]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
21 months agoOWE: Optimize transition mode scan to use known channels
Jouni Malinen [Wed, 8 Nov 2023 12:19:03 +0000 (14:19 +0200)] 
OWE: Optimize transition mode scan to use known channels

If the currently available scan results include OWE transition mode BSS
with an unknown SSID, optimize the following scan for OWE to use only
the channels on which a known transition mode BSS has been seen.

This is needed to be able to remove the design that updates BSS entries
with the learned OWE SSID in manner that does not result in regression
to scanning latencies.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoUse SSID from driver when finding the current BSS entry
Jouni Malinen [Wed, 8 Nov 2023 09:56:03 +0000 (11:56 +0200)] 
Use SSID from driver when finding the current BSS entry

The local network profile may not have matching SSID (it could be either
the wildcard 0-length SSID or visible SSID in case of OWE transition
mode), so check whether an exact match with a BSS entry can be made
using the current SSID information from the driver (i.e., the SSID of
the current association) when picking the BSS entry to use as the
current one for an association.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMLD: Use BSS Parameters in TBTT Info to check SSID match
Ben Greear [Sat, 28 Oct 2023 23:24:35 +0000 (16:24 -0700)] 
MLD: Use BSS Parameters in TBTT Info to check SSID match

Use the Same SSID and Colocated AP bits as an alternative way of finding
a match on the current SSID.

Signed-off-by: Ben Greear <greearb@candelatech.com>
21 months agoMLD: Support multiple TBTT Information fields in RNR elements
Ben Greear [Sat, 28 Oct 2023 23:24:35 +0000 (16:24 -0700)] 
MLD: Support multiple TBTT Information fields in RNR elements

The Reduced Neighbor Report element can include one or more TBTT
Information fields.  Only the first one was parsed previously. Extend
this to use a loop to go through all included TBTT Information fields.

Signed-off-by: Ben Greear <greearb@candelatech.com>
21 months agoMLD: Move TBTT Information field parsing into a helper function
Jouni Malinen [Tue, 7 Nov 2023 17:06:16 +0000 (19:06 +0200)] 
MLD: Move TBTT Information field parsing into a helper function

This makes it more convenient to process multiple TBTT Information
fields within an RNR element.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMLD: Support multiple RNR elements
Ben Greear [Sat, 28 Oct 2023 23:24:35 +0000 (16:24 -0700)] 
MLD: Support multiple RNR elements

Beacon frames are allowed to optionally include one more more Reduced
Neighbor Report elements. Only the first one was parsed previously.
Extend this to use a loop to go through all included RNR elements.

Signed-off-by: Ben Greear <greearb@candelatech.com>
21 months agoMLD: Move RNR element parsing into a helper function
Jouni Malinen [Tue, 7 Nov 2023 16:43:40 +0000 (18:43 +0200)] 
MLD: Move RNR element parsing into a helper function

This makes it more convenient to process multiple elements.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMBSSID: Use DTIM Count 0 in the Beacon template for nontransmitted BSSID
Jouni Malinen [Tue, 7 Nov 2023 08:44:28 +0000 (10:44 +0200)] 
MBSSID: Use DTIM Count 0 in the Beacon template for nontransmitted BSSID

The driver is expected to update the DTIM Count field for each BSS that
corresponds to a nontransmitted BSSID. Initialized this value to 0 in
the Beacon frame template so that the DTIM count would be somewhat
functional even if the driver were not to update this.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agodragonfly: Fix legendre symbol calculation failure handling
Chaitanya Tata [Mon, 6 Nov 2023 17:19:15 +0000 (22:49 +0530)] 
dragonfly: Fix legendre symbol calculation failure handling

In case of low-memory conditions, the computation for legendre symbol
can fail and return -2 as per documentation, but the check for that
was missed here. And this can can cause an infinite loop searching for
qr and qnr if the error repeats for each attempt.

Break the loop if calculation fails, we can leave retry to the callers
or user. This is similar to the way allocation and generation of a new
random number was handled in this loop.

Signed-off-by: Chaitanya Tata <Chaitanya.Tata@nordicsemi.no>
21 months agoRemove QCA_WLAN_VENDOR_ATTR_CONFIG_MLO_LINK_ID constraint
Mohan Prabu [Fri, 3 Nov 2023 01:18:33 +0000 (06:48 +0530)] 
Remove QCA_WLAN_VENDOR_ATTR_CONFIG_MLO_LINK_ID constraint

Currently the documentation for QCA_WLAN_VENDOR_ATTR_CONFIG_MLO_LINK_ID
indicates it is only for use inside nest attribute
QCA_WLAN_VENDOR_ATTR_CONFIG_MLO_LINKS.  Update the documentation to
allow it to be used outside that nest as well.

Signed-off-by: Mohan Prabu <quic_mprabub@quicinc.com>
21 months agoMLD STA: Use MLD MAC address as destination for EAPOL-Key request
Jouni Malinen [Mon, 6 Nov 2023 18:01:14 +0000 (20:01 +0200)] 
MLD STA: Use MLD MAC address as destination for EAPOL-Key request

Also this EAPOL frame uses the MLD MAC address of the AP MLD when sent
during an MLO association.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMLD STA: Fix destination address for Group Key handshake msg 2/2
Rohan Dutta [Tue, 10 Oct 2023 05:12:00 +0000 (10:42 +0530)] 
MLD STA: Fix destination address for Group Key handshake msg 2/2

For MLO association, specify destination address as the MLD MAC address
for sending Group Key msg 2/2.

Signed-off-by: Rohan Dutta <quic_drohan@quicinc.com>
21 months agotests: AP MLD and GTK rekeying with MLD client connection using two links
Jouni Malinen [Mon, 6 Nov 2023 17:56:41 +0000 (19:56 +0200)] 
tests: AP MLD and GTK rekeying with MLD client connection using two links

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agowpa_cli/hostapd_cli: Add driver_flags2 command
Gokul Sivakumar [Wed, 26 Apr 2023 10:45:56 +0000 (16:15 +0530)] 
wpa_cli/hostapd_cli: Add driver_flags2 command

Leverage the already available control socket cmd "DRIVER_FLAGS2" and
dump the driver capab "flags2" bitmask on triggering the new CLI CMD
"driver_flags2", similar to the already existing CLI CMD "driver_flags".

$ hostapd_cli -i wlan0 driver_flags2
(OR)
$ wpa_cli -i wlan0 driver_flags2
0000000000000020:
BEACON_RATE_HE

Signed-off-by: Gokul Sivakumar <gokulkumar.sivakumar@infineon.com>
21 months agonl80211: Add capa.flags2 to STATUS-DRIVER
Gokul Sivakumar [Wed, 26 Apr 2023 10:45:56 +0000 (16:15 +0530)] 
nl80211: Add capa.flags2 to STATUS-DRIVER

This adds the newer driver capability "flags2" bitmask to the
hostapd_cli/wpa_cli "status driver" result.

Signed-off-by: Gokul Sivakumar <gokulkumar.sivakumar@infineon.com>
21 months agonl80211: Dump driver_flags2 in debug prints
Gokul Sivakumar [Wed, 26 Apr 2023 10:45:56 +0000 (16:15 +0530)] 
nl80211: Dump driver_flags2 in debug prints

This was already done for driver_flags, but the newer driver_flags2 was
not covered here.

Signed-off-by: Gokul Sivakumar <gokulkumar.sivakumar@infineon.com>
21 months agoUpdate the driver_flags2 to string conversion
Gokul Sivakumar [Wed, 26 Apr 2023 10:45:56 +0000 (16:15 +0530)] 
Update the driver_flags2 to string conversion

Populate the switch case in the driver_flag2_to_string() function with
the full list of feature MACROs represented with the "flags2" bitmask.

Signed-off-by: Gokul Sivakumar <gokulkumar.sivakumar@infineon.com>
21 months agoRename driver capability for radar background detection
Gokul Sivakumar [Wed, 26 Apr 2023 10:45:56 +0000 (16:15 +0530)] 
Rename driver capability for radar background detection

Use the WPA_DRIVER_FLAGS2_ prefer for this to be more consistent.

Signed-off-by: Gokul Sivakumar <gokulkumar.sivakumar@infineon.com>
21 months agoFix use after free warning introduced by gcc 12.1
krishna T [Thu, 20 Apr 2023 19:28:21 +0000 (00:58 +0530)] 
Fix use after free warning introduced by gcc 12.1

gcc 12.1 complains about using pointer after realloc as it could
potentially be moved/freed, causing any uses after UB.

Fix this by doing checks before realloc and use those statuses and
update with new BSS.

Signed-off-by: Krishna T <krishna.t@nordicsemi.no>
21 months agoSAE: Pass SAE password on connect for SAE authentication offload support
Chung-Hsien Hsu [Wed, 19 Jul 2023 05:22:27 +0000 (14:22 +0900)] 
SAE: Pass SAE password on connect for SAE authentication offload support

Pass SAE password on connect if driver advertises SAE authentication
offload support.

Signed-off-by: Chung-Hsien Hsu <chung-hsien.hsu@infineon.com>
Signed-off-by: Daisuke Mizobuchi <mizo@atmark-techno.com>
21 months agonl80211: Set NL80211_WPA_VERSION_2 vs. _3 based on AKM
Chung-Hsien Hsu [Wed, 19 Jul 2023 05:22:27 +0000 (14:22 +0900)] 
nl80211: Set NL80211_WPA_VERSION_2 vs. _3 based on AKM

Signed-off-by: Chung-Hsien Hsu <chung-hsien.hsu@infineon.com>
Signed-off-by: Daisuke Mizobuchi <mizo@atmark-techno.com>
21 months agonl80211: SAE authentication offload support
Chung-Hsien Hsu [Wed, 19 Jul 2023 05:22:26 +0000 (14:22 +0900)] 
nl80211: SAE authentication offload support

Set WPA_DRIVER_FLAGS2_SAE_OFFLOAD flag if the driver indicates SAE
authentication offload support for STA mode. Allow SAE password to be
provided to the driver in such cases when using the CONNECT command.

Signed-off-by: Chung-Hsien Hsu <chung-hsien.hsu@infineon.com>
Signed-off-by: Daisuke Mizobuchi <mizo@atmark-techno.com>
21 months agomka: Fix re-establishment by resetting MI
Ze Gan [Sun, 23 Apr 2023 16:50:09 +0000 (00:50 +0800)] 
mka: Fix re-establishment by resetting MI

The key server may be removed due to the ingress packets delay. In this
situation, the endpoint of the key server may not be aware of this
participant who has removed the key server from the peer list. Because
the egress traffic is normal, the key server will not remove this
participant from the peer list of the key server. So in the next MKA
message, the key server will not dispatch a new SAK to this participant.
And this participant cannot be aware of that that is a new round of
communication so that it will not update its MI at re-adding the key
server to its peer list. So we need to update MI to avoid the failure of
re-establishment MKA session.

Signed-off-by: Ze Gan <ganze718@gmail.com>
21 months agomka: Fix unexpected cleanup on missing MKA_LIFE_TIME while installing SC/SA
Ze Gan [Sun, 23 Apr 2023 16:50:46 +0000 (00:50 +0800)] 
mka: Fix unexpected cleanup on missing MKA_LIFE_TIME while installing SC/SA

The key server may not include dist sak and use sak in one packet.
Meanwhile, after dist sak, the current participant (non-key server) will
install SC or SA(s) after decoding the dist sak which may take few
seconds in real physical platforms. Meanwhile, the peer expire time is
always initialized at adding the key server to peer list. The gap
between adding the key server to peer list and processing next use sak
packet may exceed the threshold of MKA_LIFE_TIME (6 s). It will cause an
unexpected cleanup (delete SC and SA(s)), so update the expire timeout
at dist sak also.

Signed-off-by: Ze Gan <ganze718@gmail.com>
21 months agoCompile-time config for dynamically loading libraries in wpa_supplicant
David Ruth [Tue, 4 Apr 2023 23:35:35 +0000 (23:35 +0000)] 
Compile-time config for dynamically loading libraries in wpa_supplicant

Prevent loading arbitrary executable code based on config at runtime,
while allowing libraries to be specified at compile time when they are
known in advance.

Add the ability to configure libraries to load at compile time.
* CONFIG_PKCS11_ENGINE_PATH - pkcs11_engine library location.
* CONFIG_PKCS11_MODULE_PATH - pkcs11_module library location.
* CONFIG_OPENSC_ENGINE_PATH - opensc_engine library location.

Add flags with the ability to set each of the libraries to NULL and
prevent loading them at runtime.
* CONFIG_NO_PKCS11_ENGINE_PATH - prevents loading pkcs11_engine
  library.
* CONFIG_NO_PKCS11_MODULE_PATH - prevents loading pkcs11_module
  library.
* CONFIG_NO_OPENSC_ENGINE_PATH - prevents loading opensc_engine
  library.
* CONFIG_NO_LOAD_DYNAMIC_EAP - prevents loading EAP libraries at
  runtime.

Signed-off-by: David Ruth <druth@chromium.org>
21 months agowolfSSL: Old FIPS APIs have void return
Juliusz Sosinowicz [Thu, 23 Mar 2023 15:58:50 +0000 (16:58 +0100)] 
wolfSSL: Old FIPS APIs have void return

Fix the calls to wc_AesEncryptDirect(). Old versions of wolfCrypt FIPS
had wc_AesEncryptDirect() return void instead of int. Fix this build
issue.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Implement DPP backend functions
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:49 +0000 (18:18 +0100)] 
wolfSSL: Implement DPP backend functions

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Set up generator manually in FIPS build
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:50 +0000 (18:18 +0100)] 
wolfSSL: Set up generator manually in FIPS build

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Get EC generator for DPP
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:49 +0000 (18:18 +0100)] 
wolfSSL: Get EC generator for DPP

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Add crypto_ecdh_init2()
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: Add crypto_ecdh_init2()

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Refactor crypto ECC section
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: Refactor crypto ECC section

Use heap allocated objects and improve error checking.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Use wc_ecc_get_curve_size_from_id()
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: Use wc_ecc_get_curve_size_from_id()

Avoid use of direct member access.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Use wc_ecc_forcezero_point() in non-FIPS builds
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: Use wc_ecc_forcezero_point() in non-FIPS builds

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: More complete crypto_ec_key_group()
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: More complete crypto_ec_key_group()

Add more curves and check if brainpool support is built.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: EC group-to-id conversion into a helper function
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: EC group-to-id conversion into a helper function

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Improve logging
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:48 +0000 (18:18 +0100)] 
wolfSSL: Improve logging

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Improve error checking and logging in AES functions
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:47 +0000 (18:18 +0100)] 
wolfSSL: Improve error checking and logging in AES functions

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Better error message in pbkdf2_sha1() for FIPS password failure
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:46 +0000 (18:18 +0100)] 
wolfSSL: Better error message in pbkdf2_sha1() for FIPS password failure

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Always clean up resources and log errors in wolfssl_hmac_vector()
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:45 +0000 (18:18 +0100)] 
wolfSSL: Always clean up resources and log errors in wolfssl_hmac_vector()

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Improve error checking in vector hashing functions
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:44 +0000 (18:18 +0100)] 
wolfSSL: Improve error checking in vector hashing functions

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Add crypto logging macros
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:43 +0000 (18:18 +0100)] 
wolfSSL: Add crypto logging macros

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Add FIPS warning
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:42 +0000 (18:18 +0100)] 
wolfSSL: Add FIPS warning

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Put wolfSSL headers in alphabetical order
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:41 +0000 (18:18 +0100)] 
wolfSSL: Put wolfSSL headers in alphabetical order

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Add more precise logging in wolfssl_handshake()
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:40 +0000 (18:18 +0100)] 
wolfSSL: Add more precise logging in wolfssl_handshake()

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agowolfSSL: Debug print ciphersuites
Juliusz Sosinowicz [Wed, 8 Mar 2023 17:18:39 +0000 (18:18 +0100)] 
wolfSSL: Debug print ciphersuites

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
21 months agotests: Fix DPP test case skipping without CONFIG_DPP
Jouni Malinen [Sat, 4 Nov 2023 16:14:41 +0000 (18:14 +0200)] 
tests: Fix DPP test case skipping without CONFIG_DPP

dpp_config_legacy_gen_two_conf_psk and dpp_config_legacy_gen_two_conf
tried to set a DPP parameter before having verified that CONFIG_DPP was
used in the build.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoEHT: Include crypto.h to avoid implicit function definition
Jouni Malinen [Sat, 4 Nov 2023 13:05:15 +0000 (15:05 +0200)] 
EHT: Include crypto.h to avoid implicit function definition

crypto_ec_*() were not defined in some build configuration cases.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: Wait before initiating DPP from thread in sigma_dut testing
Jouni Malinen [Sat, 4 Nov 2023 10:41:02 +0000 (12:41 +0200)] 
tests: Wait before initiating DPP from thread in sigma_dut testing

Starting a thread to initiate DPP before starting the responder through
sigma_dut can result in unexpected testing behavior since there may not
be enough time to get the responder enabled before timing out som
initiator actions. Wait a second at the beginning of the initiator
thread in dpp_init_conf() similarly to how this was handled in other
initiator-from-thread cases.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: Terminate sigma_dut more forcefully if needed
Jouni Malinen [Sat, 4 Nov 2023 10:31:23 +0000 (12:31 +0200)] 
tests: Terminate sigma_dut more forcefully if needed

Wait for stdout/stderr in a more robust manner to avoid blocking the
pipes and kill the sigma_dut process if it fails to terminate cleanly.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoDPP: Handle wpas_dpp_connected() processing in eloop callback
Jouni Malinen [Sat, 4 Nov 2023 09:58:14 +0000 (11:58 +0200)] 
DPP: Handle wpas_dpp_connected() processing in eloop callback

wpas_dpp_connected() is called from wpa_supplicant_set_state(), i.e.,
from the middle of processing of the post 4-way handshake steps. Sending
a DPP Public Action frame at that point can delay other operations, so
allow those steps to be completed first before sending out the DPP
connection status result.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: Avoid race condition in DPP GAS protocol testing
Jouni Malinen [Sat, 4 Nov 2023 09:33:15 +0000 (11:33 +0200)] 
tests: Avoid race condition in DPP GAS protocol testing

Responder receives Authentication Request and Config Request in a
sequence and it is possible for the Config Request to be received before
MGMT_RX_PROCESS has been processed for Authentication Request in the
cases where the test script is in the middle of RX processing. This can
result in DPP-AUTH-SUCCESS being delivered only after the MGMT-RX event
for Config Reques which means that wait_auth_success() would lose that
MGMT-RX event.

Avoid this issue by caching the "extra" MGMT-RX event within
wait_auth_success() and having the caller verify if the Config Request
(GAS Initial Request) has already been received before waiting to
receive it.

This makes dpp_gas, dpp_gas_comeback_after_failure, and
dpp_gas_timeout_handling more robust.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoDPP: Start next auth init from driver event to avoid race condition
Jouni Malinen [Sat, 4 Nov 2023 09:11:46 +0000 (11:11 +0200)] 
DPP: Start next auth init from driver event to avoid race condition

It looks like mac80211 ROC handling can end up postponing offchannel TX
operation by the previously started and already canceled wait time if
the new NL80211_CMD_FRAME is issued immediately after
NL80211_CMD_FRAME_WAIT_CANCEL. Make this more robust by waiting for the
driver event that indicates completion of the cancel operation (i.e.,
NL80211_CMD_FRAME_WAIT_CANCEL as an event) before issuing
NL80211_CMD_FRAME for another channel. If the driver event is not
received within 10 ms, start the operation anyway to avoid unexpected
behavior if there are drivers that do not end up notifying end of the
wait.

This fixes some issues with authentication initiation for cases where
multiple channels are iterated. This can also significantly speed up
that process.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: Handle race condition in eap_proto_md5_server
Jouni Malinen [Sat, 4 Nov 2023 07:53:58 +0000 (09:53 +0200)] 
tests: Handle race condition in eap_proto_md5_server

UML time travel allows the deauthentication event to be processed more
quickly than the delivery of EAP-Success to the client through the test
script, so accept either sequence here.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: Do not dump pending monitor events after connection
Jouni Malinen [Fri, 3 Nov 2023 20:59:33 +0000 (22:59 +0200)] 
tests: Do not dump pending monitor events after connection

connect_network() tried to make test log more readable with a
dump_monitor() call at the end of the function. However, this could end
up practically dropping an event that arrives more or less immediately
after CTRL-EVENT-CONNECTED. This could happen with UML time travel,
e.g., in suite_b_192_pmksa_caching_roam.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: ap_hs20_remediation_required_ctrl with UML time travel
Jouni Malinen [Fri, 3 Nov 2023 20:28:22 +0000 (22:28 +0200)] 
tests: ap_hs20_remediation_required_ctrl with UML time travel

Wait for hostapd connection event before issue HS20_WNM_NOTIF to avoid a
race condition with UML time travel.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoUse os_reltime_initialized() for Michael MIC failure event
Jouni Malinen [Fri, 3 Nov 2023 20:02:18 +0000 (22:02 +0200)] 
Use os_reltime_initialized() for Michael MIC failure event

The first event could have theoretically been received with reltime
sec=0, so use the helper function to check whether the reltime value is
actually set so that the usec part is checked as well. This is not going
to have a difference in practice, but it was possible to hit this corner
case with mac80211_hwsim testing (ap_cipher_tkip_countermeasures_sta)
using UML and time travel.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Add basic test for 802.1X-SHA384 with EAP-PSK
Ilan Peer [Tue, 23 May 2023 10:14:55 +0000 (13:14 +0300)] 
tests: Add basic test for 802.1X-SHA384 with EAP-PSK

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
21 months agoAdd support for AKM suite 00-0F-AC:23
Ilan Peer [Tue, 23 May 2023 10:14:54 +0000 (13:14 +0300)] 
Add support for AKM suite 00-0F-AC:23

Add support for Authentication negotiated over IEEE Std 802.1X
with key derivation function using SHA-384.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
21 months agodefs: Enclose all structs between the pragmas
Daniel Gabay [Wed, 24 May 2023 16:07:04 +0000 (19:07 +0300)] 
defs: Enclose all structs between the pragmas

Many of the STRUCT_PACKED structs are not within the pragmas resulting
in wrong packing using MSVC. Fix it by moving pragma to EOF to ensure
proper packing.

Signed-off-by: Daniel Gabay <daniel.gabay@intel.com>
21 months agotests: HE AP on 80 MHz channel and CW change notification
Jouni Malinen [Fri, 3 Nov 2023 14:28:13 +0000 (16:28 +0200)] 
tests: HE AP on 80 MHz channel and CW change notification

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agohostapd: Add support to send CW change notification
Vignesh C [Thu, 2 Nov 2023 07:36:56 +0000 (13:06 +0530)] 
hostapd: Add support to send CW change notification

Add hostapd_cli command to notify channel width change to all
associated STAs.

Notify Channel Width frame for HT STAs.
(IEEE P802.11-REVme/D4.0, 9.6.11.2)

Operating Mode Notification frame for VHT STAs.
(IEEE P802.11-REVme/D4.0, 9.6.22.4)

Usage: hostapd_cli notify_cw_change <channel_width>
<channel_width> = 0 - 20 MHz, 1 - 40 MHz, 2 - 80 MHz, 3 - 160 MHz.

Co-developed-by: Bhagavathi Perumal S <quic_bperumal@quicinc.com>
Signed-off-by: Bhagavathi Perumal S <quic_bperumal@quicinc.com>
Signed-off-by: Vignesh C <quic_vignc@quicinc.com>
21 months agotests: Mesh BSS on 5 GHz band channel 140
Jouni Malinen [Fri, 3 Nov 2023 14:03:34 +0000 (16:03 +0200)] 
tests: Mesh BSS on 5 GHz band channel 140

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agowpa_supplicant: Add channel 140 to ht40plus allowed list for mesh/IBSS
Ramya Gnanasekar [Fri, 3 Nov 2023 11:16:17 +0000 (16:46 +0530)] 
wpa_supplicant: Add channel 140 to ht40plus allowed list for mesh/IBSS

When channel 140 is configured in mesh, interface fails to come up due
to channel bond (136,140). Since Channel 136 is not HT40+ capable,
validation for HT channel bonding fails when it checks whether first
channel in the bond (channel 136) is HT40+ capable.

In mesh, during channel setup, secondary channel offset for the
configured channel will be selected as +1 if primary channel is capable
of HT40+. In current code, channel 140 is not allowed as HT40+ and hence
secondary channel offset is selected as -1, which makes 136 as secondary
channel. But channel 136 is not HT40+ supported and fails in channel
bonding validation.

Add 140 to HT40+ allowed list as HT40+ is supported for the channel.

Signed-off-by: Ramya Gnanasekar <quic_rgnanase@quicinc.com>
21 months agoOWE: Fix for entry->ssid possibly NULL dereference
Hu Wang [Thu, 2 Nov 2023 07:11:09 +0000 (00:11 -0700)] 
OWE: Fix for entry->ssid possibly NULL dereference

Pointer entry->ssid might be passed to owe_trans_ssid_match() function
as argument 3 with NULL value, and it may be dereferenced there. This
looks like a theoretical case that would not be reached in practice, but
anyway, it is better to check entry->ssid != NULL more consistently.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoOnly advertise MSCS and SCS in Association Request if supported by AP
Sebastian Priebe [Wed, 26 Apr 2023 13:22:02 +0000 (13:22 +0000)] 
Only advertise MSCS and SCS in Association Request if supported by AP

Since wpa_supplicant version 2.10 the extended capabilities MSCS and SCS
are advertised in the (Re)Association Request frames.

This causes the association request to be rejected by several access
points. Issue was observed with:
- D-Link DIR600
- TP-Link AC1900
- Synology MR2200ac

To avoid this issue the extended capabilities MSCS and SCS shall only be
added if the bss also supports them. While this may not follow the exact
behavior described in IEEE 802.11, this is a reasonable compromise to
avoid interoperability issues since these capabilities cannot be used
with an AP that does not support them anyway.

Note: The Extended Capabilities element is only included in the
Association Request frames if the AP also sent its extended capabilities
(see wpas_populate_assoc_ies()) as a workaround for misbehaving APs.
This workaround exists since version 2.1.

Signed-off-by: Sebastian Priebe <sebastian.priebe@konplan.com>
21 months agoReduce delay between Association Request and Association Response
Jurijs Soloveckis [Fri, 3 Nov 2023 08:14:24 +0000 (08:14 +0000)] 
Reduce delay between Association Request and Association Response

There is a delay between sending Association Response frame after having
received Association Request frame, due to the fact that between
receiving the request and sending the response the Beacon frame contents
is updated, after analyzing inputs from the STA. There may be several
updates if multiple fields need to change. This can cause issues with
some devices in noisy environments with many BSSs and connected STAs.

Optimize this by updating the beacon only once, even if there are
multiple reasons for updates.

Signed-off-by: Jurijs Soloveckis <jsoloveckis@maxlinear.com>
21 months agoCheck max number of TBTT info when adding Neighbor AP Information field
Allen.Ye [Thu, 2 Nov 2023 11:53:11 +0000 (19:53 +0800)] 
Check max number of TBTT info when adding Neighbor AP Information field

If the number of TBTT info is greater than RNR_TBTT_INFO_COUNT_MAX, the
new Neighbor AP Information field would need to be added in the RNR
element. However, the condition of adding Neighbor AP Information field
does not consider number of TBTT info. That would cause invalid Neighbor
AP Information field (the while loop will fill data by eid pointer) when
setting RNR element.

Signed-off-by: Allen.Ye <allen.ye@mediatek.com>
21 months agohostapd: Avoid unnecessary Beacon frame update for co-location
Michael-CY Lee [Wed, 1 Nov 2023 09:00:00 +0000 (17:00 +0800)] 
hostapd: Avoid unnecessary Beacon frame update for co-location

When it comes to set some BSS's beacon, there are two reasons to
update the beacon of co-located hostapd_iface(s) at the same time:
1. 6 GHz out-of-band discovery
2. MLD operational parameters update

BSS load update is unrelated with the above two reasons, and therefore
is not the case to update beacon for co-location. Moreover, updating
beacon for co-location when BSS load update makes hostapd set beacon too
frequently, which makes hostapd busy setting beacon in a multi-BSS case.

Add a new function to update beacon only for current BSS and use the
function during BSS load update.

Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com>
Signed-off-by: Money Wang <money.wang@mediatek.com>
21 months agoAdd DSSS Parameter Set element only for 2.4 GHz
Jurijs Soloveckis [Wed, 1 Nov 2023 11:11:03 +0000 (11:11 +0000)] 
Add DSSS Parameter Set element only for 2.4 GHz

From IEEE 802.11:
The DSSS Parameter Set element is present within Beacon frames
generated by STAs using Clause 15, Clause 16, and Clause 18
PHYs.
The element is present within Beacon frames generated by STAs
using a Clause 19 PHY in the 2.4 GHz band.

Same is applied to the Probe Response frame.

Do not include the DSSS Parameters Set element when operating on other
bands.

Signed-off-by: Jurijs Soloveckis <jsoloveckis@maxlinear.com>
21 months agocommon: Fix ieee802_11_rsnx_capab()
Daniel Gabay [Thu, 2 Nov 2023 13:21:52 +0000 (15:21 +0200)] 
common: Fix ieee802_11_rsnx_capab()

The function should return bool (0/1) and not int. In some environments
bool may be defined as unsigned char, so bits higher then 7 will be
discarded during the downcast. Fix it.

Signed-off-by: Daniel Gabay <daniel.gabay@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agotests: Work around race condition for TRANSITION-DISABLE processing
Jouni Malinen [Thu, 2 Nov 2023 13:57:39 +0000 (15:57 +0200)] 
tests: Work around race condition for TRANSITION-DISABLE processing

This event may be sent before CTRL-EVENT-CONNECTED, so modify the test
cases to wait directly for TRANSITION-DISABLE by skipping the separate
wait for CTRL-EVENT-CONNECTED.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Fix sigma_dut interaction with multiple status lines
Jouni Malinen [Thu, 2 Nov 2023 13:54:29 +0000 (15:54 +0200)] 
tests: Fix sigma_dut interaction with multiple status lines

It is possible for the sigma_dut process to be scheduled in a manner
that ends up combining the status,RUNNING and status,COMPLETE lines into
a single TCP message. This was supposed to be handled in the
sigma_dut_cmd() implementations, but that design had been broken by code
refactoring that changed the indentation level incorrectly.

Fixes: d68946d510e5 ("tests: sigma_dut and DPP push button first on Enrollee")
Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotest: Beacon protection and unicast Beacon frame
Jouni Malinen [Thu, 2 Nov 2023 13:31:32 +0000 (15:31 +0200)] 
test: Beacon protection and unicast Beacon frame

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)
Jouni Malinen [Tue, 31 Oct 2023 14:07:36 +0000 (16:07 +0200)] 
tests: HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMBSSID: Check xrates_supported for all BSSs explicitly
Jouni Malinen [Tue, 31 Oct 2023 13:52:42 +0000 (15:52 +0200)] 
MBSSID: Check xrates_supported for all BSSs explicitly

This is needed to avoid generating an nontransmitted BSS profile that
would claim the Extended Rates element to be non-inherited.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMBSSID: Fix Non-Inheritance element encoding
Jouni Malinen [Tue, 31 Oct 2023 13:51:30 +0000 (15:51 +0200)] 
MBSSID: Fix Non-Inheritance element encoding

The List of Element ID Extensions field is not an optional field, so
include it in the Non-Inheritance element with Length=0 to indicate that
there is no Element ID Extension List.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoScan 6 GHz channels after change to 6 GHz-allowed regdom
Matthew Wang [Fri, 2 Jun 2023 22:15:11 +0000 (15:15 -0700)] 
Scan 6 GHz channels after change to 6 GHz-allowed regdom

Drivers will often report regdom changes in the middle of a scan if they
detect during that scan that the regulatory domain has changed. If this
happens and we enter a regdom that supports 6 GHz channels when the
previous one didn't (this often happens in 6 GHz-capable regdoms for
devices after suspend/resume), immediately trigger a 6 GHz-only scan if
we were not able to connect to an AP on a legacy band.

This should significantly improve connection time to 6 GHz AP after
regdom has been reset.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agoParse 6 GHz capability from driver capabilities
Matthew Wang [Fri, 2 Jun 2023 22:15:10 +0000 (15:15 -0700)] 
Parse 6 GHz capability from driver capabilities

Store 6 GHz capability on channel list update for wpa_supplicant use.
This will be used in the next commit to extend scanning behavior based
on changes to 6 GHz channel availability.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agonl80211: Fix uses_6ghz flag
Matthew Wang [Fri, 2 Jun 2023 22:15:09 +0000 (15:15 -0700)] 
nl80211: Fix uses_6ghz flag

Presence of any 6ghz channels indicates nl80211 driver 6 GHz support,
not non-DISABLED channels. This increases the timeout for scan
completion for cases where 6 GHz might get scanned even if all the
channel there are currently DISABLED.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agoUse default IEs in wpa_supplicant_trigger_scan()
Matthew Wang [Fri, 2 Jun 2023 22:15:08 +0000 (15:15 -0700)] 
Use default IEs in wpa_supplicant_trigger_scan()

wpa_supplicant_trigger_scan() previously wouldn't include any of the IEs
generated by wpa_supplicant_extra_ies(). Instruct it to do so in most
cases. This is necessary because MBO STAs are required to include MBO
capabilities in their Probe Request frames.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agotests: rrm_beacon_req_active_scan_fail to allow implementation change
Jouni Malinen [Tue, 31 Oct 2023 10:00:22 +0000 (12:00 +0200)] 
tests: rrm_beacon_req_active_scan_fail to allow implementation change

Use more specific condition for the allocation failure to allow
wpa_supplicant_trigger_scan() implementation to be modified without
making this test case fail.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Redesign bgscan_*_scan_failure to work with implementation change
Jouni Malinen [Tue, 31 Oct 2023 09:54:40 +0000 (11:54 +0200)] 
tests: Redesign bgscan_*_scan_failure to work with implementation change

Wait for allocation failure using wait_fail_trigger() instead of waiting
for a scan failure event since that failure event will go away with
implementation change.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: WPA3/GCMP-256 connection at Suite B 192-bit level and OKC
Jouni Malinen [Mon, 30 Oct 2023 17:53:18 +0000 (19:53 +0200)] 
tests: WPA3/GCMP-256 connection at Suite B 192-bit level and OKC

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoOKC with Suite B AKMPs in hostapd
Jouni Malinen [Mon, 30 Oct 2023 17:52:06 +0000 (19:52 +0200)] 
OKC with Suite B AKMPs in hostapd

To support Opportunistic Key Caching for Suite B key management, KCK
needs to be stored on PMKSA to derive the new PMKID correctly when
processing reassociation from a STA to a new AP.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoOKC with Suite B AKMPs in wpa_supplicant
Vinoth V [Fri, 28 Apr 2023 04:37:39 +0000 (10:07 +0530)] 
OKC with Suite B AKMPs in wpa_supplicant

To support Opportunistic Key Caching for Suite B key management, KCK
needs to be stored on PMKSA to derive the new PMKID correctly for the
new roaming AP.

Signed-off-by: Vinoth V <vinoth117@gmail.com>
21 months agoP2P: Pass the known BSSID to the driver to optimize scan time
Qiwei Cai [Mon, 29 May 2023 05:11:06 +0000 (13:11 +0800)] 
P2P: Pass the known BSSID to the driver to optimize scan time

After GO negotiation is completed, the P2P Client needs to scan the GO
before connecting. Only SSID was specified for this and the driver still
might need to scan all channels which wastes time. wpa_supplicant can
pass the known BSSID in the scan request in additional P2P cases and
this allows the driver sto stop the scan once the specific BSSID is
found. This helps reduce some time for P2P connection.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agonl80211: Skip interface down/up when setting MAC address
Hu Wang [Thu, 26 Oct 2023 08:51:38 +0000 (01:51 -0700)] 
nl80211: Skip interface down/up when setting MAC address

A driver may not support setting MAC address when interface is UP, so
wpa_supplicant used to always sets the interface down for MAC address
change.

Try to change the address first without setting the interface down and
then fall back to DOWN/set addr/UP if the first attempt failed. This can
reduce the interface setup time for time-critical use cases.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoEnable IPv6 in wpa_supplicant and eapol_test builds
Stefan Paetow [Fri, 2 Jun 2023 01:24:18 +0000 (02:24 +0100)] 
Enable IPv6 in wpa_supplicant and eapol_test builds

eapol_test needs this for RADIUS and wpa_supplicant can use this with
DPP over TCP.

Signed-off-by: Stefan Paetow (OpenSource) <oss@eons.net>
21 months agodbus: Use proper dbus_bool_t value TRUE instead of 1
Jouni Malinen [Sun, 29 Oct 2023 15:46:46 +0000 (17:46 +0200)] 
dbus: Use proper dbus_bool_t value TRUE instead of 1

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agodbus: Add NonColoc6GHz and 6GHzOnly flags in wpa_supplicant scan
Kaidong Wang [Tue, 10 Oct 2023 19:52:02 +0000 (19:52 +0000)] 
dbus: Add NonColoc6GHz and 6GHzOnly flags in wpa_supplicant scan

Handler function for "Scan" method call of a network device doesn't set
non_coloc_6ghz, therefore wpa_supplicant doesn't scan non-PSC channels
on 6GHz band only if a co-located AP was reported on the channel.

Add NonColoc6GHz and 6GHzOnly flags to the wpas_dbus_handler_scan, so
that dBus scan requests can cover non-PSC channels and scan only 6 GHz
channels.

Signed-off-by: Kaidong Wang <kaidong@chromium.org>
21 months agoSME: MLD: Handle reconfiguration Multi-Link element
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:50 +0000 (22:59 +0300)] 
SME: MLD: Handle reconfiguration Multi-Link element

Parse the reconfiguration Multi-Link element and:

- Don't select a BSS for connection if it is part of an MLD
  and is going to be removed.
- Don't scan for missing links that are to be removed.
- Don't include removed links in association.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agotests: AP MLD with two links and non-AP MLD sending ML Probe Request
Jouni Malinen [Sun, 29 Oct 2023 14:02:11 +0000 (16:02 +0200)] 
tests: AP MLD with two links and non-AP MLD sending ML Probe Request

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoTest command for sending ML probe request
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:49 +0000 (22:59 +0300)] 
Test command for sending ML probe request

Add a control interface to trigger ML probes for testing purposes.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agowpa_supplicant: Support ML probe request
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:49 +0000 (22:59 +0300)] 
wpa_supplicant: Support ML probe request

Add support for building and sending ML probe requests. During connect,
try to send an ML probe request if we are going to connect to an MLD AP
and the BSS information for some of the links is missing.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agonl80211: Add support for minimal probe request content
Ilan Peer [Mon, 12 Jun 2023 19:59:48 +0000 (22:59 +0300)] 
nl80211: Add support for minimal probe request content

Extend 'struct wpa_driver_scan_params' to allow higher layer to indicate
if minimal probe request content should be included by the driver as part
of the scan logic.

Implement this with driver_nl80211, by setting
NL80211_SCAN_FLAG_MIN_PREQ_CONTENT.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
21 months agohostapd: Output BSS Color (he_bss_color) when using STATUS
Antonio Prcela [Tue, 13 Jun 2023 14:20:29 +0000 (16:20 +0200)] 
hostapd: Output BSS Color (he_bss_color) when using STATUS

Make the current HE BSS color available in STATUS command output since
this can change dynamically based on color collisions.

Signed-off-by: Antonio Prcela <antonio.prcela@gmail.com>
Signed-off-by: Antonio Prcela <antonio.prcela@sartura.hr>
21 months agoMore consistent use of mesh peer connected/disconnected notification
Jouni Malinen [Sun, 29 Oct 2023 08:49:43 +0000 (10:49 +0200)] 
More consistent use of mesh peer connected/disconnected notification

Use the wpas_notify_mesh_peer_*() functions for sending the control
interface events in addition to the D-Bus events so that these are all
done consistently.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoFix MESH-PEER-DISCONNECTED message logic on control iface
Nicolas Escande [Fri, 7 Jul 2023 13:37:18 +0000 (15:37 +0200)] 
Fix MESH-PEER-DISCONNECTED message logic on control iface

When using mesh we have incoherent
MESH-PEER-CONNECTED/MESH-PEER-DISCONNECTED messages when we restart one
of the devices without disconnecting it first. Sometimes we have the
right behavior, a peer disconnect and then a peer connect, sometimes we
only have a a peer connected without a peer disconnected first, and
sometimes we have nothing at all.

As the plink count seem to be correctly tracked and because we only send
the connected event on plink count increase, lets send the peer
disconnected event on plink count decrease.

Signed-off-by: Nicolas Escande <nico.escande@gmail.com>
21 months agoRespect disable_ht40/disable_vht/disable_he in AP/mesh mode
Nicolas Escande [Wed, 28 Jun 2023 12:17:04 +0000 (14:17 +0200)] 
Respect disable_ht40/disable_vht/disable_he in AP/mesh mode

When using wpa_supplicant to connect to a mesh network or to create an
AP, the current code doesn't respect all CONFIG_XXX_OVERRIDES network
parameters, just disable_ht in CONFIG_HT_OVERRIDES.

Add support for some of the others modulation related disable flags:
 - disable_ht40 with CONFIG_HT_OVERRIDES
 - disable_vht with CONFIG_VHT_OVERRIDES
 - disable_he with CONFIG_HE_OVERRIDES

Signed-off-by: Nicolas Escande <nico.escande@gmail.com>
21 months agonl80211: Change QoS Map configuration to be per bss, not radio
Eran Gonen [Sun, 30 Jul 2023 06:46:01 +0000 (06:46 +0000)] 
nl80211: Change QoS Map configuration to be per bss, not radio

Previously the NL80211_CMD_SET_QOS_MAP command was sent to the radio
interface. Send this command using nl80211_cmd_msg() and the bss,
instead of drv.

Signed-off-by: Arnon Meydav <ameydav@maxlinear.com>