Commit message (Collapse)AuthorAgeFilesLines
* hostapd: Prohibit WEP configuration when HT is enabledYogesh Ashok Powar2010-11-091-0/+7
| | | | | | | WFA 11n testing does not allow WEP when IEEE 802.11n is enabled. Reject such combination when parsing hostapd configuration file. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com>
* wpa_supplicant: Test all compiled drivers before failingSamuel Ortiz2010-11-091-14/+20
| | | | | | wpa_supplicant_set_driver() is returning an error if the first driver in the driver list is not built in. It should continue through the driver list until it finds one that's built in.
* hostapd: Add comment about CONFIG_FULL_DYNAMIC_VLAN to defconfigHelmut Schaa2010-11-091-0/+4
| | | | | | | Add comment about CONFIG_FULL_DYNAMIC_VLAN to defconfig. By default this feature is still disabled. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* hostapd: Fix config reload for multi-BSSFelix Fietkau2010-11-091-30/+39
| | | | | Secondary BSS interfaces need to be activated after the config has been reloaded.
* wpa_supplicant: Fix port state management without IEEE8021X_EAPOLFelix Fietkau2010-11-091-0/+6
| | | | | | If IEE8021X_EAPOL is not enabled in the config, wpa_drv_set_supp_port must be called from the supplicant, otherwise port will not be activated after association.
* Allow client isolation to be configured (ap_isolate=1)Felix Fietkau2010-11-094-0/+22
| | | | | | Client isolation can be used to prevent low-level bridging of frames between associated stations in the BSS. By default, this bridging is allowed.
* Fix rate table handlingFelix Fietkau2010-11-093-10/+21
| | | | | With the nl80211 driver, the rate table is mode dependent, so it must be initialized after the hardware mode has been selected.
* Add bridge handling for WDS STA interfacesFelix Fietkau2010-11-096-7/+32
| | | | | By default, add them to the configured bridge of the AP interface (if present), but allow the user to specify a separate bridge.
* nl80211: Fix AP VLAN handling for WDS STA reassociationFelix Fietkau2010-11-091-1/+2
| | | | | When a STA reassociates, the AP VLAN interface is still present, do not attempt to create it in that case.
* Fix WDS STA reassociationFelix Fietkau2010-11-091-0/+3
| | | | | If the STA entry is present in hostapd, but not in the kernel driver, its WDS status needs to be restored when the STA reassociates
* driver_roboswitch: include net/if.h instead of linux/if.hFelix Fietkau2010-11-091-1/+1
| | | | including linux/if.h clashes with other header files on some systems
* driver_madwifi: fix a compile error on big endian systemsFelix Fietkau2010-11-091-1/+1
* WPS: Add wildcard AuthorizedMACs entry for PBCJouni Malinen2010-11-091-0/+4
* wlantest: Decrypt EAPOL-Key 3/4 Key DataJouni Malinen2010-11-081-2/+112
* Allow TSN AP to be selected when configured for WEPJouni Malinen2010-11-082-0/+31
| | | | | | | | | | | | | | Commit d8d940b7469e505aec4d71a02d3f7ebab412eeae introduced a regression that prevented TSN APs from being used with WEP since the AP was rejected if it advertised WPA or RSN IE when we were configured to use WEP. Resolve this by checking whether the AP is advertising a TSN, i.e., whether the AP allows WEP to be used as a group cipher. If so, allow the AP to be selected if we are configured to use static WEP or IEEE 802.1X (non-WPA). It should be noted that this is still somewhat more restricted in AP selection than earlier wpa_supplicant branches (0.7.x or older) that ignore the WPA/RSN IE completely when configured for non-WPA.
* wlantest: Derive PMK from RADIUS exchangeJouni Malinen2010-11-075-24/+188
| | | | | | Decrypt MPPE keys and derive PMK from RADIUS exchange if RADIUS shared secret is known. Use the derived PMK when trying to derive PTK during 4-Way Handshake.
* wlantest: Add capturing and parsing of RADIUS messagesJouni Malinen2010-11-076-3/+350
| | | | | | Another interface (-I) or pcap file (-R) can now be specified as a source of RADIUS packets. These packets are now parsed, but the MSK is not yet derived for PMK use.
* wlantest: Fix LLC debug printJouni Malinen2010-11-071-1/+4
* wlantest: Add PTK derivation based on passphrasesJouni Malinen2010-11-076-11/+285
| | | | | | | Allow pre-configuration of passphrases (-p<passphrase>) to provide enough information for wlantest to be able to derive PMK for each BSS and PTK for each STA going through 4-Way Handshake (at least message 2 and 3 needs to be received).
* wlantest: Parse EAPOL-Key framesJouni Malinen2010-11-071-1/+300
* wlantest: Maintain a copy of WPA/RSN IE from (Re)AssocReqJouni Malinen2010-11-073-0/+49
* wlantest: Move Mgmt and Data frame processing into their own filesJouni Malinen2010-11-075-525/+567
* wlantest: Move bss_update() into bss.cJouni Malinen2010-11-073-53/+56
* wlantest: Maintain STA state based on auth/assoc/deauth/disassocJouni Malinen2010-11-072-3/+284
* wlantest: Create station list for each BSSJouni Malinen2010-11-075-0/+97
* wlantest: Maintain table of BSS informationJouni Malinen2010-11-075-4/+209
| | | | | Whenever a Beacon or Probe Response frame is observed, add or update a BSS entry to maintain current information about the active BSSes.
* wlantest: Add preliminary version of IEEE 802.11 protocol testing toolJouni Malinen2010-11-078-0/+767
| | | | | | | This tool can be used to capture IEEE 802.11 frames either from a monitor interface for realtime capturing or from pcap files for offline analysis. This version is only adding basic infrastructure for going through the frames and parsing their headers.
* Fix EAP standalone serverJouni Malinen2010-11-073-7/+18
| | | | | | | | | Commit c3fc47ea8e1d3730e11eb9978d13831212727902 fixed EAP passthrough server to allow Logoff/Re-authentication to be used. However, it broke EAP standalone server while doing that. Fix this by reverting the earlier fix and by clearing the EAP Identity information in the EAP server code whenever an EAPOL-Start or EAPOL-Logoff packet is received.
* eapol_test: Unregister EAP server methods if CONFIG_AP=yJouni Malinen2010-11-071-0/+4
| | | | This fixes a memory leak in CONFIG_AP=y builds.
* P2P: Clear off_channel_freq when requesting new remain-on-channelJouni Malinen2010-11-051-1/+5
| | | | | | | The driver may end up leaving the current channel when we request a new remain-on-channel and as such, it is better not assume we can start new operations like sending an Action frame on the previous off-channel.
* P2P: Cancel pending remain-on-channel request when stopping ListenJouni Malinen2010-11-051-2/+2
| | | | | | | If we have already asked the driver to start a new remain-on-channel, we need to cancel it even if the actual remain-on-channel has not yet started at the point when a new operation or timeout etc. triggers Listen state to be stopped.
* P2P: Do not skip call to p2p_scan_res_handled()Jouni Malinen2010-11-051-1/+1
| | | | | | | Even if p2p_scan_res_handler() returns 1 to indicate that scan result iteration should be stopped, the p2p_scan_res_handled() needs to be called to clear p2p_scan_running and to get a callback that will start any operations that were delayed because of the running scan.
* P2P: Drop pending TX frame on new p2p_connectJouni Malinen2010-11-051-0/+15
| | | | | | We need to drop the pending frame to avoid issues with the new GO Negotiation, e.g., when the pending frame was from a previous attempt at starting a GO Negotiation.
* Remove unused TX queue parameters related to Beacon framesJouni Malinen2010-11-045-25/+27
| | | | | | | These are not used by any driver wrapper, i.e., only the four data queues (BK, BE, VI, VO) are configurable. Better remove these so that there is no confusion about being able to configure something additional.
* WPS: Send WSC_NACK if message without Message Type is receivedJouni Malinen2010-11-042-2/+4
* WPS: Share common function for building WSC ACK/NACKJouni Malinen2010-11-044-94/+50
| | | | | These are identical functions in Enrollee and Registrar and there is no need to maintain two copies of the same functionality.
* WPS: Do not advertise support for WEP in WPS 2.0 buildJouni Malinen2010-11-041-2/+10
| | | | | | There is no point in advertising support for WEP or Shared Key authentication if we are going to reject those anyway based on WPS 2.0 rules.
* WPS: Remove PushButton from M1 ConfigMethods on APJouni Malinen2010-11-041-1/+15
| | | | | | These config methods are for the Enrollee role, i.e., for adding external Registrars, and as such, PushButton should not be claimed to be supported.
* nl80211: Allow libnl to be replaced with libnl-tinyJouni Malinen2010-11-041-0/+4
| | | | | CONFIG_LIBNL_TINY=y can be used to select libnl-tiny instead of libnl.
* WPS: Comment out WEP configuration lines on reconfigJouni Malinen2010-11-041-0/+2
* P2P: Copy p2p_intra_bss setting to the group interfaceJouni Malinen2010-11-041-0/+1
| | | | | This is needed to allow p2p_intra_bss take effect when using separate group interfaces.
* P2P: Allow p2p_cancel to cancel P2P client that has not yet connectedJouni Malinen2010-11-041-1/+6
| | | | | This can now be used to cancel a P2P client interface that has not yet completed the first 4-way handshake with a GO.
* P2P: Skip extra remain-on-channel if oper channel matchesJouni Malinen2010-11-021-34/+56
| | | | | | | | There is no need to separately move to the correct channel for transmitting an Action frame that is using the group interface (i.e., source address is P2P Interface Address). This removes extra latency from P2P Action frame operations within a P2P group.
* WPS ER: Clear WPS state if PutMessage does not include NewOutMessageJouni Malinen2010-11-021-0/+2
| | | | | | This is needed to avoid getting stuck with pending WPS operation, e.g., when an AP replies to WSC_NACK with HTTP OK, but without following message.
* nl80211: Pass data frames from unknown STAs to hostapdHelmut Schaa2010-10-311-1/+8
| | | | | | | | | | | | | | | Pass data frames from unknown STAs to hostapd in order to reply with a Deauthentication or Disassociation frame. This fixes compliance with IEEE Std 802.11-2007, 11.3. Furthermore, this does not cause a lot of overhead (at least with mac80211 drivers) since mac80211 does not pass all data frames (but at least from unauthenticated and unassociated STAs) to cooked monitor interfaces. Tested with rt2800pci on a MIPS board. Signed-off-by: Helmut Schaa <helmut.schaa@googlemail.com>
* Add ctrl_iface command 'GET version'Jouni Malinen2010-10-314-1/+94
| | | | | This can be used to fetch the wpa_supplicant/hostapd version string.
* Add WPA_IGNORE_CONFIG_ERRORS option to continue in case of bad configDmitry Shmidt2010-10-312-0/+4
| | | | | | | | | This is an option to continue with wpa_supplicant and hostapd even if config file has errors. The problem is that these daemons are the best "candidates" for the config change, so if they can not start because config file was let's say corrupted, you can not fix it easily. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* P2P: Fix random channel selection to use os_get_randomJouni Malinen2010-10-311-0/+1
| | | | | | | This could have been using an uninitialized variable instead of purposefully random value in picking up the channel. There is not much of a difference for the use case here, but anyway, we may as well do what was initially planned here and.
* P2P: Reorder code to avoid memory leak on error pathJouni Malinen2010-10-311-7/+7
* Fix copy-paste bug in p2p_serv_disc_resp handlingJouni Malinen2010-10-311-6/+2
| | | | | | | The destination address for p2p_serv_disc_resp must always be set to an individual MAC address unlike p2p_serv_disc_req which may use 00:00:00:00:00:00 to indicate wildcard query. As such, we should not try to check for this special case here.