean up wpa_supplicant_event() with deauth/disassoc helper functions
      fd9f170 Remove unnecessary nested ifdef CONFIG_AP
      13adc57 IBSS RSN: Add peer restart detection
      b21990b nl80211: Register for AUTH frames when joining an IBSS network
      c91f796 nl80211: Support not specifying the frame frequency
      ec384c5 IBSS RSN: Fix disconnect() with internal SME
      ed07764 nl80211: Remove redundant assignment of ifindex
      4ed8d95 TDLS: Tear down TDLS using wpas_drv_tlds_oper() if not external
      831770b Cancel delayed scheduled scan when wpa_supplicant cleans up
      69dd296 WDS: Fix WEP usage with nl80211 wds_sta=1
      c8ebeda wpa_supplicant: Add support for VHT BSS membership selector
      3f9a813 hostapd: Add a config option to control beaconing
      182b2e5 Add missing host_to_le32() for big endian hosts
      3f53c00 nl80211: Ignore disconnect event in case of locally generated request
      
      Change-Id: Ia7368e71ae40966a92970ac82b002c09a7971d41
      Signed-off-by: default avatarDmitry Shmidt <dimitrysh@google.com>
      c2ebb4b8
  16. 19 Jul, 2013 8 commits
  17. 16 Jul, 2013 6 commits
    • Jouni Malinen's avatar
      Mark interface disconnected on removal request, DO NOT MERGE · e7ccc402
      Jouni Malinen authored
      
      This cleans up debug log by not trying to process the disconnection
      event as a failure that could result in blacklist addition and auto
      connect attempt. These are pointless operations since the interface is
      going to removed immediately after this.
      
      Bug: 8785804
      Change-Id: I2406d9b9bd9f0a83ae9fd0b0962f1134fda2bb9e
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      e7ccc402
    • Jouni Malinen's avatar
      Do not try auto connect mechanism in disconnected state, DO NOT MERGE · 7f6ddc3b
      Jouni Malinen authored
      
      This cleans up debug log by not requesting the auto connect on
      dissassociation event if we are already in disconnected state and would
      not try to connect anyway.
      
      Bug: 8785804
      Change-Id: I3ba6cc4c64dd714c0689a39339b6f0da5a06857e
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      7f6ddc3b
    • Jouni Malinen's avatar
      Do not add BSS to blacklist on local disconnection request, DO NOT MERGE · 17cac74a
      Jouni Malinen authored
      
      There is no point in marking a BSS temporarily blacklisted based on a
      connection failure or disconnection case if that happens as a result of
      a local request to disconnect. The blacklist entry could result on
      unexpected BSS getting selected on the next connection attempt. In
      addition, the code to try to find another BSS within the ESS could
      result in scanning a single channel on the next attempt. Fix these
      issues by handling the connection failure events only if we are not in
      disconnected state (i.e., would try to reconnect after this
      automatically).
      
      Bug: 8785804
      Change-Id: Iae119c292f5f45b78359dd67317d7d8206cb4cf7
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      17cac74a
    • Jouni Malinen's avatar
      Mark interface disconnected on removal request, DO NOT MERGE · b75d8b67
      Jouni Malinen authored
      
      This cleans up debug log by not trying to process the disconnection
      event as a failure that could result in blacklist addition and auto
      connect attempt. These are pointless operations since the interface is
      going to removed immediately after this.
      
      Bug: 8785804
      Change-Id: I2406d9b9bd9f0a83ae9fd0b0962f1134fda2bb9e
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      b75d8b67
    • Jouni Malinen's avatar
      Do not try auto connect mechanism in disconnected state, DO NOT MERGE · 26a545dc
      Jouni Malinen authored
      
      This cleans up debug log by not requesting the auto connect on
      dissassociation event if we are already in disconnected state and would
      not try to connect anyway.
      
      Bug: 8785804
      Change-Id: I3ba6cc4c64dd714c0689a39339b6f0da5a06857e
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      26a545dc
    • Jouni Malinen's avatar
      Do not add BSS to blacklist on local disconnection request, DO NOT MERGE · 74d2224e
      Jouni Malinen authored
      
      There is no point in marking a BSS temporarily blacklisted based on a
      connection failure or disconnection case if that happens as a result of
      a local request to disconnect. The blacklist entry could result on
      unexpected BSS getting selected on the next connection attempt. In
      addition, the code to try to find another BSS within the ESS could
      result in scanning a single channel on the next attempt. Fix these
      issues by handling the connection failure events only if we are not in
      disconnected state (i.e., would try to reconnect after this
      automatically).
      
      Bug: 8785804
      Change-Id: Iae119c292f5f45b78359dd67317d7d8206cb4cf7
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      Signed-off-by: default avatarIliyan Malchev <malchev@google.com>
      74d2224e
  18. 12 Jul, 2013 1 commit
  19. 11 Jul, 2013 1 commit
    • Dmitry Shmidt's avatar
      Accumulative patch from commit 1075b2957169d8f9d6dddd7679339c751dc9515b · 34af306c
      Dmitry Shmidt authored
      
      1075b29 P2P: Report group formation failure on error to start GO mode
      b62b29e Do not block on ctrl_iface monitor events
      eb7ddbf WPS: Stop SSDP service before freeing the pending entries
      98cbc0a Remove forgotten Xcode defines
      0b9d3b2 Interworking: Relax 3GPP info PLMN matching for MNC
      c7a67a7 WPS: Disconnect when removing existing WPS network block
      fe65847 EAP-EKE: Add server implementation
      7e7610d EAP-EKE: Add peer implementation
      489202d EAP-SAKE: Use configured server identity
      a607b42 EAP-PSK: Use configured server identity
      15b042b EAP-MSCHAPv2: Use configured server identity
      162865b EAP-IKEv2 server: Use configured server identity
      8f89d82 EAP-GPSK server: Use configured server identity
      67fe933 Add server identity configuration for EAP server
      06aeff5 dbus: Register the AutoScan method call at the right place
      78f79fe P2P: Do not add ctrl interface for P2P_DEVICE (p2p-dev-*)
      1c42b42 P2P: Fix TDLS and l2_packet init without P2P Device interface
      9e6a321 Fix non-P2P build after the P2P_DEVICE changes
      d53d259 Fix build with older OpenSSL versions
      54d4ba4 nl80211: Silence a compiler warning with older gcc versions
      2e5ba4b P2P: Derive group interface name bit more sensibly
      c68f620 P2P: Create P2P Device interface if supported
      851b0c5 nl80211: Do not indicate P2P_DEVICE support by default
      bb4028f P2P: Ignore p2p_no_group_iface when driver advertizes P2P_DEVICE support
      7940c79 nl80211: Use wdev id when cancelling wait for frame using P2P_DEVICE
      f608081 nl80211: Verify P2P GO/client address with all interface addresses
      5fbcb45 nl80211: Fix determining phy name for P2P Device
      27ce1d6 nl80211: Fix nl80211_get_wiphy_index() for P2P Device
      080585c Add support for OCSP stapling to validate server certificate
      72950ed P2P: Remove a call to wpas_p2p_deinit_global()
      ab7a1ad nl80211: Fix P2P group interface creating using P2P Device
      fa93de4 nl80211: Use wdev_id in nl80211_create_iface_once()
      fdc554b nl80211: Use wdev id to obtain P2P Device scan results
      597b94f nl80211: Add .get_mac_addr() callback for P2P Device
      8e12685 nl80211: Rework setting interface mode
      91724d6 nl80211: Introduce i802_set_iface_flags()
      eb4582f nl80211: Remove P2P Device interface upon .deinit()
      f632e48 nl80211: Fix P2P Device interface initialization
      e472e1b nl80211: Handle creation of P2P Device interface
      01517c8 nl80211: Allow Android P2P functionality
      6bae92e nl80211: Add support for P2P Device in add interface
      d6dcfcd nl80211: Add a handler to create_interface
      d3aaef8 nl80211: Hold wdev identification for P2P Device
      7aad838 nl80211: Identify if nl80211 is capable of P2P Device abstraction
      6a71413 nl80211: Rename is_p2p_interface
      8393e1a nl80211: Print interface name on set_key()
      80ebfd9 VLAN: Avoid access to non-existing interfaces
      4345fe9 bridge: Track inter-BSS usage
      459eee9 bridge: Use safe default bridge interface
      2aaeedf bridge: Give bridge name in per-bss configuration
      8a901d7 D-Bus: Emit signal when a station is authorized or deauthorized
      9578329 Add AVG_RSSI report in signal_poll
      2cc8d8f Add bandwidth and center freq info to signal_poll
      1e0e943 Remove 802.11b rates only in case of P2P group operation
      2090a0b nl80211: Add prints for kernel events
      8743676 TDLS: Validate ext_supp_rates in copy_supp_rates
      85b4eac P2P: Do not reply to 802.11b-only Probe Request frames as GO
      ec7b97a Interworking: Add support for using eap_proxy offload
      4331263 Fix session timeout after ANQP dummy STA entry with SME-in-driver
      56cb4e1 wpadebug: Add option to ignore SSL errors
      aa20e1a Remove CONFIG_NO_WPA2 build parameter
      5d5c4ee Remove compiler warnings with CONFIG_NO_SCAN_PROCESSING
      9aaa695 Remove compiler warnings if TDLS is enabled without WPA2
      84ae1d4 Fix WNM build without WPA2
      c33d5eb Fix build without WPA2 or EAP
      1aef400 IBSS RSN: Implement disconnect() callback using sta_deauth()
      
      Change-Id: I4593be5b1478f6532da917423b1d2afa95fb8020
      Signed-off-by: default avatarDmitry Shmidt <dimitrysh@google.com>
      34af306c
  20. 26 Jun, 2013 2 commits