93e3799083fb8feaa6c62ffde18285ffec984aa5
195 Commits
| Author | SHA1 | Message | Date | |
|---|---|---|---|---|
|
|
1b0d9d6e4b | Merge "[wpa_supplicant] cumilative patch from commit bb945b98f" into udc-dev | ||
|
|
036cec531d |
[wpa_supplicant] cumilative patch from commit bb945b98f
Bug: 275651698 Test: Connect to open, WPA2, WPA3 and passpoint network Test: Establish P2P connection Test: Basic SoftAp tests Test: Regression test (b/275948027) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from opne source bb945b98f Add 40 and 80 MHz channels 165 and 173 for 5 GHz IBSS/mesh 0059fa5ba 6 GHz: Fix secondary channel setting 744295c8b Add 6 GHz channel validation during channel switching 5349a45d3 Set interface state as inactive if mesh bringup fails a4af79624 Handle signal termination in hostapd_cli for all cases cf8f13ac8 Add support to send 320 MHz bandwidth through vendor subcmd a0403c023 EHT: Validate the puncturing bitmap for ACS af0f60e7d EHT: Calculate puncturing bitmap for ACS f3206fbe9 EHT: Configuration option for ACS puncturing threshold e3621867c EHT: Process puncturing bitmap from channel switch event e277e577c nl80211: Send EHT puncturing bitmap to the driver for switch command 29a882bed EHT: Configure puncturing bitmap during channel switch 4942b19ff EHT: Send puncturing bitmap to the driver for AP bring up f9fc2eabb EHT: Add puncturing bitmap to EHT Operation element 46a5d989d EHT: Downgrade bandwidths for VHT and HE when using puncturing 7618269ec EHT: Validate puncturing bitmap 9102fda31 EHT: Add configuration option for puncturing in AP mode 9e79439fc nl80211: Retrieve driver support for EHT puncturing 507be376c Sync with wireless-next.git include/uapi/linux/nl80211.h 591256a8c FILS: 320 MHz support in FD frame 903e3a1e6 FILS: Fix maximum NSS calculation for FD frame ecae45ff6 FILS: Make HE a requirement for FILS discovery 4e86692ff AP: Fix 6 GHz AP setup after disable-enable a34b8477a ml80211: Put wiphy idx to obtain correct country code 1491fc64a Define QCA vendor per-enum 64-bit pad attributes 55e31699e qca-vendor: Add QCA_WLAN_VENDOR_ATTR_LL_STATS_IFACE_NF_CAL_VAL b1f85957c Add QCA vendor commands to set and get MLO links state information 44b32a752 mesh: Add EHT support c4cb62ca8 WPA_AUTH: MLO: Add functions to get the AA and SPA cab963e9f AP: Split check_assoc_ies() 7a7a2256c common: Support parsing link specific association request b39e35693 common: Add support for clearing elements 0b2fc4268 common: Split ieee8021_parse_elems() df6561ec0 nl80211: AP MLD support for adding multi link stations b8b4ceb8d nl80211: Properly stop and deinit MLO AP 2f8fc46ed nl80211: Provide link_id in EAPOL_RX and RX_MGMT events 821374d43 nl80211: Introduce and implement a callback to add an MLO link for AP MLD 47269be36 nl80211: Refactor i802_bss to support multiple links eb146ee80 AP: Add some bridge port attribute settings f628e6b30 nl80211: Make sure scan frequency debug buffer is NUL terminated 41d23254b nl80211: Fix frequencies array boundary check for scanned frequencies a9012070a Android: Add wowlan_disconnect_on_deinit to template configuration e2ea0fd70 EST: Write the RSA private key using the standard PRIVATE KEY format bfd236df2 webkit2: Avoid deprecated function call 2c3202682 P2P: Filter out 6 GHz frequencies if not allowed for P2P connection b2bf7e39e Update PMK in wpa_sm when roam+auth event indicated with authorized flag 6b9c86466 nl80211: Replace the channel flags for VHT support 6f63aca7b DPP: Allow both STA and AP configObject to be set 7292e30b7 DPP: Fix @CONF-OBJ-SEP@ parsing for multiple configs c31600ce1 P2P: Allow GO BSSID to be specified for P2P_GROUP_ADD commands 0430756e6 P2P: Optimize join scan frequency b3921db42 nl80211: Add frequency info in start AP command 40c139664 macsec_linux: Add support for MACsec hardware offload 6d24673ab mka: Allow configuration of MACsec hardware offload 3081a9cb6 hostapd: Output country_code and country3 when using STATUS 91ad7a309 FT: Store PTKSA entry for the correct BSSID in the FT protocol case 3f3e356fa Mark addr argument to storing PTKSA const 242c3ad99 FT: Store PTKSA from FT protocol ba6954874 Mark wpa_auth_remove_ptksa() static 3b1ad1334 FT: Include KDK in FT specific PTK derivation on the AP 870a5bdc0 nl80211: Report guard interval and dual carrier modulation edcad193a dbus: Add inactive time to D-Bus signal info a678a510f dbus: Add D-Bus signal for PSK mismatch heuristics 691f729d5 P2P: Make invitation flow less aggressive f4a7e2a07 Rework IBSS/mesh 80 MHz channel selection f91f971bd Fix creating 6 GHz IBSS/mesh on 5/6 GHz-capable PHYs c623cee42 Make arrays static const in ibss_mesh_select_*() 64043e615 Split ibss_mesh_setup_freq() into multiple functions 8085a7e65 wpa_supplicant: Add option to explicitly set 4addr mode 1ffc7d1c6 Apply bias towards 6 GHz in roaming faa410292 WNM: Event report handling for BSS color collision and in-use 97405be96 Small textual improvements to wpa_supplicant man page ec02a0e93 hostapd: Output hw_mode when using STATUS 390e24c6c EAP-TTLS server: Add Ident field to MS-CHAP-Error 4ae798a22 P2P: Pick the best driver pref freq for invitation process 6c75f1dfa Send broadcast Probe Response frames on the 6 GHz band edfcb2f1a MLD STA: Indicate MLO support in NL80211_CMD_CONNECT c91852044 MLD STA: Add support for SAE external authentication offload to userspace 575712450 qca-vendor: Add QCA_WLAN_VENDOR_MCC_QUOTA_TYPE_LOW_LATENCY ba150059d FT: Store PMK-R0/PMK-R1 after EAPOL-Key msg 2/4 MIC validation 56662f36d Refine vendor subcmd QCA_NL80211_VENDOR_SUBCMD_ROAM_STATS 72b8193f4 MACsec: Remove EAP Session-Id length constraint 3915e8834 hostapd: Report error on unknown ACCEPT_ACL/DENY_ACL commands 2cff340d1 utils: Move log2pcap to python3 12de8112b Fix BSS age underflow d31c2b43a Fix segfault in case of an invalid configuration a32b424a3 MLD STA: Use AP MLD address in PMKSA cache attempts for driver-SME case 8c4790cef MLD STA: Store PMKSA with AP MLD address for MLO connection event bf124a03d SAE: Update PT value at later point for SME cases, if needed 1aadcca0a P2P: Enable SAE-H2E for client when joining a 6 GHz group 37f8257c4 SAE: Extend automatic enabling of H2E on 6 GHz to additional cases 89377c6b9 OCV: Fix build without CONFIG_OCV=y 2e47ea22c P2P: Fix handling Service Discovery Response received by GO device dc7e330e0 Set OCV capability based on Association Request frame RSNE 831be6514 WPS: Do not indicate incorrect PBC overlap based on partner link c9fc12425 P2P: Make wpas_p2p_notif_pbc_overlap() static Change-Id: I1eb61fc82b98b937a2ff37a30e60e28129fe143d Merged-In: I1eb61fc82b98b937a2ff37a30e60e28129fe143d |
||
|
|
a9f98ebdd2 |
Do AIDL initialization after daemonizing the process
Supplicant start from command line is failing when -B option used to daemonize the supplicant process due to process forked for daemonizing is not able access the AIDL file decriptor. To avoid this do AIDL initialization after daemonizing the process. Bug: 270241817 Test: Manual test. See comments in pa/2427759 Change-Id: I7d8c5c7863f9bf5ac95d3bf141a31c01d71609af |
||
|
|
77d572f143 |
[wpa_supplicant] Cumulative patch from commit 257b119c2
Bug: 265294868
Test: Verify Passpoint ANQP functionality and Passpoint association
Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic
Test: Regression test b/218404053 (Bug: TBD)
BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open sourcie
257b119c2 QCA vendor attribute of update roaming cached statistics info
18436f393 Enhance QCA vendor interface for Concurrent AP Policy for XR
58fba11e1 Enhance QCA vendor interface with new hang reason codes
0f3f9cdca dpp-nfc: Try to request with alternative URL in additional cases
8b36248cd Add QCA vendor command to get the monitor mode status
0dd8bcef8 QCA vendor attributes for MLO and EHT capabilities
e5602989c QCA vendor attributes to configure EHT capabilities
d9d5e55c5 DPP: Respond to GAS on the same channel it was received on
651c9e957 Add new status code strings
3a2d27552 Make MFPR value from an associated STA available as hostapdMFPR
546debd5e Force MFPR=1 to be used on the 6 GHz band
f9c6ab834 P2P: Support preferred GO band based optimization for scanning
093bedc05 P2P: Allow persistent group join retry limit to be configured via D-Bus
8717110db Do not flush PMKSA cache on restoring dedicated per-ESS MAC address
1d4027fdb Make random MAC address style parameters use common enum values
681856c35 Check both sec and usec values to see if MAC address was changed
bdbb6e003 wpa_supplicant: Handle MAC address randomization changes for same ESS
4bd1efe07 dbus: Do not bring down primary interface when removing created AP interface
f4096e7cd EHT: Update EHT Operation element to P802.11be/D2.3 in AP settings
e869fdfee wpa_supplicant: Use MLD address in SAE authentication
8c0f83ae8 SME: Accept Authentication frame from an MLD AP
23039f5e4 SME: Add support for handling association with MLD
8f89661df SME: Add support for handling authentication with MLD
694a1c687 SAE: Make sme_sae_auth() return IE offset
870edfd67 WPA3: Update transition disable bitmap based on port authorized event
8fdf3c447 Sync with wireless-next.git include/uapi/linux/nl80211.h
f9804e306 nl80211: Enforce unique address for AP iftype
87bad8afa dbus: Pass in MAC address in CreateInterface method
b0722cf75 dbus: Fix a memory leak on error path in CreateInterface method
a7f6b8518 crypto: Check if crypto_bignum_to_bin() is successful
2749a2c6b nl80211: Actually get and store TX retries
998aeca3c crypto: Clear secrets from stack in hmac_sha256_vector()
909864ab1 HS 2.0: Restore ifdef for DEFINE_STACK_OF in est.c
af0ab435a PASN: Use the assigned status code from IEEE P802.11az/D7.0
3d798ff2a PASN: Align RSNXE with IEEE P802.11az/D7.0 definitions
ab2cb379d Define all assigned BSS membership selector values
ed0a7b480 wpa_supplicant: Implement HE membership selector check
054fcfab6 hostapd: Add require_he configuration
c46351d10 DFS: Clear cac_started when AP is disabled
3df42cf3c EHT: Use HE operating channel width in MCS length calculation
23e31eb68 SAE: Support cross AKM roaming between SAE AKMs in external auth case
a17026707 PASN: Avoid clearing secure context for the PASN deauthentication event
75a9c4bd4 Add new attributes in SCS rule config QCA vendor subcommand
7d8b96dcf wpa_supplicant: Apply same restrictions for MLD as for 6 GHz BSS
7216f79b9 nl80211: Support get_sta_mlo_info for SME-in-wpa_supplicant drivers
06eb608d5 nl80211: Handle scan results with MLD connection
033a57d26 nl80211: Get MLO support capability
32b745448 wpa_supplicant: Make valid_links u16
a2c4c0b1b nl80211: Support MLD association request
a134b4dc5 nl80211: Add support for MLD authentication
e3e68668c ctrl_iface: Report RNR and ML in BSS command
5f17763ad common: Combine definitions for Multi-Link and per STA profile control
7a7ce9574 dbus: Emit more information over D-Bus
ad4fa5dd3 Add more nl80211 info to struct wpa_signal_info
090f0f8c7 mbssid: Indicate MBSSID information in RNR
a1c4adda1 mbssid: Add nl80211 support
54b1352ef mbssid: Make the AID space shared
10749c3c4 mbssid: Process Known BSSID element
15690faad mbssid: Add MBSSID Configuration element
fc2e4bac5 mbssid: Set extended capabilities
a004bf2cd mbssid: Configure parameters and element data
c5a09b051 mbssid: Add Non-Inheritance element
920b56322 mbssid: Functions for building Multiple BSSID elements
931e5d4f9 mbssid: Configure all BSSes before beacon setup
78d0b9899 mbssid: Retrieve driver capabilities
7452e5447 mbssid: Add new configuration option
bb67d5b52 AP: Add testing option to delay EAPOL Tx
1897abad9 dbus: Add D-Bus property for current MAC address
1a800a940 EAP-TEAP server: Allow tunneled EAP method sequence to be optimized
f791b5bbc EAP-TEAP peer: Process Crypto-Binding TLV before EAP Payload TLV
5a9bd8a06 EAP-TEAP: Use EAP-FAST-MSCHAPv2 in the tunnel
364b6500b EAP-FAST: Move EAP-MSCHAPv2 special MSK handling into MSCHAPv2
81dedfbd7 nl80211: Increase the scan frequencies buffer
9a2781f24 wpa_supplicant: Support throughput estimation for EHT rates
755aaeb97 wpa_supplicant: Add missing memory allocation checks
69725c4cf OpenSSL: Fix BN_rshift() argument order
e9b4ad236 OpenSSL: Apply connection flags before reading certificates
bbd5a4689 SAE: Add an enum for defining sae_pwe parameter values
3a0edb2cd SAE: Enable H2E for 6 GHz BSS
20bfd4feb AP: Enable H2E on 6 GHz when SAE is used
b43e19f3f WPS: Cross band overlap detection with multiple interfaces
e2d88f86e DPP: Expose own and peer bootstrap info ids on authentication success
043dedee8 DPP: Expose enrollee pubkey hash for identification
2d8974e31 DPP: Move DPP_EVENT_AUTH_SUCCESS to a helper
d8d2b3a33 Implement read-only mode for SSIDs from the additional config (-I)
4cb23b66d ACS: Allow selecting a better channel when using 40/80/160 MHz
472101684 ACS: introduce acs_adjust_secondary
60e2934cb ACS: Introduce acs_get_bw_center_chan()
ed8e13dec ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan()
9025def55 wpa_supplicant: Add support for pregenerated MAC
5da3e1ca4 mesh: Do not allow open mode key in 6 GHz
50a9b7d3d P2P: Include only 6 GHz PSCs in full scan
0d6cd88ee DPP: Use existing TCP connection to replay duplicate Presence Announcement
6af717f73 DPP: Don't close TCP connection for duplicate Presence Announcements
46e6b72b7 Add a callback to notify added PMKSA cache entry details
af1528a12 hostapd: Add RELOAD_BSS
bc2b88b25 hostapd: Add config_id to GET_CONFIG output
b37c3fbad hostapd: Add config_id parameter
46f6a3277 Split BSS-specific hostapd_clear_old_bss() from hostapd_clear_old()
2afb9b1a5 dbus: Add dbus notify when wpa_s->key_mgmt changes
98e9d553f nl80211: Check previous MAC address for locally-generated-deauth
87ffa1bec wpa_supplicant: Convert SSID into printable form before printing
416386060 Mark authorization completed on driver indication during 4-way HS offload
da2ec9459 D-Bus: Split set_cred_properties() into two functions
f5ce680ee D-Bus: Hotspot 2.0 credentials with multiple domains
2f739c71c ctrl: Fix compilation with UDP control interface
6d4548187 RSN: Split EAPOL-Key msg 3/4 processing for WPA(v1)
5b7957b7e RSN: Split EAPOL-Key msg 1/4 processing for WPA(v1)
e5dfce38f RSN: Split EAPOL-Key group msg 1/2 processing more completely for WPA(v1)
5ab43c738 RSN: Split WPA(v1) processing of EAPOL-Key frames into a separate function
f7fd891c7 Fix a typo in driver ops poll() documentation
3268ec0ac HS20: Use required_home_ois in hs20-osu-client
58eb905ad HS20: Support credentials with multiple home OIs
0143dc1cb OpenSSL: Load OpenSSL 3.0 legacy provider but let default be loaded
fef4c6cb0 OpenSSL: Don't provide implementation of DES/RC4 for FIPS builds
1d42dafce RSN: Do not include RC4 use in FIPS builds
df5ae2aad Add more detailed description of RADIUS attributes in EAP user file
0ba266d86 dbus: Add virtual interface create/remove logic to be inline with ctrl_iface
5102d7411 wpa_passphrase: Disable terminal echo when reading from stdin
86ab28217 PASN: Fix passing own address and peer address to pasn_deauthenticate()
a9062432e wpa_cli: Fix PASN control interface commands
b6d3fd05e FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
ef70f814a Add a new QCA vendor attribute to configure wifi calling (wfc) state
05ec48568 WPS: Pick WPS AP based on latest received WPS IE
ca4fa867d Enable PMF automatically if OCV is enabled
c823197bd SAE: Use Challenge Failure status code in confirm message failure cases
65c8633d9 Allow a lower priority BSS to be tried after network disabling
e91ac53d5 DFS: Do not allow channel checks to go beyond the channel list
f96dfdeef PASN: Fix missing libraries for libpasn.so on Android
91d148f50 PASN: Fix is_pasn_auth_frame() for mgmt tx status frames
b6c38cee9 Skip CAC if the driver switches channel to non-DFS
080afc03d Add hostapd control interface command to stop logging to file
0fd13c90e Add QCA vendor interface for AP doze mode configuration
4e1f55a11 Roam control configuration for 6 GHz in full scan only on prior discovery
34d93b0c9 HS 2.0: Deauthenticate STA on deauth-imminent more quickly if no URL
2e40f969b nl80211: Fix wrong requested links bitmap in sta_mlo_info.req_links
b6e226496 MLD STA: Fix IGTK and BIGTK MLO KDEs validation
2050130be Add a vendor attribute for roam control configuration for full scan
12f16c27b TLS: Fix unsigned int underflow in internal TLS 1.0/1.1 implementation
802b67bce Update tls_connection_set_verify() documentation to verify_peer=2
0202b9774 DPP: Fix memory leak of intro.peer_key in station handling
f723f7f8a P2P: Check dev pointer consistently when building PD Response
30403e965 WPS: Check NDEF record length fields separately
cd0e8653a TDLS: Use stored FTE length in MIC calculation
7e85e24f3 TDLS: Use stored peer RSNE length in MIC calculation
40a42613e FT: Simplify FTE parsing for FT-SAE-EXT-KEY using MIC Length subfield
5ea7a2f54 DPP: Drop PMKSA entry if AP reject association due to invalid PMKID
4840b45a2 Fix empty pmksa_cache_get()
3abd0c471 SAE: Print rejection of peer element clearly in debug log
9ff778fa4 Check for own address (SPA) match when finding PMKSA entries
9f04a9c8d Store own MAC address (SPA) in supplicant PMKSA cache entries
309765eb6 PASN: Use separate variables for BSSID and peer address
42f0c44d8 PASN: Use peer address instead of BSSID as the destination for initiator
15583802b nl80211: Allow up to 64-byte PMK in NL80211_CMD_SET_PMKSA
bbe5f0c1e FT: Do not try to use FT protocol between mobility domains
b92f61885 Don't use default RSNE/RSNXE when the driver indicates cross SSID roaming
d7febe33f MLO: Remove unnecessary debug prints about clearing AP RSNE/RSNXE
16d913bfd Define AFC vendor commands and events
46f5cf928 OpenSSL: Fix additional HPKE corner cases
bdc35acd5 SAE: Allow loading of the password from an external database
48dd8994a Fix external passwords with 4-way handshake offloading
e5a7c852c systemd: Use interface name in description of interface-specific units
a0628f8a5 OpenSSL: Remove unused assignment from HPKE expand
3e1a04afa nl80211: Check that attribute addition succeeds in offloaded PASN case
0658a22ef GAS: Try to make buffer length determination easier for static analyzers
271ce71c7 FT: Fix PMK-R0 derivation for FT-SAE-EXT-KEY with SHA512
2f61d703a MLD STA: Group key handshake processing for GTK/IGTK/BIGTK rekeying
f0760aa6d MLD STA: Use AP MLD address as destination for 4-way handshake EAPOL-Key frames
8f2e493be MLD STA: Validation of MLO KDEs for 4-way handshake EAPOL-Key frames
f15cc834c MLD STA: Processing of EAPOL-Key msg 3/4 frame when using MLO
08512e5f3 MLD STA: Extend key configuration functions to support Link ID
a4adb2f3e MLD STA: Configure TK to the driver using AP MLD address
fa5cad61a MLD STA: Use AP MLD address in PMKSA entry
052bf8a51 MLD STA: Use AP MLD address to derive pairwise keys
e78437256 MLD STA: Add MLO KDEs for EAPOL-Key msg 2/4 and 4/4
472a0b8d6 MLD STA: Set MLO connection info to wpa_sm
cc2236299 nl80211: Get all requested MLO links information from (re)association events
1ca5c2ec2 PASN: Fix spelling of RSNE in debug messages
a43536a72 PASN: Verify explicitly that elements are present before parsing
7e3852407 PASN: Fix MIC check not to modify const data
8481c7509 PASN: Fix Authentication frame checks
f899d7f37 dbus: Apply PMK properties immediately
c6f8af507 Add option to disable SAE key_mgmt without PMF
7ad757ec0 Document crypto_ec_key_get_subject_public_key() to use compressed format
6527a7656 DPP: Stop listen mode for chirp-initiated Authentication exchange
2e7339442 P2P: Discount current operating frequency when scanning new connection
00a762c26 Do not drop connection attempt when reconnecting to the same ESS
368de263b P2P: Skip Extended Listen timeout to allow scans during group formation
cff55f348 P2P: Clone sae_pwe config to new group interface config
ae517789f P2P: Allow PSC channel to be used for 6 GHz BW40
9c830d917 P2P: Track peer 6 GHz capability more robustly
1ca403a8b Add QCA vendor subcommand to notify about primary netdev
70d89f90e A vendor roam control configuration for delaying hand off for RX
fff81a468 PASN: Change pasn_use_384() to be a non-static function
ea241cbe9 PASN: Rename struct wpas_pasn to pasn_data
6be84343a PASN: Add pairing verification wrapper function for Wi-Fi Aware
325236948 PASN: Mark wpas_pasn_start() comeback argument const
b1ed44b6a PASN: Allow extra elements to be added into PASN Authentication frames
08abcdf4e PASN: Makefile and Android.mk changes for libpasn.so
78c5bb7f5 PASN: Move responder functionality into a separate file
c7edfce79 PASN: Move initiator changes into a separate file
975b7a02c Move SAE comeback token functionality into a separate file
1711fe912 PASN: Compute MIC from RSNE and RSNXE of the frame for Wi-Fi Aware
6f80014b1 PASN: Allow custom PMKID in Authentication frames for Wi-Fi Aware
e99047da2 PASN: Add a handler func to send mgmt frames to the driver from AP
4022ffc5d PASN: Store AKMP in the PTKSA cache
c55eadede PASN: Remove hapd dependency in processing PASN Authentication frames
6dc833bc5 PASN: Remove hapd dependency for PASN and SAE comeback
1861f5716 PASN: Remove hapd dependency for pasn_derive_keys()
1fa266e99 PASN: Remove hapd dependency for SAE and FILS wrapped data
bc9fbe1b2 PASN: Common wpas_pasn structure for initiator and responder
14b5ebce7 PASN: Add a common header file for initiator and responder
af5eec3b3 PASN: Function handler to transmit Authentication frames
629bbc91b PASN: Remove dependency of wpa_ssid for initiator
e7f45ca11 PASN: Remove wpa_s dependency for wpas_pasn_start()
0be131265 PASN: Remove wpa_s dependency for wpas_pasn_build_auth_1()
086ccdc59 PASN: Remove wpa_s dependency for the functions processing RX frames
e2e87b90b PASN: Remove wpa_s dependency for wpas_pasn_auth_tx_status()
de4b73a36 PASN: Remove wpa_s dependency for FILS wrapped data
90bb73c51 PASN: Remove wpa_sm dependency to add an entry to PMKSA cache
5313e5a79 PASN: Remove unused wpa_s parameter for wpas_pasn_sae_setup_pt()
f636cbd04 PASN: Remove wpa_s dependency for SAE wrapped data functions
5535fbcfa PASN: Add wpa_pasn_reset() to eliminate need for struct wpa_supplicant
10e455c44 Enable use of PMKSA caching independent of RSN supplicant state machine
1d0ee1908 Fix the vendor ID assignment for configuring periodic sounding
b17b86da4 QCA vendor attribute to configure periodic sounding
6f3efa21c MLD STA: Fix crash caused by NULL wpa_s->current_ssid
ef5a9a009 nl80211: Fix parsing PASN peer and src addresses from vendor nl attributes
2c55c9273 More debug prints for EAPOL-Key message generation (Authenticator)
90cef4f21 MLD STA: Fully clear MLO info to avoid use of uninitialized members
496a1ced1 MLD STA: Use MLD addresses for sending non-Public Action frames
17ae98873 MLD STA: Support processing of M1 received before association event
9dafad1ea EHT: Definitions for STA Control fields of Basic Multi-Link element
1fbea7d43 EHT: Multi-Link element defragmentation
ec03b71ee common: Refactor element defragmentation
347ea8f0a EHT: Parse Multi-Link elements
73f540b6a MLD STA: Fetch MLO association Link ID info to core wpa_supplicant
ee46b7d6d nl80211: Check MLO link status info in NL80211_CMD_CONNECT
6e015cd45 RADIUS: Add Filter-Id attribute
06800f612 Add QCA vendor attributes for EHT support in external ACS
042368663 Vendor attribute to configure QoS/AC upgrade for UDP frames
e5d15e225 EHT: Allow EHT to be disabled using disable_eht=1 in wpa_supplicant
041f6cea9 SAE: Accept FT and -EXT-KEY AKMs for external auth
b72922796 P2P: Get cached scan results on iface creation to avoid scan
8392ea9e7 SAE: Fix AKM suite selector check for external authentication
ebe6a7c94 FT: Cover variable length KCK in function documentation
eda4ba081 FT: Reassociation Response frame validation for FT-SAE-EXT-KEY
0f7253d35 FT: Response processing for FT-SAE-EXT-KEY
a1eb1bb0e FT: Supplicant side FTE generation for FT-SAE-EXT-KEY
883e33594 FT: Authentication request frame processing for FT-SAE-EXT-KEY
879363bbc FT: Reassociation Request frame parsing for FT-SAE-EXT-KEY
e8f23c948 FT: Association Response frame FTE generation for FT-SAE-EXT-KEY
a76a314c1 FT: Extend PMK-R0 derivation for FT-SAE-EXT-KEY
79cd846b2 FT: Extend PTK derivation for FT-SAE-EXT-KEY
39b60f334 FT: Extend PMK-R1 derivation for FT-SAE-EXT-KEY
fb4fc704c FT: Debug print FTE subelements during parsing
25b52e5f8 FT: Extend FTE parsing for FT-SAE-EXT-KEY
4f58afee9 FT: Extend MIC derivation for FT-SAE-EXT-KEY
dcd46edf5 FT: Extend PMKR1Name derivation for FT-SAE-EXT-KEY
9fd245564 FT: Support longer SAE PMK for FT in INITPSK AP
c41bd98be FT: AP mode FTE writing to support FT-SAE-KEY-EXT
efa0f51d3 FT: Accept 512-bit PMK-R1 from RRB
eb0821c90 Add service class id attribute in SCS rule config vendor subcommand
5607abe2e WNM: Print unsupported neighbor report subelements in debug log
fcdd76fa2 Interworking: Print unsupported inner EAP-TTLS method in debug log
f8a05de66 Move default action from after switch to within
7614fcebe ACS: Filter out 6 GHz channels if HE or EHT is not enabled
1864664ca Android: Delay QCA roam+auth event until NL80211_CMD_ROAM is received
5f3cdc064 Override ieee80211w from pmf for AP mode in wpa_supplicant
2b972a35b DPP: Require PMF when profile is for SAE without PSK
8219d2b7d PASN: Fix CONFIG_PASN=y build without CONFIG_IEEE80211R=y
Change-Id: Ifd6be0d096df54c13162fdda164cd8e804a51692
Merged-In: Ifd6be0d096df54c13162fdda164cd8e804a51692
(cherry picked from commit
|
||
|
|
4138eec96c |
Add multiple AKMs and td_policy for Synaptics Wi-Fi
Enable the support of multiple AKMs and Transition Disable Policy for Synaptics Wi-Fi chips. Bug: 252914952 Test: Validated on Hikey with Android-T Change-Id: Ibb258b001c75ce34f623ff8bdee638c091b9af7d Signed-off-by: Winnie Chen <winnie.y.chen@synaptics.com> |
||
|
|
c28a513d29 |
Fix issue caused by NULL at msg pointer
when malloc() failed to allocate memory for msg buffer. msg buffer can be NULL. Add a NULL check to return before passing to snprintf() in wpas_auth_failed() api Bug: 262328781 Test: STA connect/disconnect Change-Id: Ic3cf55f5c21d2d955fa665a645674a0127f26528 |
||
|
|
1eb76b8dbe |
Fixed not to support seamless roaming for WPA AP am: a393081ada am: 0a1d323cf3
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/20264954 Change-Id: If2e43a32bb580795b0738e840e76a4999f623144 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com> |
||
|
|
f42be32b52 |
Do not set allowed_key_mgmts on BRCM devices
Do not add additional key managements in allowed_key_mgmts field in BRCM solutions. This is to avoid sending the AKM combinations which are not properly handled in driver. Bug: 257347048 Test: Manual - connect to WPA2 AP and WPA3 AP. Change-Id: Ia95fc14b5e3041cb077fde4713f36c1a9f81fbcf |
||
|
|
89eba10c23 |
[wpa_supplicant] Cumulative patch from commit 61c6e7c62
Bug: 245752074 Test: connect/disconnect to WPA2, WPA3 networks Test: SoftAp & p2p connection Test: Regression test(b/247129565) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source 61c6e7c62 nl80211: Parsing of MLO connection info from roam+auth event 3d842d910 MLD STA: Add support for parsing MLO KDEs e1105bab8 Add QCA vendor interface support for Spatial Reuse (SR) feature 1f39f85b7 Fix compiler warning on shift overflow in QCA vendor definitions c5b950b6a Fix compilation error due to use of bitwise '&' with boolean operands 7bdd3f2aa P2P: Allow P2P CSA from 5 GHz to 2.4 GHz band a7684a21c Update hw mode after ACS selects the channel 768537921 P2P: Set operating class along with operating channel width ee7eec518 P2P: Fix the issue in setting optimized listen channel 01944c095 Fix RNR BSSID setting for own interfaces 3a7fe1e21 dbus: Omit FT key mgmt capabilities without CONFIG_IEEE80211R d2caf6ef5 dbus: Fix property DebugShowKeys and DebugTimestamp a17f9a2d4 Add usage print for -q flag f77c0f914 ACS: Include frequency in info messages 0c7b3814c Use a less generic name for IEEE802.11 CRC-32 routine 7ed17eee3 ACS: Don't select indoor channel on outdoor operation 1f795df7a wpa_supplicant man page missing -I flag ef2d2e81a Add a new QCA vendor attribute to support flexible TWT 1b6f3b585 MLD STA: Indicate per link channel switch b7f98d92d MLD STA: Add per-link MLO signal poll 28b2256da MLD STA: Add MLO_STATUS control interface command 8dd5b9a9e nl80211: Send bssid info as parameter to nl80211_get_link_signal() 6ca98040a MLD STA: Indicate AP MLD address in STATUS command 22ba81cfe MLD STA: Indicate AP MLD address in CTRL-EVENT-CONNECTED db99e7341 Add AP MLD address into BSS command output 4bd316524 bss: Parse and store MLD address of the AP from Multi-Link element cc29cadf2 Helper function to get MLD address from Basic Multi-Link element 9a8bd7be0 scan: Helper function to get ML IE of specified type from scan result IEs e21128614 nl80211: Use AP MLD address to set supplicant port as authorized 7784964cb MLD STA: Fetch MLO connection info into core wpa_supplicant e2147f917 nl80211: Indicate MLO connection info in driver status c7741009f nl80211: Parse MLO connection info in NL80211_CMD_CONNECT event bd499f0e6 Add a helper function to get ML IE of specified type from IEs buffer 36645f839 EHT: Add Multi-Link element field definitions 62612dfc1 P2P: Use only PSC for P2P group in the 6 GHz band 7974d8053 Configure RRM elements to the driver in the driver-AP-SME case d1a7626ff SAE: Use correct SSID profile for SAE auth retries during external auth 096feac19 SAE: Include the new -EXT-KEY AKMs in external auth case 76793cbbc SAE: Make sure H2E PT is derived for external auth SSID profile 122cdd592 Enable TWT responder AP role only if IEEE 802.11ax/HE is enabled ed442e8dc Add p2p_optimize_listen_chan=1 to default Android template 5b76c3654 Extend attributes of QCA_NL80211_VENDOR_SUBCMD_GET_STA_INFO 897e09085 QCA vendor attribute to configure periodic sounding 0cc6f985d wlantest: Recognize additional not-Robust Action categories cd392151c Validate MAC Address KDE length in the parser 6f8af5974 Fix expiration logic for the first PTKSA cache entry 85e28a79b PASN: Set secure ranging context to driver after association 9b62b61c6 PASN: Configure secure ranging context to the driver in AP mode de3b91a17 nl80211: Define vendor interface functions to offload PASN authentication edd89d6db PASN: Set keys from PTKSA cache for a valid PTKSA entry e2c3cdf2c nl80211: Register PASN Authentication frames for SME-in-driver 58a96187e nl80211: Allow PASN Authentication frames with random (foreign) MAC address 24929543b PASN: Deauthenticate on PTKSA cache entry expiration 74d894a2e PASN: Offload handshake for multiple peers from the driver 06317f5e3 PASN: Add driver operation to set secure ranging context and PASN response 2edebc6b6 PASN: Add interface to handle PASN request from the driver 9330bf318 PASN: Add function to compute LTF keyseed from KDK 9391f7100 Add own MAC address in PASN supplicant start and deauthentication 580bd04cf Add own MAC address used for key derivation to PTKSA cache d0d585c48 Store secure ranging driver capabilities in WPA state machine 96a604128 Use separate PASN capabilities for AP and STA modes 909fa448e EAPOL: Update PMK length in EAPOL callback to support longer keys c80dc6940 OpenSSL: Include rsa.h for all OpenSSL versions 723eb4f38 P2P: Fix a typo in a comment about removing 6 GHz channels e9627f8c3 P2P: Skip 6 GHz band directly if 6 GHz P2P is disabled 03f7f633a Fix wrong AKM priority for FILS 1f9a988f1 DPP3: Do not initiate PKEX for PB if no configuration is available aa75aa1dc Add QCA vendor interface to get SAR capabilities to userspace 5de45546d Add support to send multi AKM connect request when driver's SME in use 0ce1545dc nl80211: Determine maximum number of supported AKMs 48c620829 Update PSK after cross AKM roaming to WPA-PSK when driver's SME in use 7e97c619a Sync with wireless-next.git include/uapi/linux/nl80211.h 54706957e DPP: Fix DPP_RELAY_ADD_CONTROLLER command parsing 44b26d82b nl80211: Silence a compiler warning on printf in 32-bit builds 4ae14deee DPP3: Use chirping channel list in PB discovery c58be1d8f DPP: Channel list generation for presence announcement to helper funcion 820211245 OpenSSL: Fix HPKE in some corner cases 57968faea DPP: Do not discard network introduction frames in test mode d72302c6b DPP: Do not use 6 GHz channels for push button 89de431f2 DPP: Add config response status value to DPP-CONF-SENT 80d5e264c Enhance QCA vendor roam event to indicate MLO links after reassociation 662249306 Update copyright notices for the QCA vendor definitions 1d08b238c nl80211: Allow more time for the initial scan with 6 GHz faf9c04cb Remove a host of unnecessary OPENSSL_IS_BORINGSSL ifdefs b9cd5a82f Always process pending QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_ROAM_AUTH data ef4cd8e33 QoS: Use common classifier_mask for ipv4/ipv6 93be02592 Add fixed FDD mode to qca_btc_chain_mode QCA vendor attribute 5565fbee2 DPP: Check Enrollee supported curves when building Config Response 4cfb484e9 DPP: Allow dpp_controller_start without arguments in CLIs c97000933 Fix ifdef condition for imsi_privacy_cert f70db167a SAE: Derive a variable length PMK with the new AKM suites 91010e6f6 SAE: Indicate AKM suite selector in commit for new AKM suites e81ec0962 SAE: Use H2E unconditionally with the new AKM suites f8eed2e8b SAE: Store PMK length and AKM in SAE data 9dc4e9d13 SAE: EAPOL-Key and key/MIC length information for the new AKM suites a32ef3cfb SAE: Driver capability flags for the new SAE AKM suites 91df8c9c6 SAE: Internal WPA_KEY_MGMT_* defines for extended key AKMs 5c8a714b1 SAE: Use wpa_key_mgmt_sae() helper 5456b0f26 Define new RSN AKM suite selector values def33101c DPP: Clear push button announcement state on wpa_supplicant FLUSH d22dfe918 DPP: Event message for indicating when Relay would need a Controller bfe3cfc38 DPP: Allow Relay connections to Controllers to be added and removed 808834b18 Add a comparison function for hostapd_ip_addr f7763880b DPP: Advertise Configurator connectivity on Relay automatically ca682f80a DPP: Dynamic Controller initiated connection on Relay d2388bcca DPP: Strict validation of PKEX peer bootstrapping key during auth a7b8cef8b DPP3: Fix push button boostrapping key passing through PKEX 69d7c8e6b DPP: Add peer=id entry for PKEX-over-TCP case 1ff9251a8 DPP3: Push button Configurator in wpa_supplicant e9137950f DPP: Recognize own PKEX Exchange Request if it ends up being received 692956446 DPP: Note PKEX code/identifier deletion in debug log ae4a3a6f6 DPP: Add DPP-CONF-REQ-RX event for Controller fb2937b85 DPP: Allow Controller to initiate PKEX through Relay 15af83cf1 DPP: Delete PKEX code and identifier on success completion of PKEX 479e412a6 DPP3: Default value for dpp_connector_privacy 148de3e0d DPP3: Private Peer Introduction protocol 786ea402b HPKE base mode with single-shot API f0273bc81 OpenSSL: Remove a forgotten debug print 68209ddbe DPP: Allow 3rd party information to be added into config object 0e2217c95 DPP: Allow 3rd party information to be added into config request obj 3d82fbe05 Add QCA vendor subcommand and attributes for SCS rule configuration 16b62ddfa QCA vendor attribute for DBAM configuration 451ede2c3 DPP: Allow AP/Relay to be configured to listed for new TCP connections 7bbe85987 DPP3: Allow external configuration to be specified on AP for PB 8db786a43 DPP3: Testing functionality for push button announcements 37bccfcab DPP3: Push button bootstrap mechanism a0054fe7c Add AP and STA specific P802.11az security capabilities (vendor command) 159e63613 QCA vendor command for CoAP offload processing 3b7bb17f6 Add QCA vendor attribute for TIM beacon statistics Change-Id: Ic5faae10839f317cc70a4df7a3f2047812ffd34c |
||
|
|
a393081ada |
Fixed not to support seamless roaming for WPA AP
The seamless roaming support that we have currently is for SAE transition mode which uses WPA2. but, DUT tried to connect AP using multiple AKM even if the AP is set as WPA-PSK-CCMP. Before, fixed to support multiple AKMs only CCMP combinations. https://partner-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2246211 In addition to the change, this fix could prevent WPA APs from using multiple AKM features. Bug: 254302283 Test: tested with TPlink Archer C7 AC1750 Signed-off-by: Dennis Jeon <dennis.jeon@broadcom.com> Change-Id: I70d526693c1ac3b929a4f85ede040dd879b0ea98 |
||
|
|
466eb7762e |
Merge "Fixed multiple AKMs to be support CCMP only" into tm-qpr-dev am: 446ff6767b am: a6df95fd01
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/19175661 Change-Id: Iead2251c86d5d4396400201d4884b004a74c7e2c Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com> |
||
|
|
446ff6767b | Merge "Fixed multiple AKMs to be support CCMP only" into tm-qpr-dev | ||
|
|
2a960550e1 |
Fixed multiple AKMs to be support CCMP only
Fixed to not use multiple AKMs when connecting to an AP set with TKIP Bug: 237362902 Test: AU drop test Change-Id: I8d1d66c71d2b8a362d0bddb50f7ca5e012961e69 Signed-off-by: Dennis Jeon <dennis.jeon@broadcom.com> |
||
|
|
115616ef1b |
wifi: HIDL/AIDL register networks when p2p dev interface added
persistent groups are not registered to the AIDL network map,
hence wifi service gets errors on getting the group information.
If p2p uses dedicated interface, register the network whose SSID
starts with DIRECT-.
Bug: 238529085
Bug: 238601241
Test: create a persistent group, turn off wifi, turn on wifi,
check saved group
Merged-In: Ib61459774d9afe236c4cc09023b87d718f23b831
Change-Id: Ib61459774d9afe236c4cc09023b87d718f23b831
|
||
|
|
e2206be29d |
wifi: HIDL/AIDL register networks when p2p dev interface added
persistent groups are not registered to the AIDL network map,
hence wifi service gets errors on getting the group information.
If p2p uses dedicated interface, register the network whose SSID
starts with DIRECT-.
Bug: 238529085
Bug: 238601241
Test: create a persistent group, turn off wifi, turn on wifi,
check saved group
Change-Id: Ib61459774d9afe236c4cc09023b87d718f23b831
|
||
|
|
8cd6f4d587 |
[wpa_supplicant] Cumulative patch from commit 09a281e52
Bug: 237446599
Test: connect/disconnect to WPA2, WPA3 networks
Test: SoftAp & p2p connection
Test: Regression test(b/237480760)
BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source
09a281e52 Add QCA vendor interface for PASN offload to userspace
809fb96fa Add a vendor attribute to configure concurrency policy for AP interface
a5754f531 Rename QCA_NL80211_VENDOR_SUBCMD_CONCURRENT_MULTI_STA_POLICY
085a3fc76 EHT: Add 320 channel width support
bafe35df0 Move CHANWIDTH_* definitions from ieee80211_defs.h to defs.h
3c2ba98ad Add QCA vendor event to indicate driver recovery after internal failures
6b461f68c Set current_ssid before changing state to ASSOCIATING
8dd826741 QCA vendor attribute to configure direct data path for audio traffic
504be2f9d QCA vendor command support to get WLAN radio combinations
d5905dbc8 OCV: Check the Frequency Segment 1 Channel Number only on 80+80 MHz
4383528e0 P2P: Use weighted preferred channel list for channel selection
f2c5c8d38 QCA vendor attribute to configure RX link speed threshold for roaming
94bc94b20 Add QCA vendor attribute for DO_ACS to allow using existing scan entries
b9e2826b9 P2P: Filter 6 GHz channels if peer doesn't support them
d5a9944b8 Reserve QCA vendor sub command id 206..212
ed63c286f Remove space before tab in QCA vendor commands
e4015440a ProxyARP: Clear bridge parameters on deinit only if hostapd set them
02047e9c8 hs20-osu-client: Explicit checks for snprintf() result
cd92f7f98 FIPS PRF: Avoid duplicate SHA1Init() functionality
5c87fcc15 OpenSSL: Use internal FIPS 186-2 PRF with OpenSSL 3.0
9e305878c SAE-PK: Fix build without AES-SIV
c41004d86 OpenSSL: Convert more crypto_ec_key routines to new EVP API
667a2959c OpenSSL: crypto_ec_key_get_public_key() using new EVP_PKEY API
5b97395b3 OpenSSL: crypto_ec_key_get_private_key() using new EVP_PKEY API
177ebfe10 crypto: Convert crypto_ec_key_get_public_key() to return new ec_point
26780d92f crypto: Convert crypto_ec_key_get_private_key() to return new bignum
c9c2c2d9c OpenSSL: Fix a memory leak on crypto_hash_init() error path
6d19dccf9 OpenSSL: Free OSSL_DECODER_CTX in tls_global_dh()
4f4479ef9 OpenSSL: crypto_ec_key_parse_{priv,pub}() without EC_KEY API
563699174 EAP-SIM/AKA peer: IMSI privacy attribute
1004fb7ee tests: Testing functionality to discard DPP Public Action frames
99165cc4b Rename wpa_supplicant imsi_privacy_key configuration parameter
35eda6e70 EAP-SIM peer: Free imsi_privacy_key on an error path
1328cdeb1 Do not try to use network profile with invalid imsi_privacy_key
d1652dc7c OpenSSL: Refuse to accept expired RSA certificate
866e7b745 OpenSSL: Include rsa.h for OpenSSL 3.0
bc99366f9 OpenSSL: Drop security level to 0 with OpenSSL 3.0 when using TLS 1.0/1.1
ed325ff0f DPP: Allow TCP destination (address/port) to be used from peer URI
37bb4178b DPP: Host information in bootstrapping URI
1142b6e41 EHT: Do not check HE PHY capability info reserved fields
bc3699179 Use Secure=1 in PTK rekeying EAPOL-Key msg 1/4 and 2/4
b859b9bce Simplify wpa_bss_get_vendor_ie_multi_beacon() bounds checking
fc9648a6a DPP: Debug print if not relay is available for PKEX exchange
1739d50c2 FST: More robust bounds checking of local data in fst_dump_mb_ies()
63eb98a8e SAE: Make Anti-Clogging token element parsing simpler
a6e04a067 Simplify DSCP policy parsing
77bb12a60 P2P: Maintain ip_pool bitfield index separately
3f3ce0571 Check sscanf() return value in TWT_SETUP parsing
2982e50c1 EAP-SAKA: Simplify attribute parser for static analyzers
6e8518749 GAS: Limit maximum comeback delay value
fe1dc9ba7 WNM: Try to make bounds checking easier for static analyzers
f8615990e Simplify wpa_parse_kde_ies()
61d37f44b Simplify wpa_parse_generic()
469528a6e BSS coloring: Fix bitmap check
8392c86df Check he_cap pointer in hostapd_set_freq_params() consistently
2227c85a9 DPP: Verify that crypto_ec_point_to_bin() succeeds
a8c319952 nl80211: Verify that nla_put_flag() succeeds for background radar
993eb1240 FST: Make sure get_hw_modes() callback is set for hostapd
4537fe124 P2P: Explicit nul termination of the generated passphrase
79dc7f619 scan: Add option to disable 6 GHz collocated scanning
3b8d9da9b nl80211: Set NL80211_SCAN_FLAG_COLOCATED_6GHZ in scan
96a7f3832 hostapd: Add the destination address of unsolicited Probe Response frame
16e755754 Add -q flag to hostapd in order to control log level
869037443 Discard unencrypted EAPOL/EAP when TK is set and PMF is enabled (AP)
3c2fbe9f5 Discard unencrypted EAPOL-EAP when TK is set and PMF is enabled
872a57500 Discard unencrypted EAPOL-Key msg 1/4 when TK is set and PMF is enabled
e6c0e1215 Do not prevent Michael MIC error report based on disallowed PTK0 rekey
18c0ac890 Provide information about the encryption status of received EAPOL frames
7ee814201 FILS: Set pairwise_set when configuring TK after association
98278c0de Fix no_encrypt flag in control port TX for rekeying
b1172c19e WPA: Discard EAPOL-Key msg 1/4 with corrupted information elements
7a7a4ea57 Check need for SA Query/assoc comeback before updating RSNE parameters
Change-Id: Ifbfe69676b38499a221aeb242cdb3eac3deee375
|
||
|
|
59fa4b44b8 |
[wpa_supplicant] Cumulative patch from commit 27e828d72
Bug: 231272394
Test: connect/disconnect to WPA2, WPA3 networks
Test: SoftAp & p2p connection
Test: Regression test(b/231636895)
BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source
27e828d72 ACS: Send EHT enabled info to driver
82066bd36 nl80211: Don't force VHT channel definition with EHT
43fe1ce35 EHT: Add [EHT] flag into AP mode STA command
696ad5c2d EHT: Indicate wifi_generation=7 in wpa_supplicant STATUS output
4994c41f2 EHT: Indicate ieee80211be configuration in hostapd STATUS output
50d883710 EHT: Fix invalid length checking for EHT Capability element
6c7b2be42 SAE: Send real status code to the driver when AP rejects external auth
2c78f11a9 Fix compilation due to forward declaration of macaddr_acl
c8e822801 OpenSSL: Fix build with old library versions that do not support TLS 1.3
c24e18e5c LibreSSL: Fix compilation issue with TLS 1.3 session ticket limit
eb5e63985 LibreSSL: Fix compilation issue with RSA-OAEP
5d56cf1c7 BoringSSL: Fix compilation error due to TLS 1.3 session tickets
a561d12d2 EAP peer status notification for server not supporting RFC 5746
566ce69a8 EAP peer: Workaround for servers that do not support safe TLS renegotiation
ccb3206b6 Fix tls_connection_set_success_data() in TLS library wrappers
decac7cd1 OpenSSL: Do not send out a TLS 1.3 session ticket if caching disabled
05406f7ae EAP-PEAP server: Fix TLS 1.3 move to Phase 2 without a new session ticket
10746875e OpenSSL: Allow no OCSP response when resuming a session with TLS 1.3
2be1bcaf7 EAP-TLS peer: Fix protected success indication check for resumed session
1c66276d9 EAP-TLS server: Send final TLS message for resumed session with TLS 1.3
81e249888 OpenSSL: Limit the number of TLS 1.3 session tickets to one
d26247c3d wpa_supplicant/README-WPS: Beautifications
a8d058c93 OpenSSL: SSLKEYLOGFILE capability to allow Wireshark TLS decoding
23f389068 wolfSSL: Fix OCSP stapling
a2971f8d8 wolfSSL: Allow TLS version 1.3 to be disabled
a40e48fbe wolfSSL: Fix TLS 1.3 session handling
0c3f68f2a wolfSSL: Check for the too-short-password error in pbkdf2_sha1()
ca2622481 Check the return of pbkdf2_sha1() for errors
013cd694d wolfSSL: Fixes for FIPS builds
9d5f8168f wolfSSL: Register a FIPS callback
8f36e6c0f wolfSSL: Implement crypto_ec_key wrappers
1f7e10177 wolfSSL: Add missing free calls for wolfSSL structs
ec1cd91e7 wolfSSL: Support both DER and PEM blobs
42871a5d2 EAP-SIM/AKA peer: IMSI privacy
21098e39f EAP-SIM/AKA server: IMSI privacy
36b11bbcf OpenSSL: RSA-OAEP-SHA-256 encryption/decryption
c3d389b72 EHT: Channel switch command support
dae7940a4 EHT: Additions to hostapd_set_freq_params()
e646b11fe EHT: Indicate EHT support in Neighbor Report element
f915d52de EHT: Provide EHT capabilities in STA addition path
a6d1b4c46 EHT: Process (Re)Association Request frame capabilities
340c0e212 EHT: Parse elements received in Management frames
d54e3d049 EHT: Add operation element in AP mode Management frames
9b7202d66 EHT: Add capabilities element in AP mode Management frames
a7ea72188 EHT: Add configuration options for beamforming capabilities
8db3881c7 EHT: Add operating channel width configuration
8dcc2139f EHT: AP mode configuration options to enable/disable the support
9f7da264b nl80211: Pass station's EHT capabilities to the driver in sta_add()
0c8a9aa5d nl80211: Parse EHT capabilities from the driver
c08b735fd EHT: Define EHT elements
1a716f86a defconfig: Document IEEE 802.11ax as a published amendment
86310c220 Set hostapd hw_mode automatically based on 6 GHz op_class
664fd83d5 nl80211: Increase the buffer length for debug printing channels
563162a5f QCA vendor attribute to allow eMLSR HW mode
1e34bc49c OpenSSL: Track SSL_SESSION ex data separately
734fa392f MBO: Check association disallowed in Beacon frames, if newer
284e3ad19 Determine whether Beacon frame information is newer in scan results
28c9f29a3 scan: Print SSID in scan results dump
5a0471579 Install wpa_passphrase when not disabled
f1686d776 hostapd: Allow enabling background radar
08d7738bb wolfSSL: Speed up crypto_ec_point_compute_y_sqr()
f50d5c9a8 wolfSSL: Fix crypto_ec_point_compute_y_sqr() error case processing
7302aa761 wolfSSL: Fix the memory leak of crypto_ec_point_compute_y_sqr()
e7dd0fff1 wolfSSL: Use wc_HmacInit() to avoid potential use of uninitialized values
f7be558d6 OpenSSL: Fix build with BoringSSL
6d33ef362 OpenSSL: Remove compatibility options for older versions than 1.0.2
78c2a4cd0 OpenSSL: Drop compatibility options for LibreSSL older than 2.7
b06250767 OpenSSL: Implement crypto_ecdh routines without EC_KEY for OpenSSL 3.0
fc96f6802 OpenSSL: Use new name for the EC_POINT set/get coordinate functions
0aae045af ctrl: Print the source address of the received commands
f94214968 wpa_ctrl: Wait for a total of 10 seconds, not 10 seconds per iteration
0d9be8855 wolfSSL: Fix certificate commonName checking
94e0f39d9 wolfSSL: Use wolfSSL_export_keying_material() when available
c31fc7a64 wolfSSL: Fix crypto_dh_init() and dh5_init()
d7b8c6eef wolfSSL: Fix crypto_ecdh_* with ECC_TIMING_RESISTANT
ae1fb6455 EAP-EKE server: Fix a memory leak on an error path
166acab4e wolfSSL: TLS session caching
12dee16d7 wolfSSL: Add a debug logging callback
a5d190650 wolfSSL: Implement tls_get_tls_unique()
a419fef36 wolfSSL: Implement tls_connection_get_cipher_suite()
364876b7d wolfSSL: Implement tls_connection_get_peer_subject()
d9c716400 wolfSSL: Implement tls_connection_get_own_cert_used()
d677b9dc6 wolfSSL: Conditional build for aes_wrap/aes_unwrap()
b0f016b87 eapol_test: Update with src/ap/ieee802_1x.c changes
747c5f228 Include MS_FUNCS=y for EAP-pwd peer build
c7f71fb86 Include HMAC-SHA384/512 KDF for SAE if SHA384/512 is included
3a759dcc8 ACS: Honor acs_exclude_dfs with hostapd's ACS implementation
3240cedd6 eapol_test: Print out names for additional known EAP types
f5c711c85 OpenSSL: Unload providers only at process exit
33c4dd26c BSS coloring: Handle the collision and CCA events coming from the kernel
27b4cc712 nl80211: Handle driver events for BSS coloring
399d6e64d nl80211: Add the switch_color() handler for BSS color changes
86bd90eb3 BSS coloring: Disable BSS color during CCA
f7d0b740e BSS coloring: BSS Color Change Announcement element generation
654d2395d BSS coloring: Handling of collision events and triggering CCA
52e2516f1 wpa_supplicant: Add the CONFIG_HE_OVERRIDES option to the defconfig
6a2a60f1d OpenSSL: Do not use the deprecated RSAPrivateKey function
ebb3055e1 OpenSSL: Generate DH parameters automatically if not set with dh_file
bcd299b32 OpenSSL: Convert DH/DSA parameter loading to new API
28c1c91d0 Remove unused dh_blob parameter
4a774cf31 Remove useless DH file configuration from TLS library wrappers
65652c67f Remove DH file configuration from TLS client functionality
b94371af8 RADIUS attributes for EAPOL-Key message details
24763e3cd RADIUS: Attributes with Extended Types (RFC 6929)
feed2f9e7 BoringSSL: Use accessor functions for X509 key usage flags
80be88a08 BoringSSL: Replace stack-allocated X509_STORE_CTX with heap one
b95ed17f6 OpenSSL: Fix build with BoringSSL and LibreSSL 3.3.x and older
ae0f6ee97 OpenSSL: CMAC using the OpenSSL library for non-FIPS cases as well
0c61f6234 OpenSSL: Implement CMAC using the EVP_MAC API
4fcd29660 OpenSSL: Extend CMAC to support 192-bit AES
117617843 OpenSSL: Remove now unused compatibility wrapper for RSA_bits()
a2dbb2558 Android: Compile hs20-osu-client to /vendor/bin in test builds
b0769ce61 DPP: Allow a list of supported curves to be used in bootstrapping URI
ef85328a6 QCA vendor command support to reset configuration for eLNA bypass
7008c50fa OpenSSL: Implement DH using the EVP API
e31500ade OpenSSL: Implement HMAC using the EVP_MAC API
097ca6bf0 OpenSSL: Unload providers on deinit
092efd45a OpenSSL: Implement AES keywrap using the EVP API
7e4984d9c OpenSSL: Use a correct EVP_CIPHER_CTX freeing function on an error path
8e0ac5366 RRM: Include passive channels in active beacon report scan
0adc67612 wpa_supplicant: Use unique IDs for networks and credentials
dacb6d278 Update IEEE P802.11ax draft references to published amendment
8128ea76a Add Transmit Power Envelope element in 6 GHz
bc3dc72a3 Extend 6 GHz Operation Info field in HE Operation element
0eb686637 hostapd: Add config option to specify 6 GHz regulatory AP type
ee06165e9 hostapd: Extend Country element to support 6 GHz band
f5ad97245 PASN: Fix build without CONFIG_TESTING_OPTIONS=y
3467a701c wpa_supplicant: Do not associate on 6 GHz with forbidden configurations
43c6eb5e4 SAE-PK: Add the option to the defconfigs
0482251a6 EAP-TLS: Allow TLSv1.3 support to be enabled with build config
7114e5606 EAP-TLS: Testing functionality to skip protected success indication
95fd54b86 Disconnect STA on continuous EAP reauth without 4-way handshake completion
9e11e746f EAP-TLS: Do not allow TLSv1.3 success without protected result indication
6135a8a6a Stop authentication attemps if AP does not disconnect us
88ab59d71 EAP-TLS: Replace the Commitment Message term with RFC 9190 language
63f311b10 EAP-TLS: Update specification references to RFC 5216 and 9190
5ab385321 Revert "Android: Compile hs20-osu-client to /vendor/bin in test builds"
b746cb28b Add support for not transmitting EAPOL-Key group msg 2/2
d27f7bd94 FILS: Fix config check to allow unsolicited broadcast Probe Response
65a3a273c OWE: Reuse own DH private key in AP if STA tries OWE association again
6ff8bda99 hostapd: Add the missing CONFIG_SAE option to the defconfig
1f5b6085c Fix SIGSEGV of eapol_test
576662d27 ieee802_11_auth: Coding style cleanup - NULL comparison
945acf3ef ieee802_11_auth: Coding style cleanup - no string constant splitting
1c3438fec RADIUS ACL/PSK check during 4-way handshake
5b5c954c0 Fix AP config check to recognize all PSK AKMs
c5d9f9064 QCA vendor attribute to indicate NDP interface managemtn using nl80211
a9c90475b FT: Update current_bss to target AP before check for SME-in-driver
0c88d1487 Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher
d5a9331f9 P2P: Copy only valid opclasses while filtering out 6 GHz channels
99c91beaa Sync with wireless-next.git include/uapi/linux/nl80211.h
d9121335a wpa_cli: Add ACL and BTM control commands
00622fcfe Extend ACL to install allow/deny list to the driver dynamically
077bce96f Set drv_max_acl_mac_addrs in wpa_supplicant AP mode
9828aba16 Support ACL operations in wpa_supplicant AP mode
fd0d738ff Add return value to ACL functions
f5ac42811 Move ACL control interface commands into shared files
930695662 Add BSS-TM-QUERY event to indicate reception of BSS TM Query
febcdf324 Support BTM operations in wpa_supplicant AP mode
0f8c6e995 Move BTM control interface commands into shared file
e059d8ece Update the Extended Capability element to struct sta_info
eb2e6b56b Enable BSS Transition Management in wpa_supplicant AP mode
30ecf0181 DPP: Update Controller parameters when it was already started
b93d1083e DPP: Fix msg_ctx for PKEX over TCP as Controller/Responder
3085e1a67 hs20-osu-client: dNSName values from OSU server certificate for PPS MO
ce86f2446 DFS: Remove unnecessary variable
760a5ae26 DFS: Switch to background radar channel if available
b63d953fe DFS: Enable CSA for background radar detection
25663241c DFS: Introduce hostapd_dfs_request_channel_switch()
316a9dc63 DFS: Configure background radar/CAC detection
bad12effe nl80211: Radar background flag setting
effd6111b DFS: Rely on channel_type in dfs_downgrade_bandwidth()
f9ba3d5c8 OpenSSL 3.0: Set SSL groups using SSL_set1_groups()
09c62aaf1 OpenSSL: Determine RSA key size without low-level routines
b700a56e1 OpenSSL 3.0: Determine the prime length for an EC key group using EVP_PKEY
3c61f4db4 OpenSSL: Replace EC_GROUP_get_curve_GFp() calls with EC_GROUP_get_curve()
e2cb0ca1a OpenSSL 3.0: Implement crypto_ec_key_group() with new API
f6a53f64a OpenSSL: Replace EVP_PKEY_cmp() with EVP_PKEY_eq() when available
5b093570d D-Bus: Add 'wep_disabled' capability
56a14cc72 DFS: Don't let cac_time_left_seconds overflow
ae512c30a DPP: Fix uninitialised variable on error path
3a157fe92 dbus: Set CurrentAuthMode to INACTIVE only if network is not selected
0ce8d55a2 hs20-osu-client: Allow EST server to use different host name
5eaf596e1 HTTP: Make URL available to the cert_cb
abed7978f HS 2.0 server: Event log entry on missing configuration for the realm
1192d5721 Android: Compile hs20-osu-client to /vendor/bin in test builds
1fee1c40c Enhance QCA vendor interface to indicate TWT required capability of AP
a192305a4 Add QCA vendor attributes for AFC support in external ACS
de5939ef5 DPP: Allow Configurator net_access_key_curve to be changed
9638452a6 DPP: Update Configurator to require same netAccessKey curve to be used
2b406eece DPP: Update Auth-I derivation operations
de64dfe98 DPP: Curve change for netAccessKey
fd2eb7a41 DPP: Fix a memory leak on error path
e9551efe0 DPP: Missing/invalid Protocol Version in Reconfig Auth Req
eeb72e7c9 DPP: Extend DPP_PKEX_ADD ver=<1/2> to cover Responder role
6c3c431bb Add QCA vendor attribute to enable Spectral FFT recapture
fcbdaae8a SAE: Add support for RADIUS passphrase as the SAE password
3d86fcee0 cleanup: Remove unreachable code
9683195ee qca-vendor: Fix typos
4c9ef9322 brcm_vendor: Fix typos
d65285ab8 src/drivers: Fix typos
203a027b2 nl80211: Report background radar/CAC detection capability
0a73649b6 DFS: Add capability to select radar-only channels
f39765369 DFS: Introduce dfs_set_valid_channel() utility routine
d001b301b Fix removal of wpa_passphrase on 'make clean'
cb41c214b build: Re-enable options for libwpa_client.so and wpa_passphrase
dec626109 HE: Fix invalid length checking for HE Capability element
53be64f7d HE: Fix calculation of the PPE Threshold field length
738fef2f0 Clear PSK explicitly from memory in couple more cases on deinit
567b9764f Clear PMK explicitly even without FT support in AP build
0bd29c176 Remove duplicated pointer check
007fd6111 Clear temporary results from stack in PBKDF2-SHA1
1364f322b Remove GTK/IGTK/BIGTK from memory explicitly in AP mode
af1f0694e Clear last set keys (for testing purposes) from memory explicitly
6c850a1c0 nl80211: Clear bss->freq when stopping AP mode
a44fa15cb Define a vendor specific NDP attribute for NAN service id
414ca953f DPP: Clear SCANNING state when starting network introduction
0b5f8e3d8 DPP: Clear netrole on starting chirping or reconfiguration
2fcc076d1 Clear wpa_s->last/current_ssid in more cases
7a7f803a9 DPP: Stop offchannel frame TX wait on DPP_STOP_LISTEN in a corner case
7e941e7a1 macsec_linux: Support cipher suite configuration
46c635910 MACsec: Support GCM-AES-256 cipher suite
42944de69 nl80211: Do not store no-wait TX frame cookies to be cancelled
340ec48cd DPP: Clear state on configuration failure in GAS server hander
7e6f59c70 nl80211: Clear the last saved TX frame cookie on wait expiration
9d5fd3328 Update QCA vendor attribute to indicate maximum PCL attributes
19169a53a atheros: Do not include p2p.h
f43d31dda nl80211: Debug print association comeback event data
a91072503 OCV: Don't start SA Query timer on CSA when SA Query is offloaded
f5c8697c0 Sync with mac80211-next.git include/uapi/linux/nl80211.h
632a9995c Clear ignore_old_scan_res on FLUSH command
Change-Id: I35fd1fb999d045ced8c153fe3d8284c9a71069b1
Merged-In: I35fd1fb999d045ced8c153fe3d8284c9a71069b1
(cherry picked from commit
|
||
|
|
a04bd250ff |
[wpa_supplicant] Cumulative patch from commit 27e828d72
Bug: 231272394 Test: connect/disconnect to WPA2, WPA3 networks Test: SoftAp & p2p connection Test: Regression test(b/231636895) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source 27e828d72 ACS: Send EHT enabled info to driver 82066bd36 nl80211: Don't force VHT channel definition with EHT 43fe1ce35 EHT: Add [EHT] flag into AP mode STA command 696ad5c2d EHT: Indicate wifi_generation=7 in wpa_supplicant STATUS output 4994c41f2 EHT: Indicate ieee80211be configuration in hostapd STATUS output 50d883710 EHT: Fix invalid length checking for EHT Capability element 6c7b2be42 SAE: Send real status code to the driver when AP rejects external auth 2c78f11a9 Fix compilation due to forward declaration of macaddr_acl c8e822801 OpenSSL: Fix build with old library versions that do not support TLS 1.3 c24e18e5c LibreSSL: Fix compilation issue with TLS 1.3 session ticket limit eb5e63985 LibreSSL: Fix compilation issue with RSA-OAEP 5d56cf1c7 BoringSSL: Fix compilation error due to TLS 1.3 session tickets a561d12d2 EAP peer status notification for server not supporting RFC 5746 566ce69a8 EAP peer: Workaround for servers that do not support safe TLS renegotiation ccb3206b6 Fix tls_connection_set_success_data() in TLS library wrappers decac7cd1 OpenSSL: Do not send out a TLS 1.3 session ticket if caching disabled 05406f7ae EAP-PEAP server: Fix TLS 1.3 move to Phase 2 without a new session ticket 10746875e OpenSSL: Allow no OCSP response when resuming a session with TLS 1.3 2be1bcaf7 EAP-TLS peer: Fix protected success indication check for resumed session 1c66276d9 EAP-TLS server: Send final TLS message for resumed session with TLS 1.3 81e249888 OpenSSL: Limit the number of TLS 1.3 session tickets to one d26247c3d wpa_supplicant/README-WPS: Beautifications a8d058c93 OpenSSL: SSLKEYLOGFILE capability to allow Wireshark TLS decoding 23f389068 wolfSSL: Fix OCSP stapling a2971f8d8 wolfSSL: Allow TLS version 1.3 to be disabled a40e48fbe wolfSSL: Fix TLS 1.3 session handling 0c3f68f2a wolfSSL: Check for the too-short-password error in pbkdf2_sha1() ca2622481 Check the return of pbkdf2_sha1() for errors 013cd694d wolfSSL: Fixes for FIPS builds 9d5f8168f wolfSSL: Register a FIPS callback 8f36e6c0f wolfSSL: Implement crypto_ec_key wrappers 1f7e10177 wolfSSL: Add missing free calls for wolfSSL structs ec1cd91e7 wolfSSL: Support both DER and PEM blobs 42871a5d2 EAP-SIM/AKA peer: IMSI privacy 21098e39f EAP-SIM/AKA server: IMSI privacy 36b11bbcf OpenSSL: RSA-OAEP-SHA-256 encryption/decryption c3d389b72 EHT: Channel switch command support dae7940a4 EHT: Additions to hostapd_set_freq_params() e646b11fe EHT: Indicate EHT support in Neighbor Report element f915d52de EHT: Provide EHT capabilities in STA addition path a6d1b4c46 EHT: Process (Re)Association Request frame capabilities 340c0e212 EHT: Parse elements received in Management frames d54e3d049 EHT: Add operation element in AP mode Management frames 9b7202d66 EHT: Add capabilities element in AP mode Management frames a7ea72188 EHT: Add configuration options for beamforming capabilities 8db3881c7 EHT: Add operating channel width configuration 8dcc2139f EHT: AP mode configuration options to enable/disable the support 9f7da264b nl80211: Pass station's EHT capabilities to the driver in sta_add() 0c8a9aa5d nl80211: Parse EHT capabilities from the driver c08b735fd EHT: Define EHT elements 1a716f86a defconfig: Document IEEE 802.11ax as a published amendment 86310c220 Set hostapd hw_mode automatically based on 6 GHz op_class 664fd83d5 nl80211: Increase the buffer length for debug printing channels 563162a5f QCA vendor attribute to allow eMLSR HW mode 1e34bc49c OpenSSL: Track SSL_SESSION ex data separately 734fa392f MBO: Check association disallowed in Beacon frames, if newer 284e3ad19 Determine whether Beacon frame information is newer in scan results 28c9f29a3 scan: Print SSID in scan results dump 5a0471579 Install wpa_passphrase when not disabled f1686d776 hostapd: Allow enabling background radar 08d7738bb wolfSSL: Speed up crypto_ec_point_compute_y_sqr() f50d5c9a8 wolfSSL: Fix crypto_ec_point_compute_y_sqr() error case processing 7302aa761 wolfSSL: Fix the memory leak of crypto_ec_point_compute_y_sqr() e7dd0fff1 wolfSSL: Use wc_HmacInit() to avoid potential use of uninitialized values f7be558d6 OpenSSL: Fix build with BoringSSL 6d33ef362 OpenSSL: Remove compatibility options for older versions than 1.0.2 78c2a4cd0 OpenSSL: Drop compatibility options for LibreSSL older than 2.7 b06250767 OpenSSL: Implement crypto_ecdh routines without EC_KEY for OpenSSL 3.0 fc96f6802 OpenSSL: Use new name for the EC_POINT set/get coordinate functions 0aae045af ctrl: Print the source address of the received commands f94214968 wpa_ctrl: Wait for a total of 10 seconds, not 10 seconds per iteration 0d9be8855 wolfSSL: Fix certificate commonName checking 94e0f39d9 wolfSSL: Use wolfSSL_export_keying_material() when available c31fc7a64 wolfSSL: Fix crypto_dh_init() and dh5_init() d7b8c6eef wolfSSL: Fix crypto_ecdh_* with ECC_TIMING_RESISTANT ae1fb6455 EAP-EKE server: Fix a memory leak on an error path 166acab4e wolfSSL: TLS session caching 12dee16d7 wolfSSL: Add a debug logging callback a5d190650 wolfSSL: Implement tls_get_tls_unique() a419fef36 wolfSSL: Implement tls_connection_get_cipher_suite() 364876b7d wolfSSL: Implement tls_connection_get_peer_subject() d9c716400 wolfSSL: Implement tls_connection_get_own_cert_used() d677b9dc6 wolfSSL: Conditional build for aes_wrap/aes_unwrap() b0f016b87 eapol_test: Update with src/ap/ieee802_1x.c changes 747c5f228 Include MS_FUNCS=y for EAP-pwd peer build c7f71fb86 Include HMAC-SHA384/512 KDF for SAE if SHA384/512 is included 3a759dcc8 ACS: Honor acs_exclude_dfs with hostapd's ACS implementation 3240cedd6 eapol_test: Print out names for additional known EAP types f5c711c85 OpenSSL: Unload providers only at process exit 33c4dd26c BSS coloring: Handle the collision and CCA events coming from the kernel 27b4cc712 nl80211: Handle driver events for BSS coloring 399d6e64d nl80211: Add the switch_color() handler for BSS color changes 86bd90eb3 BSS coloring: Disable BSS color during CCA f7d0b740e BSS coloring: BSS Color Change Announcement element generation 654d2395d BSS coloring: Handling of collision events and triggering CCA 52e2516f1 wpa_supplicant: Add the CONFIG_HE_OVERRIDES option to the defconfig 6a2a60f1d OpenSSL: Do not use the deprecated RSAPrivateKey function ebb3055e1 OpenSSL: Generate DH parameters automatically if not set with dh_file bcd299b32 OpenSSL: Convert DH/DSA parameter loading to new API 28c1c91d0 Remove unused dh_blob parameter 4a774cf31 Remove useless DH file configuration from TLS library wrappers 65652c67f Remove DH file configuration from TLS client functionality b94371af8 RADIUS attributes for EAPOL-Key message details 24763e3cd RADIUS: Attributes with Extended Types (RFC 6929) feed2f9e7 BoringSSL: Use accessor functions for X509 key usage flags 80be88a08 BoringSSL: Replace stack-allocated X509_STORE_CTX with heap one b95ed17f6 OpenSSL: Fix build with BoringSSL and LibreSSL 3.3.x and older ae0f6ee97 OpenSSL: CMAC using the OpenSSL library for non-FIPS cases as well 0c61f6234 OpenSSL: Implement CMAC using the EVP_MAC API 4fcd29660 OpenSSL: Extend CMAC to support 192-bit AES 117617843 OpenSSL: Remove now unused compatibility wrapper for RSA_bits() a2dbb2558 Android: Compile hs20-osu-client to /vendor/bin in test builds b0769ce61 DPP: Allow a list of supported curves to be used in bootstrapping URI ef85328a6 QCA vendor command support to reset configuration for eLNA bypass 7008c50fa OpenSSL: Implement DH using the EVP API e31500ade OpenSSL: Implement HMAC using the EVP_MAC API 097ca6bf0 OpenSSL: Unload providers on deinit 092efd45a OpenSSL: Implement AES keywrap using the EVP API 7e4984d9c OpenSSL: Use a correct EVP_CIPHER_CTX freeing function on an error path 8e0ac5366 RRM: Include passive channels in active beacon report scan 0adc67612 wpa_supplicant: Use unique IDs for networks and credentials dacb6d278 Update IEEE P802.11ax draft references to published amendment 8128ea76a Add Transmit Power Envelope element in 6 GHz bc3dc72a3 Extend 6 GHz Operation Info field in HE Operation element 0eb686637 hostapd: Add config option to specify 6 GHz regulatory AP type ee06165e9 hostapd: Extend Country element to support 6 GHz band f5ad97245 PASN: Fix build without CONFIG_TESTING_OPTIONS=y 3467a701c wpa_supplicant: Do not associate on 6 GHz with forbidden configurations 43c6eb5e4 SAE-PK: Add the option to the defconfigs 0482251a6 EAP-TLS: Allow TLSv1.3 support to be enabled with build config 7114e5606 EAP-TLS: Testing functionality to skip protected success indication 95fd54b86 Disconnect STA on continuous EAP reauth without 4-way handshake completion 9e11e746f EAP-TLS: Do not allow TLSv1.3 success without protected result indication 6135a8a6a Stop authentication attemps if AP does not disconnect us 88ab59d71 EAP-TLS: Replace the Commitment Message term with RFC 9190 language 63f311b10 EAP-TLS: Update specification references to RFC 5216 and 9190 5ab385321 Revert "Android: Compile hs20-osu-client to /vendor/bin in test builds" b746cb28b Add support for not transmitting EAPOL-Key group msg 2/2 d27f7bd94 FILS: Fix config check to allow unsolicited broadcast Probe Response 65a3a273c OWE: Reuse own DH private key in AP if STA tries OWE association again 6ff8bda99 hostapd: Add the missing CONFIG_SAE option to the defconfig 1f5b6085c Fix SIGSEGV of eapol_test 576662d27 ieee802_11_auth: Coding style cleanup - NULL comparison 945acf3ef ieee802_11_auth: Coding style cleanup - no string constant splitting 1c3438fec RADIUS ACL/PSK check during 4-way handshake 5b5c954c0 Fix AP config check to recognize all PSK AKMs c5d9f9064 QCA vendor attribute to indicate NDP interface managemtn using nl80211 a9c90475b FT: Update current_bss to target AP before check for SME-in-driver 0c88d1487 Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher d5a9331f9 P2P: Copy only valid opclasses while filtering out 6 GHz channels 99c91beaa Sync with wireless-next.git include/uapi/linux/nl80211.h d9121335a wpa_cli: Add ACL and BTM control commands 00622fcfe Extend ACL to install allow/deny list to the driver dynamically 077bce96f Set drv_max_acl_mac_addrs in wpa_supplicant AP mode 9828aba16 Support ACL operations in wpa_supplicant AP mode fd0d738ff Add return value to ACL functions f5ac42811 Move ACL control interface commands into shared files 930695662 Add BSS-TM-QUERY event to indicate reception of BSS TM Query febcdf324 Support BTM operations in wpa_supplicant AP mode 0f8c6e995 Move BTM control interface commands into shared file e059d8ece Update the Extended Capability element to struct sta_info eb2e6b56b Enable BSS Transition Management in wpa_supplicant AP mode 30ecf0181 DPP: Update Controller parameters when it was already started b93d1083e DPP: Fix msg_ctx for PKEX over TCP as Controller/Responder 3085e1a67 hs20-osu-client: dNSName values from OSU server certificate for PPS MO ce86f2446 DFS: Remove unnecessary variable 760a5ae26 DFS: Switch to background radar channel if available b63d953fe DFS: Enable CSA for background radar detection 25663241c DFS: Introduce hostapd_dfs_request_channel_switch() 316a9dc63 DFS: Configure background radar/CAC detection bad12effe nl80211: Radar background flag setting effd6111b DFS: Rely on channel_type in dfs_downgrade_bandwidth() f9ba3d5c8 OpenSSL 3.0: Set SSL groups using SSL_set1_groups() 09c62aaf1 OpenSSL: Determine RSA key size without low-level routines b700a56e1 OpenSSL 3.0: Determine the prime length for an EC key group using EVP_PKEY 3c61f4db4 OpenSSL: Replace EC_GROUP_get_curve_GFp() calls with EC_GROUP_get_curve() e2cb0ca1a OpenSSL 3.0: Implement crypto_ec_key_group() with new API f6a53f64a OpenSSL: Replace EVP_PKEY_cmp() with EVP_PKEY_eq() when available 5b093570d D-Bus: Add 'wep_disabled' capability 56a14cc72 DFS: Don't let cac_time_left_seconds overflow ae512c30a DPP: Fix uninitialised variable on error path 3a157fe92 dbus: Set CurrentAuthMode to INACTIVE only if network is not selected 0ce8d55a2 hs20-osu-client: Allow EST server to use different host name 5eaf596e1 HTTP: Make URL available to the cert_cb abed7978f HS 2.0 server: Event log entry on missing configuration for the realm 1192d5721 Android: Compile hs20-osu-client to /vendor/bin in test builds 1fee1c40c Enhance QCA vendor interface to indicate TWT required capability of AP a192305a4 Add QCA vendor attributes for AFC support in external ACS de5939ef5 DPP: Allow Configurator net_access_key_curve to be changed 9638452a6 DPP: Update Configurator to require same netAccessKey curve to be used 2b406eece DPP: Update Auth-I derivation operations de64dfe98 DPP: Curve change for netAccessKey fd2eb7a41 DPP: Fix a memory leak on error path e9551efe0 DPP: Missing/invalid Protocol Version in Reconfig Auth Req eeb72e7c9 DPP: Extend DPP_PKEX_ADD ver=<1/2> to cover Responder role 6c3c431bb Add QCA vendor attribute to enable Spectral FFT recapture fcbdaae8a SAE: Add support for RADIUS passphrase as the SAE password 3d86fcee0 cleanup: Remove unreachable code 9683195ee qca-vendor: Fix typos 4c9ef9322 brcm_vendor: Fix typos d65285ab8 src/drivers: Fix typos 203a027b2 nl80211: Report background radar/CAC detection capability 0a73649b6 DFS: Add capability to select radar-only channels f39765369 DFS: Introduce dfs_set_valid_channel() utility routine d001b301b Fix removal of wpa_passphrase on 'make clean' cb41c214b build: Re-enable options for libwpa_client.so and wpa_passphrase dec626109 HE: Fix invalid length checking for HE Capability element 53be64f7d HE: Fix calculation of the PPE Threshold field length 738fef2f0 Clear PSK explicitly from memory in couple more cases on deinit 567b9764f Clear PMK explicitly even without FT support in AP build 0bd29c176 Remove duplicated pointer check 007fd6111 Clear temporary results from stack in PBKDF2-SHA1 1364f322b Remove GTK/IGTK/BIGTK from memory explicitly in AP mode af1f0694e Clear last set keys (for testing purposes) from memory explicitly 6c850a1c0 nl80211: Clear bss->freq when stopping AP mode a44fa15cb Define a vendor specific NDP attribute for NAN service id 414ca953f DPP: Clear SCANNING state when starting network introduction 0b5f8e3d8 DPP: Clear netrole on starting chirping or reconfiguration 2fcc076d1 Clear wpa_s->last/current_ssid in more cases 7a7f803a9 DPP: Stop offchannel frame TX wait on DPP_STOP_LISTEN in a corner case 7e941e7a1 macsec_linux: Support cipher suite configuration 46c635910 MACsec: Support GCM-AES-256 cipher suite 42944de69 nl80211: Do not store no-wait TX frame cookies to be cancelled 340ec48cd DPP: Clear state on configuration failure in GAS server hander 7e6f59c70 nl80211: Clear the last saved TX frame cookie on wait expiration 9d5fd3328 Update QCA vendor attribute to indicate maximum PCL attributes 19169a53a atheros: Do not include p2p.h f43d31dda nl80211: Debug print association comeback event data a91072503 OCV: Don't start SA Query timer on CSA when SA Query is offloaded f5c8697c0 Sync with mac80211-next.git include/uapi/linux/nl80211.h 632a9995c Clear ignore_old_scan_res on FLUSH command Change-Id: I35fd1fb999d045ced8c153fe3d8284c9a71069b1 |
||
|
|
1470908c09 |
Multi AKM(SAE+WPA2PSK) plumb from connect command
Currently the connect command from supplicant facilitates plumbing of single AKM to the driver. In the current change, multi-AKM plumb for the combination of SAE and WPA2PSK AKMs is supported. Bug:210811506 Test:Validated on Pixel phone with Android T. Signed-off-by: Vinayak Yadawad <vinayak.yadawad@broadcom.com> Change-Id: Ie4ace52fa54c35151c607419bb709d9aa3f67f54 |
||
|
|
3a2ec2ce7c |
Notify the framework when an auxiliary event
occurs in wpa_supplicant.
Auxiliary events include:
- EAP_METHOD_SELECTED
- SSID_TEMP_DISABLED
- OPEN_SSL_FAILURE
Bug: 226140098
Bug: 165342942
Test: Manual test - trigger events and check that
onAuxilliaryEvent callback was called.
Change-Id: Ia1f137ddc1a4d91049668d6436652a0ad749c74f
|
||
|
|
c1a2144e79 |
[wpa_supplicant] Cumulative patch from commit ac1e3a7f0
Bug: 217966931
Test: Verify Passpoint ANQP functionality and Passpoint association
Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic
Test: Regression test b/218404053 (Bug: TBD)
BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source
ac1e3a7f0 Add QCA vendor MCC channel quota command and event
1d1e3184b Whitespace/coding style cleanup for QCA vendor attribute definitions
1646883f4 Vendor command to configure rate mask
2faaa193f Rename moderate latency level to XR latency level in vendor attributes
f9905f8d9 nl80211: Clear frequency information on leaving mesh
1f26a0a34 DPP: Use a 120 second timeout for GAS query
07e26b292 GAS server: Increase query timeout to 60 seconds for DPP
a6d157b6f DPP: Start a listen operation for GAS server if needed
da65e7136 nl80211: Add a handler for NL80211_CMD_FRAME_WAIT_CANCEL events
9aaf3e1d1 P2P: Update GO operating frequency after interface setup is completed
033ad6ffa DPP: Allow Configurator parameters to be provided during config exchange
d4961a775 GAS server: Asynchronous request handler comeback time indication
9a90aab12 DPP: Store Enrollee config request information
6751fb060 DPP: Make dpp_netrole_str() non-static
34575ad72 EAP-pwd: Fix the prefix in a debug message
e07000e74 nl80211: Partial support for radio_disable
33cb47cf0 DPP: Fix connection result reporting when using TCP
1822bd378 DPP: Testing capability for invalid Protocol Version in Network Intro
d7be74933 DPP3: PKEX over TCP
bdcccbc27 DPP: Change PKEX version configuration design
9d3f347a2 DPP3: Add PKEX initiator retries and fallback from v2 to v1 for hostapd
3f67ab587 DPP: Handle TX status events for broadcast DPP messages
802136299 DPP3: Start with PKEXv2 and fall back to v1
f32f99df1 P2P: Send response frame on channel where the request is received
b678a3aa3 Extend QCA_NL80211_VENDOR_SUBCMD_PEER_FLUSH_PENDING
fc4bc342e Replace "blacklist" with "denylist" in vendor interface definition
bc9fd8adc Replace "whitelist" with "allowlist" in vendor interface definition
ffe80cb8e wpa_supplicant: ap: Update comment
c76545033 The main branch is now used for v2.11 development
cff80b4f7 Preparations for v2.10 release
7a57eb315 Update copyright notices for the new year 2022
9b14aed90 crypto: Remove unused crypto_ec_point_solve_y_coord()
8c502336d EAP-pwd: Derive the y coordinate for PWE with own implementation
6c380f4c8 SAE: Derive the y coordinate for PWE with own implementation
8ebd8aacc SAE: Move sqrt() implementation into a helper function
41c7f3f20 Defined a driver interface for periodic TSF sync feature
5758d0929 Add a QCA vendor attribute to indicate ACS over EHT
7ffcbd08c Clear roam/BSS TM in progress flags for additional cases
16b5ea9e9 Reject authentication start during BSS TM requests
af6d4031d D-Bus: Fix build without CONFIG_INTERWORKING
58bbcfa31 OpenSSL: Update security level drop for TLS 1.0/1.1 with OpenSSL 3.0
682fce579 OpenSSL: Fix compressed form encoding for subjectPublicKey with 3.0
ff2eccbdf OpenSSL: Load legacy provider when needed for OpenSSL 3.0
ddcdd6286 OpenSSL: Clean up EVP_PKEY_get{0,1}_EC_KEY() use
384aa245e OpenSSL: Speed up crypto_ec_point_compute_y_sqr()
b26f5c0fe DPP: Remove dpp-listen radio work when stopping
3f8c83a65 SAE: Make sure BSS entry is available to determine RSNXE information
43f600a1f Add new vendor attributes to avoid coex unsafe frequencies
cab51021c DPP3: Update version capability indication for hostapd
bc24a8a09 Update supported channel width set (HT40) after channel switch
ff7e403f0 Fix channel switch wrapper when switching from HT to VHT/HE
5606ede12 Update ieee80211ac when channel switching
e6db1bc5d mesh: Make forwarding configurable
5ef9277d0 ACS/DFS: Support min_tx_power configuration
5530688b9 MBO: Fix the allowed range of mbo_assoc_disallow values
c8e4283f9 D-Bus: Interworking network selection
b44e19967 D-Bus: Interworking/Hotspot 2.0 credential operations
4262e6ca4 Move credential removal operations into helper functions
e232d9777 HS 2.0: Crypto engine support for creds
97607de5e D-Bus: Capture group ifname before switching to global P2P instance
36973aac2 SME: No need for OBSS scan if HT40 is disabled
7db757aac Revert "Extract BSS coex 40 MHz check into a separate function"
e480321f8 Revert "STA OBSS: Add check for overlapping BSSs"
b57273d06 DPP2: PKEXv2 core protocol changes
b21b31014 DPP: Testing functionality to omit Protocol Version from Peer Discovery
341e7cd66 DPP3: Verify version match during Network Introduction
f26fd5ee6 DPP3: Use Connector version instead of current version in Peer Discovery
0cfb72689 DPP3: Add version member to Connector
77ddd38b6 DPP3: Add build option for version 3 functionality
14ab4a816 Reject ap_vendor_elements if its length is odd
2c2bfebca Fix bool type values for setband
7dc7b8814 P2P: Remove 6 GHz channels from full scan if 6 GHz not enabled for P2P
147932add Add a QCA vendor attribute to indicate puncture pattern in ACS
0b853303a Update AKMP, cipher, PMF for driver-based SME while roaming
c8b94bc7b mesh: Enable 160 MHz bandwidth support for 6 GHz in IEEE 802.11s mesh
ab0af709d mesh: Enable MFP by default for 6 GHz 11s mesh
d10a01e22 mesh: Enable 80 MHz support for 11s mesh in 6 GHz
d6c5feb8c mesh: Change channel to frequency based lookup for starting mesh
b16b88acd RNR: Do not allow FILS Discovery and unsolicited Probe Response simultaneously
15f099ec7 RNR: Allow Probe Response frame for a colocated 6 GHz AP
f17f7ca4e RNR: Update Beacon frames for 6 GHz colocation
01efcc292 RNR: Addition in Beacon, Probe Response, and FILS Discovery frames
0c9457ee2 RNR: Additions for a 6 GHz AP
b2bbedcb2 RNR: Add co-located BSSes
a7c152d6b RNR: Add data from neighbor database
847f76760 RNR: Add configuration option
3db24e4ee RNR: Define element format
b389d88a7 Share a common error path for SET_NEIGHBOR control interface command
1b8eb3975 RNR: Add bss_parameters to the neighbor_db
9d0948ecc RNR: Short SSID assignment
8d881d942 Update AKMP and proto for driver-based SME while roaming
f969bd22d Add QCA vendor attribute to configure ARP/NS offload feature
8f4d7e8f0 OpenSSL: Fix build with OpenSSL 1.0.2
2086ae46b DPP: Replace dpp_bootstrap_key_der() with crypto_ec_key_get_subject_public_key()
e9f8f81a8 DPP: Use ECDH from crypto.h
4aed5668b OpenSSL: Clear the correct flag in crypto_ec_key_get_ecprivate_key()
bf161b660 Ignore CONFIG_WIFI_DISPLAY without CONFIG_P2P
b306a92df Fix compiler error on CONFIG_AP without CONFIG_P2P builds
726eda65f wolfSSL: Fix a link error when WPS NFC is disabled
b8402ab08 DPP: Use crypto_ec_key_get_subject_public_key() when possible
d51939f2c DPP: Move CSR routines to use crypto.h
d56352b55 DPP: Move dpp_pkcs7_certs() into crypto_pkcs7_get_certificates()
b89176fa6 DPP: Move debug print of EC key to crypto.h
87f2fb886 DPP: Remove direct call to OpenSSL in dpp_test_gen_invalid_key()
c88b7fcae DPP: Add crypto_ec_key_cmp() in crypto.h and use it
984faf963 DPP: Use crypto_ec_key_group() to compare EC key's group
f5334f9b5 DPP: Use crypto API for reconfig part
eac41656e DPP: Update connector signing to use crypto.h
da63d3099 DPP: Remove unused EVP_PKEY_CTX variable
4767de3a4 DPP: Use crypto.h for authentication computation
0d1d74107 DPP: Update PKEX part to use crypto.h API
50708770f DPP: Use crypto_ec_key_parse_priv() when possible
e294a73d0 DPP: Use crypto_ec_key_parse_pub() in dpp_get_subject_public_key()
9c1632908 DPP: Move dpp_set_pubkey_point_group() to crypto.h
e84b143e1 OpenSSL: Add Brainpool curves to crypto_ec_key_group()
c6f2103ca DPP: Replace dpp_get_pubkey_point() with crypto_ec_key_get_pubkey_point()
2d5772e69 DPP: Factorize conversion to ASN.1 ECPrivateKey
63bf3d25a OpenSSL: Mark crypto_ec_key_gen() key compressed
86cde01cb DPP: Move dpp_gen_keypair() to crypto
0517948d7 DPP: Replace EVP_PKEY by struct crypto_ec_key
cd0c1d256 OpenSSL: Use EVP_PKEY as struct crypto_ec_key
15275c53d Complete documentation in crypto.h
cb285e80c SAE: Fix sm->cur_pmksa assignment
aa5c4f932 Add QCA vendor attribute to configure priority of vendor scan
aca4d4963 Fix handling of complex configuration lines with mixed "" and #
0ae677c7b eloop: Extend overflow check in eloop_register_timeout() to cover usec
979f19716 WNM: Allow specifying dialog token for BSS transition request
3f6c02f29 Use pkg-config for libpcsclite linkage flags
e797959b8 systemd: Order wpa_supplicant after dbus
95bf9fc93 Remove extra slash from BIN/INC/LIBDIR defaults
5a4ae6e3a Replace "native" with a more specific description
2fb33ce4b wpa_supplicant: hostapd: Remove man-in-the-middle
2e122945f DPP2: Do not try to remove Controller TCP connection twice on error
5bac420e5 DPP2: Clean up Controller on hostapd interface removal
d8b3d0815 macsec_qca: Support macsec secy id getting from driver
08bdf4f90 proxyarp: Fix compilation with Hotspot 2.0 disabled
b0f457b61 SAE: Do not expire the current PMKSA cache entry
f332f6951 wpa_supplicant: Try all drivers by default
4775a5f82 Add support to reconfigure or flush PMKSA cache on interface enable
6f634b003 PMKSA: Make sure reauth time is not greater than expiration time
973f3e244 Fix hostapd segfault on WPS_CONFIG control interface command to non-WPS AP
9ef8491d9 Add TWT attribute to configure TWT related parameters
321dc403e Replace "dummy" with "stub" in crypto/random
95e140e20 Replace "dummy" with "stub" in NDIS driver interface
c53fa9225 Replace "dummy" with "stub" in EAP-TEAP testing
575dc1f3b Replace "dummy" with "stub" in preauth_test
ed5e1b722 Replace "dummy" with "stub" in comments/documentation
3955d2af7 Replace "dummy" with "stub" in wps_testing_dummy_cred
77dd71243 Replace "dummy" with "stub" in Authenticator group keys
fb1bae2a7 Replace "dummy" with "stub" in SAE
e69ea242a hostap: Remove unused driver enum values with "master" in them
7b50f2f04 Replace "sanity" with "validity"
891bb1305 P2P: Enforce SAE-H2E for P2P GO in 6 GHz
afcadbbf4 wpa_cli: Add support for SCS, MSCS, and DSCP commands
bcaa1ea08 HE: Disable HE in hostapd_set_freq_params() if driver does not support
fe1d743a1 Add QCA vendor attributes to indicate 320 MHz spectral scan capabilities
2b3e64a0f Update ciphers to address GTK renewal failures while roaming
9cf4bb0ef Vendor command to configure/trigger the roam events
dd3a2960a Add TWT vendor attribute to configure announce timeout value
afa0b9b6c P2P: Make p2p_check_pref_chan_no_recv() easier for static analyzers
857c4dfa8 Make get_mode() easier for static analyzers
9651deba5 Support vendor element configuration for AP mode from wpa_supplicant
d144b7f34 DSCP: Add support to send DSCP Policy Query frame
c903257fb DSCP: Parse WFA Capabilities element in (Re)Association Response frame
a4aae9f9b DSCP: Indicate DSCP Policy support in (Re)Association Request frame
d57456c1f DSCP: Allow DSCP Policy Response Action frame to be sent
2033e318e DSCP: Parsing and processing of DSCP Policy Request frames
fe2a44485 DSCP: DSCP policy capability configuration
8471d940e Move pmf_in_use() into a more generic file
41ec97cd0 HE: Use a random BSS Color if not defined in the config file
1518638b7 QCA vendor command to configure the parameters for monitor mode
8f7b2c898 Add attributes to support MBSSID multi groups notifications
a75fdcdcd Extend the roam reason codes in QCA vendor attribute
9ff0c8af5 Correct the documentation in enum qca_roam_reason
ce267f4da P2P: DFS offload for the autonomous GO
6ba665c5c Reserve QCA vendor sub command id 201
51d73d991 Add QCA vendor interface to configure background scan parameters
61c075761 EDMG: Validate pri channel lookup result before using it
a95144cf3 Add frequency to operating class determination for 5 GHz channel 144
e5173e8b1 P2P: Enable multiple channel widths for P2P in 6 GHz band
f725254cc P2P: Enhance determination of secondary offset to support 6 GHz channels
575a8e6ca P2P: Clone 6 GHz related parameters to new group interface config
f18433760 Add TWT attribute to send Responder PM Mode value to userspace
11a342775 Add time slice duty cycle attribute into QCA vendor command
d408e3d19 Update QCA mDNS Offload vendor command
2341585c3 ACS: Fix channel 100 frequency
ed369613f P2P: Align p2p_buf_add_pref_channel_list() prototype with definition
75a6d44a4 hostapd: Allow HT40 on 5 GHz channels 173 and 177
7dd2e2369 hostapd: Always allow HE AP with a 20 MHz channel width
9f2217c51 P2P: Consider p2p_no_go_freq for GO preferred frequency
882c53be5 P2P: Avoid integer overflow in channel
a58f7e61c Add QCA vendor interface to configure allowed bands for roaming
be81bbdc3 doc: Fix grammar in wpa_supplicant overview
362d9a49d utils: FreeBSD supports fdatasync(2)
9bd943410 nl80211: Fix send_mlme to use monitor interface only for AP interface
f02ac5140 HE: Option to disable HE ER SU in HE operation in AP mode
63f043f4f Generalize the function name as it is not dealing with only TX & RX params
3cdc6d381 mesh: Show peer connected time in the wpa_cli STA cmd output for Mesh mode
eddcd2753 Fix some compiler warnings on 32 bit platform
4c80937c7 nl80211: Reduce the number of nlctrl name resolution calls
cce33c7e7 openssl: Support private_key blob in PEM encoded PKCS#8 format
0030590fb Generate an event when a network is added or removed
f23861061 Add a --conf option to eapol_test.py
99c1789ab PASN: Fix ASAN error in ptksa_cache_add()
e2e9adc3d openssl: Disable padding after initializing the cipher suite
d265dd2d9 openssl: Remove deprecated functions from des_encrypt()
46b60299a wpa_supplicant: src: Replace Sane with Valid.
12388313a RADIUS client: Fix void-pointer-to-enum-cast warning
e433d06dd Allow MSCS support to be disabled for testing purposes
025f8ab52 SCS: Processing of SCS Response frames
b4e01ae92 Allow SCS supported to be disabled for testing purposes
c005283c4 SCS: Sending of SCS Request frames
445dbe2cd P2P: Do not stop Listen state if it is moving to correct channel
e99aaf706 Add QCA vendor attribute for TWT termination due to power save exit
a147951ee Add QCA vendor attribute indicating the spectral scan bandwidth
51f89565f Add QCA vendor interface to fetch thermal statistics from the driver
24774dcc2 P2P: Require PMF for P2P GO in the 6 GHz band
49442194c SAE: Derive H2E PT while reconnecting to same SSID also
ac79ed499 HE: Obtain correct AP mode capabilities for hw_mode with 6 GHz support
dfabf1e5c QCA vendor command for mDNS offload
1071f7539 DPP2: Fix channel 6 inclusion for chirping with non-2 GHz interfaces
84b3de809 TDLS: Support TDLS operations in HE mode for 6 GHz
1990ee7ee QCA vendor attributes to configure BTWT and Rx control frame to MultiBSS
f5f2985a2 Update TWT attribute to send TSF value in TWT setup command
b4f7506ff FILS: Flush external-PMKSA when connection fails without ERP keys
80bcd7ecd FILS: Flush PMKSA entries on FILS connection failure
914a2f518 SAE: Report authentication rejection over control interface
9557ba336 AP: Don't increment auth_transaction upon SAE authentication failure
84f6492ea Extend QCA vendor command for TSF to enable and disable auto report
7ef420058 QCA vendor attribute to configure BSS max idle support
ef83e0f90 QCA vendor attribute to use BSSID in Probe Request frame RA
e2ff06c91 Add channel load percentage attribute into QCA vendor command
ac6a0293d Add uplink delay attribute in QCA vendor command get_sta_info responses
84f894773 PTKSA: Fix a potential hostapd memory leak during reconfiguration
311091eb4 P2P: Use SAE+PMF for P2P connection in 6 GHz
f0cdacacb P2P: Allow connection on 6 GHz channels if requested
b36142a74 P2P: Add allow_6ghz parameter to control interface
f7d4f1cbe P2P: Add a mechanism for allowing 6 GHz channels in channel lists
6423c23e3 P2P: Allow 6 GHz channels to be included in the P2P_FIND operation
a06c7d50f P2P: Helper functions to check for WFD capability of a P2P device
eaf850867 P2P: Extend channel determination/validation to 6 GHz channels
9b50746f5 P2P: Introduce 6 GHz band capability bit in P2P Device Capability
9f901e65b WNM: Ignore SSID check for hidden SSID in transition candidates
525ec045f P2P: Use correct return type for has_channel()
09fb9b0cb DFS offload: Use hostapd_is_dfs_required() to check if DFS required
e8662e9d4 Use a helper function to remove struct wpa_bss_tmp_disallowed entries
ecaacb47b OCE: Remove AP from driver disallow list with sufficient AP RSSI
c25b50306 hostapd: Reject 40 MHz channel config if regulatory rules do not allow it
20a522b9e AP: Add user configuration for TWT responder role
9efed6684 Android: Pass the vendor events to $(BOARD_HOSTAPD_PRIVATE_LIB)
39a1d55b7 Add QCA vendor interface to transport CFR data using netlink events
da3335c92 QCA vendor attribute to configure keep alive data type
98f1259cd QCA vendor attribute to configure ER SU PPDU type
e2e2655ce FILS: Fix PMKID derivation for OKC
6abfb1418 Use estimated throughputs irrespective of RSSI delta for 6 GHz APs
5e1e4cceb Add QCA vendor attribute to enable/disable FT over DS
586afb8fa Add QCA interface to configure band specific RSSI thresholds for roaming
800e34550 Fix documentation for QCA_WLAN_VENDOR_ATTR_TWT_SETUP_MAC_ADDR
7d2302f87 Add EAPOL-4WAY-HS-COMPLETED indication to AP
1c5aa2579 Add EAPOL_TX command to extend ext_eapol_frame_io possibilities
7f0a2e422 Report EAPOL-RX events for testing purposes
04283cf36 Add REKEY_PTK to allow upper layer request to force PTK rekeying
82d8d631e Skip GTK rekeying request if rekeying already in process
de4d62dbc Add QCA vendor definitions for DFS radar history
46f897619 Prefer 6 GHz APs for connection in BSS selection
84008457e Add support to calculate estimated throughputs for HE rates
658b6a0b0 Add support to estimate throughput for VHT 160/80+80 MHz supporting APs
1d2118b50 Check local supported features for estimating BSS throughputs accurately
2950851ac Rename the Frame Control field subfield Order define to +HTC
11821ab3d Add QCA vendor interface to query usable channels
6ae0d78b8 Determine 6 GHz bandwidth in AP mode ACS using op_class parameter
0822de037 Add AP mode ACS support for the 6 GHz band
bef5eee4f Convert channel to frequency based selection for AP mode ACS
15742566f 6 GHz: Fix operating class in Supported Operating Classes element
79e8f0c16 hostapd: Update 160 MHz center freq calculation in 6 GHz
9c6b0a941 hostapd: Disable VHT/HE when WMM is not enabled
15b1831a2 nl80211: Map internal TDLS_PEER_* to NL80211_TDLS_PEER_*
742018f44 Add support to indicate TDLS peer's HE capability to driver
2be5777a9 Sync with mac80211-next.git include/uapi/linux/nl80211.h
1f2fbf41d Fix UPDATE_BEACON processing when disabled
b8d337c63 DPP2: Fix channel 6 inclusion for chirping with non-2 GHz interfaces
80d975695 DPP2: Get DPP Relay Controller context based on hostapd callback context
e63d45690 Add vendor reason code for TWT setup reject due to scan in progress
7d513b5b2 Add vendor hang reason code for tasklet/credit latency
a6cae954e Vendor command to configure concurrent STA connection policies
c2d7b027b DPP2: Close incomplete Relay connections
f91680c15 OpenSSL: Fix compilation for version < 1.1.0 without CONFIG_ECC
d675d3b15 Add helper functions for parsing RSNXE capabilities
663e190b7 SAE: Remove now unused password identifier argument from non-H2E case
79f87f473 PASN: Change PASN flows to use SAE H2E only
8c786e068 PASN: Derive KDK only when required
655edc19c Vendor attributes to configure broadcast TWT parameters
49ad86b0c Add vendor reason codes for TWT setup reject on roaming/channel switch
0bae16122 Set last_eapol_matches_bssid=1 on a roam+auth indication from driver
527be9ce7 SAE: Increment the Sc counter before generating each Confirm
47f51c8ba tests: Update SAE test vector to IEEE Std 802.11-2020
5f082c158 nl80211: Support larger number of MAC ACL entries
f1fc9cf74 nl80211: Fix the size of the maximum MAC ACL size
93576264b WPS: Share a single error handling path in wps_set_ie()
2445e18b6 tests: assoc+auth driver event
00bec7b5b tests: IEEE 802.1X and FORCE_UNAUTH state
e72e32253 hostapd: Enable WMM automatically when HE is configured
8ca330bd7 Flush pending control interface message for an interface to be removed
4a841a218 Fix WNM-Sleep Mode exit debug print of BIGTK
354f87e2e MSCS: Fix MSCS Response frame Status field parsing
b8673baea Add REGISTER_FRAME hostapd control interface command for testing purposes
60974eb3f Allow AP mode extended capabilities to be overridden
7365eb43e Make hostapd_config_fill() easier to auto indent
8ca09293e Simplify extended capability determination in AP mode
37306a004 PASN: Use a helper function to free radio work data
349e9eafb PASN: Mark pubkey/comeback arguments constant for frame construction
67014b3f7 PASN: Add support for comeback flow to wpa_supplicant
ab623ac75 PASN: Add support for comeback flow in AP mode
4ed10754e DPP: Fix GAS client error case handling in hostapd
3ae18d4bd EAP-SIM/AKA: Fix check for anonymous decorated identity
512d973cc DPP: Indicate authentication success on ConfReqRX if needed (hostapd)
6c8842f0e Fix full EAP authentication after PMKSA cache add failure
6bbbd9729 DPP2: Fix connection status result wait in hostapd
c0c74f0c6 Testing functionality for airtime policy
2f7789149 nl80211: Debug print error from airtime weight configuration
38fa5e657 More documentation for HE Spatial Reuse Parameter Set configuration
73d9891bd EAP-SIM/AKA peer: Support decorated anonymous identity prefix
7831b10a8 Introduce reason code for TWT teardown due to concurrency
eaeec4da2 PASN: Add support for deauthentication flow in station
4f436d537 nl80211: Allow sending Deauthentication frame with off channel for PASN
1ca1c3cfe AP: Handle deauthentication frame from PASN station
166e357e6 AP: Enable anti clogging handling code in PASN builds without SAE
6fe0d56e8 AP: Rename SAE anti clogging variables and functions
b86678633 PASN: For testing purposes allow to corrupt MIC
2efa60344 PASN: Encode the public key properly
cd0813763 PASN: Include PMKID in RSNE in PASN response from AP
da3ac9809 PASN: Fix setting frame and data lengths in AP mode PASN response
c733664be EAP peer: Make EAP-Success handling more robust against race conditions
72a17937c DPP: Add init/respond retries parameter configuration to hostapd
6ed0c212e TLS: Fix highest TLS version disabling with internal TLS client
57550cb27 DPP2: Use ASN.1 helper functions
626035bec TLS: Use ASN.1 helper functions
d4e1d76db X509: Use ASN.1 helper functions
173e7eede RSA: Use ASN.1 helper functions
72b0217ab PKCS: Use ASN.1 helper functions
a0541334a ASN.1: Validate DigestAlgorithmIdentifier parameters
94beb8e36 ASN.1: Fix AlgorithmInfo parsing for signatures
ee76493bb ASN.1: Reject invalid definite long form length values in DER encoding
3af75f23b ASN.1: Reject invalid extended tags in DER encoding
d6831a0e9 ASN.1: Explicitly validate constructed bit while parsing DER
b421a7cf2 ASN.1: Use the helper functions for recognizing tags and debug prints
9a990e8c4 ASN.1: Add helper functions for recognizing tag values
9bf4c0539 ASN.1: Verify that NULL value has zero length
f629bfe22 ASN.1: Add helper functions for debug printing identifier/length info
429f725d9 ASN.1: Define tag value for TIME
4481b03ee ASN.1: Fix a typo in a not-used tag name
2f2a57075 nl80211: Restore station mode on deinit only if station when started
a746393dc TWT: Allow specifying Control field value in TWT Request
a6b2007c2 nl80211: Support disabling HE in infrastructure BSS as station
01f2e54ce P2P: Clear pending_listen_freq when stopping listen
82a348eda wpa_supplicant: Don't process EAPOL frames while disconnecting
e80e6a2f1 eapol_test: Add address family for IPv4 in Windows build
cd2f8151e Add support to return bandwidth for channel 2 of the 6 GHz band
6b4e32da8 New vendor attribute to configure TWT mantissa in microseconds
7fd2f2496 TWT: Support sending TWT Setup and Teardown Action frames
edbaffc4f wpabuf: Add helper functions for writing 64-bit integers
17d85158c Fix hostapd PMKSA_ADD with Authenticator disabled
147d6d372 Update VHT capabilities info on channel switch event
dc587c479 nl80211: Determine secondary channel offset for CS to 80+80 MHz
0a8095d72 nl80211: Debug print for channel switch request parameters
a20ace3a1 nl80211: Add command-to-string mapping for previously missed commands
0f37b8142 More specific set_freq_params debug prints for 80/80+80 MHz errors
ab8929192 nl80211: Use process_bss_event() for the nl_connect handler
7c5442e74 DPP: Clear hapd->gas pointer on deinit
076e0abdd SQLite: Fix temporary eap_user data freeing on interface restart
2da3105ac Fix use after free with hapd->time_adv on interface restart
5ac977758 Reject authentication start during explicit roam requests
800fb6997 QCA vendor attribute to allow 6 GHz connection with all security types
1a60099f2 QCA vendor attribute to ignore SAE H2E requirement mismatch
e9d598d8a Update old link to ACS wiki documentation
b5e3d92ee OCV: Fix OCV-FAILURE event address for FT Reassociation Response frame
40551a15c Fix a memory leak in WPS with ap_scan=2
900adb3c9 FILS: Simplify code paths
4a5f6e88b SAE: Use more explicit IE payload validation steps
57fec19da Use more consistent iface->conf checks
b8211e1e7 PASN: Avoid unreachable code with CONFIG_NO_RADIUS
9a1136b7f FILS: Fix RSN info in FD frame for no-group-addressed
6035969e0 Fix dynamic EAP library building
a826ff2d9 Ignore group-addressed SA Query frames
d314213f6 P2P: Pick a 5 GHz channel from more possible channels
205c35cef nl80211: Allow compilation with both vendor do_acs() handlers
61a258e78 nl80211: Add ACS support for Broadcom device
827b43b3c RADIUS client: Support SO_BINDTODEVICE
3a05f89ed Android: Add DRIVER command support on hostapd and hostapd_cli
50baf345b TDLS: Support TDLS operations in HE mode
184c82468 P2P: Add device address to the debug entry on oldest peer removal
8460e3230 P2P: Fix a corner case in peer addition based on PD Request
Change-Id: Ieec0678b1a5c72fef3f3363cb54b20ac1cb8ab7f
Merged-In: Ieec0678b1a5c72fef3f3363cb54b20ac1cb8ab7f
(cherry picked from commit
|
||
|
|
34c660246e |
Merge changes from topic "t-p2p-vendor-extras"
* changes: p2p: implement new HAL API to pass vendor extras p2p: set p2p probe response vendor information elements for p2p dev interface |
||
|
|
cded4e2b54 |
[wpa_supplicant] Enable RCOI selection for Passpoint
Enable the flow of adding RCOI selection IE in the (re)association frames. Android does not use the native HS 2.0 support in wpa_supplicant, so added logic to skip this check in Android builds. Bug: 210879633 Test: Verify function is called, succesful connection to Passpoint network with RCOI match. Change-Id: Id22ce9db65933abda7af69bb85308b34e923d374 |
||
|
|
48b484ba71 |
p2p: set p2p probe response vendor information elements for p2p dev interface
The p2p dev interface is not a top interface, but a child of the global interface. As a result, the response vendor ies are always skipped. Bug: 197695047 Test: use WifiP2pManager::setVendorElements to set VSIEs on Pixel 6 Pro Change-Id: I4e91070132f461eaa13a1643fdec49e0f647fd69 |
||
|
|
57ededa148 |
Convert supplicant service to use new AIDL interface.
Bug: 196235436 Test: Pass AIDL VTS tests and regression tests. Change-Id: I0d7b75f526c13fc655a023d7dca088339b06b28e |
||
|
|
0e73c009c9 |
p2p: remove all p2p groups when p2p dev interface is removed.
The p2p dev interface is not a top interface, but a child of the global interface. When this interface is removed, p2p groups will not be removed. To avoid leaking p2p groups, p2p groups should be removed when p2p dev interface is removed. Bug: 195618672 Test: create a group and remove the top interface by wpa_cli command. Change-Id: Ia3e0c0512314ae55dee9a81661f51eee6e8e3428 |
||
|
|
aace8cd0fe |
wifi: enfoce H2E for 6Ghz BSS
Bug: 167634062 Test: atest VtsHalWifiSupplicantV1_4TargetTest Change-Id: I83a46c299d69c71e0595bb30ef93193bf58fe813 |
||
|
|
2cbbcd12f9 |
Support Passpoint frame filters in Android
The conf->hs20 flag is not used in Android, but HS 2.0 configuration is still required when setting up the frame filters in the WPA driver. Split the is_hs20_network() to two functions, and moved the conf->hs20() check to a new is_hs20_config function. Added ANDROID compilation flag in hs20_configure_frame_filters() to skip the configuration check. Additionally, trigger a call to hs20_configure_frame_filters() upon succesful connection when state equals to WPA_COMPLETED. Bug: 168681498 Test: Verify wpa driver is called with the appropriate frame filter flags when connecting to Passpoint networks. Test: Verify wpa driver is not called to filter frames for other Enterprise networks. Change-Id: I3afea6018d5ddd2211974ca10a30180c6cc204e7 |
||
|
|
f3f8d3c8a8 |
Flush pending control interface message for an interface to be removed
wpa_supplicant_ctrl_iface_deinit() was executed only if the per-interface control interface initialization had been completed. This is not the case if driver initialization fails and that could result in leaving behind references to the freed wpa_s instance in a corner case where control interface messages ended up getting queued. Fix this by calling wpa_supplicant_ctrl_iface_deinit() in all cases to cancel the potential eloop timeout for wpas_ctrl_msg_queue_timeout with the reference to the wpa_s pointer. In addition, flush any pending message from the global queue for this interface since such a message cannot be of use after this and there is no need to leave them in the queue until the global control interface gets deinitialized. Signed-off-by: Jouni Malinen <jouni@codeaurora.org> Bug: 168314741 Test: Connect to Wi-Fi networks, enable SAP, verify correctness Test: Run wifi_test PoC - verify no exception Change-Id: I2dcc00b1b1db1f30432641c7202e0353eca55722 |
||
|
|
6084025bf4 |
[wpa_supplicant] Cumulative patch from commit 59e9794c7
Bug: 180762886 Test: Verify Passpoint ANQP functionality and Passpoint association Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic Test: Regression test passed (Bug: 180943193) BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source 59e9794c7 QCA vendor attribute to configure Punctured Preamble Rx in HE cap 875d7be38 QCA vendor attribute to disable data and management frame Tx ecb7590f3 QCA vendor attribute to configure RU 242 tone for data Tx 8d2329712 QCA vendor attribute to configure BSS max idle period dc72854fe Fix handle_auth_cb() message length check regression f03580e31 Restore permanent MAC address on the FLUSH command 976c3c161 DPP2: Accept Config Result before GAS response TX status 6518c72b0 Multi-AP: Fix backhaul SSID printing condition 1ba8a315c Avoid use of C++ keyword in a header file 10502ad59 radiotap: Fix compiler issues with packed structures 0dee287c8 EAP server: Extend EAP-TLS Commitment Message use to PEAP and EAP-TTLS fae4eafe4 EAP-TTLS peer: Handle Commitment Message for TLS 1.3 155125b02 EAP-TLS peer: Handle Commitment Message for TLS 1.3 3a457509d EAP: Extend Session-Id derivation with TLS 1.3 to PEAP and EAP-TTLS 647db6a6b EAP-TTLS: Key derivation per draft-ietf-emu-tls-eap-types-00 c74f23020 EAP-PEAP: Key derivation per draft-ietf-emu-tls-eap-types-00 872609c15 EAP-TTLS/PEAP peer: Fix failure when using session tickets under TLS 1.3 8265f8453 nl80211: Unconditionally clear nl_msg 6c7b0a965 PASN: Correctly set RSNXE bits from AP 85eb47e3a PASN: Correctly set RSNXE bits from STA be5f7f374 wpa_supplicant: Fix potential memleak on an error path 8f248d1ac Check for message truncation in RADIUS client 5cb25307e Set RADIUS message length to reflect RFC 2865 7df089b56 Create RADIUS_MAX_MSG_LEN param in the shared radius.h 98a52b09c Add new attributes in get_sta_info QCA vendor command 8f204f69a Show OCV and beacon protection capabilities in control interface 6f92f81da AP: Check driver's capability to enable OCV when driver SME is used 73ebd58fc STA: Check driver capability to enable OCV when driver SME is used f3dfe42c7 Clean up RSN parameter setting for PASN d36d4209f Enable beacon protection only when driver indicates support 9d99814e2 Update sgml to generate reproducible manpages e680a51e9 ext_password: Implement new file-based backend e9f449ba5 wpa_supplicant: Move wpa_config_get_line() into utils b1c23d3f2 HE: Fall back to 20 MHz on 2.4 GHz if 40 MHz is not supported f1c6c9d3e ACS: Allow downgrading to 20 MHz based on OBSS results 9bb2f7529 Sync with mac80211-next.git include/uapi/linux/nl80211.h cfc45a98d nl80211: Unsolicited broadcast Probe Response configuration 024b4b2a2 AP: Unsolicited broadcast Probe Response configuration 6fb626412 P2P: Clear unexpected HT40 configuration on 2.4 GHz band 6b59e63f0 Include secondary channel config in no-hw-channel-found message d76ba2b31 nl80211: Add FILS Discovery frame configuration 9c02a0f5a FILS: Add generation of FILS Discovery frame template c4c529e9c Add a helper function for determining RSN capabilities field value 272466518 Define FILS Discovery frame subfields 3eb5f7128 Do not include VHT elements in Beacon frames on the 6 GHz band 2c2b6d265 Add Transmit Power Envelope also for 6 GHz HE AP 6c2b729de Use hostapd_get_oper_chwidth() when build Transmit Power Envelope element 5d3c4496f Make VHT Transmit Power Envelope element helper more generic 58bbbb598 nl80211: Ignore 4addr mode enabling error if it was already enabled 1b45b8d3f wpa_supplicant: Don't exit scanning state on config reload 581df2d52 DPP2: Defer chirp scan if other scan is queued up 35756c02e mesh: Assign channel in frequency params in all bands b1c3e4d07 nl80211: Send HE 6 GHz capability parameters to the driver 8d10831dc wolfSSL: wolfSSL_use_PrivateKey_* correct return codes 7e823d4df DPP: Expose config object PSK/passphrase in wpa_supplicant 1029f16a9 DPP: Expose config object AKM in wpa_supplicant control interface ad59639ed DPP2: Fix Authentication Request destination in the chirping case 598f67132 SAE: Avoid driver STA entry removal unnecessarily when using H2E/PK 99cd45372 hw_feature: Correctly select mode in case of the 6 GHz band f728c867e AP: Extend Spatial Reuse Parameter Set 9f9d3d362 Allow HE MCS rate selection for Beacon frames 7f2f262e6 nl80211: Support the 6 GHz band for beacon rate configuration c3d557b4d hostapd: Add HE 6 GHz band capability configuration bd8b17030 EAP-AKA: Check that ID message storing succeeds e781f7c86 Fix compiler warning on CONFIG_AP without CONFIG_P2P builds 4c9b16602 Update Visual Studio projects to match file renaming 48cfb52b7 Rename blacklist.[ch] to bssid_ignore.[ch] 626fc0dcd Rename wpa_blacklist to wpa_bssid_ignore b58ac90c3 Rename INTERWORKING_BLACKLISTED define 72cd4293f Rename the control interface BLACKLIST command to BSSID_IGNORE 752b1c608 Rename network profiles parameters for ignoring/accepted BSSIDs e6ac26943 radiotap: Update radiotap parser 136bbf15c wlantest: Add more details about protected FTM frames f56eec7c1 wlantest: Process Action No Ack frames like Action frames ef26fc19f DFS: Allow switch to an available channel f98fe2fd0 hostapd: Report errors ACCEPT_ACL/DENY_ACL control interface commands 15251c658 hostapd: Fix dynamic ACCEPT_ACL management over control interface 871d6648f hostapd: Add multi_ap settings to get_config() output f95ccc102 WPS: Reconfigure credentials on hostapd config reload 2fd90eb09 WPS: Use helper variables to clean up code f7bbad576 wpa_supplicant: Configurable fast-associate timer threshold b829b7003 wpa_supplicant: Notify freq change on CH_SWITCH 3a00a86bb hostapd: Fix dpp_listen in DPP responder scenario 4a7e0ac26 hostapd: Add an option to notify management frames on ctrl_iface e79febb3f P2P: Adding option to manage device drivers creating random MAC addresses a579642bc BSD: If route socket overflows, sync drivers to system interfaces fa859ebb1 RSN+WPA: Fix RSNE removing in EAPOL-Key msg 3/4 when RSNXE is included dc1977959 RSN: Validate RSNXE match in EAPOL-Key msg 3/4 only when RSN is used 0b7895750 DPP: Silence compiler warning about signed/unsigned comparison 8f557d204 Make wpa_bss_ext_capab() handle NULL bss argument 2cadb60ab robust_av: Use wpa_bss_ext_capab() helper a287c2078 Disable HE capabilities when using unacceptable security config 56c192c5e nl80211: Skip frame filter config for P2P-Device 2b916c9fd dbus: Fix IEs getter to use wpa_bss_ie_ptr() 9416b5f32 Add HE in ieee80211_freq_to_channel_ext() documentation 2acfd15a2 hostapd: Generalize channel switch methods to incorperated HE mode 2908dc91c hostapd: Enable HE for channel switch commmand 1c3e71d14 P2P: Add a maximum length limit for peer vendor IEs 947272feb P2P: Fix copying of secondary device types for P2P group client 25df656a8 Remove pointless defines for ext capab bits 11355a122 Reset external_scan_running on interface deletion 630b1fdba AP: Add 6 GHz security constraints df0bfe475 mesh: Fix for leaving mesh 24f0507af WPA: Support deriving KDK based on capabilities (Authenticator) dccb6cde0 WPA: Support deriving KDK based on capabilities 9e7b980d6 PASN: Include RSNXE in the PASN negotiation d8cd20e37 RSN: Add RSNXE new definitions 2eb2fb8bd AP: Support PASN with FT key derivation 5c65ad6c0 PASN: Support PASN with FT key derivation 62edb79a0 AP: Support PASN with FILS key derivation 8c6d2e252 PASN: Support PASN with FILS key derivation da35e1214 AP: Support PASN with SAE key derivation a93ec28d1 PASN: Support PASN with SAE key derivation 3040c8a2d AP: Add support for PASN processing to the SME f2f8e4f45 Add PTKSA cache to hostapd 2c963a117 AP: Add support for configuring PASN ad338cfe5 ctrl_iface: Add support for PASN authentication 363768c8a PASN: Add support for PASN processing to wpa_supplicant d70060f96 WPA: Add PTKSA cache to wpa_supplicant for PASN a4e369161 WPA: Add PTKSA cache implementation a84ba92fa WPA: Add a function to get PMKSA cache entry 6709b4ceb common: Add PASN parsing to ieee802_11_parse_extension() 46bfc3a84 tests: Add module tests for PASN PTK derivation 9ce123cdb PASN: Add common Authentication frame build/validation functions c6d1a33bb PASN: Add functions to compute PTK, MIC and hash d87f4aea1 FILS: Extend the fils_pmk_to_ptk() function to also derive KDK 6e834db74 FT: Extend the wpa_pmk_r1_to_ptk() function to also derive KDK 46c232eb7 WPA: Extend the wpa_pmk_to_ptk() function to also derive KDK 019507e10 common: Allow WPA_CIPHER_GTK_NOT_USED as a valid group management cipher 244721221 nl80211: Always register for RX authentication frames with PASN a728449a0 nl80211: Allow off-channel of PASN authentication frames in send_mlme() 367e79231 PASN: Add some specification definitions 833cdbe97 Add support for new 5 GHz channels 173 and 177 21fdb454d P2P: Fix channel selection for operating class 129 959af4f57 DPP: Abort authentication if no Auth Confirm is received within a second 62657365f Add a configuration to disconnect on deinit if WoWLAN is enabled 8f5897294 dbus: Export new 'suiteb192' capability 9cdcc8823 DBus: Add 'owe' to interface Capabilities 8e8406469 wpa_cli: Add WPS_EVENT_OVERLAP to action scripts 41fae6e0b nl80211: Add missing WPA3-SAE auth_data in auth retry case 71718b628 FT: Update key mgmt properly in RSNE during roaming ea77568d8 Add user configured vendor IEs to default scan IEs b6947f01a Android: Pass the vendor events to $(BOARD_WPA_SUPPLICANT_PRIVATE_LIB) 7b121af26 P2P: Delay P2P scan when an external scan is in progress f39d6aacb P2P: Recover p2p_find operation in case of failure to fetch scan results 74818ca63 Process QCA_NL80211_VENDOR_SUBCMD_KEY_MGMT_ROAM_AUTH after NL80211_CMD_ROAM b4a41abad nl80211: Do not ignore disconnection event after a connection event 084b3d2f8 Drop unexpected connection event while disconnected 73c7c2da9 Vendor feature capability to notify TWT asynchronous response support a337c1d7c New TWT operations and attributes to TWT Setup and Nudge b709bb40f DPP2: Add DPP_CONTROLLER commands to hostapd_cli and wpa_cli 6ead8b897 Use bool for is_6ghz variables and functions 7131fede3 Extend the setband support for 6 GHz and band combinations 2a37cda74 scan: Add a helper function to append supported freqs from a given band bba926350 Fix gcc-10 build with -Werror=array-bounds and dl_list_for_each() 0225301fd wolfSSL: Client cert loading API fix 297050b46 nl80211: Report invalid signal and noise when info is unavailable be96f4e8d wlantest: Allow missing RSNE in S1G beacon d83eaa351 Add option to ignore Probe Request frames when RSSI is too low f2a010140 wpa_supplicant: Initial connection speedup 4683b7218 DFS: Enter DFS state if no available channel is found eee0d242b hostapd: Add ability to disable HT/VHT/HE per BSS 89ad24379 mesh: Move mesh frequency setting to its own function 7c2cad969 mesh: Fix DFS deinit/init 0896c442d mesh: Fix for mesh init/deinit 06161d4f1 mesh: Fix mesh_oom test 12ae3e3db mesh: Inform kernel driver about DFS handler in userspace a27faf2c9 mesh: Fix channel switch error during CAC 872590978 nl80211: Do not set offchanok on DFS channels in non-ETSI for mesh e3608040c mesh: Update ssid->frequency as pri/sec channels switch f1df4fbfc mesh: Use setup completion callback to complete mesh join 3c9abc785 QCA vendor attributes to configure TX and RX NSS ed24bad1d AP: Check driver support while auto-selecting bandwidth for AP/P2P GO 5b782ff62 Add bus failure reason code to vendor indication 1c77f3d3f Indicate whether additional ANQP elements were protected 90ca804e4 Add vendor attributes for TWT nudge request 454ebb504 BSS: Use variable length array for IEs at the end of struct wpa_bss be7ee264f BSS: Use wrapper function for getting a pointer to the IE buffer 95edd8144 BSS: Add wpa_bss_get_ie_ext() wrapper dba4f7a54 Mark wpa_bss_get_fils_cache_id() argument const 2a7023ba6 Change list arguments to const where possible fdf114641 nl80211: Send the sae_pwe value to the driver 2576f27e0 P2P: Disable P2P in the 6 GHz band for now 2ffd3bb4b P2P: Include p2p_6ghz_disable in global configuration 60c902f40 Add connect fail reason code from the driver to assoc reject event 7423fa6e8 Vendor feature capability to support concurrent sessions on Wi-Fi bands 1934ad9b2 Add extra parameters to vendor command GPIO attribute d0e0d2283 Sync with mac80211-next.git include/uapi/linux/nl80211.h c2c468622 Set NLA_F_NESTED flag with NL80211_ATTR_VENDOR_DATA conditionally cd3aa54a3 Add test configuration attr to enable/disable full bandwidth UL MU-MIMO f4de21a77 BSS/scan: More conversions to for_each_element_id() aa06444f2 dbus: Check eloop registration failure in add_watch handler 56a1df71e BSS: Convert wpa_bss_get_vendor_ie() to use for_each_element_id() ec1f4f3c8 Make GTK length validation for RSN Group 1/2 easier to analyze c42d41bf3 EAP-IKEv2: Try to make transform parser simpler to understand ec0d99c00 HS 2.0: Clarify OSU Friendly Name length validation 05962099c TDLS: Fix error path for TPK M1 send failure in testing functionality a9fed5f5b Avoid undefined behavior with memcpy PMK/PSK update c643c3928 nl80211: Fix filtering of unsupported bands/modes a86078c87 TDLS: Fix error path handling for TPK M1 send failures 3d490296b DPP2: Fix error path handling in enterprise provisioning f724dd1bf Remove unused variable update 589bf1f7a DPP2: Fix ppkey parsing 79e3f08d3 6 GHz: Add support for missing 6 GHz operating classes 66bed14b2 6 GHz: Fix opclasses mapping in ieee80211_freq_to_channel_ext() 5e779873e EAP-SIM peer: Send AT_IDENTITY first 0577e8e67 nl80211: Check for proper nlmsg allocation in send_and_recv_msgs_owner() 02289ab53 DPP2: Explicitly check EC_KEY before dereferencing it c57590476 P2P: Consider BSS entry pending for P2P joining as a known BSS 106d67a93 nl80211: Filter out unsupported bands 9c39c1a6d P2P: Include p2p_add_cli_chan parameter while cloning the configuration 8f0ed71ff Vendor specific feature capability for Adaptive 11r 45ae6ae8e Add additional vendor specific hang reason codes d2190cdc6 DPP2: Update the default port number for DPP-over-TCP 5d988b4a5 Fix couple more typos b439b21a2 wpa_supplicant: Fix typos 183e72ae1 SAE-PK: Do not accept SAE-PK status code when no PK is configured 80662accb SAE: Don't use potentially uninitialized keys b4c7114cf wpa_supplicant: Remove unfeasible conditions in config parsing ff7e0c1cf wpa_cli: Don't access uninitialized variables e364a34c6 OpenSSL: Make openssl_debug_dump_certificate() more robust Change-Id: Ia7e3838712a621fe0341464dd04671f708d8cde4 |
||
|
|
e06118e239 |
wifi: Send MBO-OCE association rejection info
Parse association response for MBO association disallowed indication and OCE RSSI based association rejection info and send it to framework in association rejection event. Bug: 162542063 Test: vts test - VtsHalWifiSupplicantV1_4TargetTest Change-Id: Ie6b9d81491274e06a9521a2e45feb9bf2feabeb5 |
||
|
|
4c09cc9c46 |
wifi: handle association failed in driver
Currently, there is no notification from supplicant to
framework when association failure on driver layer.
In this commit we report the association failure with
status code (WLAN_STATUS_UNSPECIFIED_FAILURE) to framework.
Hence, framework can handle association failure on driver.
Bug: 169770508
Test: manually.
Force driver return association failure and
check framework is able to handle it.
Change-Id: Id539ede2da7028dbd08d86d62aa5d3329fc48e42
|
||
|
|
899fcc7e60 |
[wpa_supplicant] Cumulative patch from commit d68c0dd4d
Bug: 156933657
Test: Verify Passpoint ANQP functionality and Passpoint association
Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic
Test: Regression test passed (Bug: 171270733)
BYPASS_INCLUSIVE_LANGUAGE_REASON=Merged from Open source
d68c0dd4d build: lib.rules: Add common-clean
d34b33451 wpa_supplicant: Fix frequency config for VHT/HE cases
0747432ef Fix spelling of "unexpected" in messages
d720de929 hostapd: Fix typos
4c66894fa eap_peer: Add .gitignore with *.so
13256b8cf P2P: Stop old listen radio work before go to WAIT_PEER_IDLE state
0f7989d8a MSCS: Fix decapsulating subelements from MSCS descriptor
cc3d6efa8 Add QCA interface for driver to report various connect fail reason codes
39748963d build: Fix libeap_peer.a build
c3f37c35f DFS: Use helper functions for VHT/HE parameters
a72599b31 hw_features: Better debug messages for some error cases
5965c7da5 wpa_supplicant: Enable VHT and HE in default config parameters
df6745e8c wpa_supplicant: Handle HT40 and mode downgrade in AP mode
93da12fd9 mesh: Fix channel init order, disable pri/sec channel switch
7f8ac02e8 HE/VHT: Fix frequency setup with HE enabled
0f07230eb DPP2: Add privacyProtectionKey into Configurator backup/restore
a0ccc4017 DPP2: Use ppKey to decrypt E'-id on Configurator
99d7bf234 DPP2: Use the new privacy protection key to protect E-id on Enrollee
37df40845 DPP2: Copy received ppKey into wpa_supplicant network profile
a8ee2292b DPP2: Parse ppKey from Connector
2a8c92887 DPP2: Add ppKey into Connector
9c1fbff07 DPP2: Generate a privacy protection key for Configurator
1d1475845 DPP: Make dpp_keygen_configurator() a static function
1d0d8888a build: Make more library things common
f4b3d14e9 build: Make a common library build
ac1447ae9 build: Rebuild libs all the time
6c41d43f1 mesh: Stop SAE auth timer when mesh node is removed
154b18d95 build: Fix dependency file inclusion
79db311e8 macsec_linux: Fix receive-lowest-PN setting
e3b47cdf8 DPP2: Add DPP_CHIRP commands to hostapd_cli and wpa_cli
cb3b70936 P2P: Set ap_configured_cb during group reform process
0e9f62e51 P2P: Fallback to GO negotiation after running out of GO scan attempts
1a0169695 hostapd_cli: Add dpp_bootstrap_set command
7e4ed93d3 wpa_cli: Add dpp_bootstrap_set command
283eee8ee gitignore: Clean up a bit
ae0b90dfa mesh: Allow channel switch command
87098d332 build: Put archive files into build/ folder too
00b5e99b6 build: Use the new build system for fuzz tests
a49f62884 wolfSSL: Fix wrong types in tls_wolfssl.c
58c18bcf8 hostapd: Fix error message for radius_accept_attr config option
52a1b2834 nl80211: Unbreak mode processing due to presence of S1G band
4b96fafcd D-Bus: Share 'remove all networks' with CLI
2818e9ca9 wpa_supplicant: Do not retry scan if operation is not supported
c0b88d129 P2P: Limit P2P_DEVICE name to appropriate ifname size
566ea1b7c mesh: Set correct address for mesh default broadcast/multicast keys
17d6ba4c9 DBus: Add "Roam" command support
6e757bba8 Use consistent spelling of "homogeneous"
cff545720 wpa_supplicant: Clear blacklist when SSID configs change
bbbb3c04e wpa_supplicant: Add new blacklist tests
164b8dd8e wpa_supplicant: Add wpa_blacklist_update()
d53011002 wpa_supplicant: Implement time-based blacklisting
2fd35d985 wpa_supplicant: Track consecutive connection failures
6d6310701 Fix STA mode default TXOP Limit values for AC_VI and AC_VO
dcc5288e5 gitignore: Add various things
ce963433b build: Allow overriding BUILDDIR from command line
ad6e4a5c5 build: Remove hostapd vs. wpa_supplicant build checks
6acda5322 build: Add .config file to dependencies
722138cd2 build: Put object files into build/ folder
0464d5d5d build: Move config file handling into build.rules
0430bc826 build: Add a common-clean target
06a6adb54 build: Use build.rules in lib.rules
3ff115db6 build: Disable built-in rules
a41a29192 build: Pull common fragments into a build.rules file
21cc50a43 HS 2.0 server: Add a .gitignore file
a28d127b1 AP: Reflect status code in SAE reflection attack test
e8b85c078 iface match: Unspecified matched interfaces should not log driver fails
83fa0a100 op_classes: Don't report an error when there are none to add
8776551bf BSD: don't log SIOCG80211 errors during interface setup
41d20df7f D-Bus: Allow empty string in dbus network properties
4756ecabc Allow bgscan parameters to be reconfigured
922fa0997 Global parser functions to return 1 when property unchanged
a87173b1d D-Bus: Skip property update actions when wpa_config_set() returns 1
1c58317f5 D-Bus: Allow changing an interface bridge via D-Bus
14318ccff P2P: Add configuration support to disable P2P in 6 GHz band
debf3e216 OCV: Work around for misbehaving STAs that indicate OCVC=1 without OCI
d48a3a676 FT: Modify status code in FT Reassoc frame for invalid OCI channel info
0e8d569d4 DPP2: Presence Announcement notification in STA
980c4da41 DPP2: Presence Announcement notification in AP
8b667bfa1 DPP2: Presence Announcement notification
cf3d260c3 DPP2: Fix hostapd crash setting global configurator params on chirp RX
a8f304228 Document the missing ignore_broadcast_ssid network profile parameter
aa704020a DBus: Update dont_quote[] with ignore_broadcast_ssid parameter
88d3f43bd DPP2: Replace OneAsymmetricKey version number (v2 to v1)
8e5739c3a DPP2: Check channel 6 validity before adding it to chirp channel list
5c6c0d569 DPP: Fix GAS fragmentation for DPP Config Response from hostapd
a7f55f7f6 WPS: Enable SA Query checks for WPS AP
43ef227e9 P2P: Make use wpas_p2p_reconsider_moving_go timeout gets canceled
57536a567 P2P: Fix P2P interface remuval through wpa_supplicant_remove_iface()
760d10cde P2P: Include channels 149 to 161 for operating classes 128 and 130
ac882374a SAE: Fix error path handling for SSWU
e8a1e6a4a P2P: Fix a typo in a comment
fa63284af Add additional roam triggers to qca_vendor_roam_triggers
13feeaa10 Add a new status code to represent an already suspended TWT session
8175c2654 Add test configuration attr to start/stop transmitting FD frames
90e478aa0 DPP2: Use the PFS fallback if multiple key_mgmt values are enabled
cab139ebc Fix a typo in a comment
7e20502f7 hostapd: Resolved compiler uninitialized warning
e3ba0c4cd Do not start SA Query procedure without keys
a92660a00 Work around Supported Operating Classes element issues for 6 GHz
fd4a58ccd Additional attributes to QCA_WLAN_VENDOR_ATTR_ROAMING_PARAM_CONTROL
8a6a2894d Add new QCA vendor attributes to get thermal level
41f818905 SAE-PK: Add support to skip sae_pk password check for testing purposes
a71b100c3 OCV: Allow connecting MFP incapable OCV STA when OCV is disabled in AP
5ecb45a41 OCV: Use more granular error codes for OCI validation failures
10c3e58b2 DPP2: Include E-nonce in reconfig ke derivation
4ae5e459d DPP2: Move E-nonce to be outside wrapped data in Reconfig Auth Resp
0ebf5aa34 DPP2: Replace I/R-nonce with C/E-nonce in reconfiguration
99f8506d3 Add QCA_NL80211_VENDOR_SUBCMD_MBSSID_TX_VDEV_STATUS
93a73ce02 MSCS: Fix issues due to incorrect usage of wpa_hexdump_buf()
9afb68b03 OpenSSL: Allow systemwide secpolicy overrides for TLS version
c85206ba4 QCA vendor attributes for setting ANI level
d335ca953 Update QCA vendor interface for GPIO configuration
7ddb71224 DPP2: Support QR mutual auth scan-during-auth-exchange (hostapd)
c043b1e00 DPP: Remove unnecessary dpp_global_config parameters
4ecb6dd16 DPP2: Controller support in hostapd
cd17f6877 Add QCA vendor event for firmware statistics
ba3081f1d dpp-nfc: Start listen operation more completely for NFC Tag write cases
e4adbacaf GAS: Fix memory leak on some DPP error paths
8aa91282a Fix EAPOL-Key msg 1/4 processing in a corner case
96e63008f OWE: Do not add DH Params element in AssocResp with PMKSA caching
9bc881153 DPP2: Fix build without IEEE8021X_EAPOL
2caff11d7 LibreSSL: Fix build with LibreSSL versions older than 2.9.1
55a366d7a dpp-nfc: Fix recv_octets() regression
90e05626f Add test configuration to ignore SA Query timeout
a2d35b49e Fix documentation for the test configuration attributes of FT-SAE/OCV
5d2218e61 Add get_sta_info vendor attrs to get BIP failure counters for STA mode
c6a760b9c DPP: Add process_conf_obj into TCP connection data struct
7f366fcbd DPP: Add msg_ctx into TCP connection data struct
6aa7aa808 DPP2: hostapd/AP as Enrollee/Initiator over TCP
d21dde9da MSCS: Send MSCS change/remove frames only if MSCS setup exists
af8ab3208 MSCS: Parse result of MSCS setup in (Re)Association Response frames
c504ff539 MSCS: Add support to populate MSCS Descriptor IE in (Re)AssocReq
bbd3178af MSCS: Add support to process MSCS Response frames
a11804724 MSCS: Add support to send MSCS Request frames
1733e356e dpp-nfc: Fix handover client wait for receiving handover select
596d99567 SME: Process channel switch event in SME only when supplicant's SME is used
0fa274d2b Derive seg0_idx and seg1_idx for 6 GHz when processing channel switch
5644b23de QCA vendor command to update SSID
cd708e8ff Add a vendor command for medium assessment
cc9fe46b3 Add AllPlay type to the QCA vendor element
170775232 ANQP: Add support to specify frequency in ANQP_GET command
43106e122 GAS: Update source MAC address on preassoc_mac_addr randomization
1289ecf4c GAS: Ignore preassoc_mac_addr when gas_rand_mac_addr enabled
dbe485a35 SAE-PK: Check psk param also to look for SAE-PK acceptable BSS
f5388b34e Add channel TX/RX times to QCA vendor interface of LL stats
9f9c11048 Fix QCA_WLAN_VENDOR_ATTR_LL_STATS_CH_INFO interface documentation
096456c0c Enhancements to the TWT attributes/parameters (vendor command)
3adc1c623 DPP2: Disconnect before starting reconfiguration
574a8fa6c DPP: Do not interpret unknown channel as missing channel list for NFC
fc3efe083 DPP2: Support mutual auth with QR in scan-during-auth-exchange case
2e956c37d DPP2: Do not close TCP socket when waiting for full Auth Resp
e4e95aabb DPP2: Allow Controller to be configured to require QR mutual auth
61c249c49 Add QCA vendor attribute to configure number of TX/RX chains
86fd6755c dpp-nfc: Use --altchan value in handover server
315422196 dpp-nfc: Update listen channel based on channel list when writing a tag
66ffe9d24 DPP2: Update Reconfig Flags attribute format
5caf4e094 DPP2: Support RA/CA functionality in Controller initiated case
9304d1b3c DPP2: Regenerate Reconfig Announcement for each transmission
b591810f9 DPP2: Add DPP Status attribute into Reconfig Auth Confirm
6d0217119 DPP2: Allow iteration count to be configured for DPP_RECONFIG
c6d0e5a93 DPP2: Add E-id in Reconfig Announcement
e5be6e68c DPP2: Add Enrollee netAccessKey group into Reconfig Announcement
2a58968d3 SAE-PK: Allow SAE-PK password to be set using the psk parameter
7ca81190a SAE-PK: Allow SAE-PK style wpa_passphrase if SAE-PK is enabled with same
844ecc70a Additional TWT attributes for response path and resume
0a9d7b169 SAE-PK: Update design for fingerprint encoding into password
2f858254c Extend GET_PMK to check PMKSA cache on the AP
b28b9dfcb OCV: OCI channel override support for testing (STA)
d309dd52b Fix the documentation for QCA_WLAN_VENDOR_ATTR_CONFIG_UDP_QOS_UPGRADE
87971ff05 SAE-PK: Fix SAE confirm writing in some AP cases with transition mode
240e9af4d SAE-PK: Make no-KEK debug prints distinct
38ef655eb dpp-nfc: Report negotiated connection handover result
4d5461842 dpp-nfc: Stop only_one run after failed handover attempt
f7b5a1d34 dpp-nfc: Do not indicate no initial HS as failure if alt HR will be sent
475b34665 dpp-nfc: Improved version of HandoverServer::serve()
dc0795e4f dpp-nfc: Stop process after successful handover client completion
b00bbbfe5 dpp-nfc: Optimize HandoverClient message receiving for alternative HR case
bbfb7b9fe dpp-nfc: Use a single handover client thread
aaa8638ed dpp-nfc: Add a class for maintaining connection handover state
66d74626b dpp-nfc: Reuse the same handover client for alternative URI
6e904441c dpp-nfc: Add peer URI into the HS in testing mode
3021b14c4 dpp-nfc: Enable more verbose nfcpy debugging
7c04bab71 tests: AES-CTR encrypt test vectors
1d3e16d0b dpp-nfc: Skip P2P management interfaces
e9c192ffc dpp-nfc: Ignore (no) response to initial handover request
7d27bcb8e dpp-nfc: Do not allow more than one alternative channel proposal
6eaee933d dpp-nfc: Add test mode for negotiated connection handover
730fc307b Update documentation for vendor attributes to ignore BSSIDs during roaming
f4877083e Rename driver op for temporarily disallowed BSSIDs
f8c756c5b FT: Rename temporary blocking of nonresponsive R0KH
15018d4f4 DPP2: Fix auth termination after receiving Configurator backup
74cd38ac6 dpp-nfc: Return failure status if operation fails
7e2edfbc1 dpp-nfc: Add color and details for interactive operations
09c22bb78 dpp-nfc: Fix regression in NFC Tag writing
1e4a42c74 dpp-nfc: Detect a non-NDEF tag when trying to write
288c0ffaa dpp-nfc: Do not hardcode netrole for NFC Tag writing cases
ebd5e764f Vendor attribute to configure QoS/AC upgrade for UDP frames
d91fb3ce3 Add a vendor command to fetch the currently enabled band(s)
29e47c416 Vendor command to configure TWT
8f396ad68 Enhance the qca_set_band enum values to be used as a bitmap
cc6153a8a nl80211: Fix sending proper VLAN ID attr value when using VLAN offload
a57f98754 Fix enabling 40/80 MHz bandwidth support in the 6 GHz band
885097125 mesh: Fix peer link counting when removing a mesh peer
8632dea4a DPP2: Make sure dpp_auth gets cleared with external config processing
a7ae42296 DPP2: Do not allow reconfiguration to be started with pending auth
d93df9989 DPP2: Debug print reason for rejecting reconfiguration
5d8c5f344 SAE-PK: Fix password validation check for Sec
0ce6883f6 tests: Fix SAE-PK password module tests
c9dc075fc dpp-nfc: Fix connection handover renegotiation
d0819a11c FILS: Use FILS auth alg when connecting using PMKSA caching
70b80c31f nl80211: Do not send FILS ERP sequence number without rRK
52a325762 6 GHz: Change 6 GHz channels per IEEE P802.11ax/D6.1
5908fedc1 dpp-nfc: Support channel list negotiation
eddf22e1f dpp-nfc: Update debug print for tag-read-only operation
b62e46f69 DPP2: Fix DPP_CA_SET processing with authentication not having peer BI
4f4a52c3c DPP: Clear bootstrap entries only after clearing authentication state
67efd19e0 nl80211: Use control port TX (status) in AP mode if possible
569497bf4 nl80211: Work around misdelivered control port TX status
87065881b nl80211: Use ext ack handler for TX control port
6f19cc4d7 nl80211: Handle control port TX status events over nl80211
f7c657b79 nl80211: Add custom ack handler arguments to send_and_recv()
73ea1ad7f nl80211: Clean up SO_WIFI_STATUS error reporting
cd99a8c43 EAP-TEAP (server): Allow Phase 2 skip based on client certificate
519629392 EAP-TEAP (client): Allow Phase 2 to be skipped if certificate is used
9593ce658 OpenSSL: Provide access to peer subject and own certificate use
b5dab03a1 Convert int to bool for throughput estimate tables
b97aa038b Add WPA_EVENT_{DO,SKIP}_ROAM events
d6b450e89 Refactor wpa_supplicant_need_to_roam()
2ff5a1fdb Use lookup-table instead of macro for TX rate estimates
fa09b85c4 DPP2: Remove forgetten development time debug prints
0bbab6465 DPP2: Fix dot1x config object parsing without trustedEapServerName
8f88dcf05 DPP2: Add an automatic peer_bi entry for CSR matching if needed
b25ddfe9d DPP2: Add Enrollee name into CSR as the commonName
11aa77e00 DPP2: GAS comeback response processing for Enrollee over TCP
18e013a93 DPP2: GAS comeback request processing for Configurator over TCP
68d9586a4 DPP2: GAS Comeback Request for the TCP case
a352c7230 DPP2: Comeback delay response for certificate in over TCP case
0f9463d6e DPP2: CSR wait in Configurator when using TCP
1f86b2c24 DPP2: CSR generation in TCP Client/Enrollee
697fa0c4b DPP2: Do not try to proceed with GAS client if CSR building fails
ffc8ae507 Define a new QCA vendor attribute for Optimized Power Management
3a3eded0d DPP2: Allow CSR processing by CA/RA to reject configuration
3b60f1174 DPP2: Validate CSR on Configurator before forwarding to CA/RA
c98db9f1f DPP2: Add challengePassword into CSR
dbbb0d5b8 OpenSSL: Use EVP-based interface for ECDSA sign/verify
ace3723d9 DPP2: Enterprise provisioning (Enrollee)
6568e5d20 DPP2: Enterprise provisioning (Configurator)
4643b2fee DPP2: Enterprise provisioning definitions for dot1x AKM
812d52ae2 OpenSSL: Support EC key from private_key blob
4b834df5e OpenSSL: Support PEM encoded chain from client_cert blob
68ac45d53 GAS server: Support comeback delay from the request handler
608adae5b JSON: Add base64 helper functions
c7e6dbdad base64: Add no-LF variant for encoding
6dc2c0118 Update DFS terminology in attribute value documentation
621745917 Allow HE-without-VHT to add the Channel Switch Wrapper element
d51b1b7a6 Move hostapd_eid_wb_chsw_wrapper() to non-VHT-specific file
1f72bbbef AP: Reject association request upon invalid HE capabilities
088bef178 AP: Restrict Vendor VHT to 2.4 GHz only
6a34bd300 HE: Use device HE capability instead of HT/VHT for 6 GHz IEs
9272ebae8 nl80211: Fetch HE 6 GHz capability from the driver
f25c51a9f Sync with mac80211-next.git include/uapi/linux/nl80211.h
518be614f SAE-PK: Advertise RSNXE capability bit in STA mode
a77d6d220 SAE-PK: Update SAE confirm IE design
363dbf1ec SAE-PK: Remove requirement of SAE group matching SAE-PK (K_AP) group
2e80aeae4 WPS UPnP: Support build on OS X
f119f8a04 WPS UPnP: Fix FreeBSD build
cc2d03601 HS 2.0: Use global pmf=2 for the created network block
790026c3d Allow TX queue parameters to be configured for wpa_supplicant AP/P2P GO
c7cb42d53 Remove unused enum values
411e42673 Move local TX queue parameter parser into a common file
fcef598ea Do not try to connect with zero-length SSID
85aac526a WPS UPnP: Handle HTTP initiation failures for events more properly
f7d268864 WPS UPnP: Fix event message generation using a long URL path
5b78c8f96 WPS UPnP: Do not allow event subscriptions with URLs to other networks
e30dcda3b SAE-PK: Fix FILS Public Key element Key Type for ECDSA
4c3fbb234 SAE-PK: Check minimum password length more accurate
43a191b89 tests: Remove too short SAE-PK passwords
4ff0df39e SAE-PK: Testing functionality to allow behavior overrides
0c4ffce46 Allow transition_disable updates during the lifetime of a BSS
5f48d36b4 SAE-PK: Select SAE-PK network over SAE without PK
d654ca24d Clean up wpa_scan_res_match()
9ad010c29 SAE-PK: Allow automatic SAE-PK to be disabled
85ca13ebc wpa_cli: Add all_bss command to print all scan results (BSS entries)
215b4d8a7 FT: Do not add PMKID to the driver for FT-EAP if caching is disabled
5cf91afee QCA vendor attribute for dynamic bandwidth adjustment
1a28589b2 QCA vendor attributes for setting channel width
63653307d Add support for indicating missing driver AKM capability flags
18f3f99ac Add vendor attributes to configure testing functionality for FT/OCV/SAE
e53756a64 Fix a typo vendor attribute documentation
960e8e533 QCA vendor attribute to configure NSS
8d1cbaaff SAE-PK: Transition mode disabled indication processing
a75269529 SAE: Add sae_h2e and sae_pk to wpa_supplicant STATUS command
cc22fb1b8 SAE: Move H2E and PK flags to main sae_data
bc908daac Document more network profile parameters
1c846d647 SAE-PK: Allow SAE authentication without PK to be disabled
40240735b WPS UPnP: Do not update Beacon frames unnecessarily on subscription removal
c85b39ec5 SAE-PK: Increment the minimum password length to 9
2c7b5a2c5 tests: Skip too short SAE-PK passwords in positive testing
d777156e1 SAE-PK: Determine hash algorithm from K_AP group instead of SAE group
fb09ec87f SAE-PK: A tool for generating SAE-PK Modifier and password
b6bcd74e5 Show SAE capabilities in control interface
9bf576870 Show SAE flags in scan results
e7aeb6d8a SAE-PK: STA functionality
20ccf97b3 SAE-PK: AP functionality
00e4fbdcc tests: Module test for SAE-PK
6b9e99e57 SAE-PK: Extend SAE functionality for AP validation
b6dcbd01a SAE-PK: Identifier definitions
aed01b82d OpenSSL: Additional EC functionality for SAE-PK
8c1f61e82 OCV: Report OCI validation failures with OCV-FAILURE messages (STA)
661e66118 OCV: Allow OCI channel to be overridden for testing (AP)
d10a57f6e DPP2: Derive a separate key for enveloped data
32d3360f3 DPP: Fix a typo in a comment
5a7bcb772 OSEN: Do not send the actual BIGTK to OSEN STAs
2d6cc0e67 FT: Do not expose GTK/IGTK in FT Reassociation Response frame in OSEN
a99833789 WNM: Do not expose GTK/IGTK in WNM Sleep Mode Response frame in OSEN
d578e890e OWE: Skip beacon update of transition BSS if it is not yet enabled
88436baaa Add a vendor attribute to get OEM data
3f9a89ca1 Vendor attributes for configuring LDPC, TX STBC, RX STBC
8ee0bc622 OCV: Disconnect STAs that do not use SA Query after CSA
01ceb88c7 OCV: Report validation errors for (Re)Association Request frames
a3556d581 OCV: Report validation errors for EAPOL-Key messages in AP mode
d52067a5b OCV: Report validation errors for SA Query Request/Response in AP mode
52579be86 OCV: Move "OCV failed" prefix to callers
2d118f557 OCV: Add support to override channel info OCI element (STA)
c2080e865 Clear current PMKSA cache selection on association/roam
d9532eb70 Debug print PMK-R0/R1 and PMKR0/R1Name in the helper functions
5ab8ad4cf Vendor attributes for ssetting TX A-MSDU and RX A-MSDU parameters
f7a904a28 QCA vendor command for adding and deleting TSPEC
82867456e Vendor attributes to configure PMF protection and disassoc Tx for testing
e5e275745 Add QCA vendor interface support to configure PHY modes
db0d0b84a nl80211: Control the registration for RRM frame with driver_param
Change-Id: I07d9feb8f019a22917ffc0088126c04b7d80115a
|
||
|
|
92cbe44bb5 |
wpa_supplicant: Fix order of auth_timeout event
`auth_timeout` event should be sent out before `disconnect` event. This otherwise causes issues in external clients which are keeping track of connection state. Bug: 170476633 Test: Compiles Change-Id: Iecadf054e56fca07bece54d65fcce327534c1336 |
||
|
|
fb3a444d74 |
FILS: Use FILS auth alg when connecting using PMKSA caching
When a PMKSA cache entry is available and used for connection with FILS key management suite, use FILS authentication algorithm for connection even if ERP keys are not available. This scenario may happen when applications using wpa_supplicant cache persistently only PMKSA but not ERP keys and reconfigures wpa_supplicant with PMKSA cache after restarting wpa_supplicant. The previous implementation correctly handles SME-in-wpa_supplicant cases. However, SME-in-driver cases, complete FILS authentication without PMKSA caching is performed. Fix SME-in-driver behavior by setting authentication algorithm to WPA_AUTH_ALG_FILS when connecting to a FILS AP using PMKSA caching. Bug: 156130528 Test: Manual - Basic wifi sanity Signed-off-by: Jouni Malinen <jouni@codeaurora.org> Signed-off-by: Sunil Ravi <sunilravi@google.com> Change-Id: I352f4e9badfd39de3d1c47b047f5fc9882024a56 |
||
|
|
4fbc08f3cc |
[wpa_supplicant] Cumulative patch from commit dd2daf084
Bug: 156933657
Test: Confirm random dialog token usage from logs
Test: Verify Passpoint ANQP functionality and Passpoint association
Test: act.py -c ../WifiDppConfig.json -tc WifiDppTest
Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic
Test: Regression test passed (Bug: 156969218)
dd2daf084 HE: Process HE 6 GHz band capab from associating HE STA
db603634a HE: Add 6 GHz Band Capabilities element in Beacon and response frames
88911a0aa HE: Add HE 6 GHz Band Capabilities into ieee802_11_parse_elems()
b2c0b83c6 HE: Remove VHT Operation Information from HE Operation element
e297a5bfd HE: Define 6 GHz band capability elements
39f29f250 defconfig: Enable TDLS
025ab330b ACS: Channel selection based freqlist
4ae3f3972 Add a helper function for recognizing BIP enum wpa_alg values
d3cab56c0 Rename WPA_ALG_IGTK to use the correct cipher name for BIP
bd1aebbd0 hostapd: Extend RESET_PN for BIGTK
df49c53f4 Fix a typo in a comment
4294d221d D-Bus: Increase introspection buffer size
79488da57 wolfssl: Do not hardcode include directory in wpa_supplicant build
eb595b3e3 wolfssl: Fix crypto_bignum_rand() implementation
6a28c4dbc wolfssl: Fix compiler warnings on size_t printf format use
f2dbaa8ac SAE: Fix a typo in a comment
038899290 wpa_gui: Fix build with Inkscape 1.0
3e1a13010 nl80211: Change AKM suite limit from warning to debug print
5a04a76aa Ignore Management frames while AP interface is not fully enabled
c82535edd Move deauthentication at AP start to be after beacon configuration
094c8a621 Remove unnecessary key clearing at AP start with nl80211
04030e8c0 nl80211: Remove AP mode interface from bridge for STA-mode-scan
7adea21d2 dpp-nfc: Enable hostapd beaconing for listen state
134ad50b0 dpp-nfc: Clean up debug prints when handover select is received
5d49c1bf7 dpp-nfc: Do not indicate a single channel 1 by default
d0e2d8091 dpp-nfc: Make handover request collision detection more robust
8791e7461 dpp-nfc: Write debug info to summary log
1e0bc897a dpp-nfc: Collision detection for handover request
9ad3fe934 dpp-nfc: Start handover server regardless of init-on-touch setting
24efcdf74 dpp-nfc: Own MAC address fetching from hostapd
8f96f2c3b dpp-nfc: Be more graceful when wpa_supplicant is not available
0b04d3c57 dpp-nfc: Allow wpa_supplicant control interface directory to be set
69dfbe6a9 dpp-nfc: Use Configurator/Enrollee parameters with tag reading
f85fb349f dpp-nfc: More robust determination of the script directory
98e4b3840 DPP2: Chirping in hostapd Enrollee
95471fc3e Handle hostapd_for_each_interface() at the process termination
99809c7a4 nl80211: Disable offchannel-ok in AP mode only if beaconing
0f58c88fc DPP2: Fix CONFIG_DPP2=y build with OpenSSL 1.0.2
44f786678 Clean up GET_CAPABILITY handling of 'strict' argument
3790f3a6e Use per-interface type driver key_mgmt capabilities when possible
8d7502809 Allow per interface type AKM capabilities to be fetched
b67bedf2e nl80211: Fetch information on supported AKMs from the driver
6fffb320f nl80211: Remove QCA vendor specific AKM capability handling
db59827a3 DPP2: Extend TCP encapsulation case to support Configurator as Initiator
0086c1452 DPP: Extend NFC bootstrapping script for more control by caller
890ae336c DPP2: Clean up CONFIG_DPP2 use with configurator connectivity IE
670e15337 DPP2: Fix DPP_CHIRP listen parameter value validation
7f20a3ebd DPP2: Reconfiguration support in Controller
6dcb8aaf1 DPP2: Reconfig Announcement relaying from AP to Controller
3b4f7dfaa DPP2: Fix Presence Announcement processing in Controller
5e2d877cc DPP: Mark internal-to-file functions static
3aaf269f6 DPP: Move TCP encapsulation into a separate source code file
21c612017 DPP: Move configurator backup into a separate source code file
fdbbb7406 DPP: Move authentication functionality into a separate source code file
182f6ae90 DPP2: Remove reconfigured network
3e48c5d4b DPP2: Reconfig Authentication Confirm processing
24b01c706 DPP2: Reconfig Authentication Response processing and Confirm generation
65e94351d DPP2: Reconfig Authentication Request processing and Response generation
3774b6bd0 DPP2: Reconfig Authentication Request generation and transmission
66ac616cd DPP2: Process received Reconfig Announcement frame
0c043d9de DPP2: Reconfig Announcement transmission
92492dd3a DPP2: Extend connector matching for reconfiguration
961435097 DPP2: Move connStatus object building into a helper function
94f73f90e DPP: Move signed connector checking into a helper function
94a28a494 DPP: Move parsing of own connector into a helper function
d4ae12355 DPP: Move PKEX functionality into a separate source code file
87b657261 DPP: Move crypto routines into a separate source code file
16626dff9 DPP2: Derive bk ("base key")
76029c6e1 DPP: Use EVP_PKEY_get0_EC_KEY() when a const reference is sufficient
0a488ef35 DPP: Track ending time for remain-on-channel operations
481fdfc46 DPP2: Fix URI version parser
7dd768c3c DPP2: Version information in bootstrapping info URI
cbafc8ef4 Fix truncated control interface command detection
5a0718a19 DPP2: Report MUD URL and bandSupport in control interface events
769139c49 DPP2: Do not include Protocol Version in Auth Req when testing v1
fad64b416 DPP: Move dppCon signing to a set of helper functions
12c8eacf7 DPP: Allow version number to be overridden for testing purposes
c3c38bc8b DPP2: Detect PFS downgrade attack while processing EAPOL-Key msg 3/4
9561925b4 DPP2: Detect PFS downgrade attack while processing EAPOL-Key msg 2/4
68422fedb DPP2: Parse DPP KDE in EAPOL-Key Key Data field
143e3d8bc DPP2: Add DPP KDE into EAPOL-Key msg 2/4 when using DPP AKM
b11a12401 DPP2: Add DPP KDE into EAPOL-Key msg 3/4 when using DPP AKM
85d545699 DPP2: Indicate if PFS was used in control interface STATUS
1f5f00008 DPP2: Try to negotiate PFS only if AP supports version 2 or newer
f6c22dcde Use a local pointer to simply current_ssid accesses in sme_associate()
42acf1292 DPP2: Add Protocol Version attribute to network introduction messages
96b6dd21a Increase wpa_supplicant control interface buffer size
a7d6098fb Add PRINTF_FORMAT for printf wrapper functions
Change-Id: I26a15ac578ce81d1e35f426085661e5c7b43b6ef
|
||
|
|
e21d4e8dc6 |
[wpa_supplicant] Cumulative patch from commit c54a5e96b
Bug: 154862045 Test: Confirm random dialog token usage from logs Test: Verify Passpoint ANQP functionality and Passpoint association Test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Connect to Passpoint, Open, WPA2, WPA3 networks and run traffic c54a5e96b Randomize GAS dialog token a803ba4f9 Use more specific reason codes for 4-way handshake timeouts ff0b87304 nl80211: Process unprotected Beacon frame RX events a39e9af90 nl80211: DPP listen mode callback e81e2091b Remove now unused Boolean/TRUE/FALSE definitions 3d58e8286 FILS: Convert Boolean to C99 bool 86ea761e9 mesh: Convert Boolean to C99 bool 71140cd5b RADIUS: Convert Boolean to C99 bool 2c55e67aa airtime_policy: Convert Boolean to C99 bool f75a0339d state_machine: Convert Boolean to C99 bool 0365458eb HE: Replace Boolean with C99 bool 5e5eb5a31 MACsec: Convert Boolean to C99 bool d15e109e2 EAP peer: Convert Boolean to C99 bool c9d70dd32 RSN supp: Convert Boolean to C99 bool da8478a1a EAPOL supp: Convert Boolean to C99 bool 37e3501bf FST: Convert Boolean to C99 bool 3dc69721e EAPOL auth: Convert Boolean to C99 bool 56024a233 WPA auth: Convert Boolean to C99 bool 4d9c313f2 WPA: Fix wpa_parse_kde_ies() handling with vendor specific elements 1025a9052 Sync with mac80211-next.git include/uapi/linux/nl80211.h Change-Id: I4fc553d84810ba82fdc626767c2e8a5640e4ca51 |
||
|
|
b755a2a1f9 |
[wpa_supplicant] Cumulative patch from commit 0c5ededed
Merge to enable randomized source MAC address for ANQP/GAS messages. Addresses an issue with DPP when GAS MAC randomization is enabled. Enable GAS MAC randomization in HIDL. Bug: 154393320 Test: Device boots up and connects to wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Confirm ANQP messages are randomized from logs: wpa_supplicant: GAS: Use a new random transmitter address ae:a2:5f:5e:65:11 Test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Wi-Fi direct tests in CtsVerifier Test: Regression test passed (Bug: 154769005) 0c5ededed DPP: Fix config exchange with gas_rand_mac_addr 60a2de568 EAP server: Convert Boolean to C99 bool 4d2ec436e DPP: Add driver operation for enabling/disabling listen mode 99cf89555 Include stdbool.h to allow C99 bool to be used 3e6383f31 DPP2: Silence compiler warning with no-CONFIG_DPP2 and OpenSSL 1.0.2 f23b70f16 Silence compiler warning in no-NEED_AP_MLME hostapd builds 011526874 nl80211: Move nl80211_init_connect_handle() to avoid forward declaration 2c70b7d0b Do not open l2_packet(EAPOL) for receive unnecessarily 7a880b129 l2_packet: Allow initialization without RX handling 95cbf4509 nl80211: Do not open EAPOL RX socket when using control port for RX (AP) c3bb8865a Clean up l2_packet_get_own_addr() call 9d6334e81 Do not open l2_packet bridge workaround socket if control port is used c1bc0dd80 nl80211: Disable EAPOL TX over control port in AP mode by default 12ea7dee3 nl80211: Use nl80211 control port for receiving EAPOL frames 8609aa5ba nl80211: Tie connect handle to bss init/destroy b4a70018e nl80211: Handle control port frame in bss events 6f70fcd98 nl80211: Check ethertype for control port RX 932546ac2 nl80211: Add a separate driver capability for control port RX bb9e3935d driver: Add second driver capability flags bitmap 6255a8ac1 WPS: Convert WPA/TKIP-only to WPA+WPA2 mixed mode credential 6b1c590eb Allow TKIP support to be removed from build a6c689d35 FT: Testing override for RSNXE Used subfield in FTE (AP) 9b222b613 nl80211: Remove unnecessary inclusion of l2_packet.h b2d8dc59f FT: Testing override for RSNXE Used subfield in FTE 5344af7d2 FT: Discard ReassocReq with mismatching RSNXE Used value af0178c75 Add vendor attributes indicating number of spectral detectors 7a510a97b Add an attribute for secondary 80 MHz span of agile spectral scan 24a6bca70 PKCS#1: Debug dump invalid Signature EB eac6eb702 X509: Use unique debug prints for unused bits entries 153333ef6 FT RRB: Remove confusing debug print about extra data d867e1181 FT: Remove and re-add STA entry after FT protocol success with PMF 97beccc83 SAE: Fix build without DPP/OWE/ERP c7a9a5745 P2P: Start group with user configured params after accepting invitation 512b6c02e DPP: Mandate mutual auth with NFC negotiated connection handover 872299f4b DPP2: Store netAccessKey in psk/sae credentials for reconfig bf9f49396 OWE: Remove check for unexpected DH Parameter IE use with other AKMs e4eb009d9 DPP2: Add Connector and C-sign-key in psk/sae credentials for reconfig 1dcfbab25 DPP2: Clear requirement for QR Code mutual authentication for chirping Change-Id: Iecf7494c1be132e006dee9ec0a40283765bdddbb |
||
|
|
a5ae4a7eeb |
Revert "[wpa_supplicant] Cumulative patch from commit 0c5ededed"
This reverts commit
|
||
|
|
1a1e642fd6 |
[wpa_supplicant] Cumulative patch from commit 0c5ededed
Merge to enable randomized source MAC address for ANQP/GAS messages. Addresses an issue with DPP when GAS MAC randomization is enabled. Enable GAS MAC randomization in HIDL. Bug: 154393320 Test: Device boots up and connects to wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Confirm ANQP messages are randomized from logs: wpa_supplicant: GAS: Use a new random transmitter address ae:a2:5f:5e:65:11 Test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Wi-Fi direct tests in CtsVerifier Test: Regression test passed (Bug: 154769005) 0c5ededed DPP: Fix config exchange with gas_rand_mac_addr 60a2de568 EAP server: Convert Boolean to C99 bool 4d2ec436e DPP: Add driver operation for enabling/disabling listen mode 99cf89555 Include stdbool.h to allow C99 bool to be used 3e6383f31 DPP2: Silence compiler warning with no-CONFIG_DPP2 and OpenSSL 1.0.2 f23b70f16 Silence compiler warning in no-NEED_AP_MLME hostapd builds 011526874 nl80211: Move nl80211_init_connect_handle() to avoid forward declaration 2c70b7d0b Do not open l2_packet(EAPOL) for receive unnecessarily 7a880b129 l2_packet: Allow initialization without RX handling 95cbf4509 nl80211: Do not open EAPOL RX socket when using control port for RX (AP) c3bb8865a Clean up l2_packet_get_own_addr() call 9d6334e81 Do not open l2_packet bridge workaround socket if control port is used c1bc0dd80 nl80211: Disable EAPOL TX over control port in AP mode by default 12ea7dee3 nl80211: Use nl80211 control port for receiving EAPOL frames 8609aa5ba nl80211: Tie connect handle to bss init/destroy b4a70018e nl80211: Handle control port frame in bss events 6f70fcd98 nl80211: Check ethertype for control port RX 932546ac2 nl80211: Add a separate driver capability for control port RX bb9e3935d driver: Add second driver capability flags bitmap 6255a8ac1 WPS: Convert WPA/TKIP-only to WPA+WPA2 mixed mode credential 6b1c590eb Allow TKIP support to be removed from build a6c689d35 FT: Testing override for RSNXE Used subfield in FTE (AP) 9b222b613 nl80211: Remove unnecessary inclusion of l2_packet.h b2d8dc59f FT: Testing override for RSNXE Used subfield in FTE 5344af7d2 FT: Discard ReassocReq with mismatching RSNXE Used value af0178c75 Add vendor attributes indicating number of spectral detectors 7a510a97b Add an attribute for secondary 80 MHz span of agile spectral scan 24a6bca70 PKCS#1: Debug dump invalid Signature EB eac6eb702 X509: Use unique debug prints for unused bits entries 153333ef6 FT RRB: Remove confusing debug print about extra data d867e1181 FT: Remove and re-add STA entry after FT protocol success with PMF 97beccc83 SAE: Fix build without DPP/OWE/ERP c7a9a5745 P2P: Start group with user configured params after accepting invitation 512b6c02e DPP: Mandate mutual auth with NFC negotiated connection handover 872299f4b DPP2: Store netAccessKey in psk/sae credentials for reconfig bf9f49396 OWE: Remove check for unexpected DH Parameter IE use with other AKMs e4eb009d9 DPP2: Add Connector and C-sign-key in psk/sae credentials for reconfig 1dcfbab25 DPP2: Clear requirement for QR Code mutual authentication for chirping Change-Id: I3e808e1d17162f0d4ce71536addf28790f0b24d2 |
||
|
|
fdcde76682 |
[wpa_supplicant] Cumulative patch from commit e4eb009d9
Bug: 153102274 Test: Device boots up and connects to wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Regression test passed (Bug: 153163800) e4eb009d9 DPP2: Add Connector and C-sign-key in psk/sae credentials for reconfig 1dcfbab25 DPP2: Clear requirement for QR Code mutual authentication for chirping a371164f8 Process received WNM Notification Request for beacon protection failures 0e794989e Beacon frame protection event for incorrect protection 7c8f540ee wpa_supplicant: Add HE override support e149051ce hostapd: Validate the country_code parameter value d4f5d1f0c DPP: Add some more details on how to use DPP 66e20bb1a Fix the dpp_configurator_sign example command 91498a122 hostapd: DFS for channel switch in repeater mode c60717f83 hostapd: Add support for DFS channels in CHAN_SWITCH 683e7c755 DFS: Add new hostapd_is_dfs_overlap() helper 798876739 DFS: Rename and export hostapd_config_dfs_chan_available helper 30b6d4bb7 hostapd: Basic channel check for CHAN_SWITCH parameters 3f88d2ba0 AP: Drop not needed condition to delete PTK ID 1 80914e9eb DPP2: Fix build with OpenSSL 1.0.2 (EVP_PKEY_get0_EC_KEY() wrapper) 54e2961f8 Add a hostapd testing option for skipping association pruning 1a18f8df6 nl80211: Allow full AP client state capability to be disabled 7b156a3c5 wpa_auth: Use printf format %zu instead of type casts f83d3491b wpa_auth: Do not split strings into multiple lines 9385f03fe wpa_auth: Coding style cleanup for pointer is NULL comparisons 62e12afcf wpa_auth: Clean up pointer dereferences bbf94a095 nl80211: Configure PMKSA lifetime and reauth threshold timer to driver 1f4e9946b Sync with mac80211-next.git include/uapi/linux/nl80211.h 5058f771d DPP2: Allow station to require or not allow PFS 7c021dec3 DPP2: Allow AP to require or reject PFS ca57d5f55 Return an enum from wpa_validate_wpa_ie() 2b4f9ce28 hostapd: Add HE bit in BSSID Information field of own Neighbor Report 80d0e50dc DPP2: Use a helper function for encapsulating TCP message fa5143feb DPP2: Presence Announcement processing in Controller db1ef8253 DPP2: Presence Announcement processing in AP/Relay 06dd32903 DPP2: Presence Announcement processing at Configurator 6f5bc15be DPP2: Configurator Connectivity indication 562f77144 DPP2: Chirping in wpa_supplicant Enrollee 1f0226770 DPP2: Add a helper function for building Presence Announcement frame 7cba35b0e DPP2: New identifier definitions 547dc7eaa DPP: Add DPP_BOOTSTRAP_SET command 804fc268a DPP: Allow per-peer configurator parameters to be set 514cc49ba DPP: Store global pointers in struct dpp_authentication bc95d5833 Fix a typo in function documentation b7275a814 Update STA flags to the driver immediately on disconnection 8ca6f924d STA: Fix wpa_clear_keys() PTK key deletion logic ff5434090 AP: Fix Extended Key ID parameter check 96686e637 wpa_supplicant AP mode configuration for Transition Disable KDE 9d1857cf3 Process Transition Disable KDE in station mode 82cc0b0cc Allow hostapd AP to advertise Transition Disable KDE 3eb9ddc65 Transition Disable KDE definitions a72ec4c22 Add addition CFR capture type to filter all NDPA NDP frames a163bfe2b Change CFR attributes from required to optional e520de8db Add ACS support for 60 GHz channel bonding 00f6a2762 nl80211: Fix offloaded ACS regression for the 60 GHz band 1e8ea0833 HE: Add HE support to hostapd_set_freq_params() bb08be757 Extend vendor attributes to support enhanced CFR capture 30ac8ddaf Add QCA vendor attributes for ACS over EDMG (IEEE 802.11ay) 41c3f0cd5 Allow last configured Key ID for TK to be fetched from wpa_supplicant 8b63a5816 Use a shared helper function for RSN supplicant capabilities b17b7a8e5 STA: Support Extended Key ID 862aac1fc AP: Support Extended Key ID b967b5e85 Limit scan frequency list to 100 entries 9f9a148af Convert int_array to use size_t instead of int as the length 749add5c6 Limit freq_range_list_parse() result to UINT_MAX entries 2f0600856 loop: Use size_t for eloop.count 7858f493f eloop: Use size_t for socket table->count 3f45b8dae hs20-osu-client: Use size_t for certificate components 913220cbb eloop: Use size_t for signal_count ae7193611 Limit maximum number of pending SA Queries 02b43c557 RADIUS: Use size_t instead of int for message attributes a2c23195a D-Bus: Use size_t for values theoretically larger than 16-bit int d2d16e310 Use size_t instead of int or unsigned int for configuration items 4391ddd63 Use size_t instead of unsigned_int for last_scan_res 22f0318db Interpolate rate calculation functions 3a25897ef Adjust max bitrate SNR floors eb26a6997 Allow SA Query to be disabled for testing purposes 7546c489a nl80211: Fix RTM NEW/DELLINK IFLA_IFNAME copy for maximum ifname length 22547c314 More details to the vendor specific driver internal failure reporting 51e8f5d63 Ignore duplicated SSID element when parsing 5a296129f Set beacon protection config irrespective of macro CONFIG_FILS cc79eb725 Check against integer overflow in int_array functions a55ecfeab Allow RSNXE to be removed from Beacon frames for testing purposes b7366a942 FT: Omit RSNXE from FT protocol Reassociation Response when needed 6140cca81 FT: Omit RSNXE from FT protocol Reassociation Request when needed 35936cd2c FT: Verify that RSNXE is used consistently in Reassociation Response 497ae9f00 FT: Verify that RSNXE is used consistently in Reassociation Request 51d1924bd FT: Set the new RSNXE Used subfield in FT reassociation 796253a65 nl80211: Debug print set_key() command names ac2224153 nl80211: Extended Key ID support a1afa2df8 Remove unnecessary and confusing length check from the PMKID KDE case 094c9cdc7 Add parsing of Key ID KDE for Extended Key ID f5c0104f3 Add KEY_FLAG_MODIFY for Extended Key ID support 9e30180a3 nl80211: Allow scanning in wpa_supplicant AP mode fab94f16e Indicate scan completion in active AP mode even when ignoring results 037e004c1 nl80211: Remove extraneous space from send_mlme debug print 81fa7730d nl80211: Add more TX status details in debug log in AP mode f21fbfb97 Allow RSNE in EAPOL-Key msg 2/4 to be overridden for testing purposes 46e147fcd Allow RSNE/RSNXE to be replaced in FT protocol Reassocation Response frame 1a8e9334c FT: Check RSNE/RSNXE match in FT protocol Reassociation Response frame 839bab785 nl80211: Debug print driver capabilities e861fa1f6 Move the "WPA: AP key_mgmt" debug print to be after final changes 1d9cff86b Multi-AP: Set 4-address mode after network selection e0fb468a7 HS 2.0 server: Add a note on OCSP server hostname 440dac755 hs20-osu-client: Use more specific debug message on OSU connection 2b9713d61 Fill the current opclass in (Re)AssocRequest depending on HT/VHT IEs d9a7b71a7 AP: Fix regression in frequency check for a usable EDMG channel 1f13c1393 mesh: Fix CONFIG_HT_OVERRIDES build without CONFIG_VHT_OVERRIDES 52efde2aa WPS: Do not set auth_alg=OPEN for PSK+SAE case 10223b501 SAE: Expose sae_write_commit() error cases to callers 7f1f69e89 SAE: Check hmac_sha256() result in sae_token_hash() b0927e5d0 nl80211: Fix error print for hapd_send_eapol() a17cbcd69 os_unix: Call srandom() only if os_get_random() succeeds 17ba51b14 nl80211: Fix tx_control_port error print bb2ea8e5e DPP: Remove unreachable return statement 7dcc5f7fe SAE: Check sta pointer more consistently in testing code 15d63c604 Clean up hostapd_get_he_twt_responder() processing 7aa47fe5f DPP: Fix connectorTemplate addition fe0429a58 Replace systemd install Alias with WantedBy c7d293024 RSN: Stop 4-way handshake if scan results are not available f4bf6a5d4 OWE: Allow BSS entry with different SSID to be used in transition mode 3c7381150 OWE: Mark BSS for transition mode based on active OWE network profiles ecb5219d8 OWE: Avoid incorrect profile update in transition mode 785f99b68 FT: Silence debug prints when FT is not actually used 33a28170a Recognize OWE Transition Mode element in IE parser fad044943 Report RSNXE mismatch in EAPOL-Key msg 3/4 more consistently with RSNE 4d64fd37b Allow RSNE in EAPOL-Key msg 3/4 to be replaced for testing purposes 9128b6726 Extend hostapd rsnxe_override_eapol to allow IE removal 43ededa9c Do not override WDS VLAN assignment for STA 87998f80e HS 2.0 server: Allow OCSP responder to continue running after errors ca8a51c4b webkit2: Fix http://localhost:12345/ redirect handling be15f33d0 Replace WPA_ALG_PMK with KEY_FLAG_PMK 11b1fcd6c nl80211: Drop outdated TDLS set_key() hack 2dd72315d wpa_cli: Add missing quote around interface name f64b601c4 DFS: Add support for 80+80 MHz when going through channel switch 0a76a0b96 OWE: Fix PTK derivation workaround for interoperability 87775e32f Fix segmentation fault for NULL confname in SAVE_CONFIG 81621eab7 nl80211: Migrate from set_tx to key_flag API 9757f18db nl80211: Don't ignore when SET_KEY returns ENOENT 98b8275d9 nl80211: Remove not needed netlink key attribute 8563f6f56 nl80211: Fix wrong return code in set_key error path adf550ee4 nl80211: Ignore seq number for key deletion e9e69221c Validity checking function for key_flag API 5eb163256 nl80211: Add a missing key_flag for WEP shared key authentication 82eaa3e68 Remove the not yet needed KEY_FLAG_MODIFY 982b9cf02 Fix a wrong key_flag when deleting 802.1X WEP keys d37c05e5b AP: Don't try to set NULL WEP default key fa1a6aff2 Fix unicast argument for set_wep_key() from EAPOL supplicant 11dab0f37 WPS: Remove expired PINs on Selected Registrar timeout 8f89e57ab DFS: More debug prints on channel selection after radar detection 4b37d2428 hostapd: Fix to downgrade bandwidth in radar detection 7242087d1 DFS: Do not process radar event while disabling an interface 5fdacce46 Allow wildcard SSID to be enforced for a specific BSSID scan 43282f732 mesh: Fix HE enablement on 5 GHz with VHT 21f835e64 SAE: Allow SAE-only network profile with sae_password to be written 5bad30056 privsep: Mask out control port capability flag c1a6b1e47 privsep: Add key_flag to set_key() 852d370f6 Silence a compiler warning in no-WEP and no-EAP builds 101da59aa common: Add support for element defragmentation e636bc855 WPA: Rename FILS wrapped data 94773d40f crypto: Add a function to get the ECDH prime length e8ae97aeb nl80211: Allow TX status for Authentication frames c4988e73c driver: Extend send_mlme() with wait option d046f2a9f nl80211: Register for SAE Authentication frames more strictly 7a9c36722 DBus: Add "sae" to interface key_mgmt capabilities 200c7693c Make WEP functionality an optional build parameter bca44f4e4 WPS: Remove static-WEP-only workaround b7f1d4f4d ACS: Allow hw_mode=any to be used with internal ACS algorithm d07f1ade9 ACS: Determine mode when using hw_mode=any c60362e6e ACS: Extend acs_find_ideal_chan() to support multiple modes 141a8815e ACS: Extend acs_request_scan() to support multiple modes f3c44a196 ACS: Extend interference factor calculation for all modes 070522e5b ACS: Extend acs_find_chan() for all modes 4c1ffb45e ACS: Extend acs_surveys_are_sufficient() for all modes 3d09be41a ACS: Clear all modes in acs_cleanup() 499c37b72 ACS: Extend hostapd_get_mode_channel() to find from any mode a62d76185 ACS: Fix spelling of "interference" 167205d45 os_unix: Seed random() for os_random() 74db49d74 SAE: Do not use PMKSA entry after its reauth threshold bb93ea234 SAE: Do not clone PMKSA entry for OKC after its reauth threshold 114d12418 SAE: Fix PMKID derivation for OKC 3f10f716a common: Provide the BIT() macro locally b8f6b0713 Add attribute for dwell time in QCA vendor scan ec303e2cb Introduce QCA_WLAN_VENDOR_ATTR_CONFIG_ROAM_REASON 34640a88d Fix enum qca_wlan_vendor_attr_config value prefix 3fadb1dcc WPS: Ignore other APs if PBC is used with a specific BSSID f1d385609 nl80211: Beacon protection capability flag and default key type 2e34f6a53 Sync with mac80211-next.git include/uapi/linux/nl80211.h 0f84a93f6 Fix a type in wpa_supplicant defconfig 0e05e8781 Simplify wpa_deny_ptk0_rekey documentation a5944db04 Add wpa_deny_ptk0_rekey to AP get_config() output 8a1660b60 common: Add missing driver flag strings 4b04223f2 hostapd: Replace UDP ctrl_iface global cookies with per-instance ones 12fb9698a Use IFNAME= prefix for global UDP control interface events 293631f17 IBSS RSN: Coding style cleanup 1f90a49d0 STA: Allow PTK rekeying without Ext KeyID to be disabled as a workaround 1a7963e36 AP: Allow PTK rekeying without Ext KeyID to be disabled as a workaround 35da7c20a nl80211: Add driver capability flag for CAN_REPLACE_PTK0 7b26238d4 Do not skip MBO PMF check with the WPS special case WPA check exception fae7e64aa Save RM enabled capability of station with AP SME e9ac44fcb Make INTERWORKING_CONNECT more reliable in testing environment 1074d4241 Fix a typo in a comment 8fe7ec664 Remove Secondary Channel Offset element from Beacon/Probe Response frames 7f1529d2a Fix HE element order in Beacon and Probe Response frames f3bcd6960 Remove CONFIG_IEEE80211N build option 640d59942 Fix location of MDE and RSNXE in Beacon and Probe Response frames 2d4c78aef Configure received BIGTK on station/supplicant side ecbf59e69 wpa_supplicant configuration for Beacon protection 16889aff4 Add BIGTK KDE and subelement similarly to IGTK 555dcd75c Generate BIGTK and rekey it with IGTK 323d06187 Parsing of BIGTK KDE in EAPOL-Key frames 3937378ab Parsing of BIGTK subelement in FTE d2e77310d driver: Document use of set_key() for BIGTK c1df321b6 AP mode indication of Beacon protection being enabled 92d407dbd hostapd configuration for Beacon protection cb86e8bac nl80211: Remove an extra closing parenthesis from a debug message 46cb04650 nl80211: Check nla_nest_start() result for NL80211_ATTR_HE_OBSS_PD 0b0ee0f15 HE: Propagate BSS color settings to nl80211 8155b36fa Fix VERSION_STR printf() calls in case the postfix strings include % dd74ddd0d nl80211: Handle AKM suite selectors for AP configuration 139f6deaf Remove duplicated wpa_akm_to_suite() entry 10655d1bc nl80211: Add NLA_F_NESTED to nla_nest_start() with older libnl versions 5db5290ab webkit: Clean up USE_WEBKIT2 blocks 26ad26c8c webkit2: Split decide-policy into a separate function 02ed737ee webkit2: Split resource-load-started handler into a separate function 7de8bd508 webkit: Track gtk_main()/gtk_main_quit() calls de0a8906f webkit2: Remove TODO not for download-started ae07bc46c webkit2: Do not register notify::load-status handler 9ea9d18de webkit2: Replace notfy::progress with notify::estimated-load-progress c0c4685d5 webkit2: Implement notify::title handler ffeafc087 webkit2: Use mouse-target-changed to replace hovering-over-link e33a0eece hs20-osu-client: Validate HTTPS server certificate by default (browser) 61bf9819c hs20_web_browser() to allow TLS server validation to be enabled 921ea4962 hs20-osu-client: Ignore TLS errors with webkit2 b4b1b122e hs20-osu-client: Enable webkit2 support 466e48dcd HT: Remove SMPS in AP mode 8de0ff0fa HE: Add TWT responder extended capabilities field ab8c55358 HE: Dynamically turn on TWT responder support 0cb39f4fd HE: Extend BSS color support 458162a27 Sync with mac80211-next.git include/uapi/linux/nl80211.h 981b96caa WPS: Mark added PSK entry with wps=1 tag for per-Enrollee PSK case b05627511 Fix exception checking in a wpa_supplicant P2P example script 2bab073df WPS: Add new PSK entries with wps=1 tag fde8e7946 WPS: Make it possible to use PSKs loaded from the PSK file b1977a652 WPS: Use PMK_LEN instead of hardcoded 32 b27ed050d Do not split strings into multiple lines 838180877 Use PMK_LEN macro instead of hardcoded value 64 (= 2 * 32) f5da5810c Check pbkdf2_sha1() result when generating PSK from PSK file e7d8842e6 OWE: Rename owe_assoc_req_process() parameter reason to status 877d9a02b Additional get_sta_info attrs for Beacon/Probe Response/disconnect reasons 8162d98f2 Introduce QCA_NL80211_VENDOR_SUBCMD_DRIVER_DISCONNECT_REASON 32551066b Introduce QCA_NL80211_VENDOR_SUBCMD_UPDATE_STA_INFO dae85e655 P2P: Increase number of channels per operating class 75d0ec470 P2P: Fix a possible buffer overflow in struct p2p_reg_class 555131783 Introduce QCA_WLAN_VENDOR_ATTR_BEACON_REPORT_FAIL c304bddcf DPP: Stop Action frame sequence on DPP_STOP_LISTEN and PKEX failure de08fae66 DPP: Do not require dpp_configurator_params to start with a space c7cc80fbc DPP: Reset DPP_AUTH_INIT netrole back to STA by default adf3de44c Add check to consider band in enabling connection_vht flag 490d90db4 Define macro BIT() in qca_vendor.h 9a0edf170 wlantest: Add PTK derivation support with SAE, OWE, DPP 96a2a9a88 Send RM Enabled Capabilities element in (Re)Association Response frame 23dc196fd Check for FT support when selecting FT suites 85f3ab758 Replace deprecated readdir_r() with readdir() 641d79f16 SAE: Special test mode sae_pwe=3 for looping with password identifier 31d7fe917 Add GET_PMK for fetching the current PMK for a STA from hostapd ca1cecc54 SAE: Verify that appropriate Status Code is used in SAE commit (SME) c248ebaf4 DPP: Fix encryptedContent DER encoding 4dc3b70de DPP: Try to negotiate different parameters if NFC handover fails 61c049da3 DPP: Allow local channel list to be set e2b1e7dce DPP: Require conf=configurator to allow Configurator provisioning 1ba4a10a0 DPP: Initialize conf_resp_status to non-OK 18714af2d DPP: Ignore unexpected duplicated Authentication Confirm 8f8473ceb SAE: Fix peer-commit-scalar reuse check c4bab72d9 Use secondary channel provided by ACS for HT40 if valid 16b789eef Fix wmm compile on fedora-17 (gcc 4.7.2) d240c74b6 nl80211: Fix regulatory limits for WMM cwmin/cwmax values bc1289b07 nl80211: Fix WMM queue mapping for regulatory limit fee28410d scan_est_throughput: Use ie_len instead of res->ie_len b2b7f8dcf BSD: Fix the maximum size of a route(4) msg to 2048 25c247684 BSD: Remove an outdated comment d807e289d BSD: Don't set or remove IFF_UP 4692e87b2 BSD: Share route(4) processing with hostapd and wpa_supplicant. d20b34b43 BSD: Driver does not need to know about both wpa and hostap contexts aad414e95 nl80211: Fix send_mlme for SAE external auth 1a9d270d4 Additional stats through QCA_NL80211_VENDOR_SUBCMD_GET_STA_INFO c025c2eb5 DPP: DPPEnvelopedData generation for Configurator backup 7d9e32005 DPP: Received Configurator backup processing ea91ddb08 DPP: DPPEnvelopedData parsing for Configurator backup/restore 312eac1d1 DPP: Add ASN.1 support into build 31b5950d0 ASN.1: Helper functions for building DER encoded data ce1f47739 ASN.1: More OID definitions 8006742fa ASN.1: Add a helper for parsing AlgorithmIdentifier f7f2843c4 ASN.1: Add a helper for parsing SEQUENCE 3393d94d0 ASN.1: Add a helper for parsing INTEGER 5e98998ec DPP2: Add Protocol Version attr to Auth Resp only if peer is R2 or newer 505797b45 Add a vendor attribute for RTPL instance primary frequency 76162b182 TLS: Fix bounds checking in certificate policy parser 703c2b645 DPP: Example script for NFC bootstrapping method 566972fd6 DPP: Show selected negotiation channel in DPP_BOOTSTRAP_INFO 5e287724e DPP: NFC negotiated connection handover 2bbe6ad3a DPP: Helper function for bootstrapping URI generation 12da39b38 crypto: Allow up to 10 fragments for hmac_sha*_vector() d165b32f3 TLS: TOD-STRICT and TOD-TOFU certificate policies cd66b8295 TLS: Fix a typo in a debug message a62940904 Add vendor interface QCA_NL80211_VENDOR_SUBCMD_REQUEST_SAR_LIMITS_EVENT 0ecf73563 Add new QCA vendor attribute to set thermal level 8b138d282 OWE: PTK derivation workaround in STA mode 65a44e849 OWE: PTK derivation workaround in AP mode bd50805e4 OWE: Select KDF hash algorithm based on the length of the prime 10bdce692 Fix a typo in an example configuration file comment 0d445cd39 Fix a typo in a comment ce26f0086 Fix coloc_intf_reporting config param in hostapd in non-OWE builds 1011c7990 Do not enable HT/VHT for 6 GHz band 20 MHz width channels also d0e116f61 Enhance get_mode() to return correct hw_mode with 6 GHz support 4658eb77d Remove deprecated text for ap_scan=0 5e32fb017 SAE: Use Anti-Clogging Token Container element with H2E e36a5894d SAE: Use H2E whenever Password Identifier is used c56b7a2fd SAE: Mark sae_derive_pt_ecc() static 29dd0b316 SAE H2E: Check H2E-only BSS membership selector only if SAE is enabled 4ee5a5035 trace: Handle binutils bfd.h breakage fa308a649 hostapd: Fix a typo in sample configuration d20365db1 EAP-SIM/AKA peer: Add support for EAP Method prefix 4bf78a79d ACS: Populate channel config from external ACS per documented behavior fe1552d93 ACS: Update documentation of external ACS results event parameters 881177201 6 GHz: Fix Channel Width value for 80+80 in 6 GHZ Operation Info field b4fe37c4f Silence compiler warning in no-NEED_AP_MLME builds dd530b873 Silence compiler warning with CONFIG_NO_ROAMING=y e1650a7b0 tests: Set key_flag when using SET_KEY a919a2603 Introduce and add key_flag 3df4c05ae nl80211: Pass set_key() parameter struct to wpa_driver_nl80211_set_key() 99d8c4dca hostapd: Support VLAN offload to the driver 0f903f37d nl80211: VLAN offload support 4d3ae54fb Add vlan_id to driver set_key() operation f82254645 driver: Move set_key() parameters into a struct 3912cbd88 SAE: A bit optimized sae_confirm_immediate=2 for testing purposes 33c8a1049 Do not select APs found on disabled channels for connection aa663baf4 Fix QCA_WLAN_VENDOR_ATTR_ACS_VHT_SEG1_CENTER_CHANNEL NULL check f7b2fe99e tests: Fix undefined behavior in module tests 297d69161 OpenSSL: Fix memory leak in TOD policy validation 8296ee180 RSN IBSS: Fix EAPOL TX using control port c52129bed nl80211: Allow control port to be disabled with a driver param 781c5a062 nl80211: Use control port TX for AP mode d8252a981 nl80211: Report control port RX events a79ed0687 Add no_encrypt flag for control port TX 144314eaa wpa_supplicant: Send EAPOL frames over nl80211 where available 8759e9116 nl80211: Control port over nl80211 helpers ccaabeaa0 driver: Remove unused send_ether() driver op 3d41dd7c5 WPS: Add application extension data to WPS IE b7bb2c020 P2P: Move p2p_long_listen into struct wpa_global 9ad3c12dd P2P: Always use global p2p_long_listen 9bedf9004 nl80211: Use monitor interface for sending no-encrypt test frames 8d84c75f7 Allow testing override for GTK/IGTK RSC from AP to STA af670cb41 SME: Postpone current BSSID clearing until IEs are prepared ff7743118 nl80211: Don't set offchan-OK flag if doing on-channel frame in AP mode d5798e43f nl80211: Use current command for NL80211_CMD_REGISTER_ACTION 81ae8820a nl80211: Rename send_action_cookie to send_frame_cookie 5ad372cc3 nl80211: Clean up nl80211_send_frame_cmd() callers 0dae4354f nl80211: Get rid of separate wpa_driver_nl80211_send_frame() e69592786 driver: Remove unused send_frame() driver op ce0180487 Convert the only remaining send_frame() users to send_mlme() 27cc06d07 nl80211: Support no_encrypt=1 with send_mlme() 665a3007f driver: Add no_encrypt argument to send_mlme() 371002746 Make hostapd_drv_send_mlme() more generic b3525dc17 P2P Manager: Use send_mlme() instead of send_frame() for Deauthentication 947465475 IBSS RSN: Use send_mlme() instead of send_frame() for Authentication frames 14cc3d10c nl80211: Simplify hapd_send_eapol() with monitor interface 16a266720 nl80211: Don't accept interrupted dump responses 6c5701937 Test functionality to override driver reported signal levels c8eb7fe66 Fix signal_poll based roaming skip a8b00423e BSD: Use struct ip rather than struct iphdr 3ea58a054 nl80211: Fix libnl error string fetching 139f7ab31 mac80211_linux: Fix libnl error string fetching 25ebd538a Drop support for libnl 1.1 1ace2f7c0 Drop debug print level for informative debug messages ad2f09660 Maintain BSS entries for 5 seconds after interface is disabled 988f14448 Indicated if the selected BSS is the current BSS a8ad9c31d Make min_diff determination from cur_level more readable 41f72d735 Use sel_est consistently with cur_sel in wpa_supplicant_need_to_roam() a2c1bebd4 Improve roaming logic 9c8d550b7 Allow roam to lower signal level if throughput benefit is significant 9fafefb9e Skip roaming based on signal level difference if current SNR is good f4f7600ad Use signal_poll noise information for roaming, if available f97baef25 Clear SME auth_alg on FLUSH 568950c6e RSN: Do not add PMKSA candidates unnecessarily 0d1d1f0d2 Clear last Michael MIC error timer on FLUSH 69ccc557d wpa_supplicant: Fall back to avg_signal in roaming decision 7e7b23e22 Update throughput estimate for the current BSS based on signal poll ad06ac0b0 Move throughput estimation into a helper function ef1a45f28 Move scan/roaming related defines to a header file 98ea9d5d5 Use local variables for current BSS signal strength in roaming 22319c7fe RADIUS client: fix extra retry before failover 02c21c02d wpa_supplicant: Do not disconnect on deinit if WoWLAN is enabled 82ba4f2d1 nl80211: Add a driver ops function to check WoWLAN status 59536a33d wpa_cli: WPS-PIN-ACTIVE and WPS-CANCEL events for action scripts b0621b083 Call hostapd_allowed_address() directly from handle_probe_req() 963681723 Fix possible memory leak of RADIUS data in handle_auth() d4ceaafc2 Make hostapd_copy_psk_list() non-static 29024efd1 Move the RADIUS cached attributes into a struct 3cd4db231 FT: Do not deliver RRB messages locally without matching FT/SSID c133c785d FT: Check mobility domain when sending RRB message to local managed BSS a422d9b4c RRB: More debug prints for local delivery 7b1105afe RRB: Do not reorder locally delivered messages 4834c6869 FT: Fix hostapd_wpa_auth_oui_iter() iteration for multicast packets 18780c6d6 OpenSSL: Add support for TPM2-wrapped keys 974f84bb7 Fix ignore_broadcast_ssid behavior with SSID List and Short SSID List 1c7f652f9 AP: Support Short SSID List element in Probe Request frames 522450b7b AP: Determine Short SSID value for the BSS 41b06b065 mesh: Fix race condition in mesh mpm new peer handling ef48f1bfb Ensure authenticator session timer is applied with wired driver a383db064 defconfig: Enable MACsec 53661e3a9 Allow debug log to be written to both syslog and file 68f9f480e wpa_gui: Silence a compiler warning eadfeb0e9 wpa_gui: Show entire list of networks a3b59fa11 wpa_cli: Let LAST_ID argument to be used for LIST_NETWORKS 078217a2d STA OBSS: Update secondary channel info after CSA Change-Id: I194039d27c1467a20aa4a28c0612ff9ba52ac7f9 |
||
|
|
0ff61c5e4c |
Cumulative patch from commit ee48f48ba
The following commits are merged as well as changes in
./wpa_supplicant/hidl/1.3 to fix compilation errors.
ee48f48ba hostapd: Support showing neighbor list through hostapd_cli
3204795d7 STA OBSS: Add check for overlapping BSSs
3af78a4e0 Extract BSS coex 40 MHz check into a separate function
70755e658 Allow removing neighbor DB entries by BSSID alone
bf3ab50f4 Change some RRM debug messages from wpa_printf() to wpa_dbg()
a737e40b5 drivers: Support of dynamic VLAN requires Linux ioctls
9b391715c mesh: Allow group management cipher to be configured
65d0b67c2 mesh: Increase plink action frame AMPY buffer length for max GTK/IGTK
b1b62a136 WPS: Add WPS-PIN-ACTIVE and WPS-CANCEL events
0b1839405 Add "reconnect" cmdline argument to hostapd_cli/wpa_cli
4318a635a DBus: Update dont_quote[] with new network profile parameters
26a00ba8b DBus: Remove not existing network profile params from dont_quote[]
23d87687c dbus: Move roam metrics to the correct interface
8e111157e nl80211: Relax bridge setup
3626e72c8 l2_packet: Fix bridge workaround for repeater configuration
84972999b FT: More debug prints for RSNE modification for EAPOL-Key msg 2/4
4cfa8b92b Fix wpa_insert_pmkid() when buffer includes extra IEs
32289112c wpa_passphrase: Output errors to stderr
07fe134d9 EAP-SIM peer: Do not accept SIM/Challenge without SIM/Start
b2e2a8588 OpenSSL: Extend key_block size determination to support GCM/CCM ciphers
efaa6256e More detailed documentation on ieee80211w configuration parameter
1730a6a5e nl80211: Fix couple of typos in a comment
307cfc328 Strip trailing zero data in EAPOL-Key msg 1/4 when no PMKID to send
2c5ccfa60 nl80211: Initialize full channel info struct even if channel is not known
e6d3aca9c WPS: Add prefixes to public event_* functions
2ba6aa604 Fix memory leak in case allocation of token fails during JSON parsing
84877f253 wpa_supplicant: Do not try to detect PSK mismatch during PTK rekeying
78d338d1b DPP: Fix a memory leak on an error path
9be30ffc1 DPP: Abort ongoing scan if connection status needs to be sent
3f3876344 SAE: Enable NEED_DH_GROUPS_ALL for CONFIG_TESTING_OPTIONS=y builds
1f1567d2a QCA vendor command for getting STA information
e5620bf02 6 GHz: Select channel width using configured op_class
0bfc04b8d Do not enable HT/VHT when operating in 6 GHz band
da8570f4c Allow non-PCS 6 GHz channels to be excluded from ACS
59bb72642 Allow ACS channel list to be configured as frequencies (in MHz)
5f9b4afdf Use frequency in HT/VHT validation steps done before starting AP
59e33b4a9 ACS: Select current hw_mode based on the selected frequency
bb781c763 AP: Populate iface->freq before starting AP
41cac481a ACS: Use frequency params in ACS (offload) completed event interface
840532aea Search through all hw_features sets in hw_get_channel_freq()
15d356873 ACS: Add channels from all modes matching with configured hw mode
996662250 P2P: Add support for EDMG channels
f86e34168 Update operating classes and channels for the 60 GHz band
a19277a28 Add EDMG bandwidth to channel frequency APIs
5a563a3d3 Avoid compiler warning on shadowing a local variable
e3c476bd8 SAE H2E: Fix RSNXE override in EAPOL-Key msg 2/4 for testing purposes
7fde39fb1 Add sae_rejected_groups to hostapd STA control interface command
5661ebd77 DPP: Configurator netRole for Enrollee
740457445 DPP: Replace ap boolean with netRole enum in Configurator params
f2c4b44b4 SAE H2E: RSNXE override in EAPOL-Key msg 3/4
132565539 SAE H2E: RSNXE override for testing purposes
a889e9a70 SAE: Reject invalid rejected group report in SAE commit explicitly (AP)
c88e01e1b SAE H2E: Fix validation of rejected groups list
b834e9700 SAE H2E: Testing option to report extra rejected groups
918df2227 SAE: Reject unexpected Status Code in SAE commit explicitly (AP)
405946d76 SAE: Testing option to ignore H2E requirement mismatch
23acdd9f3 Fix memory leak in ACS offload operation
e86ba912a ACS: Remove redundant ch_list parameters from do_acs interface
3cf360b8e DFS: Don't handle DFS ops for 6 GHz channels
ee0030e81 6 GHz: Do not check for HT capability on 6 GHz channels
e780b4bf2 DPP: Bootstrapping via NFC URI Record
3c0d6eb8a Sync with mac80211-next.git include/uapi/linux/nl80211.h
38203148e Extend hostapd to support setband to driver via QCA vendor command
3c13af557 hostapd: Register wpa_msg callback even if only global ctrl_iface is used
e92080568 hostapd: Extend global control interface notifications
9f50538e1 SAE H2E: Do not use sae_h2e param in AP mode if SAE is disabled
181bf9336 DPP2: Report received ssid_charset as DPP-CONFOBJ-SSID-CHARSET event
71e2848ea DPP2: ssid64/ssid_charset in Configurator
57a63b131 DPP2: Add parsing of ssid64/ssid_charset in Config Object
590bc64d6 DPP: Use JSON token builder helpers
e75ab5322 JSON: Add helper functions for building tokens
8e5e36a18 Clean up base64_{encode,decode} pointer types
b22608423 Clean up base64_url_{encode,decode} pointer types
a4255a207 Simplify base64_url_encode() prototype
c54227c26 DPP2: Replace connectionStatus object ssid with ssid64
31b6eb417 tests: Update SAE H2E test case to match SSWU parameter z change
0432237a4 SAE H2E: Update SSWU curve-specific parameter z values
5b50265e1 WMM: Do not modify input TSPEC buffer during processing
783a99b73 HS2.0: Skip check for roaming_consortium for NAI realm query
f3c077929 P2P: Fix listen state machine getting stuck in send_action() scheduled case
530b8ee3c hostapd: Update DFS status in VHT80+80 mode
93ba13bcf Fix status code in SAE/DPP association PMKID mismatch (driver-AP-SME)
b90d2f7ff Fix a typo in a comment
Bug: 146900007
Test: Device boots up and connects to wifi networks, run traffic.
Test: Able to turn on/off softap, associate wifi STA, run traffic.
Test: Regression test Passed (Bug: 146905211)
Change-Id: Idc3584b491429a2e4935068a293bff572fc9d62e
|
||
|
|
c3565926fc |
[wpa_supplicant] Cumulative patch from 9fde14607
Changes include required updates to DPP R2. Bug: 143479699 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Regression test Passed (Bug: 143485775) 9fde14607 Allow scans triggered by D-Bus to use MAC address randomization 10f8351d6 D-Bus: Add MAC address randomization endpoints bb66d4675 Move ownership of MAC address randomization mask to scan params 6c2f70cc6 DPP: Mention ssid and pass parameters for DPP_AUTH_INIT in documentation 1030dec1f JSON: Fix escaping of characters that have MSB=1 with signed char 7800725af dbus: Export OWE capability and OWE BSS key_mgmt b2ad4e6b2 D-Bus: Fix P2P NULL dereference after interface removal 937644aa2 nl80211: Indicate SUITE_B_192 capa only when CCMP-256/GCMP-256 supported 1b5865a53 SAE: Ignore commit message when waiting for confirm in STA mode 50a2c8c90 Do not indicate possible PSK failure when using SAE df3b2e22a nl80211: Add STA node details in AP through QCA vendor subcommand f273b2a5c Add QCA vendor cmd for setting BT coex chain mode 4dc860680 Extend QCA OEM data vendor subcmd to allow use as an event 93a1e275a SAE: Determine H2E vs. looping when restarting SAE auth in AP mode de580bf6c crypto: Remove unused crypto_bignum_sqrtmod() 9b292a48f SAE: Drop sqrt() alternative from SSWU (H2E) 305369038 wpa_supplicant: Fix arithmetic on void pointer 00ddc1cc2 common: Fix same expression checked twice in fils_key_auth_sk() 327d09aa0 HE: Add 11ax info to ap mode ctrl iface STATUS command d7678a084 Fix AP Extended Capability length determination a592f2a9e P2P: Continue listening next request if no post-PD operations a32acf391 Fix hostapd build with CONFIG_WPA_TRACE but no CONFIG_WPA_TRACE_BFD b38c8c9cb dbus: Suppress to show NULL string 6807eee9c Interworking: Check NULL string to avoid compiler warning ec1c0d154 Fix name of DBus interface in defconfig f73dd0a69 FT-SAE: Add RSNXE into FT MIC cb9925977 Add RSNXE into (Re)Association Response frames 865721c69 Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers 898b6d58f SAE: Verify that STA negotiated H2E if it claims to support it 74866f537 RSN: Verify RSNXE match between (Re)AssocReq and EAPOL-Key msg 2/4 9981d5bf3 Add RSNXE into AP KDE parser d3516cad7 Store a copy of Association Request RSNXE in AP mode for later use 6d6c88775 SAE: Add RSNXE in Association Request and EAPOL-Key msg 2/4 8401cdc8d Add RSNXE into IE parser 0b0ed907d WPS: Check SHA256 result success 8dda97c75 QCA vendor command for adding a STA node b41dc61af Add a new QCA vendor attribute to carry device info for OEM data bf185bfd5 QCA vendor attributes to indicate BW-based agile spectral capability 1317ea2c0 nl80211: Allow external auth based on SAE/FT-SAE key mgmt cdb5774f4 FST: Update FST about MAC address change 49e95ee1e AP: Publish only HE capabilities and operation IEs on 6 GHz band d7c2c5c98 AP: Add initial support for 6 GHz band a5b2faa71 AP: Add op_class config item to specify 6 GHz channels uniquely 89450024a wpa_supplicant: Pass in operating class for channel validity checks 032c8264d SAE: Check that peer's rejected groups are not enabled in AP a5dc2a5c1 SAE: H2E version of SAE commit message handling for AP 43b20b437 SAE: Derive H2E PT in AP when starting the AP 444d76f74 SAE: Check that peer's rejected groups are not enabled cfe1ea5c9 SAE: H2E version of SAE commit message handling for STA 447cd5f2d SAE: Collect list of rejected groups for H2E in STA 05a2fb0d1 SAE: Derive H2E PT in STA before connection 146889e3c RSN: Verify RSNXE match between Beacon/ProbeResp and EAPOL-Key msg 3/4 3134bb13a SAE: Advertise Extended RSN Capabilities when H2E is enabled 293a01f3b SAE: Handle BSS membership selector indication for H2E-only in STA mode cc0da0ff4 SAE: Advertise BSS membership selector for H2E-only case 85e64e634 SAE: Add sae_pwe configuration parameter for wpa_supplicant a36e13a7c SAE: Add sae_pwe configuration parameter for hostapd af4487148 tests: Module test for SAE hash-to-element crypto routines cf84246eb SAE: Add Rejected Groups element into H2E Commit efd428529 SAE: Hash algorithm selection for H2E KCK/CN() aeb022f8e SAE: Implement hash-to-element PT/PWE crypto routines ecd711407 SAE: Parse Rejected Groups element from H2E SAE commit 86f608486 SAE: Tell sae_parse_commit() whether H2E is used 316156739 SAE: H2E protocol defines 1766e608b wolfSSL: Fix crypto_bignum_sub() 2a1c84f4e crypto: Add more bignum/EC helper functions 9c08bfbd9 DPP: Fix confusing debug entry from Configurator f7fe05522 SAE: Allow AP behavior for SAE Confirm to be configured d6a7de60c wpa_cli: Clean up unnecessarily complex CONFIG_MESH use 8b426ab1e wpa_supplicant: Pass AP mode EDMG config to hostapd struct a82aee1f4 wpa_supplicant: Add support for EDMG channels 35aed771f Indicate EDMG in scan results f6f8c6ade AP: Show EDMG channel info in STATUS output 241dd76cf hostapd: Check EDMG configuration against capability dc3457cc4 hostapd: Check usability of EDMG channel bebd91e9c Add EDMG parameters to set_freq functions fdd0fef2c EDMG: Helper functions for parameter encoding/checking e8ff22f47 wpa_supplicant: Add EDMG channel configuration parameters 5c5ff22ef hostapd: Add EDMG channel configuration parameters dda5d9e31 nl80211: Add support for EDMG channels a19913c17 IEEE P802.11ay/D4.0 defines for EDMG c34917403 MBO/OCE: Update disable_mbo_oce flag after association b719a1568 DPP2: Parse AKM suite selector version of akm node 68fea9603 DPP2: Allow Configurator to use AKM suite selectors in Config Object 52d469de1 DPP2: Support multiple Config Objects in Enrollee 7eb06a336 DPP2: Allow multiple Config Objects to be build on Configurator 99918e069 DPP: Cleaned up netrole indication for config object building e0d22c842 FILS+FT: Fix MFPR flag in RSNE during FILS exchange for FT d0a4ed6a1 Allow SAE to be used in wpa_supplicant AP mode 7846e8d60 NetBSD: Fix compile 2e06cef80 MBO/OCE: Work around misbehaving MBO/OCE APs that use RSN without PMF 722c7d195 wlantest: Process VLAN tagged Data frames 83b83b461 nl80211: Migrate to current netlink key message format 7a4b01c87 AP: Provide correct keyid to wpa_send_eapol() for EAPOL-Key msg 3/4 a3ebf7175 BSD: Add support for route(4) message filtering d9286d099 ACS: Stop before scan if no channels in chanlist are available f32aa244e DPP: Debug print configRequest bandSupport on Configurator 8f8c423a5 DPP: Add bandSupport JSON array into config request 6d3dc9ba1 mka: Check OLPN for exhaustion on SAKuse decode 84851007d mka: Check OLPN for exhaustion on SAKuse encode 547ba732d mka: Clear out old/latest key values on CHANGE in CP state machine 536a7cfcf mka: Don't set newSAK to FALSE on ABANDON in CP state machine 0fedfba2e mka: Change RECEIVE and RETIRE states to match the standard 3f2641e7a Fix wpa_supplicant build with CONFIG_PCSC=y 5a5639b06 DPP: Allow name and mudurl to be configured for Config Request 3394def5a More consistent SA check for unexpected Data frames 16ef233bf DPP2: Connection status result (Enrollee) b10e01a79 DPP2: Connection status result (Configurator) e501a2eb5 DPP2: Connection status result defines cc8399528 DPP2: Move dpp_build_conf_result() to be within ifdef block 3a6736fe8 DPP2: Fix a memory leak on error path for Config Result 21dc1627f wpa_supplicant: Don't return an error when successfully parsing WMM rules 8214b45ba P2P: Use latest BSS entry if multiple P2P Device Addr matches found dc6c3be4e wpa_supplicant: Add support for 60 GHz band channels 5 and 6 018edec9b Remove IAPP functionality from hostapd d86d66dc0 AP: Silently ignore management frame from unexpected source address a84bf4438 HE: Send the AP's OBSS PD settings to the kernel 262b71eea Sync with mac80211-next.git include/uapi/linux/nl80211.h 8788a314d WPS: Update MAC address on address changes 39042d7f7 os_sleep: Use nanosleep for POSIX versions 2008 and higher a69742c2f wpa_cli: Do not pick p2p-dev-* interfaces by default d842e00bd SAE: Return result from confirm CN() operation to the caller a8bfc6fff FILS: Update connect params after sending connection notification 0df82a3da Correct the type/usage of QCA_ATTR_ROAM_CONTROL_SCAN_FREQ_LIST 6bf6c6fec DPP: Fix hostapd build dependencies for DPP-only build 1eff2e7bf DPP2: Fix wpa_supplicant build dependencies for CONFIG_AP=y build d2bae5763 DPP: Fix wpa_supplicant build dependencies for DPP-only build 7d2ed8bae Remove CONFIG_IEEE80211W build parameter 022926187 DFS offload: Fix hostapd state and CAC info in STATUS output 4d78ba990 EAP-TEAP peer: Clear Phase 2 EAP method on new Identity exchange 681618246 EAP-TEAP peer: Add support for machine credentials using certificates ebee8232d Do not try to include net/ethernet.h in MinGW/Windows builds bf15b1559 Fix Windows error code definition workaround 043de65f1 EAP peer config: Move ocsp param to phase1/phase2 8d76e0ad7 EAP server: Configurable maximum number of authentication message rounds b99c4cadb EAP peer: Move certificate configuration params into shared struct 6e711e7ab mesh: Do not enable HE on 5 GHz without VHT 0497e4148 HE: Fix HE Capabilities element size a2e0cc9e0 Add nl80211 vendor ACS trigger reasons related to interference 69e8e7817 HS 2.0: Do not add two copies of OSEN element into Beacon/Probe Resp a762ba8b1 HS 2.0 AP: Do not mandate PMF for HS 2.0 Indication in open OSU network e49ce2990 IEEE 802.1X authenticator: Coding style cleanup 31aaddc90 Clean up IEEE 802.1X authentication debug messages for EAP code 71419119f EAP-TEAP peer: Fix protected indication of inner EAP method failure 93cd29d2b EAP-TEAP server: Add support for requiring user and machine credentials c38c62ff7 wlantest: Derive PMK-R1 and PTK for FT protocol cases c41936566 EAP-TEAP peer: Add support for machine authentication c724a0a16 EAP peer: Add a concept of a separate machine credential 9ce3bfaf4 RADIUS server: Abort startup on allocation failures fa1f0751c RADIUS server: Use struct eap_config to avoid duplicated definitions a00cb1b1f EAP-TEAP server: Fix eap_teap_pac_no_inner configuration 986033ff3 EAP-TEAP server: Fix Crypto-Binding check in PAC no-inner-auth case e54cfbb56 EAP-TEAP server: Allow a specific Identity-Type to be requested/required f186ec54c EAP-TEAP peer: Support Identity-Type TLV cc661c160 EAP-TEAP: Add parsing and generation routines for Identity-Type TLV 100b2edb2 OpenSSL: Write peer certificate chain details in debug log 7eb157f1e EAP: Increase the maximum number of message exchanges 822e7c66a EAP server: Use struct eap_config to avoid duplicated definitions 62af2b18f EAP-TEAP peer: Support vendor EAP method in Phase 2 aba8dc82f EAP-PEAP server: Support vendor EAP types in Phase 2 357c1062d EAP-FAST peer: Support vendor EAP method in Phase 2 f32f76231 EAP-FAST server: Support vendor EAP types in Phase 2 887d8703b EAP-PEAP peer: Support vendor EAP method in Phase 2 f2ef4f255 EAP peer: Allow VENDOR-TEST method in Phase 2 5ddbd9e96 EAP-TTLS peer: Support vendor EAP method in Phase 2 5e94e7f23 EAP-TTLS server: Support vendor EAP types in Phase 2 5f2301a6d Replace EapType typedef with enum eap_type 76ddfae6e EAP-TEAP server: Testing mechanism for Result TLV in a separate message 4c327146f EAP-TEAP peer: Allow Result TLV without Crypto-Binding TLV 128d46be9 EAP-TEAP: Add parsing of Error TLV 234489efd EAP-TEAP server: Require Intermediate-Result TLV even with Result TLV 0f7c91f2b EAP-TEAP peer: Add Intermediate-Result TLV with Crypto-Binding TLV a66e53c41 EAP-TEAP: Fix TLS-PRF for TLS ciphersuites that use SHA384 52069c7ef Add TLS-PRF using HMAC with P_SHA384 for TEAP a647a0ad7 Extend server certificate TOD policy reporting to include TOD-TOFU 346d10cf8 SAE: Conditionally set PMKID while notifying the external auth status b7cd64876 SAE: Use BSSID stored in ext_auth_bssid for set_pmk e0b331d89 OWE: Update connect params with new DH attributes to the driver c574a3ff1 nl80211: Request update connection params only for drivers with SME 528f263c4 FT: Reject over-the-DS response with MFPC=0 if PMF is required ae05b6a21 RSN: Do not allow connection to proceed without MFPC=1 if PMF required ded56f2fa FT: Fix MFPR flag in RSNE during FT protocol 0028d627c OCE: Mandate PMF for WPA2 association with OCE AP 84ebc759a HS 2.0: Match credentials based on required_roaming_consortium d2b208384 SAE: Allow PMKID to be added into Association Request frame following SAE 2ca23faf1 Make wpa_insert_pmkid() more generic 05822609d HE: MCS size is always a minimum of 4 bytes df4f95998 nl80211: Don't force VHT channel definition with HE dd0153fce Check for LEAP before doing FT 6126e5f97 Fix a typo in hostapd config documentation 698a0067c Fix check_crl_strict documentation 485dd425b Add QCA vendor command for avoid frequency feature 6ae1247bf Update QCA vendor attributes for 6 GHz band support aa23ece3d Add QCA vendor channel attribute to restart AP 85508ecf6 Add QCA vendor command to configure ACS policy 2395fdb67 Add QCA vendor attributes to enhance roaming configuration 1425caac2 Rename qca_wlan_vendor_attr_roam_subcmd to represent subcmds f13119631 Document the attributes used by QCA_NL80211_VENDOR_SUBCMD_ROAM b0b25c5bb Clear external eapSuccess setting in driver-authorized cases fa1d5ec18 The master branch is now used for v2.10 development ca8c2bd28 Preparations for v2.8 release 3263fca28 Set the default scan IEs on interface restart d776bf8c6 EAP-TEAP peer: Fix fragmentation of final message 1c7e61a35 wolfssl: Avoid void pointer arithmetic 7122a02fa SAE: Fix order_len for FFC groups 422e73d62 DPP: Indicate authentication success on ConfReqRX if needed d001fe31a OpenSSL: Handle EVP_PKEY_derive() secret_len changes for ECDH 29ef1c5ee DPP: Use a common helper function for ECDH operations ac734a342 SAE: Fix KCK, PMK, and PMKID derivation for groups 22, 23, 24 c65168ccd OpenSSL: Fix crypto_bignum_to_bin() with padlen == 0 cb28bd52e nl80211: Use separate flag for 4-way handshake offload 6bb11c7a4 EAP-SIM/AKA server: Allow pseudonym/fast reauth to be disabled c1b236521 EAP-SIM/AKA: Do not allow anonymous@realm "pseudonym" to be cleared cc2fd9425 D-Bus: Demote timeout/flush messages to MSG_MSGDUMP 3b726df82 nl80211: Missing sysctl flags aren't fatal f4111ff3d Extra RADIUS request attributes from SQLite 74707def8 Move hostapd_parse_radius_attr() into ap_config.c 1e5ea68d1 mka: Accept last two used MNs in Peers List of a received MKPDU 013686403 P2P: Pass HE flag to GO negotiation result 876c5eaa6 dragonfly: Disable use of groups using Brainpool curves 968520da8 nl80211: Add WMM parameters while updating TDLS peer entry 5a511924b wpa_cli: Add support to process DPP action events in action script 64e37be94 Avoid nested enum wpas_mode declaration to allow C++ compilation fe2e1edf4 EAP-SIM server: Avoid void pointer arithmetic cfc9ebea0 EAP-AKA server: Avoid void pointer arithmetic bd0414043 trace: Avoid void pointer arithmetic fc03ea2c1 DPP: Avoid void pointer arithmetic d1b1f9fa9 Report WPA/RSN protocol and AKM suite selector in STA MIB 43aafef8d Add missed wpa_akm_to_suite() selectors bfb6a482f dragonfly: SAE/EAP-pwd min PWE derivation iteration count to shared code 226da33d7 EAP-pwd peer: Configurable set of groups with reduced default 6a4406c01 Add QCA vendor attributes for ELNA bypass 176c133e9 Add a vendor attribute to configure disconnect IEs 123895228 Add QCA vendor command to support OEM data Change-Id: Iaa497edcda7c5dcdad19db9d09ab09ef74e508bd |
||
|
|
cc779b85e0 |
WPS: Update MAC address on address changes
The WPS component keeps a copy of the network interface MAC address. When MAC address is changed the WPS copy was not updated so WPS M1 message contained the old address. Some devices check this field and fail connection attempts. Update the WPS MAC address on interface MAC address changes. (cherry-picked from 8788a314d7897c90195c6f94810f55b2ba6e7190) Bug: 140748809 Test: manually test with some TVs (WFD sink) Signed-off-by: Mikael Kanstrup <mikael.kanstrup@sony.com> Signed-off-by: Daichi Ueura <daichi.ueura@sony.com> Change-Id: Id8b7ec54bdbbf8b18416af6e3063af163344f5b1 |
||
|
|
81f62d8b15 |
[wpa_supplicant] Cumulative patch from b8491ae5a
Also revert local solution for encrypted IMSI and use the upstream version. Bug: 134177972 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Regression test passed (Bug: 137653009) Change-Id: Ie34a0138a3a2039b03101c788b43acbb33f8332a |
||
|
|
f1c9764c0e |
Revert "[wpa_supplicant] Cumulative patch from b8491ae5a"
This reverts commit
|
||
|
|
878cf7bcbf |
[wpa_supplicant] Cumulative patch from b8491ae5a
Also revert local solution for encrypted IMSI and use the upstream version. Bug: 134177972 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: Regression test passed (Bug: 137653009) Change-Id: Ibf6b6ef3495287156c397daa89d02923f981889b |
||
|
|
5f92bc919a |
[wpa_supplicant] Cumulative patch from 6151c9b90
Bug: 130813391 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP test: act.py -c ../WifiDppConfig.json -tc WifiDppTest Test: Regression test passed (Bug: 130831127) 6151c9b90 EAP-pwd server: Remove unused srandom() call d2d1a324c EAP-pwd peer: Fix reassembly buffer handling fe76f487e EAP-pwd server: Fix reassembly buffer handling a9d224f56 EAP-pwd server: Fix a memory leak on error path 90ee1bf5f EAP-MSCHAPv2: Propagate GetAsymetricStartKey() failures up from getKey() 824cb5a53 RSN: Ignore IGTK configuration errors with swapped KeyID values dfdabd917 RSN: Report completion only after IGTK configuration bce3d4f70 autoscan: Disable when we move above WPA_SCANNING state eb3234c07 SAE: Use open authentication to reassociate for PMKSA caching fe01cd006 Fix FILS ERP association event with 4-way HS offload drivers 323a51cc0 nl80211: Handle NL80211_CMD_PROBE_CLIENT command response 28f19a3ae nl80211: More detailed PROBE_CLIENT debug print 31cf52bf2 Do not clear FT IEs twice in sme_deinit() 01ac337b3 Stop SA Query on disconnection 7a206c504 Add debug print on stopping SA Query procedure 710c69238 P2PS: Cleanup pending_p2ps_group flag 0be8b9238 mka: Avoid memory leak in unexpected case in RECEIVE 984d5b7e1 mesh: Fix random llid generation in an error case 10cf866ba mesh: Fix operations after SAE state machine removing the STA 153d4c501 mesh: Fix SAE reauthentication processing 2f6805139 Fix hostapd BSS_TM_REQ handling of bss_term parameter e6ac47b47 Fix debug print in GET_PREF_FREQ_LIST handler 2e70e807c D-Bus: Fix P2P GroupStarted signal not to use uninitialized IP buffer c5fff8bbd nl80211: Update assoc_freq and bss->freq based on real association info 091c22771 nl80211: Clear bss->freq on station mode disconnection cb5db189e Remove the unused crypto_ec_cofactor() function 8b093db2c EAP-pwd: Remove unused checks for cofactor > 1 cases 92e1b96c2 EAP-pwd: Disallow ECC groups with a prime under 256 bits 6fe3ee722 tests: EAP-pwd local failure in crypto_bignum_rand() 6570949b2 OpenSSL: Fix server side openssl_ecdh_curves configuration with 1.0.2 52b1cb5d7 tests: crypto_hash_finish() failure in eap_pwd_kdf() 56ac1f9df RRM: Set last beacon report indication in the last element only 6f484978f Document BSS expiration configurables 8f36c84a2 bsd: Fix a typo in error message dd1a8cef4 Remove unnecessary copying of SSID and BSSID for external_auth 4ffb0fefe hostapd: Support external authentication offload in AP mode 236e793e7 nl80211: External authentication in driver-based AP SME mode 2ab19f4be Reset beacon_set_done on disabling interface Change-Id: I5642b46d79aee83dd4f4307bf781d57b318831bd |
||
|
|
021b0b5d02 |
[wpa_supplicant] Cumulative patch from 89bbe6f87
Bug: 130294744
Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic.
Test: Able to turn on/off softap, associate wifi STA, run traffic.
Test: DPP test: act.py -c ../WifiDppConfig.json -tc WifiDppTest
Test: Regression test passed (Bug: 130312227)
89bbe6f87 EAP-pwd: Get rid of unnecessary allocation of temporary buffer
4396f74a3 EAP-pwd: Enforce 1 < rand,mask < r and rand+mask mod r > 1
72056f69a tests: Module tests for const_time_*() functions
16d4f1069 EAP-pwd: Check element x,y coordinates explicitly
8ad8585f9 EAP-pwd client: Verify received scalar and element
d63edfa90 EAP-pwd server: Detect reflection attacks
70ff850e8 EAP-pwd server: Verify received scalar and element
ac8fa9ef1 SAE: Fix confirm message validation in error cases
cff138b07 SAE: Use constant time operations in sae_test_pwd_seed_ffc()
f8f20717f SAE: Use const_time selection for PWE in FFC
90839597c SAE: Mask timing of MODP groups 22, 23, 24
362704dda SAE: Avoid branches in is_quadratic_residue_blind()
6513db3e9 SAE: Minimize timing differences in PWE derivation
aaf65feac EAP-pwd: Use constant time and memory access for finding the PWE
c93461c1d OpenSSL: Use constant time selection for crypto_bignum_legendre()
6e34f618d Add helper functions for constant time operations
d42c477cc OpenSSL: Use constant time operations for private bignums
242e85728 Extend domain_match and domain_suffix_match to allow list of values
dcc0ccd5b wolfSSL: Fix dNSName matching with domain_match and domain_suffix_match
83f13e4ff tests: Fix build without CONFIG_SAE
3580ed826 RADIUS server: Accept ERP keyName-NAI as user identity
bbde461d7 Fix a typo in the Multiple BSSID Index element ID define
1326cb765 DPP: Fix a regression in non-DPP, non-OpenSSL builds
db54db11a SAE: Reject unsuitable groups based on REVmd changes
6bb9d9a8d AP: Avoid NULL use with snprintf string
0a42f1ede scan: Use normal scans after connection failure
bbed23aee hostapd: Reduce minimum beacon interval from 15 to 10 TUs
048796715 OWE: Fix a possible memory leak on error path
277fa92b3 crypto: Fix unreachable code in tls_prf_sha1_md5()
3d93e26e6 tests: SAE test vector from IEEE P802.11-REVmd/D2.1, Annex J.10
e5711b618 Add a QCA vendor attribute to carry the reason for roaming
005585d60 nl80211: Add SAE, FT-SAE, FT-EAP-SHA384 AKMs in connect request
edcaf16f9 P2P: Enable HE for both 2G and 5G bands
822c756e8 MBO: Update connect params with new MBO attributes to driver
74f8e768f MBO: Always include Non-preferred Channel Report attribute in AssocReq
bd23daa8e DPP: Move GAS encapsulation into dpp_build_conf_req()
be609c6fc SAE: Fix commit message override with external authentication
9af1eea37 Prefer FT-SAE over FT-PSK if both are enabled
853bd19f2 Add more debug prints on suite selector selection
6d77014e7 Suite B: Prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192
ab3aebcce SAE: Fix PMKSA cache entry search for FT-SAE case
253ce212e Add AKM info in the debug message noting PMKSA caching entry addition
6fe3f0f79 FT-SAE: Use PMK as XXKey in AP when SAE PMKSA caching is used
bcf190005 FT-SAE: Enable external auth support for FT-SAE also
6d14b98fc nl80211: Do not add WMM parameters when updating an existing STA entry
2ffd8076d FT/RRB: Pad RRB messages to at least minimum Ethernet frame length
555c93e2d FT/RRB: Add more debug prints for RRB message encryption/decryptiom
76fd782ab SAE: Reorder SAE and FT-SAE AKM selection to prefer the FT option
322d328e7 FT: Fix SAE + FT-SAE behavior in association parameter selection
87d8435cf DPP: Common configurator/bootstrapping data management
08dc8efd2 Fix memcpy regression in PMK handling
130444738 FILS: Fix KEK2 derivation for FILS+FT
bf84e78cb OpenSSL: Fix build with current BoringSSL
b750dde64 OWE: Move Association Response frame IE addition to appropriate place
10ec6a5f3 DPP2: PFS for PTK derivation
ecacd9ccd DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in context
16a4e931f OWE: Allow Diffie-Hellman Parameter element to be included with DPP
808bdb308 Add TEST_FAIL() to aes_encrypt_init() with internal crypto
32f476066 TLS: Add support for RFC 5705 TLS exporter context with internal TLS
a916ff5cd Add support for an optional context parameter to TLS exporter
18015fc8a DPP2: Support new legacy+DPP config object credentials
dd6c59800 DPP: Support DPP and SAE in the same network profile
9305c2332 DPP: Clean up configuration parsing
f5db77504 Remove pending connect and sme-connect radio works on disconnect
c675397cc OpenSSL: Fix build with OpenSSL 1.0.2
ff5f54e15 SAE: Reduce queue wait time for pending Authentication frames
5e3a759cd SAE: Improved queuing policy for pending authentication frames
67b3bcc95 DPP2: Testing option for Config Object rejction
22f90b32f DPP2: Configuration Result message generation and processing
c98617b48 DPP2: Make DPP version number support available over control interface
673631b8a More robust timer_tick_enabled tracking
b5e57699a FILS+FT: STA mode validation of PMKR1Name in initial MD association
365366393 FILS+FT: AP mode processing of PMKR1Name in initial MD association
aabbdb818 FILS: Do not try to add PMKSA cache entry if caching is disabled
02bde9581 Vendor attribute to enable or disable TWT request support
4efade315 nl80211: Clear keys from heap memory before freeing it for get_seqnum
2b7fa0355 P2P: Fix ACS offloading behavior with p2p_no_group_iface=1
c6ec9759c nl80211: Exclude PMK when sending NL80211_CMD_DEL_PMKSA explicitly
0b4a906de DPP2: Protocol version indication
ce7effd08 DPP2: Build configuration flags for DPP version 2 support
bf0021ede Allow fragmentation/RTS threshold to be disabled explicitly
48102f65e Add a vendor subcommand QCA_NL80211_VENDOR_SUBCMD_MPTA_HELPER_CONFIG
f10a4af1b Add QCA vendor command/event and attributes for peer rate statistics
56a33496f Sync with mac80211-next.git include/uapi/linux/nl80211.h
841205a1c OpenSSL: Add 'check_cert_subject' support for TLS server
0173423f4 Use char pointers for EAP configuration parameters without length
cd6a5866e Remove forgotten os_strncpy() implementations
ca9efe113 roboswitch: Check some read operation results
9571f945c mesh: Check that SAE state initialization succeeded for PMKID check
fafad8527 defconfig: Enable DBus
6a8dee76d wpa_supplicant: Drop the old D-Bus interface support
954c535a5 DPP: Update wpa_supplicant configuration file after provisioning
4d379be4a Clarify AP mode Action frame handling
cc833a236 Minor cleanup to return after WNM Action frame handling
700b3f395 Move SA Query frame length check to the shared handler function
002edb630 Fix AP MLME in driver handling of FT and SA Query Action frames
1e653daa3 EAP-pwd server: Fix memory leak with salted passwords
96d6dfa8e SAE: Add Finite Cyclic Group field in status code 77 response
fda766010 EAP-pwd: Fix a memory leak in hunting-and-pecking loop
339dc8bd6 WPS: Allow SAE configuration to be added automatically for PSK
fc30f99b3 WPS: Allow AP SAE configuration to be added automatically for PSK
b9cd4f5e7 Vendor feature capability for TWT (Target Wake Time)
877502a6a Vendor attribute to indicate a set_blacklist of BSSID only as a hint
a9247bcdf Vendor attribute to configure HE testbed default capabilities
8a7510cc0 Vendor attribute to configure support to enable VHT in 2.4G band
8919ec616 Vendor attribute to configure HE OMI UL MU data disable
f21436158 SAE: Reuse previously generated PWE on a retry with the same STA
fd8308912 SAE: Reuse previously generated PWE on a retry with the same AP
a9af1da0b SAE: Enforce single use for anti-clogging tokens
ff9f40aee SAE: Process received commit message through a queue
a9fe13035 SAE: Enable only groups 19, 20, and 21 in station mode
941bad5ef SAE: Enable only group 19 by default in AP mode
b11fa98bc Add explicit checks for peer's DH public key
4a9531a75 bignum: Fix documentation for bignum_cmp_d()
611308365 defconfig: Enable IEEE 802.11w management frame protection (wpa_supplicant)
9515fa925 defconfig: enable IEEE 802.11r fast BSS transition (wpa_supplicant)
6b7a0da75 defconfig: Enable IEEE 802.11n and 802.11ac (wpa_supplicant)
467004d63 defconfig: Enable Hotspot 2.0 (wpa_supplicant)
ec52faa2b defconfig: Enable RSN on IBSS networks (wpa_supplicant)
67d99d2e0 defconfig: Remove obsolete notes about OpenSSL requirements for EAP-FAST
eafc5fec2 defconfig: Enable a handful of EAP methods (wpa_supplicant)
f64050da0 defconfig: Enable logging to file and syslog (wpa_supplicant)
ae5240db8 defconfig: Enable simple bgscan module (wpa_supplicant)
2d6d47219 defconfig: Enable AP (wpa_supplicant)
f87450a73 defconfig: Enable WPS (wpa_supplicant)
d989e67d0 defconfig: Fix typos in Wi-Fi Display description
c4eafad09 defconfig: Enable P2P and Wi-Fi Display (wpa_supplicant)
bf46c6fca defconfig: Add SAE (wpa_supplicant)
ca098ee45 defconfig: Add DPP (wpa_supplicant)
2f7bc0681 UBSan: Avoid a warning on unsigned integer overflow
bb05d0360 Fix a regression from VLAN assignment using WPA/WPA2 passphrase/PSK
429ed54a3 UBSan: Avoid a warning on signed left shift
b3957edbe UBSan: Split loop index decrementation into a separate step
5ac13f6d0 atheros: Avoid clang compiler warning on address of array check
aaa6b1498 Avoid compiler warning about potentially unaligned pointer value
cce974d36 UBSan: Define FST LLT macros without integer overflow
9140caf5f UBSan: Avoid integer overflow in a loop index counter
8fc22fdde UBSan: Avoid NULL pointer dereferences on an error path
43216777e UBSan: Avoid unsigned integer overflow in base64 encoding
fed7d8fcb UBSan: Avoid unsigned integer overflow in utf8_{,un}escape()
cc4cdefc7 UBSan: Avoid unnecessary warning
a9377bc38 UBSan: Avoid memcpy(ptr, NULL, 0)
5a23c2528 UBSan: Avoid an unsigned integer overflow warning
abde4eba4 UBSan: Pack MACsec peer id structure
c4fccfc7a UBSan: Avoid memcmp(ptr, NULL, 0)
1b85cad29 UBSan: Use typecast to avoid unsigned integer overflow
e3b5bd81b UBSan: Fix RRM beacon processing attempt without scan_info
01d01a311 UBSan: Avoid size_t variable overflow in control interface
ec2e7c4cf UBSan: Avoid unsigned integer overflow is throughput estimation
3b6b3ae58 Modify dl_list_for_each() to not use unaligned access with WPA_TRACE
1415d4b82 Multi-AP: Avoid memcpy(ptr, NULL, 0) in WPS Registrar initialization
2c129a1b7 Fix cipher suite selector default value in RSNE for DMG
239794018 Add new QCA vendor attributes for coex configuration
d939a8cb4 Add a vendor attribute for specifying ethernet protocol type
8682f384c hostapd: Add README-MULTI-AP
66819b07b hostapd: Support Multi-AP backhaul STA onboarding with WPS
83ebf5586 wpa_supplicant: Support Multi-AP backhaul STA onboarding with WPS
56a2d788f WPS: Add multi_ap_subelem to wps_build_wfa_ext()
bfcdac1c8 Multi-AP: Don't reject backhaul STA on fronthaul BSS
7ad7aa0e1 HS 2.0: Make hs20-osu-client SP and <FQDN> directories group writable
0f9632ceb mesh: More consistent checking of wpa_s->ifmsh in completion handler
2fae58fdc Fix wpa_psk_file parser error case handling
b0e91e387 SAE: VLAN assignment based on SAE Password Identifier
947b5a153 P2P: Stop listen state if Action frame TX is needed on another channel
b3e8ca65a P2P: Fix a typo in a debug message
464064c7e hostapd: Document openssl_ecdh_curves configuration parameter
31ee2992c Add QCA vendor subcmd/attribute to check wlan firmware state
3f8ceff54 Indicate wifi_generation in wpa_supplicant STATUS output
ccaf77476 Add HE Capabilities into ieee802_11_parse_elems()
5d68c0acd nl80211: (Re)Association Request frame IEs from association event
dbfa691df VLAN assignment based on used WPA/WPA2 passphrase/PSK
dd2aedeb5 HS 2.0 server: Add X-WFA-Hotspot20-Filtering header line to T&C
Change-Id: I4efde950845354673694f025ca07c3dddb6039e9
|
||
|
|
b1ae0fe6d5 |
wpa_supplicant: Don't trigger auto-connect on failure
When the |auto_reconnect_disabled| flag is set, don't attempt to blacklist and trigger a new connection attempt on failure. Bug: 70839791 Test: Device boots up & connects to wifi networks. Test: Will send for regression tests. Change-Id: Iaabc4848683cc5213868c819f84eb1cd9af01dab Signed-off-by: Roshan Pius <rpius@google.com> |