Commit message (Collapse)AuthorAgeFilesLines
* One more year update for copyright noticesJouni Malinen2011-02-271-1/+1
* Remove Host AP driver FAQ from the git repositoryJouni Malinen2011-02-272-183/+2
| | | | | | There is no need to keep this in hostap.git with wpa_supplicant and hostapd. The CVS version from 0.5.x branch is identical and it can be used instead.
* Update copyright notices to include the new yearJouni Malinen2011-02-2710-19/+19
* Add wpa_supplicant state change event for Android network managerDmitry Shmidt2011-02-262-0/+9
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* ctrl_iface: Return only finished line for scan resultsDmitry Shmidt2011-02-261-7/+7
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* OpenSSL: Add access to Android certificatesDmitry Shmidt2011-02-261-0/+86
| | | | | | | This allows keystore:// prefix to be used with client_cert and private_key configuration parameters. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Add CONFIG_ANDROID_LOG supportDmitry Shmidt2011-02-252-0/+53
| | | | | This makes wpa_printf() calls use __android_log_vprint(). In addition, hexdumps are commented out.
* Change executable permissions for AndroidDmitry Shmidt2011-02-251-0/+30
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* wext: Do not include typedefs for Android buildJouni Malinen2011-02-251-0/+2
| | | | | | Android build gets __u32 and friends from bionic/libc/kernel/arch-x86/asm/types.h and having the typedefs here causes redefinition errors.
* wext: Sync with linux/wireless.h from wireless-testing.gitJouni Malinen2011-02-251-14/+98
| | | | | This updates the Linux wireless extensions header file to be based on the latest version (22).
* P2P: Add wpas_notify_p2p_sd_responseKonguraj(Raj) Kulanthaivel2011-02-243-0/+12
| | | | | Signed-off-by: Konguraj(Raj) Kulanthaivel <konguraj.kulanthaivel@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add wpas_notify_p2p_sd_requestKonguraj(Raj) Kulanthaivel2011-02-243-0/+15
| | | | | Signed-off-by: Konguraj(Raj) Kulanthaivel <konguraj.kulanthaivel@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add invitation result notificationJean-Michel Bachot2011-02-243-0/+9
| | | | | | | Add a notification function for the result of an invitation. Signed-off-by: Jean-Michel Bachot <jean-michelx.bachot@linux.intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add GO negotiation status notificationJayant Sane2011-02-243-0/+9
| | | | | Signed-off-by: Jayant Sane <jayant.sane@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add wpas_notify_p2p_go_neg_reqKonguraj(Raj) Kulanthaivel2011-02-243-0/+10
| | | | | | | Add a notification for received GO negotiation requests. Signed-off-by: Konguraj(Raj) Kulanthaivel <konguraj.kulanthaivel@intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add group removed notificationJohannes Berg2011-02-243-0/+14
| | | | Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add method to signal lost deviceJohannes Berg2011-02-245-0/+30
| | | | | | | This signal is used to notify users of the P2P state machine or wpa_supplicant of lost devices. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add notification for P2P device foundJohannes Berg2011-02-243-0/+13
| | | | Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add p2p_get_peer_found to get peer infoJohannes Berg2011-02-242-0/+51
| | | | | | | | This will only retrieve information about peers that have been fully discovered, not peers that are only half-discovered based on their Probe Request frames. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add new_device flag to dev_found callbackJohannes Berg2011-02-247-9/+24
| | | | | | | | | | | | | | The DBus code will want to have perfect matching of dev_found and the dev_lost it adds so it doesn't need to keep track internally. Enable that with a new flag in the core that tracks whether we have already notified about this -- the existing users can ignore it. The part where this is always set to 1 if the new device is discovered by a driver that has P2P in the driver is buggy -- the driver should feed the P2P peer database and then that should feed the notification here instead. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Embed publically visible struct in peer infoKonguraj(Raj) Kulanthaivel2011-02-2412-145/+187
| | | | | | | | | | | | This embeds some information about each P2P peer that will be publically visible in a struct that is shared. The dev_found notification function is also passed the new struct, which requires some work for the driver-based P2P management. Signed-off-by: Konguraj(Raj) Kulanthaivel <konguraj.kulanthaivel@intel.com> Signed-off-by: Fabien Marotte <fabienx.marotte@linux.intel.com> Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* hostapd: Inherit correct MAC address for AP VLAN interfacesHelmut Schaa2011-02-241-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | When using multiple vifs and dynamic vlan tagging is enabled on any interface, the created AP VLAN interfaces get the BSSID of the first AP mode interface instead of the BSSID of the corresponding AP mode interface. Example: wlan0 - xx:xx:xx:xx:x0 wlan1 - xx:xx:xx:xx:x1 Assume a STA connects to the AP interface wlan1 and gets a dynamic VLAN tag 100 assigned by the RADIUS server. Hostapd will create an AP VLAN interface wlan1.100 but doesn't set an address for this interface which results in wlan1.100 getting the same address as wlan0: wlan1.100 - xx:xx:xx:xx:x0 As a result the STA that was moved to wlan1.100 isn't able to finish its 4-way handshake since mac80211 won't pass its frames to wlan1.100 due to the different address. To fix this issue make use of the address of the AP interface when creating an AP VLAN interface. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* P2P: Handle P2P-not-supported without segfaultsJouni Malinen2011-02-242-10/+57
| | | | | | | Previous code was assuming that the P2P module is always initialized. However, that is not the case anymore with drivers that do not support P2P. Add verification of whether P2P is enabled before trying to execute P2P commands.
* AP: Update logging related to inactivity and disassociationBen Greear2011-02-242-16/+22
| | | | | | | | Add MAC addresses for stations and use wpa_msg instead of printf methods to make it easier to grep logs and find messages for the station in question. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Add more wpa_auth debugging messagesBen Greear2011-02-241-1/+13
* Wait 1 second before (re)scanning on authentication timeoutBen Greear2011-02-241-1/+6
| | | | | | | If we timed out, the AP or the local radio may be busy. So, wait a second until scanning again. Signed-off-by: Ben Greear <greearb@candelatech.com>
* SME: Add timers for authentication and asscoiationBen Greear2011-02-245-41/+136
| | | | | | | | mac80211 authentication or association operation may get stuck for some reasons, so wpa_supplicant better use an internal timer to recover from this. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Remove unneeded OpenSSL error messages from key/cert parsingJouni Malinen2011-02-221-27/+6
| | | | | | | If parsing of the certificate or private key succeeds using any of the tried encoding types, clear the OpenSSL error queue without showing the pending errors in debug log since they do not really provide any useful output and can be confusing.
* nl80211: Use nl_atype() from libnlRaghunathan Kailasanathan2011-02-221-1/+1
| | | | | libnl provides nla_type() which can be used to derive nla_type from struct nlattr.
* P2P: Notify WPS-M2D event on parent interface and handle PBC overlapJouni Malinen2011-02-221-0/+24
| | | | | | | | | GO may use M2D to notify that PBC overlap was detected if the GO was configured to allow only a specific P2P Device to connect using PBC. We need to report the M2D message on the parent interface if a separate group interface is used. In addition, we can stop the P2P operation if PBC overlap was indicated similarly to what we are already doing in th case the overlap is detected locally.
* Remove obsolete comments about libnl 1.1 being newJouni Malinen2011-02-211-6/+0
* wpa_cli: Add newline to end of responses in interactive modeJouni Malinen2011-02-211-0/+2
| | | | | | | | Some of the wpa_supplicant control interface commands, like WPS_PIN, may not include a newline in the end of the response. This can result in the response being lost when wpa_cli redraws the screen after an event message. Add a newline after such responses in interactive mode to avoid the problem.
* utils: Corrected a typo in header's name definitionGuy Eilam2011-02-211-1/+1
| | | | | | | Corrected a typo in the BASE64_H definition that might cause the header file to be included more than once. Signed-off-by: Guy Eilam <guy@wizery.com>
* WPS ER: Stop eloop only on the last terminate_cbBen Greear2011-02-211-1/+5
| | | | | | This allows all WPS ER instances to be cleaned up properly if more than one interface has an active WPS ER when wpa_supplicant is being killed.
* Increase internal TLSs client key exchange bufferChristian Lamparter2011-02-211-1/+1
| | | | | | | | | | | | | | | | | This patch fixes a problem I had when I tried to connect an embedded system [wpa_supplicant, CONFIG_TLS=internal] to my TLS secured network. TLSv1: Send CertificateVerify TLSv1: CertificateVerify hash - hexdump(len=36): ha .. ha PKCS #1: pkcs1_generate_encryption_block - Invalid buffer lengths \ (modlen=512 outlen=454 inlen=36) It turned out that a fixed 1000 byte message buffer was just a little bit too small for the 4096 bit RSA certificates I'm using. Signed-off-by: Christian Lamparter <chunkeey@googlemail.com>
* hostapd: Allow coexistance of HT BSSes with WEP/TKIP BSSesHelmut Schaa2011-02-215-12/+17
| | | | | | | | | | | | | | | | | | | In multi BSS setups it wasn't possible to set up an HT BSS in conjunction with a WEP/TKIP BSS. HT needed to be turned off entirely to allow WEP/TKIP BSSes to be used. In order to allow HT BSSes to coexist with non-HT WEP/TKIP BSSes add a new BSS conf attribute "disable_11n" which disables HT capabilities on a single BSS by suppressing HT IEs in the beacon and probe response frames. Furthermore, mark all STAs associated to a WEP/TKIP BSS as non-HT STAs. The disable_11n parameter is used internally; no new entry is parsed from hostapd.conf. This allows a non-HT WEP/TKIP BSS to coexist with a HT BSS without having to disable HT mode entirely. Nevertheless, all STAs associated to the WEP/TKIP BSS will only be served as if they were non-HT STAs. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* FT: Set EAPOL state machined to authenticated state with FT-EAPJouni Malinen2011-02-201-1/+10
| | | | | | When FT protocol run is completed with FT-EAP, the EAPOL state machine needs to be notified of the completed authentication to make sure it does not try to start new authentication.
* FT: Fix FT-EAP to set EAPOL Authenticator into authenticated stateJouni Malinen2011-02-201-1/+20
| | | | | This is needed to avoid the EAPOL Authenticator from trying to start new authentication when FT protocol is used. [Bug 384]
* FT: Specify source MAC address for RRB messagesJouni Malinen2011-02-201-12/+27
| | | | | | | | Use l2_packet with Ethernet header included so that the source address for RRB packets can be forced to be the local BSSID. This fixes problems where unexpected bridge interface address may end up getting used and the recipient of the frame dropping it as unknown R0KH/R1KH.
* Do not propagate bad scan results to siblings sharing the radioBen Greear2011-02-161-12/+20
| | | | | | | This decreases useless work and re-scans by siblings when a device gets a scan failure. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Flush STA entries in hostapd when clearing STAs from kernelJouni Malinen2011-02-101-0/+1
| | | | | | | | This is needed to keep kernel and hostapd in sync. In addition, the obsolete entry in hostapd prevented use of Deauthentication or Disassociation frame with reason code 6/7 mechanism to indicate to the STA that there is no association if the STA missed the broadcast Deauthentication frame for any reason.
* hostapd: Fix RADIUS client configuration update on reconfigJouni Malinen2011-02-103-4/+19
| | | | | | | The internal pointer to RADIUS client configuration needs to be updated whenever a new hostapd configuration is loaded. Without this, freed memory may be dereferenced and this can result in segmentation faults.
* Make sure reserved field in WMM IE is set to 0Jouni Malinen2011-02-101-0/+2
| | | | | This was previously left uninitialized for Beacon frames and could potentially have any value.
* Fix CONFIG_NO_STDOUT_DEBUG=y buildJouni Malinen2011-02-103-3/+15
* Use wpa_msg() instead of wpa_printf()Ben Greear2011-02-107-604/+695
| | | | | | | | | | This converts number of debugging messages to use wpa_msg() in order to allow the interface name to be shown with the messages. A new function, wpa_dbg(), is introduced to allow CONFIG_NO_STDOUT_DEBUG=y builds to remove the debug strings. This is otherwise identical with wpa_msg(), but it gets compiled out if stdout debugging is disabled.
* hostapd: Add require_ht configuration parameterJouni Malinen2011-02-096-3/+31
| | | | | This can be used to configure hostapd to reject association with any station that does not support HT PHY.
* wpa_s AP: Deliver EVENT_RX_PROBE_REQ events to AP processingJouni Malinen2011-02-083-24/+37
| | | | | | | | This is needed to allows WPS PBC session overlap detection to work with drivers that process Probe Request frames internally. This code is is run in hostapd, but the wpa_supplicant AP mode did not have call to the hostapd_probe_req_rx() function even though it registered handlers for hostapd Probe Request RX callbacks.
* P2P: Allow WPS_PBC command on GO to select on P2P Device AddressJouni Malinen2011-02-0714-18/+92
| | | | | | | | | | | | | | An optional parameter, p2p_dev_addr, can now be given to WPS_PBC command on P2P GO to indicate that only the P2P device with the specified P2P Device Address is allowed to connect using PBC. If any other device tries to use PBC, a session overlap is indicated and the negotiation is rejected with M2D. The command format for specifying the address is "WPS_PBC p2p_dev_addr=<address>", e.g., WPS_PBC p2p_dev_addr=02:03:04:05:06:07 In addition, show the PBC session overlap indication as a WPS failure event on an AP/GO interface. This particular new case shows up as "WPS-FAIL msg=4 config_error=12".
* hostapd: Add iface-name wpa_msg() callback registrationBen Greear2011-02-061-0/+11
| | | | | | | This allows the interface name to be automatically added to log file lines by the core logging logic. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Add interface name to wpa_msg() outputBen Greear2011-02-063-2/+35
| | | | | | | | | | This makes log files much more readable if multiple interfaces are being controlled by the same process. The interface name is added to stdout/file/syslog entries, but not to the messages sent to control interface monitors to avoid issues with parsing in external programs. Signed-off-by: Ben Greear <greearb@candelatech.com>