Mikael Kanstrup [Thu, 7 Jul 2016 12:04:36 +0000 (14:04 +0200)]
hostapd_cli: Completion for disassociate and deauthenticate
Command completion routine for disassociate and deauthenticate
commands implemented. Tracks AP-STA-CONNECTED/AP-STA-DISCONNECTED
events for easy station MAC address lookup.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:35 +0000 (14:04 +0200)]
hostapd_cli: Implement event handler
Add an empty event handler in preparation for additional command
completion routines that will need to dynamically build parameters
based on events received.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:34 +0000 (14:04 +0200)]
Move parts of wpa_cli to a new common file
In preparation for adding further command completion support
to hostapd_cli move some cli related utility functions out of
wpa_cli into a new common cli file.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:33 +0000 (14:04 +0200)]
hostapd_cli: Add completion for help command
Implement command completion support for help command.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:32 +0000 (14:04 +0200)]
hostapd_cli: Replace static usage string with print_help() function
Replace the static commands usage string with a print_help() function
that reads commands and help text from the array of defined cli
commands.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:31 +0000 (14:04 +0200)]
hostapd_cli: Add command completion support
Add command completion support for hostapd_cli. Only completion
for available commands and basic building blocks in preparation for
per command parameter completion.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:04:30 +0000 (14:04 +0200)]
wpa_cli: Implement completion routine for get_capability
Add command completion routine for get_capability command.
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Sunil Dutt [Thu, 4 Aug 2016 16:52:21 +0000 (22:22 +0530)]
Define an attribute QCA_WLAN_VENDOR_ATTR_CONFIG_IFINDEX
This can be used to set the configuration parameters per netdev (instead
of wiphy).
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Sunil Dutt [Thu, 4 Aug 2016 10:01:31 +0000 (15:31 +0530)]
Define vendor command to support IE based access control
This commit defines QCA vendor subcommand and attributes for IE based
access control, i.e., the specific configured IE (full IE) is matched
with the frames originated by the Wi-Fi STA / AP to accept or deny the
connection. A specific IE can either be a whitelist or blacklist.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Vikram Kandukuri [Mon, 1 Aug 2016 17:17:35 +0000 (22:47 +0530)]
QCA vendor command to configure GPIO pins
This commit introduces a new vendor sub command
QCA_NL80211_VENDOR_SUBCMD_GPIO_CONFIG_COMMAND and associated
attributes to configure GPIO pins.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Vikram Kandukuri [Mon, 1 Aug 2016 17:00:39 +0000 (22:30 +0530)]
Assign QCA vendor attributes for generic commands
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Tue, 2 Aug 2016 20:47:38 +0000 (23:47 +0300)]
P2P: Fix D-Bus persistent parameter in group started event
wpas_p2p_persistent_group() returns non-zero for persistent groups. This
value happens to be 2 instead of 1 due to the
P2P_GROUP_CAPAB_PERSISTENT_GROUP value. This ended up with D-Bus code
trying to encode 2 as a DBUS_TYPE_BOOLEAN value which results in an
assert from the library. Fix this by modifying
wpas_p2p_persistent_group() to return 0 or 1 instead of 0 or an
arbitrary non-zero.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
vamsi krishna [Tue, 19 Jul 2016 07:11:15 +0000 (12:41 +0530)]
Set default scan IEs to the driver (QCA vendor extension)
This makes wpa_supplicant set default scan IEs to the driver (if the
vendor command is supported). The driver can use these IEs in the scan
requests initiated by the driver itself. Also the driver can merge these
IEs into further scan requests that it receives, in case if the scan
request doesn't carry any of the IEs sent in this command.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Tue, 2 Aug 2016 18:11:25 +0000 (21:11 +0300)]
Fix a typo in QCA vendor attribution documentation
The previously used subcommand names in the comment did not match the
ones defined above.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
vamsi krishna [Tue, 2 Aug 2016 16:45:56 +0000 (22:15 +0530)]
Define QCA vendor config attribute to set default scan IEs to the driver
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Tue, 2 Aug 2016 14:43:38 +0000 (17:43 +0300)]
tests: HT/VHT values in STATUS
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Tue, 2 Aug 2016 14:42:47 +0000 (17:42 +0300)]
tests: WEP with HT/VHT
Verify that HT/VHT gets disabled in WEP configuration.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Tue, 2 Aug 2016 14:41:01 +0000 (17:41 +0300)]
Show disabled HT/VHT properly in AP mode STATUS command
Previously, HT/VHT state was shown in STATUS based on the configuration
parameter instead of the runtime operational parameters. This could
result in claiming HT/VHT to be enabled even when it was forced to be
disabled due to an incompatible configuration. Clear HT/VHT information
in the STATUS output if HT/VHT has been disabled.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Wu Gao [Tue, 2 Aug 2016 14:31:48 +0000 (17:31 +0300)]
AP: Disable VHT in WEP configuration
This was already done for HT, but VHT has the same constraint on not
allowing WEP.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Rahul Bedarkar [Mon, 25 Jul 2016 18:23:01 +0000 (23:53 +0530)]
doc: Correct spelling mistake
s/availibility/availability
Signed-off-by: Rahul Bedarkar <rahulbedarkar89@gmail.com>
Chaitanya T K [Thu, 14 Jul 2016 16:50:40 +0000 (22:20 +0530)]
nl80211: Fix segfault when params->freq is NULL for AP mode start
If params->freq is NULL here, it leads to a segfault. Do not initialize
bss->bandwidth if params->freq is NULL.
Signed-off-by: Chaitanya T K <Chaitanya.Mgit@gmail.com>
Masashi Honma [Thu, 21 Jul 2016 23:52:55 +0000 (08:52 +0900)]
mesh: Remove HT IEs if HT is disabled
Previously, HT capability IE and HT information IE were included in
Beacon and Mesh Peering Open/Confirm frames even if HT is disabled with
disable_ht=1. This patch removes these.
Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Masashi Honma [Fri, 8 Jul 2016 05:42:48 +0000 (14:42 +0900)]
mesh: Make DTIM period configurable
Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Masashi Honma [Fri, 8 Jul 2016 02:39:13 +0000 (11:39 +0900)]
mesh: Stop joining to different frequency network
Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Masashi Honma [Fri, 8 Jul 2016 02:39:12 +0000 (11:39 +0900)]
mesh: Join an existing MBSS instead of creating a new one
If scan results show a matching existing MBSS, join it instead of
creating a new MBSS.
Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Mikael Kanstrup [Thu, 7 Jul 2016 12:09:07 +0000 (14:09 +0200)]
gitignore static library files
Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sonymobile.com>
Nishant Chaprana [Tue, 5 Jul 2016 09:41:45 +0000 (15:11 +0530)]
P2Ps: Clear existing value when peer stops sending adv_service_instance
If a peer stops sending adv_service_instance, we should clear the
existing dev->info.p2ps_instance.
This commit fixes the following scenario:
When peer device stops sending adv_service_instance, wpa_supplicant did
not remove old dev->info.p2ps_instance from device's property. This
variable should be updated as per peer behavior and should be cleared
when peer stops sending this information.
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
Jouni Malinen [Sat, 23 Jul 2016 17:51:55 +0000 (20:51 +0300)]
tests: DRIVER_FLAGS command
Signed-off-by: Jouni Malinen <j@w1.fi>
Erik Ljungberg [Mon, 4 Jul 2016 09:25:39 +0000 (11:25 +0200)]
Make driver flags available through control interface
This shows the current set of driver flags in wpa_cli and hostapd_cli.
Signed-off-by: Erik Ljungberg <erik.ljungberg@sonymobile.com>
MAYANK HAARIT [Mon, 4 Jul 2016 05:12:39 +0000 (05:12 +0000)]
P2P: Cleanup by removing unnecessary os_free() call from p2p_deinit()
Remove the unnecessary os_free() call from p2p_deinit() since
p2p_flush() called just above this takes care of freeing
p2p->after_scan_tx and the second call here ends up being no-op
os_free(NULL) in practice.
Signed-off-by: Mayank Haarit <mayank.h@samsung.com>
Masashi Honma [Fri, 1 Jul 2016 01:22:39 +0000 (10:22 +0900)]
mesh: Report mesh peer AID to kernel
Previously, mesh power management functionality works only with kernel
MPM. Because user space MPM did not report mesh peer AID to kernel,
the kernel could not identify the bit in TIM element. So this patch
reports mesh peer AID to kernel.
Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
Jouni Malinen [Sat, 23 Jul 2016 17:25:28 +0000 (20:25 +0300)]
Sync with mac80211-next.git include/uapi/linux/nl80211.h
This brings in nl80211 definitions as of 2016-07-01.
Signed-off-by: Jouni Malinen <j@w1.fi>
Sunil Dutt [Fri, 22 Jul 2016 15:22:29 +0000 (20:52 +0530)]
Assign QCA vendor attribute for setting TX fail count threshold
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
zhangq [Thu, 30 Jun 2016 02:59:21 +0000 (10:59 +0800)]
Assign QCA vendor attributes for set retry configuration
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Chandrasekaran, Manishekar [Mon, 18 Jul 2016 12:29:43 +0000 (17:59 +0530)]
QCA vendor command to configure conditional switch channel for AP
This commit introduces a new vendor sub command
QCA_NL80211_VENDOR_SUBCMD_SAP_CONDITIONAL_CHAN_SWITCH and associated
attributes which aim to configure selected frequencies on which the AP
can conditionally switch onto for preferred operation.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 18 Jul 2016 20:41:19 +0000 (23:41 +0300)]
MBO: Remove unused assignment
The local found variable is not used in this case. Commit
653d227e9f40cad1114c1c96654061446fd8b131 ('MBO: Improve supported
operating class generation') introduced this variable and unnecessarily
set it here. Remove the write-only assignment to silence static
analyzers.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Sun, 17 Jul 2016 21:58:27 +0000 (00:58 +0300)]
tests: WPA2-PSK AP with station using SA Query local failures
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 21:57:34 +0000 (00:57 +0300)]
SME: Fix SA Query local failure handling
If no new sme_sa_query_timer() callback is scheculed,
sme_stop_sa_query() needs to be called to allow new SA Query operations
to be started after the failure.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 21:56:53 +0000 (00:56 +0300)]
Clear wpa_s->sme.last_unprot_disconnect.sec on FLUSH command
This is needed for hwsim test cases to allow multiple STA-initiated SA
Query operations in short amount of time.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 21:14:34 +0000 (00:14 +0300)]
tests: Overlapping BSS scan request (HT40+)
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 21:14:14 +0000 (00:14 +0300)]
tests: FT OOM in SME
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 20:49:44 +0000 (23:49 +0300)]
tests: AP with open mode and driver operations failing
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 14:53:25 +0000 (17:53 +0300)]
tests: SAE and invalid anti-clogging token request
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 08:29:42 +0000 (11:29 +0300)]
tests: IEEE 802.1X connection using dynamic WEP104 when WPA enabled
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 08:22:04 +0000 (11:22 +0300)]
tests: IEEE 802.1X connection with LEAP included in configuration
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 17 Jul 2016 08:15:59 +0000 (11:15 +0300)]
tests: More SAE OOM coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 10:26:11 +0000 (13:26 +0300)]
tests: Hotspot 2.0 OSU provider and OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 10:21:41 +0000 (13:21 +0300)]
tests: Hotspot 2.0 OSU provider and invalid directory
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 10:21:12 +0000 (13:21 +0300)]
HS 2.0: Add an event message to note failed OSU provider write
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 10:11:36 +0000 (13:11 +0300)]
tests: More GET_HS20_ICON coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 10:01:18 +0000 (13:01 +0300)]
tests: Unexpected Hotspot 2.0 AP configuration
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 09:40:16 +0000 (12:40 +0300)]
tests: Fix ap_wpa2_eap_too_many_roundtrips with OpenSSL 1.1.0
Use a smaller fragment_size to force the roundtrip limit to be reached
with OpenSSL 1.1.0 which seemed to result in a bit shorter TLS messages
being used and being able to complete the authentication successfully
with the previously used fragment_size value.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 15 Jul 2016 08:36:31 +0000 (11:36 +0300)]
OpenSSL: Fix OpenSSL 1.1.0 DH operation
Commit
49fe2ada20d5fd53c0388442d23e7f03086f4d57 ('OpenSSL: Support
OpenSSL 1.1.0 DH opacity') started using the new accessor functions, but
used incorrect success check for the DH_set0_key() call. This resulted
in dh5_init_fixed() failures and double-free on error path if the build
was linked against OpenSSL 1.1.0. Fix this by checking DH_set0_key()
return value to be 1 for the success case.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Tue, 12 Jul 2016 20:44:52 +0000 (23:44 +0300)]
tests: Hotspot 2.0 OSU provider and protocol testing
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Tue, 12 Jul 2016 20:13:09 +0000 (23:13 +0300)]
HS 2.0: Add optional no-scan parameter to FETCH_OSU
This is mainly for testing purposes to allow multiple FETCH_OSU ANQP
operations to be ran without having to wait for full scan between each
query.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Tue, 12 Jul 2016 17:58:20 +0000 (20:58 +0300)]
tests: Hotspot 2.0 OSU provider and no icon found
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Tue, 12 Jul 2016 17:49:02 +0000 (20:49 +0300)]
tests: Hotspot 2.0 connection and deauthentication request without PMF
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 11 Jul 2016 21:14:42 +0000 (00:14 +0300)]
tests: GAS/ANQP and Hotspot 2.0 element protocol testing
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 11 Jul 2016 21:05:35 +0000 (00:05 +0300)]
tests: GAS/ANQP and icon binary protocol testing
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 11 Jul 2016 18:50:41 +0000 (21:50 +0300)]
Interworking: Define control interface message prefixes in wpa_ctrl.h
These control interface event message are used by external programs, so
define them a bit more formally in the header file.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 11 Jul 2016 18:10:59 +0000 (21:10 +0300)]
tests: Extend GAS error case coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 11 Jul 2016 18:03:09 +0000 (21:03 +0300)]
HS 2.0: Make hs20_build_anqp_req() static
This function is not used outside hs20_supplicant.c.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 16:40:59 +0000 (19:40 +0300)]
tests: Hotspot 2.0 icon fetch OOM with REQ_HS20_ICON
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 16:34:22 +0000 (19:34 +0300)]
HS 2.0: Fix hs20_get_icon() error path
If base64_encode() fails (e.g., due to memory allocation failure), the
return value needs to be checked against NULL before using the (not
really) returned length value. The error path here ended up reading
uninitialized variable.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:54:26 +0000 (18:54 +0300)]
tests: Hotspot 2.0 and connect attempt without matching cred
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:50:59 +0000 (18:50 +0300)]
tests: ANQP no sharing
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:43:30 +0000 (18:43 +0300)]
tests: Hotspot 2.0 and select with multiple matching home credentials
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:12:41 +0000 (18:12 +0300)]
tests: Hotspot 2.0 connection with TTLS/default
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:08:49 +0000 (18:08 +0300)]
tests: Hotspot 2.0 and connect attempt without RSN
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:03:28 +0000 (18:03 +0300)]
tests: Hotspot 2.0 and connect attempt without credential
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 15:00:23 +0000 (18:00 +0300)]
tests: Hotspot 2.0 connection and invalid roaming consortium element
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 10:59:14 +0000 (13:59 +0300)]
tests: Hotspot 2.0 connection and 3GPP credential constraints
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 09:15:15 +0000 (12:15 +0300)]
tests: Hotspot 2.0 and failures during profile configuration
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 10:21:42 +0000 (13:21 +0300)]
tests: Hotspot 2.0 connection and no full match
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 21:46:26 +0000 (00:46 +0300)]
Interworking: Remove unused allow_excluded from interworking_connect()
This argument was set to a hardcoded value 1 and as such, the other
cases were not reachable.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 21:46:07 +0000 (00:46 +0300)]
tests: Hotspot 2.0 connection and roaming consortium constraints
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 20:57:36 +0000 (23:57 +0300)]
tests: Hotspot 2.0 network selection with req_conn_capab (not present)
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 14:48:30 +0000 (17:48 +0300)]
tests: D-Bus GetAll wpa_config_get_all() OOM
This is a regression test for a crash on wpa_config_get_all() error
path.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 4 Jul 2016 14:34:19 +0000 (17:34 +0300)]
Fix wpa_config_get_all() error path
The previous version did not really work at all and it ended up crashing
if the os_strdup(field->name) call failed.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 19:08:31 +0000 (22:08 +0300)]
tests: Hotspot 2.0 OSU provider and no AP with info
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 19:02:21 +0000 (22:02 +0300)]
tests: GAS/ANQP query OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 19:00:24 +0000 (22:00 +0300)]
tests: ANQP_GET to unknown BSS
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 18:25:45 +0000 (21:25 +0300)]
tests: GAS_REQUEST OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 18:20:08 +0000 (21:20 +0300)]
tests: Hotspot 2.0 network selection and invalid GAS response
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 18:00:08 +0000 (21:00 +0300)]
tests: Hotspot 2.0 and maximum BSS load (roaming)
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 17:55:02 +0000 (20:55 +0300)]
tests: Hotspot 2.0 network selection with min bandwidth - special cases
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 17:45:37 +0000 (20:45 +0300)]
tests: Hotspot 2.0 required roaming consortium and no match
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 17:30:19 +0000 (20:30 +0300)]
tests: Hotspot 2.0 connection and invalid roaming consortium ANQP-element
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 17:05:51 +0000 (20:05 +0300)]
tests: Hotspot 2.0 with simulated SIM and EAP-SIM - OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 16:57:31 +0000 (19:57 +0300)]
Interworking: Combine identical error returns into a single one
There is no need to maintain separate "return -1;" for each of the
wpa_config_set() calls that cannot really fail in practice.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 16:55:34 +0000 (19:55 +0300)]
tests: Fix interworking_select() bssid argument in some test cases
The bssid argument was missing from couple of test cases. While this is
clearly incorrect, it looks like the error did not really cause any
significant issues to the test case. Anyway, better provide the correct
set of arguments to the call.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 16:53:03 +0000 (19:53 +0300)]
tests: Hotspot 2.0 with simulated SIM and EAP-SIM - invalid IMSI
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 16:37:50 +0000 (19:37 +0300)]
tests: Remove extra semicolons from python scripts
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 16:23:18 +0000 (19:23 +0300)]
tests: Hotspot 2.0 network selection and OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 15:15:29 +0000 (18:15 +0300)]
tests: Hotspot 2.0 network selection and no roaming consortium
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 15:12:44 +0000 (18:12 +0300)]
tests: Hotspot 2.0 network selection and cred_with_nai_realm cred->realm
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 15:04:48 +0000 (18:04 +0300)]
tests: Hotspot 2.0 multi-cred and same sp_priority
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 3 Jul 2016 14:44:45 +0000 (17:44 +0300)]
tests: wpa_supplicant P2P_LO_START and P2P_LO_STOP commands
Signed-off-by: Jouni Malinen <j@w1.fi>
Peng Xu [Fri, 24 Jun 2016 18:36:18 +0000 (11:36 -0700)]
P2P: Allow P2P listen being offloaded to the driver/firmware
This allows P2P Listen to be offloaded to device to enhance power
saving.
To start P2P listen offload, from wpa_cli interface, issue the command:
p2p_lo_start <freq> <period> <interval> <count>
To stop P2P listen offload, issue the command:
p2p_lo_stop
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Peng Xu [Fri, 24 Jun 2016 00:32:09 +0000 (17:32 -0700)]
nl80211: P2P Listen offload vendor command definitions
Define QCA vendor commands, events, and attributes for P2P
Listen offload.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>