aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* P2P: Include p2p_add_cli_chan parameter while cloning the configurationHEADpendingmasterSreeramya Soratkal4 days1-0/+1
| | | | | | | | | | | The dynamically created P2P group interface did not consider the channels that can be used by the P2P client during the P2P group formation. Copy the p2p_add_cli_chan parameter while cloning the configuration to the P2P group interface. This allows the dynamically created group interface case to form the group in the specific client-only channels when the device is a P2P client in the group. Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
* Vendor specific feature capability for Adaptive 11rSunil Dutt4 days1-0/+10
| | | | | | | Add feature capability indication for Adaptive 11r for the drivers to advertize support for this. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* Add additional vendor specific hang reason codesArun Kumar Khandavalli4 days1-0/+6
| | | | | | | Add additional hang reason codes in enum qca_wlan_vendor_hang_reason to address potential internal failure cases. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Update dpp_controller_rx_errors to use the assigned TCP portJouni Malinen6 days1-1/+1
| | | | Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Update the default port number for DPP-over-TCPJouni Malinen6 days1-1/+1
| | | | | | | IANA assigned the TCP port 8908 for DPP, so update the implementation to match the formal assignment. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* Fix couple more typosJouni Malinen7 days3-7/+5
| | | | | | Couple of similar cases that were not included in the previous commit. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* wpa_supplicant: Fix typosYegor Yefremov7 days23-50/+50
| | | | Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
* tests: SAE status code handlingJouni Malinen7 days1-0/+41
| | | | Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* SAE-PK: Do not accept SAE-PK status code when no PK is configuredJouni Malinen7 days1-3/+5
| | | | | | | | Make sae_status_success() more explicit by rejecting SAE-PK status code when the AP is not configured with PK. Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality") Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* SAE: Don't use potentially uninitialized keysAndrei Otcheretianski7 days1-9/+17
| | | | | | | | | | | If SAE_CONFIG_PK is not defined and sae->pk isn't zero (which is possible as it is controlled by the commit message status code), sae_derive_keys() may end up deriving PMK and KCK from an uninitialized array. Fix that. Fixes: 6b9e99e571ee ("SAE-PK: Extend SAE functionality for AP validation") Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality") Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* wpa_supplicant: Remove unfeasible conditions in config parsingAndrei Otcheretianski7 days1-3/+1
| | | | | | | | pos can't be NULL in wpa_global_config_parse_str(), so there is no point checking this, especially when pos was already dereferenced earlier. Remove the redundant conditions. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* wpa_cli: Don't access uninitialized variablesAndrei Otcheretianski7 days1-2/+5
| | | | | | | Don't print potentially uninitialized variables in wpa_ctrl_command_bss(). Some compilers and analyzers may warn about it. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
* OpenSSL: Make openssl_debug_dump_certificate() more robustPooventhiran G7 days1-0/+3
| | | | | | | | | | | SSL_CTX_get0_certificate() returns NULL if no certificate is installed. While this should not be the case here due to the loop in openssl_debug_dump_certificate_chains() proceeding only if the SSL_CTX_set_current_cert() returns success, it is safer to make openssl_debug_dump_certificate() explicitly check against NULL before trying to dump details about the certificate. Signed-off-by: Pooventhiran G <pooventh@codeaurora.org>
* build: lib.rules: Add common-cleanJohannes Berg10 days1-1/+1
| | | | | | | | During the build reshuffling, I missed this, so doing 'make clean' in a certain src/lib folder doesn't clean up everything anymore. Fix that. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* wpa_supplicant: Fix frequency config for VHT/HE casesMarkus Theil10 days1-9/+13
| | | | | | | Fix compilation without CONFIG_P2P and only set secondary channel seg idx if we use a mode supporting a sec channel for VHT/HE. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* Fix spelling of "unexpected" in messagesJouni Malinen10 days2-3/+3
| | | | Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* hostapd: Fix typosYegor Yefremov10 days8-11/+11
| | | | Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
* eap_peer: Add .gitignore with *.soJohannes Berg10 days1-0/+1
| | | | | | | If wpa_supplicant is built with dynamic EAP methods, the *.so files land here. Add them to .gitignore. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Stop old listen radio work before go to WAIT_PEER_IDLE stateHu Wang12 days1-0/+1
| | | | | | | | | | | | | | | | | | | | P2P goes to Listen state while waiting for the peer to become ready for GO Negotiation. If old listen radio work has not been completed, P2P fails to go to listen state. This could happen in cases where P2P Action frame transmission reused ongoing p2p-listen radio work. p2p0: Add radio work 'p2p-listen'@0x P2P-FIND-STOPPED p2p0: Starting radio work 'p2p-listen'@0x after 0.010644 second wait P2P: Use ongoing radio work for Action frame TX P2P: Use ongoing radio work for Action frame TX P2P: State CONNECT -> CONNECT P2P: State CONNECT -> WAIT_PEER_IDLE P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT P2P: Reject start_listen since p2p_listen_work already exists P2P: Failed to start listen mode Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* MSCS: Fix decapsulating subelements from MSCS descriptorVamsi Krishna12 days1-2/+5
| | | | | | | | Fix pointer sent for decapsulating subelements from MSCS descriptor IE while processing (re)association response frames. Fixes: af8ab3208d03 ("MSCS: Parse result of MSCS setup in (Re)Association Response frames") Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* Add QCA interface for driver to report various connect fail reason codesVamsi Krishna12 days1-0/+39
| | | | | | | | | | The connection process fails for several reasons and the status codes defined in IEEE Std 802.11 do not cover the locally generated reason codes. Add an attribute to QCA_NL80211_VENDOR_SUBCMD_GET_STA_INFO vendor sub command which can be used by the driver/firmware to report various additional reason codes for connection failures. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* build: Fix libeap_peer.a buildJouni Malinen12 days2-7/+10
| | | | | | | | | | | | | The install target at the beginning of src/eap_peer/Makefile was confusing make about the build rules for libeap_peer.a and overriding of the install target between src/eap_peer/Makefile and src/lib.rules was breaking installation of dynamic EAP peer *.so files. Fix this by lib.rules defining a default for the install target so that src/*/Makefile can override that and by moving the install target for eap_peer to the end of the Makefile. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DFS: Use helper functions for VHT/HE parametersMarkus Theil12 days1-2/+5
| | | | | | | This is needed to cover the HE-specific conf->he_oper_chwidth value in addition to conf->vht_oper_chwidth. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* hw_features: Better debug messages for some error casesMarkus Theil12 days1-7/+29
| | | | Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* wpa_supplicant: Enable VHT and HE in default config parametersMarkus Theil12 days2-1/+4
| | | | | | | Enable VHT and HE as default config parameters in order for wpa_supplicant AP mode to use it, if hw support is given. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* wpa_supplicant: Handle HT40 and mode downgrade in AP modeMarkus Theil12 days1-9/+43
| | | | | | | | | | | Add some missing pieces to the interface configuration of AP/mesh mode in wpa_supplicant. - check for secondary channel and HT40 capability - try to downgrade to IEEE 802.11b if 802.11g is not available Especially with the HT40 check, this code now performs all settings, which the deleted/duplicated mesh code did. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* mesh: Fix channel init order, disable pri/sec channel switchMarkus Theil12 days1-2/+25
| | | | | | | | | | | | | | | | wpa_supplicant_conf_ap_ht() has to happen before hostapd_setup_interface() in order for its configuration settings to have effect on interface configuration. Disable primary and secondary channel switch because of missing tie breaking rule/frames in mesh networks. A rather long comment about this issue is placed in mesh.c in the corresponding place. I was not able to reproduce the memory corruption during mesh_secure_ocv_mix_legacy, which lead to a revert of a similar patch in the past. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* tests: Remove wpas_mesh_open_5ghz_coexMarkus Theil12 days1-50/+0
| | | | | | | This is in preparation for an implementation change that ends up contradicting the operations enforced in this test case for mesh coex. Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* HE/VHT: Fix frequency setup with HE enabledMarkus Theil12 days3-45/+27
| | | | | | | | | | | | | | | | | | | Some places in the code base were not using the wrappers like hostapd_set_oper_centr_freq_seg0_idx and friends. This could lead to errors, for example when joining 80 MHz mesh networks. Fix this, by enforcing usage of these wrappers. wpa_supplicant_conf_ap_ht() now checks for HE capability before dealing with VHT in order for these wrappers to work, as they first check HE support in the config. While doing these changes, I've noticed that the extra channel setup code for mesh networks in wpa_supplicant/mesh.c should not be necessary anymore and dropped it. wpa_supplicant_conf_ap_ht() should handle this setup already. Acked-by: John Crispin <john@phrozen.org> Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
* DPP2: Add privacyProtectionKey into Configurator backup/restoreJouni Malinen13 days3-9/+84
| | | | | | | This allows the privacyProtectionKey to be transferred to a new Configurator similarly to the way c-sign-key is transferred. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Use ppKey to decrypt E'-id on ConfiguratorJouni Malinen13 days3-11/+14
| | | | | | | Use the new privacy protection key to decrypt E'-id from Reconfig Announcement frames. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Use the new privacy protection key to protect E-id on EnrolleeJouni Malinen13 days4-12/+30
| | | | | | | Use ppKey instead of C-sign-key to encrypted E-id to E'-id into Reconfig Announcement frame on the Enrollee side. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Copy received ppKey into wpa_supplicant network profileJouni Malinen13 days5-0/+37
| | | | | | | | Store the received privacy protection key from Connector into wpa_supplicant network profile and indicate it through the control interface similarly to C-sign-key. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Parse ppKey from ConnectorJouni Malinen13 days2-3/+37
| | | | | | This will be used to protect E-id in Reconfig Announcement frames. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Add ppKey into ConnectorJouni Malinen13 days1-0/+10
| | | | | | | This provides the new privacy protection key to the Enrollee so that this can be used to protect E-id in Reconfig Announcement frames. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP2: Generate a privacy protection key for ConfiguratorJouni Malinen13 days2-6/+25
| | | | | | | | | Generate a new key for Configurator. This is either generated automatically for the specified curve or provided from external source with the new ppkey=<val> argument similarly to the way c-sign-key was previously generated. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* DPP: Make dpp_keygen_configurator() a static functionJouni Malinen13 days2-4/+1
| | | | | | This was not used anywhere outside dpp.c. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Silence compiler warnings from test-base64Jouni Malinen14 days1-2/+2
| | | | | | | Use typecasting to match the base64_{encode,decode}() function prototype for signed/unsigned char buffer. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Build test-https and test-https_server as part of ALLJouni Malinen14 days1-1/+1
| | | | | | | Even though these are not part of run-tests, it is simpler to just build them like all other tests/test-* tools. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove unnecessary libraries from tests/test-*.c buildJouni Malinen14 days1-11/+0
| | | | | | | These libraries are not needed anymore with the remaining tests/test-*.c tools. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete ASN.1 parser/fuzzerJouni Malinen14 days2-199/+1
| | | | | | | tests/fuzzing/asn1 replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete TLS fuzzerJouni Malinen14 days2-247/+0
| | | | | | | tests/fuzzing/tls-{client,server} replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete EAPOL-Key fuzzerJouni Malinen14 days2-612/+0
| | | | | | | tests/fuzzing/eapol-key-{auth,supp} replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete json fuzzerJouni Malinen2020-10-122-68/+0
| | | | | | | tests/fuzzing/json replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete ap-mgmt-fuzzerJouni Malinen2020-10-126-277/+0
| | | | | | | tests/fuzzing/ap-mgmt replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete eapol-fuzzerJouni Malinen2020-10-125-279/+0
| | | | | | | tests/fuzzing/eapol-supp replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete wnm-fuzzerJouni Malinen2020-10-124-210/+0
| | | | | | | tests/fuzzing/wnm replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* tests: Remove obsolete p2p-fuzzerJouni Malinen2020-10-128-267/+0
| | | | | | | tests/fuzzing/p2p replaced this more than a year ago, so get rid of the now obsolete version. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
* build: Make more library things commonJohannes Berg2020-10-1216-122/+22
| | | | | | | | We don't really need to duplicate more of this, so just move the lib.rules include to the end and do more of the stuff that's common anyway there. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* build: Make a common library buildJohannes Berg2020-10-1216-60/+8
| | | | | | | | | | Derive the library name from the directory name, and let each library Makefile only declare the objects that are needed. This reduces duplicate code for the ar call. While at it, also pretty-print that call. Signed-off-by: Johannes Berg <johannes.berg@intel.com>