]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
7 years agowlantest: Fix EAPOL buffer length with variable MIC length
Jouni Malinen [Fri, 24 Mar 2017 18:53:54 +0000 (20:53 +0200)] 
wlantest: Fix EAPOL buffer length with variable MIC length

struct wpa_eapol_key does not include the MIC field anymore, so need to
add it explicitly.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoQCA vendor attributes to extend antenna diversity functionality
lifeng [Fri, 10 Mar 2017 10:51:56 +0000 (18:51 +0800)] 
QCA vendor attributes to extend antenna diversity functionality

1. Add new attribute to report corresponding antenna information to the
chain RSSI which is used in subcmd
QCA_NL80211_VENDOR_SUBCMD_GET_CHAIN_RSSI.

2. Add a series of attr to support the new wmi interface
WMI_PDEV_PARAM_ANT_DIV_USRCFG which export parameters setting of antenna
diversity algorithm to userspace.

Signed-off-by: Li Feng <lifeng@qti.qualcomm.com>
7 years agoAdd vendor attribute to config propagation delay's absolute value
Zhang Qian [Fri, 10 Mar 2017 13:12:49 +0000 (21:12 +0800)] 
Add vendor attribute to config propagation delay's absolute value

QCA_WLAN_VENDOR_ATTR_CONFIG_PROPAGATION_ABS_DELAY is added to set
propagation delay's absolute value. This is a more detailed version of
QCA_WLAN_VENDOR_ATTR_CONFIG_PROPAGATION_DELAY.

Signed-off-by: Zhang Qian <zhangq@qti.qualcomm.com>
7 years agoFix QCA_ATTR_NUD_STATS_IS_DAD value
Dmitry Shmidt [Tue, 14 Mar 2017 17:33:50 +0000 (17:33 +0000)] 
Fix QCA_ATTR_NUD_STATS_IS_DAD value

Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
7 years agotests: P2P device discovery and p2p_find restart
Jouni Malinen [Mon, 13 Mar 2017 15:08:22 +0000 (17:08 +0200)] 
tests: P2P device discovery and p2p_find restart

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoP2P: Run full P2P_FIND scan after pending scan completes
Jouni Malinen [Mon, 13 Mar 2017 15:05:55 +0000 (17:05 +0200)] 
P2P: Run full P2P_FIND scan after pending scan completes

If a P2P_FIND command is issued for running the initial full scan and
the attempt to start that full scan fails, the previous behavior was to
wait for the ongoing scan to complete and then continue p2p_find scan
iterations. However, this continued with the social channels scan
instead of the initial full scan. This could end up missing the full
scan completely.

Fix this by marking the full scan pending if the new scan cannot be
started immediately. Then start the initial full scan after the ongoing
scan completes before moving to social channel only scan iterations.
This applies both for the P2P_FIND_START_WITH_FULL (no specific
frequency set) and P2P_FIND_PROGRESSIVE cases since both of them start
with a single full scan round.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Additional coverage for P2P_FIND freq argument
Jouni Malinen [Mon, 13 Mar 2017 10:52:44 +0000 (12:52 +0200)] 
tests: Additional coverage for P2P_FIND freq argument

This test case verifies that the specified channel is included in the
consecutive p2p_find scan iterations.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoP2P: Continue scanning specified channel with P2P_FIND freq argument
Jouni Malinen [Mon, 13 Mar 2017 10:50:50 +0000 (12:50 +0200)] 
P2P: Continue scanning specified channel with P2P_FIND freq argument

This makes the "P2P_FIND freq=<MHz>" operation more robust by continuing
to include the specified frequency in the consecutive scan rounds
instead of including it only once in the first scan. In other words, the
first scan is only for the specified frequency just like the previous
behavior, but the following scans include all the social channels and
the specified frequency instead of just the previously used social
channels.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Skip FILS SK PFS test cases if PFS functionality not in the build
Jouni Malinen [Mon, 13 Mar 2017 09:46:59 +0000 (11:46 +0200)] 
tests: Skip FILS SK PFS test cases if PFS functionality not in the build

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFILS: Add FILS-SK-PFS capability into "GET_CAPABILITY fils" command
Jouni Malinen [Mon, 13 Mar 2017 09:46:30 +0000 (11:46 +0200)] 
FILS: Add FILS-SK-PFS capability into "GET_CAPABILITY fils" command

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: FILS SK authentication type mismatch (PFS not supported)
Jouni Malinen [Sun, 12 Mar 2017 21:04:24 +0000 (23:04 +0200)] 
tests: FILS SK authentication type mismatch (PFS not supported)

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFILS: Check FILS Indication element against local network profile
Jouni Malinen [Sun, 12 Mar 2017 20:59:52 +0000 (22:59 +0200)] 
FILS: Check FILS Indication element against local network profile

Do not try to use FILS authentication unless the AP indicates support
for the type the local network profile enforces.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: FILS SK with PFS
Jouni Malinen [Sun, 12 Mar 2017 20:46:50 +0000 (22:46 +0200)] 
tests: FILS SK with PFS

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFILS: Add FILS SK auth PFS support in STA mode
Jouni Malinen [Sun, 12 Mar 2017 20:45:35 +0000 (22:45 +0200)] 
FILS: Add FILS SK auth PFS support in STA mode

This adds an option to configure wpa_supplicant to use the perfect
forward secrecy option in FILS shared key authentication. A new build
option CONFIG_FILS_SK_PFS=y can be used to include this functionality. A
new runtime network profile parameter fils_dh_group is used to enable
this by specifying which DH group to use. For example, fils_dh_group=19
would use FILS SK PFS with a 256-bit random ECP group.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFILS: Add FILS SK auth PFS support in AP mode
Jouni Malinen [Sun, 12 Mar 2017 20:40:56 +0000 (22:40 +0200)] 
FILS: Add FILS SK auth PFS support in AP mode

This adds an option to configure hostapd to enable use of perfect
forward secrecy option in FILS shared key authentication. A new build
option CONFIG_FILS_SK_PFS=y can be used to include this functionality. A
new runtime configuration parameter fils_dh_group is used to enable this
by specifying which DH group to use. For example, fils_dh_group=19 would
allow FILS SK PFS to be used with a 256-bit random ECP group.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFILS: Define authentication algorithm for FILS SK auth with PFS
Jouni Malinen [Sun, 12 Mar 2017 20:39:38 +0000 (22:39 +0200)] 
FILS: Define authentication algorithm for FILS SK auth with PFS

This is needed to add PFS support into hostapd and wpa_supplicant FILS
shared key authentication.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Opportunistic Wireless Encryption (OWE)
Jouni Malinen [Sat, 11 Mar 2017 22:48:19 +0000 (00:48 +0200)] 
tests: Opportunistic Wireless Encryption (OWE)

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Add CONFIG_OWE=y build option
Jouni Malinen [Sat, 11 Mar 2017 22:38:24 +0000 (00:38 +0200)] 
OWE: Add CONFIG_OWE=y build option

This can be used to enable OWE support in hostapd and wpa_supplicant
builds.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Use AKM 00-0F-AC:11 style parameters for EAPOL-Key frames
Jouni Malinen [Sun, 12 Mar 2017 18:40:43 +0000 (20:40 +0200)] 
OWE: Use AKM 00-0F-AC:11 style parameters for EAPOL-Key frames

draft-harkins-owe-07.txt does not specify these parameters, so need to
pick something sensible to use for the experimental implementation. The
Suite B 128-bit level AKM 00-0F-AC:11 has reasonable parameters for the
DH group 19 case (i.e., SHA256 hash), so use it for now. This can be
updated if the OWE RFC becomes clearer on the appropriate parameters
(KEK/KCK/MIC length, PRF/KDF algorithm, and key-wrap algorithm).

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoPrint the algorithms used for EAPOL-Key professing in log
Jouni Malinen [Sun, 12 Mar 2017 17:43:39 +0000 (19:43 +0200)] 
Print the algorithms used for EAPOL-Key professing in log

This makes it easier to debug crypto algorithm selection for 4-way
handshake related functions.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoReturn success/failure result from sha384_prf()
Jouni Malinen [Sun, 12 Mar 2017 17:40:29 +0000 (19:40 +0200)] 
Return success/failure result from sha384_prf()

This makes the function more consistent with sha256_prf().

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Process Diffie-Hellman Parameter element in STA mode
Jouni Malinen [Sun, 12 Mar 2017 09:53:21 +0000 (11:53 +0200)] 
OWE: Process Diffie-Hellman Parameter element in STA mode

This adds STA side addition of OWE Diffie-Hellman Parameter element into
(Re)Association Request frame and processing it in (Re)Association
Response frame.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Process Diffie-Hellman Parameter element in AP mode
Jouni Malinen [Sat, 11 Mar 2017 23:26:43 +0000 (01:26 +0200)] 
OWE: Process Diffie-Hellman Parameter element in AP mode

This adds AP side processing for OWE Diffie-Hellman Parameter element in
(Re)Association Request frame and adding it in (Re)Association Response
frame.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Add driver capability flag for OWE AKM
Jouni Malinen [Sat, 11 Mar 2017 22:38:04 +0000 (00:38 +0200)] 
OWE: Add driver capability flag for OWE AKM

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Define and parse OWE AKM selector
Jouni Malinen [Sat, 11 Mar 2017 22:32:23 +0000 (00:32 +0200)] 
OWE: Define and parse OWE AKM selector

This adds a new RSN AKM "OWE".

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOWE: Define and parse Diffie-Hellman Parameter element
Jouni Malinen [Sat, 11 Mar 2017 22:23:36 +0000 (00:23 +0200)] 
OWE: Define and parse Diffie-Hellman Parameter element

Add WLAN_EID_EXT_OWE_DH_PARAM definition and extend
ieee802_11_parse_elems() to recognize this element.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Extract-and-Expand HKDF (RFC 5869)
Jouni Malinen [Sat, 11 Mar 2017 20:40:31 +0000 (22:40 +0200)] 
tests: Extract-and-Expand HKDF (RFC 5869)

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoExtend hmac_sha256_kdf() to support HKDF-Expand() as defined in RFC 5869
Jouni Malinen [Sat, 11 Mar 2017 20:38:47 +0000 (22:38 +0200)] 
Extend hmac_sha256_kdf() to support HKDF-Expand() as defined in RFC 5869

The KDF define in RFC 5295 is very similar to HKDF-Expand() defined in
RFC 5869. Allow a NULL label to be used to select the RFC 5869 version
with arbitrary seed (info in RFC 5869) material without forcing the
label and NULL termination to be included. HKDF-Expand() will be needed
for OWE.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoOpenSSL: Add wrapper functions for ECDH
Jouni Malinen [Sat, 11 Mar 2017 16:54:33 +0000 (18:54 +0200)] 
OpenSSL: Add wrapper functions for ECDH

These allow ECDH to be used with compressed public key encoding (only
x-coordinate). This is needed for FILS PFS and OWE.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: wpa_supplicant AP mode - HT disabled
Jouni Malinen [Sat, 11 Mar 2017 09:20:17 +0000 (11:20 +0200)] 
tests: wpa_supplicant AP mode - HT disabled

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agowpa_supplicant: Allow disabling HT in AP mode without HT overrides
Johannes Berg [Tue, 7 Mar 2017 16:20:59 +0000 (18:20 +0200)] 
wpa_supplicant: Allow disabling HT in AP mode without HT overrides

Since VHT can be toggled explicitly, also expose being able to disable
HT explicitly, without requiring HT overrides. Continue making it
default to enabled though.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agotests: add wpa_supplicant 80 MHz VHT network test
Johannes Berg [Tue, 7 Mar 2017 16:20:58 +0000 (18:20 +0200)] 
tests: add wpa_supplicant 80 MHz VHT network test

Add a test for the configuration knobs exposed in the previous
patch; more precisely, add a test that creates an 80 MHz VHT
network through wpa_supplicant (without P2P).

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agowpa_supplicant: Allow explicit wide channel configuration for AP mode
Johannes Berg [Tue, 7 Mar 2017 16:20:57 +0000 (18:20 +0200)] 
wpa_supplicant: Allow explicit wide channel configuration for AP mode

Instead of deducing the wide (HT, VHT) channel configuration only
automatically in P2P mode, allow it to be configured in the network
in non-P2P mode.

Also allow all of these parameters to be configured through the control
interface or the configuration file.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agowpa_cli: Execute action file in case of WPS_EVENT_TIMEOUT
Jörg Krause [Thu, 9 Mar 2017 09:59:50 +0000 (10:59 +0100)] 
wpa_cli: Execute action file in case of WPS_EVENT_TIMEOUT

Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks>
7 years agowpa_cli: Execute action file in case of WPS_EVENT_ACTIVE
Jörg Krause [Thu, 9 Mar 2017 09:59:49 +0000 (10:59 +0100)] 
wpa_cli: Execute action file in case of WPS_EVENT_ACTIVE

Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks>
7 years agoWPS: Notify about WPS PBC event in Enrollee mode
Jörg Krause [Thu, 9 Mar 2017 09:59:48 +0000 (10:59 +0100)] 
WPS: Notify about WPS PBC event in Enrollee mode

Previously, the event "WPS-PBC-ACTIVE" was only generated when
wpa_supplicant is operating as WPS Registrar whereas "WPS-SUCCESS" or
"WPS-TIMEOUT" are generated for both, the Registrar and the Enrollee
roles.

Also generate the event when wpa_supplicant is operating as WPS Enrollee
to allow monitoring the begin and the end of a WPS PBC process.

Signed-off-by: Jörg Krause <joerg.krause@embedded.rocks>
7 years agowpa_supplicant: events: Don't bounce timeout reason through a buffer
Johannes Berg [Wed, 8 Mar 2017 20:41:17 +0000 (21:41 +0100)] 
wpa_supplicant: events: Don't bounce timeout reason through a buffer

There's no point in making the code use a stack buffer and first copying
the string there, only to copy it again to the output. Make the output
directly use the reason string.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agotests: BSS transition management query with unknown candidates
Avraham Stern [Wed, 8 Mar 2017 12:37:42 +0000 (14:37 +0200)] 
tests: BSS transition management query with unknown candidates

Verify that the AP responds to a BSS transition management query that
includes candidates unknown to the AP.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agowpa_cli: Update wnm_bss_query auto complete message
Avraham Stern [Wed, 8 Mar 2017 12:37:41 +0000 (14:37 +0200)] 
wpa_cli: Update wnm_bss_query auto complete message

It is now possible to add neighbor configuration to wnm_bss_query.
Update the auto complete message to reflect that.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agoWNM: Add option to configure candidates for BTM query candidate list
Avraham Stern [Wed, 8 Mar 2017 12:37:40 +0000 (14:37 +0200)] 
WNM: Add option to configure candidates for BTM query candidate list

Add a mechanism to configure the candidates for BTM query candidate list
manually. This can be used to verify AP behavior for various candidates
preferences.

usage:
wnm_bss_query <reason> [neighbor=<BSSID>,<BSSID information>,
                <operating class>,<channel number>,
<PHY type>[,<hexdump of optional subelements>]]

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agocommon: Add candidate list parsing helper function
Avraham Stern [Wed, 8 Mar 2017 12:37:39 +0000 (14:37 +0200)] 
common: Add candidate list parsing helper function

Add a helper function that parses candidate list from command line
arguments.

This function will be used (in the following commits) to add
a candidate list to BSS transition management query.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agoWNM: Use a dynamically allocated buffer for BTM query and response
Avraham Stern [Wed, 8 Mar 2017 12:37:38 +0000 (14:37 +0200)] 
WNM: Use a dynamically allocated buffer for BTM query and response

BSS transition management query and response use a large static buffer
for the frame because the candidate list may require a lot of space.
However, in most cases the actually used space will be much less than
the buffer (since the candidate list is short or completely missing).

Use a dynamically allocated buffer instead and allocate it according
to the actual space needed.

While at it, remove unneeded filling of the MAC header in the Action
frames, since this gets ignored and wpa_drv_send_action() adds the MAC
header anyway.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agotests: MBO ANQP
Jouni Malinen [Fri, 10 Mar 2017 16:59:12 +0000 (18:59 +0200)] 
tests: MBO ANQP

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoMBO: Parse MBO ANQP-element on STA
Jouni Malinen [Fri, 10 Mar 2017 16:57:12 +0000 (18:57 +0200)] 
MBO: Parse MBO ANQP-element on STA

This extends the GAS/ANQP parser in wpa_supplicant to process MBO
ANQP-elements and indicate received Cellular Data Connection Preference
values over the control interface.

When a valid MBO ANQP-element is received, the following control
interface message is sent:

RX-MBO-ANQP <BSSID> cell_conn_pref=<value>

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoMBO: Add MBO ANQP-element processing on AP
Jouni Malinen [Fri, 10 Mar 2017 16:33:51 +0000 (18:33 +0200)] 
MBO: Add MBO ANQP-element processing on AP

This extends the GAS server to process MBO ANQP-elements and reply to a
query for the Cellular Data Connection Preference (if configured). The
new configuration parameter mbo_cell_data_conn_pref can be used to set
the value (0, 1, or 255) for the preference to indicate.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Extend ANQP_GET coverage for new functionality
Jouni Malinen [Fri, 10 Mar 2017 15:03:55 +0000 (17:03 +0200)] 
tests: Extend ANQP_GET coverage for new functionality

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoANQP: Extend ANQP_GET command to request without IEEE 802.11 elements
Jouni Malinen [Fri, 10 Mar 2017 15:02:22 +0000 (17:02 +0200)] 
ANQP: Extend ANQP_GET command to request without IEEE 802.11 elements

Previously, ANQP_GET required at least one IEEE 802.11 ANQP-element to
be requested. This is not really necessary, so allow a case where
num_ids == 0 as long as the request includes at least one Hotspot 2.0 or
MBO ANQP-element.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Fix MBO ANQP cellular data preference query
Avraham Stern [Mon, 6 Mar 2017 12:59:55 +0000 (14:59 +0200)] 
tests: Fix MBO ANQP cellular data preference query

The cellular data preference ANQP element subtype is now 2, so
fix the command to query the MBO cellular data preference.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agoMBO: Add option to add MBO query list to ANQP query
Avraham Stern [Thu, 9 Mar 2017 13:19:58 +0000 (15:19 +0200)] 
MBO: Add option to add MBO query list to ANQP query

MBO techspec v0.0_r27 changed the MBO ANQP-element format. The MBO
element in ANQP query should now include an MBO Query List element that
contains a list of MBO elements to query.

Add API to add the MBO Query List to an ANQP query.

Format:
ANQP_GET <addr> <info_id>[,<info_id>]...[,mbo:<subtype>...]

Example for querying neighbor report with MBO cellular data
connection preference:
ANQP_GET <bssid> 272,mbo:2

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agotests: Additional RADIUS accounting failure cases
Jouni Malinen [Fri, 10 Mar 2017 10:23:25 +0000 (12:23 +0200)] 
tests: Additional RADIUS accounting failure cases

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoDFS: Handle pre-CAC expired event
Vasanthakumar Thiagarajan [Wed, 8 Mar 2017 05:13:17 +0000 (10:43 +0530)] 
DFS: Handle pre-CAC expired event

As FCC DFS requirement does not explicitly mention about the validity of
the (pre-)CAC when channel is switched, it is safe to assume that the
pre-CAC result will not be valid once the CAC completed channel is
switched or radar detection is not active on the (CAC completed) channel
within a time period which is allowed (10 seconds - channel switch time)
as per FCC DFS requirement.

Use the new driver event to allow the driver to notify expiry of the CAC
result on a channel. Move the DFS state of the channel to 'usable' when
processing pre-CAC expired event.  This means any future operation on
that channel will require a new CAC to be completed. This event is
applicable only when DFS is not offloaded to the kernel driver.

Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
7 years agonl80211: Handle pre-CAC expired event from the driver
Vasanthakumar Thiagarajan [Wed, 8 Mar 2017 05:13:17 +0000 (10:43 +0530)] 
nl80211: Handle pre-CAC expired event from the driver

Process the new nl80211 event NL80211_RADAR_PRE_CAC_EXPIRED to allow the
driver to notify expiry of the CAC result on a channel.

Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
7 years agoSync with mac80211-next.git include/uapi/linux/nl80211.h
Jouni Malinen [Thu, 9 Mar 2017 14:58:31 +0000 (16:58 +0200)] 
Sync with mac80211-next.git include/uapi/linux/nl80211.h

This brings in nl80211 definitions as of 2017-03-06.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoDFS: Handle CAC completion event from other radio
Vasanthakumar Thiagarajan [Wed, 8 Mar 2017 05:13:16 +0000 (10:43 +0530)] 
DFS: Handle CAC completion event from other radio

When DFS channel state is shared across multiple radios on the system it
is possible that a CAC completion event is propagated from other radio
to us. When in enabled state, do not proceed with setup completion upon
processing CAC completion event with devices where DFS is not offloaded,
when in state other than enabled make sure the configured DFS channel is
in available state before start the AP.

Signed-off-by: Vasanthakumar Thiagarajan <vthiagar@qti.qualcomm.com>
7 years agonl80211: Add option to delay start of schedule scan plans
Purushottam Kushwaha [Mon, 6 Mar 2017 07:53:10 +0000 (13:23 +0530)] 
nl80211: Add option to delay start of schedule scan plans

The userspace may want to delay the the first scheduled scan.
This enhances sched_scan to add initial delay (in seconds) before
starting first scan cycle. The driver may optionally choose to
ignore this parameter and start immediately (or at any other time).

This uses NL80211_ATTR_SCHED_SCAN_DELAY to add this via user
global configurable option: sched_scan_start_delay.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoRRM: Fix wpas_rrm_send_msr_report() loop handling
Jouni Malinen [Wed, 8 Mar 2017 14:16:37 +0000 (16:16 +0200)] 
RRM: Fix wpas_rrm_send_msr_report() loop handling

The while (len) loop was updating the next pointer at the end even when
len == 0, i.e., when the new next value won't be used. This could result
in reading one octet beyond the end of the allocated response wpabuf.
While the read value is not really used in practice, this is not correct
behavior, so fix this by skipping the unnecessary next pointer update in
len == 0 case.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoRRM: Use dynamically allocated buffer for beacon report
Avraham Stern [Wed, 8 Mar 2017 12:31:49 +0000 (14:31 +0200)] 
RRM: Use dynamically allocated buffer for beacon report

The maximum required size for each Beacon Report element is known in
advance: it is the size of the Beacon Report element fixed fields + the
size of the Reported Frame Body subelement.

Allocate the buffer used for constructing the Beacon Report element
dynamically with the maximum needed size, instead of using a very
large static buffer.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agotests: Fix authsrv_errors_1 and authsrv_errors_3 when running on host
Jouni Malinen [Tue, 7 Mar 2017 16:13:05 +0000 (18:13 +0200)] 
tests: Fix authsrv_errors_1 and authsrv_errors_3 when running on host

Use a non-existing directory in the path to avoid SQLite from being able
to create a new database file. The previous design worked in the VM case
due to the host file system being read-only, but a bit more is needed
for the case when this is running on the host.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoUse os_memdup()
Johannes Berg [Tue, 7 Mar 2017 09:17:23 +0000 (10:17 +0100)] 
Use os_memdup()

This leads to cleaner code overall, and also reduces the size
of the hostapd and wpa_supplicant binaries (in hwsim test build
on x86_64) by about 2.5 and 3.5KiB respectively.

The mechanical conversions all over the code were done with
the following spatch:

    @@
    expression SIZE, SRC;
    expression a;
    @@
    -a = os_malloc(SIZE);
    +a = os_memdup(SRC, SIZE);
    <...
    if (!a) {...}
    ...>
    -os_memcpy(a, SRC, SIZE);

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agoIntroduce os_memdup()
Johannes Berg [Tue, 7 Mar 2017 09:17:23 +0000 (10:17 +0100)] 
Introduce os_memdup()

This can be used to clean the code and reduce size by converting
os_malloc() followed by os_memcpy() cases to use a single function call.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agogitignore: Add parallel-vm.log
Johannes Berg [Tue, 7 Mar 2017 06:48:37 +0000 (07:48 +0100)] 
gitignore: Add parallel-vm.log

Ignore parallel-vm.log regardless of where in the tree
it was created.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agoap-mgmt-fuzzer: Add .gitignore
Johannes Berg [Tue, 7 Mar 2017 06:47:41 +0000 (07:47 +0100)] 
ap-mgmt-fuzzer: Add .gitignore

Ignore the binary created here.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
7 years agowpadebug: Add .gitignore
Jouni Malinen [Tue, 7 Mar 2017 10:10:11 +0000 (12:10 +0200)] 
wpadebug: Add .gitignore

Ignore the automatically generated build directories and files.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoMBO: Add support for transition reject reason code
Kanchanapally, Vidyullatha [Mon, 6 Mar 2017 11:46:00 +0000 (17:16 +0530)] 
MBO: Add support for transition reject reason code

Add support for rejecting a BSS transition request using MBO reject
reason codes. A candidate is selected or rejected based on whether it is
found acceptable by both wpa_supplicant and the driver. Also accept any
candidate meeting a certain threshold if disassoc imminent is set in BTM
Request frame.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agonl80211: Driver command for checking BTM accept/reject
Kanchanapally, Vidyullatha [Mon, 6 Mar 2017 11:43:10 +0000 (17:13 +0530)] 
nl80211: Driver command for checking BTM accept/reject

Add driver interface command using the QCA vendor extensions to check
the driverr whether to accept or reject a BSS transition candidate. For
the reject case, report an MBO reject reason code.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Make beacon report tests remote compatible
Avraham Stern [Mon, 6 Mar 2017 11:30:38 +0000 (13:30 +0200)] 
tests: Make beacon report tests remote compatible

Use the new hostapd.add_ap() API (i.e., pass the ap device as a
parameter instead of the interface name) in beacon report tests to
make them remote compatible, and mark them appropriately.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agotests: Make wnm_bss_tm_req a bit more efficient and robust
Jouni Malinen [Mon, 6 Mar 2017 21:53:33 +0000 (23:53 +0200)] 
tests: Make wnm_bss_tm_req a bit more efficient and robust

Use a local variable for the STA address instead of fetching it
separately for each operation. Dump control interface monitor events
between each test message to avoid increasing the socket output queue
unnecessarily.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Clean up wnm_bss_tm_req test not initialize unused AP
Beni Lev [Mon, 6 Mar 2017 11:30:37 +0000 (13:30 +0200)] 
tests: Clean up wnm_bss_tm_req test not initialize unused AP

The second AP is not really needed in this test case that verifies
parsing of various different BSs Transition Management Request frame
payloads.

Signed-off-by: Beni Lev <beni.lev@intel.com>
7 years agowpa_supplicant: Fix non_pref_chan example
Avraham Stern [Mon, 6 Mar 2017 11:30:36 +0000 (13:30 +0200)] 
wpa_supplicant: Fix non_pref_chan example

The parsing code expects non_pref_chan to be non-quoted.
Fix the example in wpa_supplicant.conf not to include
quotes.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
7 years agotests: Rename ap_wpa2_psk_file test
Andrei Otcheretianski [Mon, 6 Mar 2017 11:30:35 +0000 (13:30 +0200)] 
tests: Rename ap_wpa2_psk_file test

There are two different tests with the same name in test_ap_psk.py.
Fix that.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
7 years agotests: hostapd authentication server test cases
Jouni Malinen [Sun, 5 Mar 2017 10:06:28 +0000 (12:06 +0200)] 
tests: hostapd authentication server test cases

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Add TEST_FAIL() to radius_msg_add_attr()
Jouni Malinen [Sun, 5 Mar 2017 14:36:24 +0000 (16:36 +0200)] 
tests: Add TEST_FAIL() to radius_msg_add_attr()

This makes it easier to test error paths for RADIUS message
construction.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoRADIUS server: Fix error paths in new session creation
Jouni Malinen [Sun, 5 Mar 2017 14:16:42 +0000 (16:16 +0200)] 
RADIUS server: Fix error paths in new session creation

radius_server_session_free() does not remove the session from the
session list and these radius_server_get_new_session() error paths ended
up leaving a pointer to freed memory into the session list. This
resulted in the following operations failing due to use of freed memory.

Fix this by using radius_server_session_remove() which removes the entry
from the list in addition to calling radius_server_session_free().

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Automatic channel selection failures
Jouni Malinen [Sat, 4 Mar 2017 14:59:57 +0000 (16:59 +0200)] 
tests: Automatic channel selection failures

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Automatic channel selection for VHT160
Jouni Malinen [Sat, 4 Mar 2017 11:54:31 +0000 (13:54 +0200)] 
tests: Automatic channel selection for VHT160

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoACS: Fix memory leak if interface is disabled during scan
Jouni Malinen [Sat, 4 Mar 2017 11:48:29 +0000 (13:48 +0200)] 
ACS: Fix memory leak if interface is disabled during scan

The survey data was not freed if hostapd interface got disabled during
an ACS scan.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Automatic channel selection for VHT40
Jouni Malinen [Sat, 4 Mar 2017 11:30:43 +0000 (13:30 +0200)] 
tests: Automatic channel selection for VHT40

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Automatic channel selection for HT40- channel
Jouni Malinen [Sat, 4 Mar 2017 11:28:27 +0000 (13:28 +0200)] 
tests: Automatic channel selection for HT40- channel

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoACS: Simplify code paths
Jouni Malinen [Sat, 4 Mar 2017 11:22:46 +0000 (13:22 +0200)] 
ACS: Simplify code paths

This removes some unnecessarily duplicated return paths and simplifies
code paths.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: ProxyARP error cases
Jouni Malinen [Sat, 4 Mar 2017 09:44:55 +0000 (11:44 +0200)] 
tests: ProxyARP error cases

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: Add TEST_FAIL() checks in l2_packet
Jouni Malinen [Sat, 4 Mar 2017 09:43:58 +0000 (11:43 +0200)] 
tests: Add TEST_FAIL() checks in l2_packet

This enables additional test coverage for error paths.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoFix DHCP/NDISC snoop deinit followed by failing re-init
Jouni Malinen [Sat, 4 Mar 2017 09:42:15 +0000 (11:42 +0200)] 
Fix DHCP/NDISC snoop deinit followed by failing re-init

It was possible to hit a double-free on the l2_packet socket if
initialization of DHCP/NDISC snoop failed on a hostapd interface that
had previously had those enabled successfully. Fix this by clearing the
l2_packet pointers during deinit.

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agotests: P2P autonomous GO and NoA
Jouni Malinen [Sat, 4 Mar 2017 08:57:28 +0000 (10:57 +0200)] 
tests: P2P autonomous GO and NoA

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agoAdd QCA vendor command/attr for BRP antenna limit control
Alexei Avshalom Lazar [Tue, 28 Feb 2017 07:36:41 +0000 (09:36 +0200)] 
Add QCA vendor command/attr for BRP antenna limit control

Add QCA_NL80211_VENDOR_SUBCMD_BRP_SET_ANT_LIMIT for setting the number
of antennas that will be active in different modes for each connection.

Signed-off-by: Alexei Avshalom Lazar <qca_ailizaro@qca.qualcomm.com>
7 years agotests: Scan failures for TYPE=ONLY
Jouni Malinen [Wed, 1 Mar 2017 14:42:56 +0000 (16:42 +0200)] 
tests: Scan failures for TYPE=ONLY

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoClear scan_res_handler on no-retry failure
Hu Wang [Wed, 1 Mar 2017 14:39:30 +0000 (16:39 +0200)] 
Clear scan_res_handler on no-retry failure

Previously it was possible for wpa_s->scan_res_handler to remain set to
its old value in case wpa_drv_scan() failed and no retry for the scan
trigger was scheduled (i.e., when last_scan_req == MANUAL_SCAN_REQ).
This could result in getting stuck with the next connection attempt
after a failed "SCAN TYPE=ONLY" operation when wpa_s->scan_res_handler
was set to scan_only_handler().

Fix this by clearing wpa_s->scan_res_handler if wpa_drv_scan() fails and
no retry is scheduled.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Wi-Fi Display extensions to P2P with R2 subelems
Jouni Malinen [Wed, 1 Mar 2017 10:16:10 +0000 (12:16 +0200)] 
tests: Wi-Fi Display extensions to P2P with R2 subelems

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoWFD: Add WFD R2 Subelements
Amarnath Hullur Subramanyam [Wed, 1 Mar 2017 05:18:58 +0000 (21:18 -0800)] 
WFD: Add WFD R2 Subelements

Define and add support for WFD R2 Subelements.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoQCA nl80211 vendor attribute for specific sub-20 MHz channel width
Gaole Zhang [Wed, 1 Mar 2017 07:56:32 +0000 (15:56 +0800)] 
QCA nl80211 vendor attribute for specific sub-20 MHz channel width

Define a new attribute QCA_WLAN_VENDOR_ATTR_CONFIG_SUB20_CHAN_WIDTH.
This attribute can set a station device to work in 5 or 10 MHz channel
width while in disconnect state.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: WNM BSS Transition Management and scan needed (Table E-4)
Jouni Malinen [Wed, 1 Mar 2017 09:39:24 +0000 (11:39 +0200)] 
tests: WNM BSS Transition Management and scan needed (Table E-4)

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: WNM BSS TM with explicit Table E-4 indication
Jouni Malinen [Wed, 1 Mar 2017 09:25:49 +0000 (11:25 +0200)] 
tests: WNM BSS TM with explicit Table E-4 indication

wnm_bss_tm_global uses an unknown country code to use Table E-4. Extend
that with otherwise identical test case wnm_bss_tm_global4, but with the
country string explicitly indicating use of Table E-4 while using a
known country code.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Country code string and the third octet
Jouni Malinen [Wed, 1 Mar 2017 09:11:31 +0000 (11:11 +0200)] 
tests: Country code string and the third octet

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoMake the third octet of Country String configurable
Jouni Malinen [Wed, 1 Mar 2017 08:58:15 +0000 (10:58 +0200)] 
Make the third octet of Country String configurable

The new hostapd.conf parameter country3 can now be used to configure the
third octet of the Country String that was previously hardcoded to ' '
(= 0x20).

For example:

All environments of the current frequency band and country (default)
country3=0x20

Outdoor environment only
country3=0x4f

Indoor environment only
country3=0x49

Noncountry entity (country_code=XX)
country3=0x58

IEEE 802.11 standard Annex E table indication: 0x01 .. 0x1f
Annex E, Table E-4 (Global operating classes)
country3=0x04

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotests: Add mesh path test
Masashi Honma [Tue, 28 Feb 2017 00:50:52 +0000 (09:50 +0900)] 
tests: Add mesh path test

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
7 years agotests: Save the log of wmediumd
Masashi Honma [Tue, 28 Feb 2017 00:50:51 +0000 (09:50 +0900)] 
tests: Save the log of wmediumd

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
7 years agotests: Work around pyopenssl API change
Jouni Malinen [Tue, 28 Feb 2017 09:48:16 +0000 (11:48 +0200)] 
tests: Work around pyopenssl API change

OpenSSL.SSL.Connection.state_string() was replaced with
get_state_string() in pyopenssl. Add workaround code to be able to use
either of these names.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agotrace: Look up start to cope with ASLR
Johannes Berg [Mon, 27 Feb 2017 23:04:14 +0000 (00:04 +0100)] 
trace: Look up start to cope with ASLR

When ASLR is enabled, like it is by default on many distros now,
the trace code doesn't work right.

Fix this by looking up the start of the executable mapping and
subtracing it from all the lookups.

Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
7 years agotests: Fix EAPOL frame source address in protocol tests
Jouni Malinen [Mon, 27 Feb 2017 22:03:48 +0000 (00:03 +0200)] 
tests: Fix EAPOL frame source address in protocol tests

The send_eapol() calls for delivering frames to wpa_supplicant had a
copy-paste bug from the earlier hostapd cases. These were supposed to
use the BSSID, not the address of the station, as the source address.
The local address worked for most cases since it was practically
ignored, but this could prevent the race condition workaround for
association event from working. Fix this by using the correct source
address (BSSID).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
7 years agoaf_alg: Crypto wrappers for Linux kernel crypto (AF_ALG)
Jouni Malinen [Sun, 26 Feb 2017 23:10:02 +0000 (01:10 +0200)] 
af_alg: Crypto wrappers for Linux kernel crypto (AF_ALG)

CONFIG_TLS=linux can now be used to select the crypto implementation
that uses the user space socket interface (AF_ALG) for the Linux kernel
crypto implementation. This commit includes some of the cipher, hash,
and HMAC functions. The functions that are not available through AF_ALG
(e.g., the actual TLS implementation) use the internal implementation
(CONFIG_TLS=internal).

Signed-off-by: Jouni Malinen <j@w1.fi>
7 years agocrypto: Process des_encrypt() error returns in callers
Jouni Malinen [Tue, 28 Feb 2017 09:11:12 +0000 (11:11 +0200)] 
crypto: Process des_encrypt() error returns in callers

This updates all the des_encrypt() callers to handle error cases.

Signed-off-by: Jouni Malinen <j@w1.fi>