aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Do not print out debug messages about duplicate EAP Id if the EAPhostap_0_4_3Jouni Malinen2005-06-271-1/+1
| | | | | | packet is something else than Request. EAP-Success and EAP-Failure are supposed to have the same Id, so printing out debugging about duplicates for these is confusing at best.
* Preparations for v0.4.3 release.Jouni Malinen2005-06-276-12/+12
|
* Fixed PMKSA caching for the case where STA (re)associates withoutJouni Malinen2005-06-279-33/+24
| | | | | | | | | | | | | | | | | | | | | first disassociating. Based on comments and patch from Divy Le Ray <dleray@atheros.com>: It seems the last changes regarding PMKSA caching fixed pre-authentication, but broke PMKSA caching on re-authentication. I collected the attached traces against hostapd-0.4.2. On re-authentication, the WPA state machine will not move to INITPMK, as keyRun is FALSE. The WPA exchange won't start and a full 802.1x session will run. I applied the fix in attachement to the madwifi driver: on a re-auth event, let the 802.1x state machine decide if it can bypass a full authentication, and set its flags accordingly. Then kick the WPA state machine. It gives good results for both PMK caching usage on re-auth and pre-auth. jkm: cleaned up the changes in the patch and applied the same fix for other driver interfaces
* Complete rsn_preauth_finished() by running ap_free_sta() fromJouni Malinen2005-06-271-1/+16
| | | | | | | registered callback (rsn_preauth_finished_cb) in order to avoid removing STA entry while EAPOL state machine is still processing the STA. This fixes a segfault due to using freed memory after completion of pre-authentication.
* Start RADIUS accounting only after successful completion of WPAJouni Malinen2005-06-263-3/+9
| | | | 4-Way Handshake if WPA-PSK is used.
* Fixed new WPA/RSN IE processing in wpa_supplicant_set_suites() to notJouni Malinen2005-06-261-2/+2
| | | | segfault if bss == NULL.
* Fixed PMKSA caching to copy User-Name and Class attributes so thatJouni Malinen2005-06-266-21/+126
| | | | | | | RADIUS accounting gets correct information. This is also needed for RSN pre-authentication. Bug 51
* Ignore automatically generated files.Jouni Malinen2005-06-261-0/+4
|
* Added wpa_supplicant_s.h.Jouni Malinen2005-06-261-0/+5
|
* Removed developer.txt since it is not updated anymore and developers'Jouni Malinen2005-06-262-463/+2
| | | | | documentation at http://hostap.epitest.fi/wpa_supplicant/devel/ has replaced it as the current documentation.
* Moved prototypes for core wpa_supplicant functions called from wpa.cJouni Malinen2005-06-266-49/+149
| | | | | | | | | | | and preauth.c into a new header file, wpa_supplicant_s.h, so that wpa_supplicant_i.h is not included into wpa.c/preauth.c anymore. wpa_supplicant_s.h should be removed once the direct calls from wpa.c/preauth.c to core functions is cleaned up, e.g., by using registered callback function pointers. If some of the direct calls remain, the prototypes for these functions should be moved to wpa_supplicant.h.
* Moved ap_{wpa,rsn}_ie from struct wpa_supplicant into struct wpa_sm andJouni Malinen2005-06-266-109/+121
| | | | the related processing from wpa_supplicant.c and events.c to wpa.c.
* Moved assoc_wpa_ie from struct wpa_supplicant into struct wpa_sm andJouni Malinen2005-06-266-54/+117
| | | | the related processing from wpa_supplicant.c to wpa.c.
* Added support for testing AssocInfo event with driver_test by addingJouni Malinen2005-06-262-4/+31
| | | | use_associnfo=1 to the driver_param configuration variable.
* Do not replace existing PMKSA entry for the same authenticator if PMKJouni Malinen2005-06-261-0/+8
| | | | and PMKID remain the same.
* wpa_s->assoc_wpa_ie is set by default to wpa_supplicant-generated IEJouni Malinen2005-06-261-18/+9
| | | | | when starting association, so need to have special case for wpa_s->assoc_wpa_ie == NULL in message 2/4 generation.
* Changed wpa_supplicant_validate_ie() to use struct wpa_sm instead ofJouni Malinen2005-06-251-4/+4
| | | | struct wpa_supplicant.
* Changed wpa_gen_wpa_ie() to use struct wpa_sm instead ofJouni Malinen2005-06-253-10/+6
| | | | struct wpa_supplicant.
* More WPA state machine separation work:Jouni Malinen2005-06-256-114/+110
| | | | | | | | | - rename wpa_supplicant_key_request() to wpa_sm_key_request() and use struct wpa_sm pointer as parameter - replace wpa_eapol_send() with wpa_ether_send() and rename original wpa_eapol_send() to wpa_supplicant_eapol_send() which is a static function - move number of functions in wpa.c to use struct wpa_sm instead of struct wpa_supplicant
* Fixed function name in debug printf.Jouni Malinen2005-06-251-1/+1
|
* Removed the final part refering to struct wpa_supplicant directly.Jouni Malinen2005-06-251-3/+2
|
* Added a new EAPOL state machine context pointer (eapol_send_ctx) to beJouni Malinen2005-06-255-9/+11
| | | | | | used with eapol_send() callback. This allows preauth.c to use struct wpa_sm pointer as the eapol_send() context without breaking other calls that were using the generic EAPOL callback ctx.
* wpa_parse_wpa_ie() was not actually using wpa_s parameter anymore, soJouni Malinen2005-06-258-30/+28
| | | | | | | let's remove it to get the WPA state machine more independent of struct wpa_supplicant. In addition, this allows rsn_preauth_scan_results() to replace struct wpa_supplicant with struct wpa_sm.
* Replaced wpa_s->eapol with sm->eapol in wpa.c and preauth.c.Jouni Malinen2005-06-255-11/+30
|
* Command line option for disabling the internal EAPOL state machine wasJouni Malinen2005-06-251-27/+24
| | | | | already removed, so no need to maintain disable_eapol parameter in the implementation anymore.
* Continued WPA state machine separation:Jouni Malinen2005-06-2510-39/+69
| | | | | | | | | | | - moved wpa_s->dot11RSNA4WayHandshakeFailures into struct wpa_sm and increment this from wpa_sm_notify_disassoc() - renamed wpa_get_mib() to wpa_sm_get_mib() - replaced direct wpa_s->wpa_state reads in wpa.c and preauth.c with wpa_supplicant_get_state() call - fixed preauth_test and eapol_test builds - moved function prototypes for wpa.c function from wpa_supplicant_i.h to wpa.h
* Clear wpa_s->keys_cleared automatically on wpa_drv_set_key() callsJouni Malinen2005-06-243-4/+1
| | | | instead of having to clear it separately wherever keys are configured.
* WPA state machine separation changes:Jouni Malinen2005-06-249-145/+237
| | | | | | | - Moved wpa_s->proto into wpa_s->wpa->proto - Copy wpa_s->{pairwise_cipher,group_cipher,key_mgmt} into wpa_s->wpa - Moved WPA specific status functions from ctrl_iface.c and config.c into wpa.c
* Use WPA state machine variable bssid instead of wpa_s->bssid since theJouni Malinen2005-06-241-2/+2
| | | | current BSSID is now stored in the state machine variables.
* Use dot11RSNAConfigSATimeout as the pre-auth timeout instead ofJouni Malinen2005-06-241-1/+2
| | | | hardcoded 60.
* dot11RSNAConfigPMKReauthThreshold done.Jouni Malinen2005-06-241-2/+1
|
* Fixed reauth request generation based onJouni Malinen2005-06-242-3/+17
| | | | dot11RSNAConfigPMKReauthThreshold.
* Fixed a typo.Jouni Malinen2005-06-241-1/+1
|
* Request reauthentication if dot11RSNAConfigPMKReauthThreshold percentJouni Malinen2005-06-245-1/+47
| | | | of the PMK lifetime has passed.
* Send disassoc event on deauth/disassoc requests to allow testingJouni Malinen2005-06-241-0/+4
| | | | reauthentication.
* Remove PMK/PTK, disconnect, and try to reassociate if the currentJouni Malinen2005-06-241-3/+11
| | | | PMKSA cache entry expires.
* Use wpa_sm_set_pmk_from_pmksa() instead of copying PMK with the exactJouni Malinen2005-06-241-2/+1
| | | | same code elsewhere.
* Set PMKSA cache expiration timeout when adding the first entry to theJouni Malinen2005-06-241-0/+1
| | | | | cache. This allows non-preauth entries to be expired based on dot11RSNAConfigPMKLifetime.
* Do not segfault on missing driver_param parameter in the configurationJouni Malinen2005-06-241-0/+2
| | | | file.
* Shortened overlong lines.Jouni Malinen2005-06-241-4/+4
|
* Made dot11RSNAConfigPMKLifetime, dot11RSNAConfigPMKReauthThreshold,Jouni Malinen2005-06-2410-12/+136
| | | | | and dot11RSNAConfigSATimeout configurable through configuration file and ctrl_iface.
* Fixed compilation without EAP.Jouni Malinen2005-06-241-2/+4
|
* Mark in_data argument const for tls_connect_{encrypt,decrypt}().Jouni Malinen2005-06-225-7/+7
|
* Added function documentation.Jouni Malinen2005-06-221-0/+33
|
* Added function documentation.Jouni Malinen2005-06-211-0/+33
|
* Added notes about porting to different target boards and operatingJouni Malinen2005-06-192-8/+97
| | | | systems.
* Added Doxygen documentation for the event loop interface.Jouni Malinen2005-06-192-20/+105
|
* Include netinet/in.h in order to get struct in6_addr definition onJouni Malinen2005-06-192-0/+2
| | | | FreeBSD. This fixes builds with CONFIG_IPV6=y.
* Merge FreeBSD version of l2_packet implementation fromJouni Malinen2005-06-184-15/+300
| | | | | | | http://www.freebsd.org/cgi/cvsweb.cgi/src/usr.sbin/wpa/l2_packet.c into wpa_supplicant tree as l2_packet_freebsd.c. This has some modifications to make the diff between l2_packet_pcap.c and l2_packet_freebsd.c minimal.
* Moved different l2_packet implementations into separate files. ThisJouni Malinen2005-06-188-196/+253
| | | | | | replaces l2_packet.c with l2_packet_linux.c (Linux packet sockets) and l2_packet_pcap.c (libpcap/libdnet/WinPcap). Makefile is used to select which implementation is linked in.