libeap.git
14 years agoFix MCS set field to be based on driver info
Jouni Malinen [Thu, 5 Nov 2009 10:38:47 +0000 (12:38 +0200)]
Fix MCS set field to be based on driver info

Instead of using hardcoded Rx MCS bitmask (indexes 0..15 enabled),
use the real information from the driver capabilities.

14 years agoUse type-punning to avoid breaking strict aliasing rules
Jouni Malinen [Thu, 5 Nov 2009 10:11:49 +0000 (12:11 +0200)]
Use type-punning to avoid breaking strict aliasing rules

While the actual use here would be unlikely to be broken by any C
optimization, it is better to use explicit union construction to let
gcc know about the aliasing and avoid warnings from gcc 4.4.

14 years agoAllow driver and ctrl_interface parameters to be overridden
Jouni Malinen [Wed, 4 Nov 2009 18:16:15 +0000 (20:16 +0200)]
Allow driver and ctrl_interface parameters to be overridden

New wpa_supplicant command line options -o<driver> and -O<ctrl> can
now be used to override the parameters received in add interface
command from dbus or global ctrl_interface. This can be used, e.g.,
to enable control interface when using NetworkManager (add
-O/var/run/wpa_supplicant into the Exec parameter in
/usr/share/dbus-1/system-services/fi.epitest.hostap.WPASupplicant.service).
Similarly, this can be used to use another driver wrapper with
NetworkManager (e.g., -onl80211 to replace WEXT with nl80211).

14 years agoWork around some gcc 4.4 strict-aliasing warnings
Jouni Malinen [Wed, 4 Nov 2009 17:49:14 +0000 (19:49 +0200)]
Work around some gcc 4.4 strict-aliasing warnings

gcc 4.4 ends up generating strict-aliasing warnings about some very common
networking socket uses that do not really result in a real problem and
cannot be easily avoided with union-based type-punning due to struct
definitions including another struct in system header files. To avoid having
to fully disable strict-aliasing warnings, provide a mechanism to hide the
typecast from aliasing for now. A cleaner solution will hopefully be found
in the future to handle these cases.

14 years agoAdd Xcode project file for building wpa_supplicant
Jouni Malinen [Mon, 2 Nov 2009 17:37:46 +0000 (19:37 +0200)]
Add Xcode project file for building wpa_supplicant

14 years agoFix int_array_concat() to bail out on realloc failure
Jouni Malinen [Mon, 2 Nov 2009 17:14:17 +0000 (19:14 +0200)]
Fix int_array_concat() to bail out on realloc failure

The previous version could have ended up dereferencing a NULL pointer
if the reallocation call were to fail.

14 years agoWPS: SelectedRegistrar expiration for internal PIN registrar
Andriy Tkachuk [Sun, 1 Nov 2009 20:19:02 +0000 (22:19 +0200)]
WPS: SelectedRegistrar expiration for internal PIN registrar

Though we have such a timeout when handling SetSelectedRegistrar UPnP
message from an external registrar, it looks like we don't have one when
the internal registrar is activated for PIN connection. Thus we set the
SelectedRegistrar flag when AP is activated for PIN connection but we
never reset it - not by some timeout, nor when registration succeeds.
This lead to situations where AP everlastingly declare that it is
activated for WPS PIN connection when in reality it is not.

Use the same timeout (and also success with PIN) to clear the selected
registrar flag when using internal registrar, too.

14 years agoWPS: Abort ongoing PBC protocol run if session overlap is detected
Jouni Malinen [Sun, 1 Nov 2009 19:59:30 +0000 (21:59 +0200)]
WPS: Abort ongoing PBC protocol run if session overlap is detected

If PBC session overlap is detected during an ongoing PBC protocol run,
reject the run (if M8, i.e., credentials, have not yet been sent). This
provides a bit longer monitoring time at the Registrar for PBC mode to
catch some cases where two Enrollees in PBC mode try to enroll
credentials at about the same time.

14 years agoWPS: Add PBC overlap and timeout events from WPS module
Oleg Kravtsov [Sun, 1 Nov 2009 19:26:13 +0000 (21:26 +0200)]
WPS: Add PBC overlap and timeout events from WPS module

This provides information about PBC mode result from the WPS Registrar
module. This could be used, e.g., to provide a user notification on the
AP UI on PBC failures.

14 years agoWPS: Use Config Error 12 to indicate PBC overlap in M2D
Jouni Malinen [Sun, 1 Nov 2009 18:57:36 +0000 (20:57 +0200)]
WPS: Use Config Error 12 to indicate PBC overlap in M2D

If PBC session overlap is detected between button press on the registrar
and M1 is reception, report session overlap with the Config Error
attribute in M2D to the Enrollee.

14 years agoSME: Improve processing of association rejection
Jouni Malinen [Sat, 31 Oct 2009 21:21:43 +0000 (23:21 +0200)]
SME: Improve processing of association rejection

Force deauthentication from the AP to clear mac80211 state (it would get
stuck with future scans if the AP is left in authenticated, but not
associated, state).

Add blacklist entry for the AP to allow other APs with worse signal
strength to be tried (e.g., when APs are trying to do load balancing
with status code 17). Reduce wait for the next scan to speed up
connection in cases where there could be other APs that could accept
association, but which show worse signal strength.

14 years agoAllow CONFIG_DEBUG_SYSLOG=y to be used
Sam Leffler [Thu, 22 Oct 2009 18:17:05 +0000 (11:17 -0700)]
Allow CONFIG_DEBUG_SYSLOG=y to be used

Instead of having to add the syslog define manually into CFLAGS,
CONFIG_DEBUG_SYSLOG=y can now be used in .config.

14 years agoFix dbus build without EAP
Jouni Malinen [Thu, 22 Oct 2009 18:11:53 +0000 (11:11 -0700)]
Fix dbus build without EAP

14 years agoStub out the dbus function w/o CONFIG_WPS to fix build
Sam Leffler [Thu, 22 Oct 2009 18:08:10 +0000 (11:08 -0700)]
Stub out the dbus function w/o CONFIG_WPS to fix build

14 years agoMove shared MD5/SHA-1 internal definitions into header files
Jouni Malinen [Sat, 17 Oct 2009 09:55:12 +0000 (12:55 +0300)]
Move shared MD5/SHA-1 internal definitions into header files

14 years agoMove shared DES definitions into a header file
Jouni Malinen [Sat, 17 Oct 2009 09:53:27 +0000 (12:53 +0300)]
Move shared DES definitions into a header file

14 years agoMove PKCS# {1,5,8} functionality into separate files
Jouni Malinen [Sat, 17 Oct 2009 09:48:55 +0000 (12:48 +0300)]
Move PKCS# {1,5,8} functionality into separate files

This functionality fits better with src/tls (i.e., internal TLS
implementation), so move it there to make crypto_internal.c more
of a wrapper like other crypto_*.c files.

14 years agoTLS: Replace set_key helpers to return key instead of status code
Jouni Malinen [Sat, 17 Oct 2009 09:15:46 +0000 (12:15 +0300)]
TLS: Replace set_key helpers to return key instead of status code

The status code was not being used anyway, so it is simpler to
just return the key as is done in crypto functions.

14 years agoAdd support for PKCS #5 encrypted PKCS #8 keys with internal crypto
Jouni Malinen [Sat, 17 Oct 2009 09:06:36 +0000 (12:06 +0300)]
Add support for PKCS #5 encrypted PKCS #8 keys with internal crypto

Private keys can now be used in either unencrypted or encrypted
PKCS #8 encoding. Only the pbeWithMD5AndDES-CBC algorithm (PKCS #5)
is currently supported.

14 years agoAdd DES-CBC support into internal crypto implementation
Jouni Malinen [Sat, 17 Oct 2009 09:05:06 +0000 (12:05 +0300)]
Add DES-CBC support into internal crypto implementation

14 years agoInternal TLS: Add support for unencrypred PKCS#8 private keys in PEM
Jouni Malinen [Fri, 16 Oct 2009 19:00:45 +0000 (22:00 +0300)]
Internal TLS: Add support for unencrypred PKCS#8 private keys in PEM

Recognize the PEM header "BEGIN PRIVATE KEY" as base64-decode the data
to be able to use PEM encoded, unencrypted PKCS#8 private keys with the
internal TLS implementation. Previously, only DER encoding of the
PKCS#8 private key was supported.

14 years agoRemove wpa_priv on 'make clean'
Jouni Malinen [Fri, 16 Oct 2009 18:49:45 +0000 (21:49 +0300)]
Remove wpa_priv on 'make clean'

14 years agoAdd AP mode WPA status into ctrl_iface
Jouni Malinen [Fri, 16 Oct 2009 15:35:45 +0000 (18:35 +0300)]
Add AP mode WPA status into ctrl_iface

14 years agowpa_gui-qt4: Dynamically update associated STAs in peer dialog
Jouni Malinen [Fri, 16 Oct 2009 14:53:02 +0000 (17:53 +0300)]
wpa_gui-qt4: Dynamically update associated STAs in peer dialog

14 years agoAdd ctrl_iface events for AP mode STA connect/disconnect
Jouni Malinen [Fri, 16 Oct 2009 14:51:49 +0000 (17:51 +0300)]
Add ctrl_iface events for AP mode STA connect/disconnect

These are used to notify ctrl_iface monitors when a STA completes
connection (the port becomes authorized) and when a STA disconnects.

14 years agoopenssl: Allow build with OpenSSL 0.9.7
Jouni Malinen [Fri, 16 Oct 2009 12:57:17 +0000 (15:57 +0300)]
openssl: Allow build with OpenSSL 0.9.7

OpenSSL 0.9.7 does not include get_rfc3526_prime_1536() function, so
provide that functionality internally if needed. In addition, make
sha256_vector() building depend on whether SHA256 support is included
in the OpenSSL library. This with CONFIG_INTERNAL_SHA256=y in .config
allows OpenSSL without SHA256 support to be used.

14 years agoopenssl: Mark openssl_digest_vector() static
Jouni Malinen [Fri, 16 Oct 2009 12:54:52 +0000 (15:54 +0300)]
openssl: Mark openssl_digest_vector() static

14 years agoSkip networks without known SSID when selecting the BSS
Jouni Malinen [Thu, 15 Oct 2009 18:58:58 +0000 (21:58 +0300)]
Skip networks without known SSID when selecting the BSS

Previously, APs that were hiding SSID (zero-length SSID IE in
Beacon frames) could have been selected when wildcard SSID matching
was used. This would result in failed association attempt since
the client does not know the correct SSID. This can slow down WPS
which is often using wildcard SSID matching.

Ignore BSSes without known SSID in the scan results when selecting
which BSS to use.

14 years agowpa_supplicant and dbus code separation
Witold Sowa [Thu, 15 Oct 2009 18:15:10 +0000 (21:15 +0300)]
wpa_supplicant and dbus code separation

This patch completely separates supplicant's code from dbus.
It introduces three new notifications which copes with all
remaining dbus stuff.
wpas_notify_unregister_interface() was renamed to
wpas_notify_iface_removed().

14 years agoDo not schedule a new scan if no networks are enabled
Sam Leffler [Wed, 14 Oct 2009 19:05:58 +0000 (22:05 +0300)]
Do not schedule a new scan if no networks are enabled

This avoids an extra timeout to move to INACTIVE state.

14 years agoFix AES dependencies for CONFIG_AP=y (and IBSS) builds
Jouni Malinen [Tue, 13 Oct 2009 08:16:05 +0000 (11:16 +0300)]
Fix AES dependencies for CONFIG_AP=y (and IBSS) builds

14 years agoFix CONFIG_AP=y build without CONFIG_CTRL_IFACE
Jouni Malinen [Tue, 13 Oct 2009 08:15:39 +0000 (11:15 +0300)]
Fix CONFIG_AP=y build without CONFIG_CTRL_IFACE

14 years agoFix IEEE 802.11r/w compilation error
Masashi Honma [Tue, 13 Oct 2009 07:04:46 +0000 (10:04 +0300)]
Fix IEEE 802.11r/w compilation error

The hostapd/wpa_supplicant compilation failed with CONFIG_IEEE80211R=y
or CONFIG_IEEE80211W=y option if CONFIG_EAP_PSK and CONFIG_EAP_GPSK are
not used.

14 years agoDragonFly BSD: Fix driver_bsd.c build
Masashi Honma [Mon, 12 Oct 2009 06:56:57 +0000 (09:56 +0300)]
DragonFly BSD: Fix driver_bsd.c build

Both hostapd/wpa_supplicant compilation fails on DragonFly BSD.

This patch solves this issue.

I have tested only compilation. Not functionality.
Because I don't have any device which can work on DragonFly BSD.

14 years agonl80211: Work around mac80211 limitation on (re)auth when authenticated
Jouni Malinen [Mon, 12 Oct 2009 06:39:55 +0000 (09:39 +0300)]
nl80211: Work around mac80211 limitation on (re)auth when authenticated

mac80211 does not currently allow (re)authentication when we are already
authenticated. In order to work around this, force deauthentication if
nl80211 authentication command fails with EALREADY. Unfortunately, the
workaround code in driver_nl80211.c alone is not enough since the
following disconnection event would clear wpa_supplicant authentication
state. To handle this, add some code to restore authentication state
when using userspace SME.

This workaround will hopefully become unnecessary in some point should
mac80211 start accepting new authentication requests even when in
authenticated state.

14 years agoInclude aes_unwrap in build when needed (FT and EAP-FAST server)
Jouni Malinen [Mon, 12 Oct 2009 06:10:24 +0000 (09:10 +0300)]
Include aes_unwrap in build when needed (FT and EAP-FAST server)

14 years agoMFP: Clear IGTK
Masashi Honma [Mon, 12 Oct 2009 04:19:01 +0000 (07:19 +0300)]
MFP: Clear IGTK

The fourth and fifth keys are used as IGTK for management frame
protection. This patch clears these keys.

I have tested with linux kernel 2.6.31.2.

14 years agoReplace CONFIG_NO_AES_EXTRAS with auto-detection during build
Jouni Malinen [Sun, 11 Oct 2009 19:23:50 +0000 (22:23 +0300)]
Replace CONFIG_NO_AES_EXTRAS with auto-detection during build

There is no need to do this manually since it is possible to figure
out automatically which AES extra files need to be included in the
build.

14 years agoFix EAP-AKA server build without EAP-SIM
Jouni Malinen [Sun, 11 Oct 2009 19:23:05 +0000 (22:23 +0300)]
Fix EAP-AKA server build without EAP-SIM

14 years agoClean up crypto makefile segments
Jouni Malinen [Sun, 11 Oct 2009 19:04:29 +0000 (22:04 +0300)]
Clean up crypto makefile segments

Reorganize the TLS/crypto library segments into a single set of blocks
for each library instead of multiple locations handling library-specific
operations. Group crypto functionality together and get wpa_supplicant
and hostapd Makefile closer to eachother in order to make it easier to
eventually move this into a shared makefile.

14 years agoMove TLS_FUNCS and NEED_CRYPTO segment next to each other
Jouni Malinen [Sun, 11 Oct 2009 17:34:26 +0000 (20:34 +0300)]
Move TLS_FUNCS and NEED_CRYPTO segment next to each other

14 years agoFurther crypto makefile unification
Jouni Malinen [Sun, 11 Oct 2009 17:31:15 +0000 (20:31 +0300)]
Further crypto makefile unification

14 years agoFix crypto config for minimal builds
Jouni Malinen [Sun, 11 Oct 2009 17:19:12 +0000 (20:19 +0300)]
Fix crypto config for minimal builds

14 years agoCleaned up and unified some of the crypto Makefile code
Jouni Malinen [Sun, 11 Oct 2009 16:42:04 +0000 (19:42 +0300)]
Cleaned up and unified some of the crypto Makefile code

14 years agoAllow the internal DH implementation to be overridden
Jouni Malinen [Sun, 11 Oct 2009 16:17:22 +0000 (19:17 +0300)]
Allow the internal DH implementation to be overridden

Crypto library wrappers can now override the internal DH (group 5)
implementation. As a starting point, this is done with OpenSSL. The
new mechanism is currently available only for WPS (i.e., IKEv2 still
depends on the internal DH implementation).

14 years agoInclude only the used DH groups in the build
Jouni Malinen [Sun, 11 Oct 2009 12:24:40 +0000 (15:24 +0300)]
Include only the used DH groups in the build

This reduces the binary size by 3 kB or so when WPS is included in
the build, but IKEv2 is not.

14 years agonl80211: Add parsing of NL80211_BSS_SEEN_MS_AGO into scan results
Jouni Malinen [Thu, 1 Oct 2009 14:53:22 +0000 (17:53 +0300)]
nl80211: Add parsing of NL80211_BSS_SEEN_MS_AGO into scan results

14 years agonl80211: Recognize NL80211_CMD_TRIGGER_SCAN events
Jouni Malinen [Thu, 1 Oct 2009 10:58:17 +0000 (13:58 +0300)]
nl80211: Recognize NL80211_CMD_TRIGGER_SCAN events

Replace "nl80211: Ignored unknown event (cmd=33)" with
"nl80211: Scan trigger" to make debug output clearer. We do not
currently do anything with this event apart from showing it in
the debug log.

14 years agoFix VLAN ID validation check to use the new VLAN ID
Blaž Bačnik [Wed, 30 Sep 2009 17:44:04 +0000 (20:44 +0300)]
Fix VLAN ID validation check to use the new VLAN ID

When checking the validity of VLAN ID based on RADIUS-based ACL or
accept_mac_file, the assigned vlan_id, not the old sta->vlan_id
(likely zero) needs to be used.

14 years agoNSS: Implement TLS PRF using new TLS extractor interface
Jouni Malinen [Wed, 30 Sep 2009 17:12:32 +0000 (20:12 +0300)]
NSS: Implement TLS PRF using new TLS extractor interface

This allows NSS to be used to derive EAP-TLS/PEAP/TTLS keying material.
NSS requires a patch from
https://bugzilla.mozilla.org/show_bug.cgi?id=507359
to provide the new API. In addition, that patch needs to be modified to
add the 16-bit context length value in SSL_ExportKeyingMaterial() only if
contextlen != 0 in order to match with the EAP-TLS/PEAP/TTLS use cases.
This issue seems to be coming from the unfortunate incompatibility in
draft-ietf-tls-extractor-07.txt (draft-ietf-tls-extractor-00.txt would
have used compatible PRF construction).

At this point, it is unclear how this will be resolved eventually, but
anyway, this shows a mechanism that can be used to implement EAP key
derivation with NSS with a small patch to NSS.

14 years agonl80211: Fix a typo in set_sta_vlan()
Author: Johannes Berg [Wed, 30 Sep 2009 16:23:52 +0000 (19:23 +0300)]
nl80211: Fix a typo in set_sta_vlan()

The VLAN interface index needs to use NL80211_ATTR_STA_VLAN. It was
adding a duplicate NL80211_ATTR_IFINDEX.

14 years agoFix wpa_passphrase build with NSS
Jouni Malinen [Wed, 30 Sep 2009 16:14:43 +0000 (19:14 +0300)]
Fix wpa_passphrase build with NSS

14 years agowpa_gui-qt4: Add pending WPS PIN queries into peer dialog
Jouni Malinen [Tue, 29 Sep 2009 20:16:21 +0000 (23:16 +0300)]
wpa_gui-qt4: Add pending WPS PIN queries into peer dialog

Whenever running wpa_supplicant in AP mode with WPS enabled, the
notifications of missing WPS PIN are now shown on the peer dialog
to make it easier to provide the PIN.

14 years agoFix hostapd wpa_msg() calls ctx for wpa_supplicant AP mode
Jouni Malinen [Tue, 29 Sep 2009 18:25:14 +0000 (21:25 +0300)]
Fix hostapd wpa_msg() calls ctx for wpa_supplicant AP mode

Need to use wpa_s pointer, not hapd pointer, for these calls.

14 years agowpa_gui-qt4: Fix peer_role_address for AP entry
Jouni Malinen [Tue, 29 Sep 2009 17:51:45 +0000 (20:51 +0300)]
wpa_gui-qt4: Fix peer_role_address for AP entry

14 years agoAllow IBSS/AP mode networks to be created in ap_scan=1 mode
Jouni Malinen [Tue, 29 Sep 2009 14:11:36 +0000 (17:11 +0300)]
Allow IBSS/AP mode networks to be created in ap_scan=1 mode

If no BSSes/IBSSes matching the enabled networks are found in the scan
results, IBSS/AP mode network (if configured) can be created in
ap_scan=1 mode instead of requiring ap_scan=2 mode to be used whenever
using IBSS or AP mode.

14 years agoSplit wpa_supplicant_event_scan_results() into helper functions
Jouni Malinen [Tue, 29 Sep 2009 11:30:11 +0000 (14:30 +0300)]
Split wpa_supplicant_event_scan_results() into helper functions

14 years agoAdd preliminary version of NSS TLS/crypto wrapper for wpa_supplicant
Jouni Malinen [Mon, 28 Sep 2009 22:21:09 +0000 (01:21 +0300)]
Add preliminary version of NSS TLS/crypto wrapper for wpa_supplicant

This brings in the first step in adding support for using NSS
(Mozilla Network Security Services) as the crypto and TLS library
with wpa_supplicant. This version is able to run through EAP-PEAP
and EAP-TTLS authentication, but does not yet implement any
certificate/private key configuration. In addition, this does not
implement proper key fetching functions either, so the end result
is not really of much use in real world yet.

14 years agoDragonFly BSD: Fix wired IEEE 802.1X
Masashi Honma [Mon, 28 Sep 2009 13:10:02 +0000 (16:10 +0300)]
DragonFly BSD: Fix wired IEEE 802.1X

On DragonFly BSD, wired IEEE 802.1X fails with this message:
ioctl[SIOC{ADD/DEL}MULTI]: Invalid argument

This patch solves this issue.

I have tested with these:
OS : DragonFly BSD 2.4.0
EAP : EAP-TLS
Switch : Cisco Catalyst 2950

14 years agoRemove the STA entry on reassociation to clear STA PS state
Jouni Malinen [Sat, 26 Sep 2009 18:30:43 +0000 (21:30 +0300)]
Remove the STA entry on reassociation to clear STA PS state

hostapd needs to remove the old STA entry if it exists when processing
reassociation back to the same AP. This removes the potentially PS
buffered frames and allows association parameters to be updated with
mac80211.

14 years agoMac OS X: Fix wired IEEE 802.1X
Masashi Honma [Sat, 26 Sep 2009 16:29:03 +0000 (19:29 +0300)]
Mac OS X: Fix wired IEEE 802.1X

14 years agonl80211: Use defines for NL80211_KEY_CIPHER values
Jouni Malinen [Tue, 15 Sep 2009 08:23:48 +0000 (11:23 +0300)]
nl80211: Use defines for NL80211_KEY_CIPHER values

14 years agoRevert "nl80211: Share the same routine for NL80211_ATTR_KEY_CIPHER setup"
Jouni Malinen [Tue, 15 Sep 2009 08:21:25 +0000 (11:21 +0300)]
Revert "nl80211: Share the same routine for NL80211_ATTR_KEY_CIPHER setup"

This reverts commit 5aa9cb5cca24268ae3a8cc35c85215b4a9a513b6.

The nested key attribute is using different attribute values
(NL80211_KEY_* vs. NL80211_ATTR_KEY_*), so cannot share the same routine
for these purposes..

14 years agonl80211: Share the same routine for NL80211_ATTR_KEY_CIPHER setup
Jouni Malinen [Tue, 15 Sep 2009 07:54:41 +0000 (10:54 +0300)]
nl80211: Share the same routine for NL80211_ATTR_KEY_CIPHER setup

14 years agodriver_nl80211: Fix MLME key settings for static WEP
Johannes Berg [Tue, 15 Sep 2009 07:48:30 +0000 (10:48 +0300)]
driver_nl80211: Fix MLME key settings for static WEP

Current wpa_supplicant has a bug with WEP keys, it adds a zero-length
sequence counter field to netlink which the kernel doesn't accept.

Additionally, the kernel API slightly changed to accept keys only when
connected, so we need to send it the keys after that. For that to work
with shared key authentication, we also include the default WEP TX key
in the authentication command.

To upload the keys properly _after_ associating, add a new flag
WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC_DONE indicating that the driver
needs the keys at that point and not earlier.

14 years agoAdd preliminary background scan and roaming module design
Jouni Malinen [Mon, 14 Sep 2009 21:08:24 +0000 (00:08 +0300)]
Add preliminary background scan and roaming module design

This allows background scanning and roaming decisions to be contained in
a single place based on a defined set of notification events which will
hopefully make it easier to experiment with roaming improvements. In
addition, this allows multiple intra-ESS roaming policies to be used
(each network configuration block can configure its own bgscan module).

The beacon loss and signal strength notifications are implemented for
the bgscan API, but the actual events are not yet available from the
driver.

The included sample bgscan module ("simple") is an example of what can
be done with the new bgscan mechanism. It requests periodic background
scans when the device remains associated with an ESS and has couple of
notes on what a more advanced bgscan module could do to optimize
background scanning and roaming. The periodic scans will cause the scan
result handler to pick a better AP if one becomes available. This bgscan
module can be taken into use by adding bgscan="simple" (or
bgscan="simple:<bgscan interval in seconds>") into the network
configuration block.

14 years agoGetting back to DISCONNECTED afer SCANNING
Samuel Ortiz [Mon, 14 Sep 2009 14:25:03 +0000 (17:25 +0300)]
Getting back to DISCONNECTED afer SCANNING

After transitioning from DISCONNECTED to SCANNING, we never go back
to DISCONNECTED even though scanning is done or failed.
We're thus stuck in SCANNING while scanning is actually done.

14 years agoWPS: Fix CONFIG_WPS=y compilation of wpa_supplicant
Masashi Honma [Mon, 14 Sep 2009 13:50:53 +0000 (16:50 +0300)]
WPS: Fix CONFIG_WPS=y compilation of wpa_supplicant

The wpa_supplicant compilation failed with CONFIG_WPS=y option
if CONFIG_CLIENT_MLME and CONFIG_IEEE80211R are not used.

14 years agoShare same freeing and error checking code in get_scan_results
Witold Sowa [Sun, 13 Sep 2009 19:21:52 +0000 (22:21 +0300)]
Share same freeing and error checking code in get_scan_results

Convert wpa_supplicant_get_scan_results_old() to use the same return
style with the other get_scan_results options and clean up the code
by sharing the same scan result freeing and error checking code for
all the options.

14 years agoUse shared functions for network operations and param changes
Witold Sowa [Sun, 13 Sep 2009 18:16:43 +0000 (21:16 +0300)]
Use shared functions for network operations and param changes

Instead of implementing these separately in various control
interface handlers, use shared functions. These add some of the
previously missing notification calls, too, for the affected areas.

14 years agoAdd wpa_supplicant notification calls
Jouni Malinen [Sun, 13 Sep 2009 17:53:32 +0000 (20:53 +0300)]
Add wpa_supplicant notification calls

This introduces a new mechanism for collecting notification calls into
a single place (notify.c). As a result of this, most of the
wpa_supplicant code does not need to know about dbus (etc. mechanisms
that could use the notifications). Some empty placeholder functions are
also added in preparation of new dbus code that needs more event
notifications.

14 years agoRemove extra whitespace
Witold Sowa [Sun, 13 Sep 2009 17:27:54 +0000 (20:27 +0300)]
Remove extra whitespace

14 years agowpa_gui-qt4: Fix WPS AP detection for peer window
Jouni Malinen [Fri, 11 Sep 2009 16:06:38 +0000 (19:06 +0300)]
wpa_gui-qt4: Fix WPS AP detection for peer window

14 years agowpa_gui-qt4: Add scan results into the peer window
Jouni Malinen [Fri, 11 Sep 2009 15:37:16 +0000 (18:37 +0300)]
wpa_gui-qt4: Add scan results into the peer window

In addition, add a peer entry type for each peer entry. Currently,
this is only stored as an integer and visible in the context menu.
Eventually, different icons should be used based on this type.

14 years agowpa_gui-qt4: Handle UNKNOWN COMMAND reply during peer window update
Jouni Malinen [Fri, 11 Sep 2009 14:52:46 +0000 (17:52 +0300)]
wpa_gui-qt4: Handle UNKNOWN COMMAND reply during peer window update

Avoid an infinite loop if wpa_supplicant is not built with AP support.

14 years agoAdd parsed information from WPS IE(s) into scan results
Jouni Malinen [Fri, 11 Sep 2009 14:14:49 +0000 (17:14 +0300)]
Add parsed information from WPS IE(s) into scan results

This makes it easier for external programs to show WPS information
since they do not need to parse the WPS IE themselves anymore.

14 years agoWPS: Add parsing of AP Setup Locked attribute
Jouni Malinen [Fri, 11 Sep 2009 14:13:59 +0000 (17:13 +0300)]
WPS: Add parsing of AP Setup Locked attribute

14 years agoFix driver_test for hostapd
Jouni Malinen [Fri, 11 Sep 2009 13:45:34 +0000 (16:45 +0300)]
Fix driver_test for hostapd

Commit 0b55b934ee6243f2682524b0a733cc1468e20050 broke this by not
initializing drv->ap = 1 in hostapd case since the mode updating
code ended up unlinking the socket file. Setting drv->ap = 1
removes the mode change and as such, unlinking of the socket file.

14 years agoConvert WPS IE concat routine to a generic helper
Jouni Malinen [Fri, 11 Sep 2009 13:36:59 +0000 (16:36 +0300)]
Convert WPS IE concat routine to a generic helper

This may also be needed in wpa_supplicant and potentially for other
IE types, too.

14 years agodriver_test: Update BSS data when using wpa_supplicant AP mode
Jouni Malinen [Thu, 10 Sep 2009 21:22:35 +0000 (00:22 +0300)]
driver_test: Update BSS data when using wpa_supplicant AP mode

14 years agodriver_test: Implement set_mode for wpa_supplicant AP deinit
Jouni Malinen [Thu, 10 Sep 2009 21:17:35 +0000 (00:17 +0300)]
driver_test: Implement set_mode for wpa_supplicant AP deinit

14 years agodriver_test: Preliminary support for wpa_supplicant AP functionality
Jouni Malinen [Thu, 10 Sep 2009 14:41:29 +0000 (17:41 +0300)]
driver_test: Preliminary support for wpa_supplicant AP functionality

14 years agodriver_test: Share the same deinit() for hostapd and wpa_supplicant
Jouni Malinen [Thu, 10 Sep 2009 14:03:51 +0000 (17:03 +0300)]
driver_test: Share the same deinit() for hostapd and wpa_supplicant

14 years agodriver_test: Merge socket_dir into test_dir
Jouni Malinen [Thu, 10 Sep 2009 13:52:03 +0000 (16:52 +0300)]
driver_test: Merge socket_dir into test_dir

14 years agodriver_test: Some additional merging of send_mlme
Jouni Malinen [Thu, 10 Sep 2009 13:48:10 +0000 (16:48 +0300)]
driver_test: Some additional merging of send_mlme

14 years agodriver_test: Claim AP mode capability for wpa_supplicant
Jouni Malinen [Thu, 10 Sep 2009 13:30:35 +0000 (16:30 +0300)]
driver_test: Claim AP mode capability for wpa_supplicant

14 years agodriver_test: Build most of code in unconditionally
Jouni Malinen [Thu, 10 Sep 2009 13:28:47 +0000 (16:28 +0300)]
driver_test: Build most of code in unconditionally

It is simpler to just build in all the test driver code regardless
of whether this is for hostapd or wpa_supplicant (which will eventually
get AP mode support with driver_test, too).

14 years agodriver_test: Merge wpa_supplicant and hostapd data structures
Jouni Malinen [Thu, 10 Sep 2009 13:18:04 +0000 (16:18 +0300)]
driver_test: Merge wpa_supplicant and hostapd data structures

There is no real need to keep these in separate data structures with
different names.

14 years agowpa_gui-qt4: Add context menu for peers dialog
Jouni Malinen [Thu, 10 Sep 2009 11:43:08 +0000 (14:43 +0300)]
wpa_gui-qt4: Add context menu for peers dialog

Replace the clicked() event with more appropriate context menu
and add a WPS PIN entry as an example command.

14 years agoradius_server: clean up completed sessions sooner
Alex Badea [Wed, 9 Sep 2009 20:54:03 +0000 (23:54 +0300)]
radius_server: clean up completed sessions sooner

radius_server_encapsulate_eap() resets sess->eap->if->eap{Success,Fail}
to FALSE, such that the completion condition is never true.

The net effect is that completed sessions would linger for
RADIUS_SESSION_TIMEOUT seconds.

Signed-off-by: Alex Badea <vamposdecampos@gmail.com>
Previously, the default settings allowed 100 sessions in 60 seconds.
With this fix, the default limit is now 100 sessions per 10 seconds.
[Bug 329]

14 years agowpa_gui-qt4: Include cstdio to avoid some compiler issues
Jouni Malinen [Wed, 9 Sep 2009 08:11:42 +0000 (11:11 +0300)]
wpa_gui-qt4: Include cstdio to avoid some compiler issues

It looks like some build systems do not find snprintf() here unless
cstdio is included explicitly.

14 years agowpa_gui-qt4: Add a new window for showing peer information
Jouni Malinen [Tue, 8 Sep 2009 13:28:41 +0000 (16:28 +0300)]
wpa_gui-qt4: Add a new window for showing peer information

This provides some initial functionality for showing peer information,
i.e., showing information about other devices that has been discovered.
Currently, information is only available in the AP mode (list of
associated stations), but this is expected to increase in the future
(e.g., show the current AP in station mode, other stations in IBSS,
etc.). Furthermore, there will be actions available for doing things
like providing a WPS PIN for a station.

14 years agoAdd station table query to wpa_supplicant AP ctrl_iface
Jouni Malinen [Tue, 8 Sep 2009 09:58:02 +0000 (12:58 +0300)]
Add station table query to wpa_supplicant AP ctrl_iface

"wpa_cli all_sta" and "wpa_cli sta <addr>" can now be used to fetch
information about stations associated with the
wpa_supplicant-controlled AP.

14 years agoMove STA list ctrl_iface handlers to a separate file
Jouni Malinen [Tue, 8 Sep 2009 09:56:07 +0000 (12:56 +0300)]
Move STA list ctrl_iface handlers to a separate file

This makes it easier to share the hostapd station table query
functionality with wpa_supplicant AP mode operations.

14 years agoWPS: Store device info and make it available through AP ctrl_iface
Jouni Malinen [Mon, 7 Sep 2009 19:09:13 +0000 (22:09 +0300)]
WPS: Store device info and make it available through AP ctrl_iface

Store a copy of device attributes during WPS protocol run and make it
available for external programs via the control interface STA MIB
command for associated stations. This gives access to device name and
type which can be useful when showing user information about associated
stations.

14 years agoWPS: Add support for AP reconfiguration with wps_reg
Jouni Malinen [Sun, 6 Sep 2009 10:58:15 +0000 (13:58 +0300)]
WPS: Add support for AP reconfiguration with wps_reg

wpa_supplicant can now reconfigure the AP by acting as an External
Registrar with the wps_reg command. Previously, this was only used
to fetch the current AP settings, but now the wps_reg command has
optional arguments which can be used to provide the new AP
configuration. When the new parameters are set, the WPS protocol run
is allowed to continue through M8 to reconfigure the AP instead of
stopping at M7.

14 years agoFix WPA reconfiguration to update GTK
Jouni Malinen [Sun, 6 Sep 2009 10:55:01 +0000 (13:55 +0300)]
Fix WPA reconfiguration to update GTK

The group key state machine needs to be re-initialized with possible
updated GTK length when restarting WPA (e.g., when WPS was used to
reconfigure the AP).

14 years agoDelay processing of EAPOL frames when not associated
Jouni Malinen [Fri, 4 Sep 2009 15:04:41 +0000 (18:04 +0300)]
Delay processing of EAPOL frames when not associated

If an EAPOL frame is received while wpa_supplicant thinks the driver is
not associated, queue the frame for processing at the moment when the
association event is received. This is a workaround to a race condition
in receiving data frames and management events from the kernel.

The pending EAPOL frame will not be processed unless an association
event is received within 100 msec for the same BSSID.

14 years agonl80211: Ignore connect/roam/disconnect events when using SME
Jouni Malinen [Fri, 4 Sep 2009 13:39:41 +0000 (16:39 +0300)]
nl80211: Ignore connect/roam/disconnect events when using SME

Getting double association/disassociation events can get core code
confused, so better filter out the extra events.

14 years agonl80211: Connect API support
Zhu Yi [Thu, 3 Sep 2009 18:31:29 +0000 (21:31 +0300)]
nl80211: Connect API support

If the driver does not support separate authentication and association
steps, use the connect API instead.