- 19 Mar, 2016 1 commit
-
-
Paul Stewart authored
If there is no retrieved parameter, we should not de-reference null Bug: 27748546 Change-Id: I8e6ceba26ab7d73ab365b72c0bfdcdb0a36a59a7
-
- 04 Mar, 2016 1 commit
-
-
Paul Stewart authored
Spurious newlines output while writing the config file can corrupt the wpa_supplicant configuration. Avoid writing these. Bug: 27371366 Change-Id: I3bb99b8c46dba1c81cbccc76ed0cd01abc3ccef9
-
- 09 Nov, 2015 2 commits
-
-
Dmitry Shmidt authored
-
Dmitry Shmidt authored
-
- 06 Nov, 2015 3 commits
-
-
Jouni Malinen authored
WNM Sleep Mode Response frame is used to update GTK/IGTK only if PMF is enabled. Verify that PMF is in use before using this field on station side to avoid accepting unauthenticated key updates. Bug: 25266660 Change-Id: Ib4b80f9c9e4aa5ea0b827c5202809c9660ad9b39 Signed-off-by:
Jouni Malinen <j@w1.fi> Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Jouni Malinen authored
All but the last fragment had their length checked against the remaining room in the reassembly buffer. This allowed a suitably constructed last fragment frame to try to add extra data that would go beyond the buffer. The length validation code in wpabuf_put_data() prevents an actual buffer write overflow from occurring, but this results in process termination. (CVE-2015-5314) Bug: 25510821 Change-Id: I43a9e6270b4ae693fae15314c3ba1f4baef7c083 Signed-off-by:
Jouni Malinen <j@w1.fi> Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Jouni Malinen authored
All but the last fragment had their length checked against the remaining room in the reassembly buffer. This allowed a suitably constructed last fragment frame to try to add extra data that would go beyond the buffer. The length validation code in wpabuf_put_data() prevents an actual buffer write overflow from occurring, but this results in process termination. (CVE-2015-5315) Bug: 25510821 Change-Id: Ic509a6efedc3da9ff40f2842fab5547d087f64de Signed-off-by:
Jouni Malinen <j@w1.fi> Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 09 Apr, 2015 1 commit
-
-
Jouni Malinen authored
This fixes a possible memcpy overflow for P2P dev->oper_ssid in p2p_add_device(). The length provided by the peer device (0..255 bytes) was used without proper bounds checking and that could have resulted in arbitrary data of up to 223 bytes being written beyond the end of the dev->oper_ssid[] array (of which about 150 bytes would be beyond the heap allocation) when processing a corrupted management frame for P2P peer discovery purposes. This could result in corrupted state in heap, unexpected program behavior due to corrupted P2P peer device information, denial of service due to process crash, exposure of memory contents during GO Negotiation, and potentially arbitrary code execution. Thanks to Google security team for reporting this issue and smart hardware research group of Alibaba security team for discovering it. Change-Id: I9f350f20cdd010f2c096514b245b4a901ad74e46 Signed-off-by:
Jouni Malinen <jouni@qca.qualcomm.com>
-
- 14 Nov, 2013 1 commit
-
-
Naresh Jayaram authored
Bug: 11631777 Change-Id: I3fbcf3cef4a6a4d894f78dd3dbe4757831e4fc56 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 07 Nov, 2013 1 commit
-
-
Dmitry Shmidt authored
Change-Id: I58bc138d5b74b1b62f7a9612c12399083aef1374 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 24 Oct, 2013 1 commit
-
-
Jouni Malinen authored
DISCONNECT followed by ENABLE_NETWORK ended up starting a scan for a new connection due to wpa_supplicant_enable_one_network() setting wpa_s->reassociate = 1. This was done regardless of wpa_s->disconnected being 1 which should imply that wpa_supplicant should not try to connect before asked explicitly with REASSOCIATE or RECONNECT. Fix this by making ENABLE_NETWORK setting of reassociate = 1 and starting of scans for connection conditional on wpa_s->disconnected == 0. This will make ENABLE_NETWORK trigger a connection only if wpa_supplicant is already in a state where it would try to connect if there are any enabled networks. Bug: 10483405 Change-Id: Iae606745270f6f3185d5705947f8ccd46bc3a904 Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
- 17 Oct, 2013 1 commit
-
-
Ed Heyl authored
-
- 13 Oct, 2013 1 commit
-
-
The Android Automerger authored
-
- 10 Oct, 2013 1 commit
-
-
Dmitry Shmidt authored
Bug: 11105901 Change-Id: Ibe8e85f47e95177700deedccb408f1eec85b8f3d Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 08 Oct, 2013 2 commits
- 01 Oct, 2013 1 commit
-
-
The Android Automerger authored
-
- 30 Sep, 2013 7 commits
-
-
Sunil Dutt authored
A new TDLS request shall transmit TPK M1 frame with a unique INonce. Thus a new explicit request would fail an ongoing TDLS negotiation with the error "TDLS: FTIE SNonce in TPK M3 does not match with FTIE SNonce used in TPK M1" if the peer happens to receive two M1 frames before an M3 frame. Check for the ongoing negotiation with the peer and do not start a new one if we are already in a setup negotiation with the peer. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
This function is used only with external setup, so this can cleaned up to use simpler design. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
There is no need to go through the peer list when we already have a pointer to the specific peer entry. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
This is called from number of locations and it is more efficient to use a new helper function instead of wpa_tdls_disable_link() that would do peer address search from the list of peers. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
Making this function be used only for external setup case simplifies the implementation and makes core wpa_supplicant calls in ctrl_iface.c and events.c consistent. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
There is no point in updating the RNonce for every obtained TPK M1 frame (e.g., retransmission due to timeout) with the same INonce (SNonce in FTIE). Update RNonce only if a TPK M1 is received with a different INonce (new TDLS session) to avoid issues with two setup exchanges getting mixed and exchange failing due to mismatching nonces ("TDLS: FTIE ANonce in TPK M3 does not match with FTIE ANonce used in TPK M2"). Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Sunil Dutt authored
Clear the peer information and disable the created link on a failed TDLS setup negotiation. This is needed to avoid leaving TDLS setup pending and to return to the AP path in case anything goes wrong during the setup attempt. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
- 29 Sep, 2013 1 commit
-
-
The Android Automerger authored
-
- 27 Sep, 2013 1 commit
-
-
Jouni Malinen authored
If there are large number of BSSes in the scan results, BSS table update could have added a BSS entry to the last_scan_res in a case where that BSS entry got just deleted. This would happen only if there are more than bss_max_count (by default 200) BSSes and if at least bss_max_count of those BSSes are known (match a configured network). In such a case, wpa_bss_add() could end up allocating a new BSS entry and return a pointer to that entry even if it was the one that ended up getting freed to keep the BSS table length within the limit. This could result in freed memory being used and the process crashing (likely with segfault) when trying to access information from that BSS entry. Fix the issue by removing the oldest BSS entry before linking the new entry to the table. This makes sure the newly added entry will never get picked up as the one to be deleted immediately. Bug: 10964663 Change-Id: I495dd2503127263746a69c9ef040c9e62fec0bda Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
- 18 Sep, 2013 2 commits
-
-
The Android Automerger authored
-
The Android Automerger authored
-
- 17 Sep, 2013 2 commits
-
-
Hardik Kantilal Patel authored
When no other user preference is specified, opt to use an operating channel that allows 5 GHz band to be used rather than 2.4 GHz. Previously, this was already done in practice for HT40 channels since no such channel is enabled for P2P on 2.4 GHz. This commit extends this to apply 5 GHz preference for 20 MHz channels as well. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
Dmitry Shmidt authored
Bug: 10641114 Change-Id: I621ef6d5e45392d86211bc3936e85b876b96aec4 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com> Conflicts: src/p2p/p2p_utils.c
-
- 16 Sep, 2013 2 commits
-
-
Dmitry Shmidt authored
Bug: 10641114 Change-Id: I621ef6d5e45392d86211bc3936e85b876b96aec4 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
The Android Automerger authored
-
- 12 Sep, 2013 2 commits
-
-
Dmitry Shmidt authored
Bug: 10641114 Change-Id: I9bb5e6f816ae84363487d77a8c6ddd1b4ae6ae0f Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
Dmitry Shmidt authored
Bug: 10641114 Change-Id: Iab32a76b277cc8195f47a02fb8e6936ff2529aaa Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 10 Sep, 2013 1 commit
-
-
Dmitry Shmidt authored
Bug: 10513949 Change-Id: Id9e5b2560630049a6ca5f74e3785d4a2c2be3124 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 09 Sep, 2013 1 commit
-
-
Dmitry Shmidt authored
Despite interface (and group) related sockets are not used for control, they are created and may be left. Bug: 10585306 Change-Id: I7cf49403337afc2db552c094029390c2cbd57c0f Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 03 Sep, 2013 1 commit
-
-
Dmitry Shmidt authored
b2b688d P2P: Fix crash when failed to create GO interface 6197169 WPS NFC: Fix build without CONFIG_AP=y e1ae5d7 SAE: Fix build without CONFIG_AP=y 813e7b3 P2P: Remove group from timeout on PSK failure 5bf9a6c P2P: Add event messages for possible PSK failures on P2P groups eac8dab P2P: Document per-client keys and p2p_remove_client 43c693c P2P: Do not store duplicate PSK entries for the same device f2c5660 P2P: Add a command for removing a client from all groups 01a57fe P2P: Maintain list of per-client PSKs for persistent groups 759fd76 P2P: Select PSK based on Device Address instead of Interface Address 94ddef3 P2P: Make peer's P2P Device Address available to authenticator 52177fb P2P: Store P2P Device Address in per-device PSK records 05766ed P2P: Allow per-device PSK to be assigned 698e921 wpa_cli: Add tab completion for p2p_set field values 0b5fb86 P2P: Stop listen state when listen-only duration is over 02a3e5c wpa_cli: Allow first DISCONNECTED event to be reported cdf8bfa Disallow WEP configuration in WPA network 731ef43 D-Bus: Fix per-iface object unregistration on not existing objects 447969e D-Bus: Do not send network notification for all P2P groups eb32460 Fix switching from EAP-SIM to EAP-AKA/AKA' f2b3f4d P2P: Allow P2P functionality to be disabled per interface 50f4f2a hostapd: Add Automatic Channel Selection (ACS) support 43ee470 P2P: Immediate group removal in GC in case of deauthentication fcf2052 Fix MNC length for Swisscom SIM cards Bug: 10606228, 10513949 Change-Id: I63ba0e2ab4fa76e6afa7a34be42e8e847e1511b0 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 29 Aug, 2013 1 commit
-
-
Dmitry Shmidt authored
add7add IBSS RSN: Add a timeout for Authentication frame exchange c1c0b35 P2P: Postpone concurrent scans when waiting for first client as GO 6fb7b58 IBSS RSN: Work around Data RX vs. Authentication RX race condition Bug: 10513949 Change-Id: Ic4d77c94a5b6e4729cd798f7b033e3ea5b2481cc Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 26 Aug, 2013 1 commit
-
-
Dmitry Shmidt authored
853b49a tests: Increase test_ap_wps_init connection timeout 28de68a P2P: Update peer operating channel from GO Negotiation Confirm 6701fdc P2P: Use the first pref_chan entry as operating channel preference 99d7c76 P2P: Add more debug info on operating channel selection 8d660e0 P2P: Add GO negotiation results into the P2P-GO-NEG-SUCCESS event 2c6f8cf Replace perror() with wpa_printf(strerror) in ctrl_iface calls e743db4 IBSS RSN: Add IBSS-RSN-COMPLETED event message 4c55901 P2P: Add state info to global STATUS command ae8c27f Add STATUS command to global control interface 42868f1 Add SAVE_CONFIG command to global control interface 1b9b31c Add SET command for global control interface 0185007 hostapd: Add survey dump support 245e026 hostapd: Split up channel checking into helpers ba873bd wired: Wait for the link to become active before sending packets d393de1 P2P: Validate the freq in p2p_group_add 973622c wpa_supplicant: Fix AP mode frequency initialization d99ca89 P2P: Skip non-P2P interface in p2p_group_remove * 239abaf WPS: Set currently used RF band in RF Bands attribute bf83eab nl80211: Start P2P Device when rfkill is unblocked 60b13c2 nl80211: Do not change type to station on P2P interfaces e0591c3 wpa_supplicant: Reduce wait time for control interfaces 5046eb4 P2P: Allow separate interface GO to disconnect low-ack STAs 5bcd5c5 FT RRB: Clear pad field to avoid sending out uninitialized data b378c41 nl80211: Fix deinit path to unregister nl_mgmt socket a235aca Fix DETACH command debug prints to avoid use of freed memory 8d6e035 Make global UNIX socket non-blocking for ctrl_iface 86bd141 Change WEP network selection to reject WPA/WPA2 APs 2e145e9 WPS: Fix failure path to allow WSC_NACK and EAP-Failure to be exchanged 3351a38 WPS: Add control interface command for fetching latest status e96872a WPS: Track peer MAC address from the last operations ae23935 WPS: Track PBC status 61b6520 WPS: Track result of the latest WPS operation 50396e2 WPS: Add PBC mode activated/disabled events 961750c WPS: Share a common function for error strings 30158a0 nl80211: Update the assoc_freq during connect 83e7bb0 nl80211: Add more debug prints for DEL_STATION commands Bug: 9056601 Change-Id: I8bc671eb13f4c2c388a4c15cf1ba968c24c9656a Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 16 Aug, 2013 1 commit
-
-
Dmitry Shmidt authored
Bug: 9056601 Change-Id: I6d78433df656c24af74a6825624c68231a4bf87d Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-