mech_eap.git
10 years agowpa_supplicant: Call frequency conflict handling during auth
Ilan Peer [Thu, 24 Apr 2014 05:45:40 +0000 (08:45 +0300)]
wpa_supplicant: Call frequency conflict handling during auth

Previously, the frequency conflict was handled only during the
association flow. However, some drivers, e.g., mac80211 based
drivers, will fail an authentication request in case that there
are no available channels for use (as they might be used by
other interfaces), and thus the frequency conflict resolution
is never called.

Fix this by calling frequency conflict resolution during
authentication (SME-in-wpa_supplicant) as well.

In addition, get the shared radio frequency from the wpa_s context in
both the SME-in-driver and SME-in-wpa_supplicant cases and not from the
driver.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
10 years agoscan: Reset normal scan counter when a connection succeeds
Luciano Coelho [Thu, 24 Apr 2014 05:45:36 +0000 (08:45 +0300)]
scan: Reset normal scan counter when a connection succeeds

The normal scan counter is used to trigger a few normal scans before a
scheduled scan is issued. The reason for doing this is that we get
results faster and some drivers support more SSIDs per normal scan
than during sched scan. After 2 normal scans, we start using
sched_scan. But the problem is that when a connection succeeds, we do
not reset this counter, so we will keep using sched scans.

To fix this, now we reset the counter when we switch to WPA_COMPLETED
state.

Signed-off-by: Luciano Coelho <luciano.coelho@intel.com>
10 years agoradiotap: Fix compilation for systems without le16toh/le32toh
Ilan Peer [Thu, 24 Apr 2014 05:45:34 +0000 (08:45 +0300)]
radiotap: Fix compilation for systems without le16toh/le32toh

These functions are not standard and do not exist in all systems, e.g.,
variants of Android. Instead use the macros defined in common.h.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
10 years agoAndroid: Disable unused parameter warnings
Greg Hackmann [Tue, 15 Apr 2014 00:06:02 +0000 (17:06 -0700)]
Android: Disable unused parameter warnings

This avoids large number of undesired compiler warnings since Android
build system is added -Wextra.

Signed-off-by: Greg Hackmann <ghackmann@google.com>
10 years agoInterworking: Don't filter probe requests when interworking is disabled
Maxime Bizon [Wed, 23 Apr 2014 21:23:37 +0000 (23:23 +0200)]
Interworking: Don't filter probe requests when interworking is disabled

With hidden SSID (ignore_broadcast_ssid), an IOS device trying to
connect to the AP will send a probe request with ANT == 2. If
interworking support is just compiled (not enabled), we will drop the
probe request since default ANT is 0.

Check that interworking is enabled before filtering based on ANT or
HESSID to match the behavior of code without CONFIG_INTERWORKING.

Signed-off-by: Maxime Bizon <mbizon@freebox.fr>
10 years agoAdd SIM identifier to the network profile and cred block
Naresh Jayaram [Fri, 28 Mar 2014 15:01:44 +0000 (17:01 +0200)]
Add SIM identifier to the network profile and cred block

This allows the specific SIM to be identified for authentication
purposes in multi-SIM devices. This SIM number represents the index of
the SIM slot. This SIM number shall be used for the authentication using
the respective SIM for the Wi-Fi connection to the corresponding
network.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoAP: Fix checking if DFS is required
Marek Puzyniak [Wed, 16 Apr 2014 10:22:14 +0000 (12:22 +0200)]
AP: Fix checking if DFS is required

Sometimes function hostapd_is_dfs_required() returns -1 which indicates
that it was not possible to check if DFS was required. This happens for
channels from the 2.4 GHz band where DFS checking should not happen.
This can be fixed by returning DFS-not-required for mode different from
IEEE80211A and when DFS support is not available (ieee80211h not set).

Signed-off-by: Marek Puzyniak <marek.puzyniak@tieto.com>
10 years agoAllow HT 40 MHz intolerant flag to be set for association
Jouni Malinen [Tue, 15 Apr 2014 14:22:47 +0000 (17:22 +0300)]
Allow HT 40 MHz intolerant flag to be set for association

This extends HT overrides to allow HT 40 MHz intolerant flag to be set
with ht40_intolerant=1.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agonl80211: Debug print HT/VHT capability override information
Jouni Malinen [Tue, 15 Apr 2014 14:22:05 +0000 (17:22 +0300)]
nl80211: Debug print HT/VHT capability override information

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: wpa_supplicant configuration file reading/writing
Jouni Malinen [Tue, 15 Apr 2014 21:27:27 +0000 (00:27 +0300)]
tests: wpa_supplicant configuration file reading/writing

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix writing of provisioning_sp cred parameter
Jouni Malinen [Tue, 15 Apr 2014 22:40:44 +0000 (01:40 +0300)]
Fix writing of provisioning_sp cred parameter

This was supposed to be within quotation marks in the configuration
file.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoReduce the amount of time PTK/TPTK/GTK is kept in memory
Jouni Malinen [Tue, 15 Apr 2014 22:27:10 +0000 (01:27 +0300)]
Reduce the amount of time PTK/TPTK/GTK is kept in memory

Some of the buffers used to keep a copy of PTK/TPTK/GTK in the
supplicant implementation maintained a copy of the keys longer than
necessary. Clear these buffers to zero when the key is not needed
anymore to minimize the amount of time key material is kept in memory.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: More converage for INTERFACE_ADD
Jouni Malinen [Tue, 15 Apr 2014 20:50:49 +0000 (23:50 +0300)]
tests: More converage for INTERFACE_ADD

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Wi-Fi Display through the global interface
Jouni Malinen [Tue, 15 Apr 2014 20:43:36 +0000 (23:43 +0300)]
tests: Wi-Fi Display through the global interface

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix P2P redirection of global ctrl_iface SET command
Jouni Malinen [Tue, 15 Apr 2014 10:22:48 +0000 (13:22 +0300)]
Fix P2P redirection of global ctrl_iface SET command

The previous version prevented all use of wpas_global_ctrl_iface_set().
That's not desirable since there may be more global parameters added in
the future. Instead, try to use the global version first and redirect to
P2P interface only if the global version returns an error.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoRemove SAVE_CONFIG redirect from global control interface
Jouni Malinen [Tue, 15 Apr 2014 10:15:09 +0000 (13:15 +0300)]
Remove SAVE_CONFIG redirect from global control interface

The P2P redirection for SAVE_CONFIG issued on the global control
interface was preventing wpas_global_ctrl_iface_save_config() from being
reached. The global version of SAVE_CONFIG was supposed to try to save
configuration files for all interface rather than just the P2P
management interface, so fix this by removing the unneeded and undesired
redirection.

Modify the global SAVE_CONFIG handler to return FAIL if no configuration
files were saved. This makes the behavior match with the per-interface
SAVE_CONFIG.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoeap_proxy: Use unique Makefile names for Android and non-Android
Jouni Malinen [Tue, 15 Apr 2014 10:02:25 +0000 (13:02 +0300)]
eap_proxy: Use unique Makefile names for Android and non-Android

Rename the eap_proxy_*.mk file to eap_proxy_*.mak for non-Android builds
so that the same eap_proxy implementation can be more easily included in
the same directory for both cases.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: P2P group formation using parameters from persistent group
Jouni Malinen [Mon, 14 Apr 2014 22:06:39 +0000 (01:06 +0300)]
tests: P2P group formation using parameters from persistent group

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Fix progressive p2p_find to actually use progressive part
Jouni Malinen [Mon, 14 Apr 2014 21:53:30 +0000 (00:53 +0300)]
tests: Fix progressive p2p_find to actually use progressive part

It turned out that the initial test case found the GO based on the
initial full scan instead of the progressive search part. Fix this by
started the GO only after the initial full scan.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P group interface ifdown
Jouni Malinen [Mon, 14 Apr 2014 21:23:55 +0000 (00:23 +0300)]
tests: P2P group interface ifdown

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoP2P: Fix interface remove to terminate all P2P groups
Jouni Malinen [Mon, 14 Apr 2014 21:20:17 +0000 (00:20 +0300)]
P2P: Fix interface remove to terminate all P2P groups

Previously, it was possible to remove the main interface and leave
behind dynamic P2P group interfaces. This would eventually result in
references freed memory, so it is not really suitable behavior. Instesd,
remove all the dynamic P2P group interfaces that were created through an
interface that is now removed.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: wpa_supplicant global control interface and SUSPEND/RESUME
Jouni Malinen [Mon, 14 Apr 2014 21:06:12 +0000 (00:06 +0300)]
tests: wpa_supplicant global control interface and SUSPEND/RESUME

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agol2_packet: Fix l2_packet_none (hostapd default)
Jouni Malinen [Mon, 14 Apr 2014 20:04:55 +0000 (23:04 +0300)]
l2_packet: Fix l2_packet_none (hostapd default)

The sample code here ended up trying to register an eloop socket with fd
== -1. This was not really ever supposed to be used, but it is now also
hitting an assert in eloop. Skip the unnecessary
eloop_register_read_sock() to avoid this.

This was causing issues for hostapd since CONFIG_L2_PACKET is not set by
default. If CONFIG_RSN_PREAUTH=y was not used for CONFIG_L2_PACKET was
not set in .config explicitly, the defaul use of l2_packet_none.c ended
up hitting the newly added assert() in eloop.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Work around invalid ap_wps_ie_fragmentation failures
Jouni Malinen [Sun, 13 Apr 2014 21:53:27 +0000 (00:53 +0300)]
tests: Work around invalid ap_wps_ie_fragmentation failures

This can fail if Probe Response frame is missed and Beacon frame was
used to fill in the BSS entry. This can happen, e.g., during heavy load
every now and then and is not really an error, so try to workaround by
runnign another scan.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Try to work around bogus errors in wpas_ctrl_country
Jouni Malinen [Sun, 13 Apr 2014 21:45:25 +0000 (00:45 +0300)]
tests: Try to work around bogus errors in wpas_ctrl_country

It seems like it is possible for a CTRL-EVENT-REGDOM-CHANGE event from a
previous test case to "leak" through to the execution of this test case.
That can result in the validation steps here failing, so wait a bit and clear the pending events before starting the test.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Work around mac80211_hwsim survey limitations
Jouni Malinen [Sun, 13 Apr 2014 21:38:37 +0000 (00:38 +0300)]
tests: Work around mac80211_hwsim survey limitations

ap_multi_bss_acs test case was failing if it was executed immediately
after a test case that used 5 GHz band since the current mac80211_hwsim
channel survey implementation is very limited and reports only a single
channel. For this test case, that channel has to be from the 2.4 GHz
band.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agowlantest: Tag and ignore generated packets
Johannes Berg [Wed, 9 Apr 2014 09:53:16 +0000 (11:53 +0200)]
wlantest: Tag and ignore generated packets

Rather than ignoring packets with a minimal 8-byte radiotap
header, which may occur elsewhere, tag generated (decrypted)
packets with an empty vendor namespace tag and ignore those.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
10 years agoradiotap: Update radiotap parser to library version
Johannes Berg [Wed, 9 Apr 2014 09:50:54 +0000 (11:50 +0200)]
radiotap: Update radiotap parser to library version

Update the radiotap parser to the latest version of the
http://git.sipsolutions.net/radiotap.git/ library to get
parsing for vendor namespaces.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
10 years agoPropagate scan failures over D-Bus
quiche@chromium.org [Wed, 9 Apr 2014 22:10:29 +0000 (15:10 -0700)]
Propagate scan failures over D-Bus

If we receive a scan request via D-Bus and wpa_supplicant_scan_trigger
fails, return the failure to the caller over D-Bus.

Signed-hostap: mukesh agrawal <quiche@chromium.org>

10 years agotests: NFC_GET_HANDOVER_REQ/SEL
Jouni Malinen [Sun, 13 Apr 2014 16:25:00 +0000 (19:25 +0300)]
tests: NFC_GET_HANDOVER_REQ/SEL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS_NFC_TAG_READ error cases
Jouni Malinen [Sun, 13 Apr 2014 15:46:05 +0000 (18:46 +0300)]
tests: WPS_NFC_TAG_READ error cases

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P NFC static handover with forced channel
Jouni Malinen [Sun, 13 Apr 2014 15:33:55 +0000 (18:33 +0300)]
tests: P2P NFC static handover with forced channel

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: wpa_supplicant country code SET/GET
Jouni Malinen [Sun, 13 Apr 2014 13:33:18 +0000 (16:33 +0300)]
tests: wpa_supplicant country code SET/GET

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoAdd a wpa_supplicant ctrl_iface event for regdom changes
Jouni Malinen [Sun, 13 Apr 2014 13:32:38 +0000 (16:32 +0300)]
Add a wpa_supplicant ctrl_iface event for regdom changes

CTRL-EVENT-REGDOM-CHANGE event provides an external notification of
regulatory domain (and any driver channel list) changes.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWPS: Split eapol_cb reconnect to a separate code path
Jouni Malinen [Sun, 13 Apr 2014 08:47:03 +0000 (11:47 +0300)]
WPS: Split eapol_cb reconnect to a separate code path

Use eloop timeout to run the reconnect command after eapol_cb has
returned. This reduces stack use and can simplify the driver
command/event sequence by allowing the disconnection events from the
provisioning step to be processed before starting the actual data
connection.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P GO issuing multiple credentials
Jouni Malinen [Sun, 13 Apr 2014 08:46:26 +0000 (11:46 +0300)]
tests: P2P GO issuing multiple credentials

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWPS: Close p2p_group and temporary parameters to all network blocks
Jouni Malinen [Sun, 13 Apr 2014 08:44:57 +0000 (11:44 +0300)]
WPS: Close p2p_group and temporary parameters to all network blocks

If a P2P GO issues multiple credentials for some reason, clone the
p2p_group and temporary parameters to all those based on the initial
network block that gets used for the first credential.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agonl80211: Mask out deauth even after own deauth request
Jouni Malinen [Sun, 13 Apr 2014 08:39:49 +0000 (11:39 +0300)]
nl80211: Mask out deauth even after own deauth request

This was already done for the disconnect event, but
SME-in-wpa_supplicant case needs to do same with the deauth event to
avoid getting extra events during WPS disconnect-and-reconnect sequence.
This can speed up WPS processing by removing unnecessary failures or
retries due to the extra event being processed during the next
association attempt.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P NFC Tag with group interface
Jouni Malinen [Sat, 12 Apr 2014 20:37:14 +0000 (23:37 +0300)]
tests: P2P NFC Tag with group interface

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: NFC tag enable/disable for P2P
Jouni Malinen [Sat, 12 Apr 2014 20:34:49 +0000 (23:34 +0300)]
tests: NFC tag enable/disable for P2P

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HT capability overrides
Jouni Malinen [Sat, 12 Apr 2014 20:25:36 +0000 (23:25 +0300)]
tests: HT capability overrides

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoAdd forgotten ampdu_factor into wpa_supplicant.conf
Jouni Malinen [Sat, 12 Apr 2014 20:25:11 +0000 (23:25 +0300)]
Add forgotten ampdu_factor into wpa_supplicant.conf

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: IBSS with fixed BSSID
Jouni Malinen [Sat, 12 Apr 2014 20:11:02 +0000 (23:11 +0300)]
tests: IBSS with fixed BSSID

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS 2.0 connection using connect API
Jouni Malinen [Sat, 12 Apr 2014 20:01:58 +0000 (23:01 +0300)]
tests: HS 2.0 connection using connect API

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Opportunistic key caching with the connect API
Jouni Malinen [Sat, 12 Apr 2014 19:52:41 +0000 (22:52 +0300)]
tests: Opportunistic key caching with the connect API

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Wildcard SSID with PSK/passphrase
Jouni Malinen [Sat, 12 Apr 2014 19:47:49 +0000 (22:47 +0300)]
tests: Wildcard SSID with PSK/passphrase

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoRe-enable use of wildcard SSID with passphrase
Jouni Malinen [Sat, 12 Apr 2014 19:46:54 +0000 (22:46 +0300)]
Re-enable use of wildcard SSID with passphrase

This used to work, but it looks like the disabled-PSK-network check
ended up rejecting confiurations that configured a wildcard SSID with a
passphrase (instead of PSK).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: More IBSS WPA-None coverage
Jouni Malinen [Sat, 12 Apr 2014 19:30:48 +0000 (22:30 +0300)]
tests: More IBSS WPA-None coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P GO removing persistent client based on invitation result
Jouni Malinen [Sat, 12 Apr 2014 17:28:37 +0000 (20:28 +0300)]
tests: P2P GO removing persistent client based on invitation result

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P group interface removed due to GO Negotiation failure
Jouni Malinen [Sat, 12 Apr 2014 17:16:22 +0000 (20:16 +0300)]
tests: P2P group interface removed due to GO Negotiation failure

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P group idle timeout on GO
Jouni Malinen [Sat, 12 Apr 2014 17:08:13 +0000 (20:08 +0300)]
tests: P2P group idle timeout on GO

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: p2p_find with progressive scan
Jouni Malinen [Sat, 12 Apr 2014 17:03:24 +0000 (20:03 +0300)]
tests: p2p_find with progressive scan

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SCAN_INTERVAL setting
Jouni Malinen [Sat, 12 Apr 2014 16:48:57 +0000 (19:48 +0300)]
tests: SCAN_INTERVAL setting

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: filter_ssids=1
Jouni Malinen [Sat, 12 Apr 2014 16:43:24 +0000 (19:43 +0300)]
tests: filter_ssids=1

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Association timeout
Jouni Malinen [Sat, 12 Apr 2014 16:27:57 +0000 (19:27 +0300)]
tests: Association timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: INTERFACE DISABLED/ENABLED events based on ifdown/up
Jouni Malinen [Sat, 12 Apr 2014 16:09:35 +0000 (19:09 +0300)]
tests: INTERFACE DISABLED/ENABLED events based on ifdown/up

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Reconnect to the same BSS on inactivity disconnection
Jouni Malinen [Sat, 12 Apr 2014 16:02:23 +0000 (19:02 +0300)]
tests: Reconnect to the same BSS on inactivity disconnection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WNM keep-alive
Jouni Malinen [Sat, 12 Apr 2014 15:53:35 +0000 (18:53 +0300)]
tests: WNM keep-alive

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: auto_interworking=1
Jouni Malinen [Sat, 12 Apr 2014 15:47:48 +0000 (18:47 +0300)]
tests: auto_interworking=1

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: AP_SCAN 0/2 and externally triggered connection
Jouni Malinen [Sat, 12 Apr 2014 15:31:25 +0000 (18:31 +0300)]
tests: AP_SCAN 0/2 and externally triggered connection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: BSS_EXPIRE_COUNT/AGE
Jouni Malinen [Sat, 12 Apr 2014 14:16:07 +0000 (17:16 +0300)]
tests: BSS_EXPIRE_COUNT/AGE

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ENABLE/DISABLE_NETWORK
Jouni Malinen [Sat, 12 Apr 2014 13:51:15 +0000 (16:51 +0300)]
tests: ENABLE/DISABLE_NETWORK

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Radio work canceling during interface removal
Jouni Malinen [Sat, 12 Apr 2014 13:42:22 +0000 (16:42 +0300)]
tests: Radio work canceling during interface removal

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix a debug print to have a space between words
Jouni Malinen [Sat, 12 Apr 2014 13:41:45 +0000 (16:41 +0300)]
Fix a debug print to have a space between words

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: EXT PW with no valid PSK found
Jouni Malinen [Sat, 12 Apr 2014 13:25:18 +0000 (16:25 +0300)]
tests: EXT PW with no valid PSK found

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: RSN IBSS reconnection
Jouni Malinen [Sat, 12 Apr 2014 13:17:04 +0000 (16:17 +0300)]
tests: RSN IBSS reconnection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: autoscan
Jouni Malinen [Sat, 12 Apr 2014 12:51:52 +0000 (15:51 +0300)]
tests: autoscan

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: bgscan test cases
Jouni Malinen [Sat, 12 Apr 2014 08:56:55 +0000 (11:56 +0300)]
tests: bgscan test cases

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoAdd CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events
Jouni Malinen [Sat, 12 Apr 2014 08:48:05 +0000 (11:48 +0300)]
Add CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events

This allows external programs to monitor driver signal change events
through wpa_supplicant when bgscan is used.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P_LISTEN with timeout
Jouni Malinen [Fri, 11 Apr 2014 22:11:25 +0000 (01:11 +0300)]
tests: P2P_LISTEN with timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: RADIO_WORK timeout
Jouni Malinen [Fri, 11 Apr 2014 22:06:09 +0000 (01:06 +0300)]
tests: RADIO_WORK timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SIGNAL_POLL and PKTCNT_POLL
Jouni Malinen [Fri, 11 Apr 2014 22:02:19 +0000 (01:02 +0300)]
tests: SIGNAL_POLL and PKTCNT_POLL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WNM_SLEEP with additional parameters
Jouni Malinen [Fri, 11 Apr 2014 21:58:52 +0000 (00:58 +0300)]
tests: WNM_SLEEP with additional parameters

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS20_ICON_REQUEST
Jouni Malinen [Fri, 11 Apr 2014 21:27:20 +0000 (00:27 +0300)]
tests: HS20_ICON_REQUEST

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS20_ANQP_GET
Jouni Malinen [Fri, 11 Apr 2014 21:18:07 +0000 (00:18 +0300)]
tests: HS20_ANQP_GET

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P_SERVICE_DEL
Jouni Malinen [Fri, 11 Apr 2014 21:16:38 +0000 (00:16 +0300)]
tests: P2P_SERVICE_DEL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface LIST_CREDS
Jouni Malinen [Fri, 11 Apr 2014 21:05:34 +0000 (00:05 +0300)]
tests: ctrl_iface LIST_CREDS

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface SCAN_RESULTS
Jouni Malinen [Fri, 11 Apr 2014 21:00:51 +0000 (00:00 +0300)]
tests: ctrl_iface SCAN_RESULTS

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface LOG_LEVEL
Jouni Malinen [Fri, 11 Apr 2014 20:56:57 +0000 (23:56 +0300)]
tests: ctrl_iface LOG_LEVEL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface BLACKLIST
Jouni Malinen [Fri, 11 Apr 2014 20:48:36 +0000 (23:48 +0300)]
tests: ctrl_iface BLACKLIST

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix ctrl_iface BLACKLIST return value
Jouni Malinen [Fri, 11 Apr 2014 20:47:46 +0000 (23:47 +0300)]
Fix ctrl_iface BLACKLIST return value

Adding a new entry was returning FAIL on success due to incorrect
assumption of wpa_blacklist_add() returning 0 on success (it returns the
positive blacklist count).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface BSSID command
Jouni Malinen [Fri, 11 Apr 2014 20:34:47 +0000 (23:34 +0300)]
tests: ctrl_iface BSSID command

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: NFC_REPORT_HANDOVER error cases
Jouni Malinen [Fri, 11 Apr 2014 20:27:26 +0000 (23:27 +0300)]
tests: NFC_REPORT_HANDOVER error cases

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Additional WPS ctrl_iface coverage
Jouni Malinen [Fri, 11 Apr 2014 20:04:18 +0000 (23:04 +0300)]
tests: Additional WPS ctrl_iface coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface invalid MAC address
Jouni Malinen [Fri, 11 Apr 2014 19:56:42 +0000 (22:56 +0300)]
tests: ctrl_iface invalid MAC address

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Increase ctrl_iface SET test coverage
Jouni Malinen [Fri, 11 Apr 2014 19:30:43 +0000 (22:30 +0300)]
tests: Increase ctrl_iface SET test coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoP2P: Add NFC_HANDOVER commands to p2p_redir list
Andres Morales [Thu, 27 Feb 2014 00:05:21 +0000 (16:05 -0800)]
P2P: Add NFC_HANDOVER commands to p2p_redir list

These commands can be executed on the P2P interface thus should be
redirected to it when issued to the global control interface.

Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
10 years agoAdd reassociate command to dbus doxygen
Fionn Cleary [Fri, 4 Apr 2014 13:49:53 +0000 (15:49 +0200)]
Add reassociate command to dbus doxygen

Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
10 years agoFix reassociate dbus method
Fionn Cleary [Fri, 4 Apr 2014 13:45:26 +0000 (15:45 +0200)]
Fix reassociate dbus method

- Reassociate was only working when there was already a connect in
  place, which is not how the REASSOCIATE command from the ctrl
  interface works.

Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
10 years agowpa_cli: Fix wrong comparison in wpa_cli_cmd_interface
Daichi Ueura [Sun, 6 Apr 2014 07:35:12 +0000 (16:35 +0900)]
wpa_cli: Fix wrong comparison in wpa_cli_cmd_interface

Signed-off-by: Daichi Ueura <daichi.ueura@gmail.com>
10 years agonl80211: Handle multiple interface combinations for P2P
Felix Fietkau [Sun, 6 Apr 2014 11:11:53 +0000 (13:11 +0200)]
nl80211: Handle multiple interface combinations for P2P

The first combination may allow single-channel concurrency for
P2P + managed, but there may be others that allow multi-channel
concurrency. Parse all of them to find the maximum number of channels.

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
10 years agoHS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER
Jouni Malinen [Fri, 11 Apr 2014 15:55:42 +0000 (18:55 +0300)]
HS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER

The trust roots in the PPS MO point to a DER encoded X.509 certificate.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoP2P: Add retry mechanism for GO Negotiation Confirmation
Nirav Shah [Mon, 7 Apr 2014 22:12:19 +0000 (03:42 +0530)]
P2P: Add retry mechanism for GO Negotiation Confirmation

wpa_supplicant now retries for P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if
it doesn't receive acknowledgement for GO Negotiation Confirmation
frame. Currently, P2P_GO_NEG_CNF_MAX_RETRY_COUNT is set to 1.

While this is not strictly speaking following the P2P specification,
this can improve robustness of GO Negotiation in environments with
interference and also with peer devices that do not behave properly
(e.g., by not remaining awake on the negotiation channel through the
full GO Negotiation).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoP2P: Mark the scan in p2p_in_invitation as p2p_probe
Sunil Dutt [Wed, 9 Apr 2014 09:12:08 +0000 (14:42 +0530)]
P2P: Mark the scan in p2p_in_invitation as p2p_probe

Mark the scan performed by the P2P Client in search of the GO
during the persistant reinvocation as a p2p_probe to avoid
unnecessary use of 802.11b rates.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agonl80211: Use LEAVE_IBSS with driver-based-SME
Abhishek Singh [Thu, 10 Apr 2014 12:23:40 +0000 (17:53 +0530)]
nl80211: Use LEAVE_IBSS with driver-based-SME

NL80211_CMD_LEAVE_IBSS was used only with wpa_supplicant-based SME.
Extend this to drivers that implement SME internally.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoAndroid: Add qca-vendor.h to be exported
Amarnath Hullur Subramanyam [Fri, 4 Apr 2014 20:40:58 +0000 (13:40 -0700)]
Android: Add qca-vendor.h to be exported

Add qca-vendor.h along with wpa_ctrl.h to be exported to
common staged location.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoOpenSSL: Detect and prevent TLS heartbeat attack
Jouni Malinen [Wed, 9 Apr 2014 10:02:53 +0000 (13:02 +0300)]
OpenSSL: Detect and prevent TLS heartbeat attack

Some OpenSSL versions have vulnerability in TLS heartbeat request
processing. Check the processed message to determine if the attack has
been used and if so, do not send the response to the peer. This does not
prevent the buffer read overflow within OpenSSL, but this prevents the
attacker from receiving the information.

This change is an additional layer of protection if some yet to be
identified paths were to expose this OpenSSL vulnerability. However, the
way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant
was already rejecting the messages before the response goes out and as
such, this additional change is unlikely to be needed to avoid the
issue.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: WNM BSS TM Req with neighbor report subelements
Jouni Malinen [Mon, 7 Apr 2014 22:35:01 +0000 (01:35 +0300)]
tests: WNM BSS TM Req with neighbor report subelements

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Remove unnecessary present flag
Jouni Malinen [Mon, 7 Apr 2014 22:34:17 +0000 (01:34 +0300)]
WNM: Remove unnecessary present flag

The structures are all allocated, so the pointer can be compared to NULL
to determine whether the subelement was present.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Fix neighbor report subelement formats
Jouni Malinen [Mon, 7 Apr 2014 22:32:28 +0000 (01:32 +0300)]
WNM: Fix neighbor report subelement formats

Number of of subelements were using incorrect format definition.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>