]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
21 months agoReduce delay between Association Request and Association Response
Jurijs Soloveckis [Fri, 3 Nov 2023 08:14:24 +0000 (08:14 +0000)] 
Reduce delay between Association Request and Association Response

There is a delay between sending Association Response frame after having
received Association Request frame, due to the fact that between
receiving the request and sending the response the Beacon frame contents
is updated, after analyzing inputs from the STA. There may be several
updates if multiple fields need to change. This can cause issues with
some devices in noisy environments with many BSSs and connected STAs.

Optimize this by updating the beacon only once, even if there are
multiple reasons for updates.

Signed-off-by: Jurijs Soloveckis <jsoloveckis@maxlinear.com>
21 months agoCheck max number of TBTT info when adding Neighbor AP Information field
Allen.Ye [Thu, 2 Nov 2023 11:53:11 +0000 (19:53 +0800)] 
Check max number of TBTT info when adding Neighbor AP Information field

If the number of TBTT info is greater than RNR_TBTT_INFO_COUNT_MAX, the
new Neighbor AP Information field would need to be added in the RNR
element. However, the condition of adding Neighbor AP Information field
does not consider number of TBTT info. That would cause invalid Neighbor
AP Information field (the while loop will fill data by eid pointer) when
setting RNR element.

Signed-off-by: Allen.Ye <allen.ye@mediatek.com>
21 months agohostapd: Avoid unnecessary Beacon frame update for co-location
Michael-CY Lee [Wed, 1 Nov 2023 09:00:00 +0000 (17:00 +0800)] 
hostapd: Avoid unnecessary Beacon frame update for co-location

When it comes to set some BSS's beacon, there are two reasons to
update the beacon of co-located hostapd_iface(s) at the same time:
1. 6 GHz out-of-band discovery
2. MLD operational parameters update

BSS load update is unrelated with the above two reasons, and therefore
is not the case to update beacon for co-location. Moreover, updating
beacon for co-location when BSS load update makes hostapd set beacon too
frequently, which makes hostapd busy setting beacon in a multi-BSS case.

Add a new function to update beacon only for current BSS and use the
function during BSS load update.

Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com>
Signed-off-by: Money Wang <money.wang@mediatek.com>
21 months agoAdd DSSS Parameter Set element only for 2.4 GHz
Jurijs Soloveckis [Wed, 1 Nov 2023 11:11:03 +0000 (11:11 +0000)] 
Add DSSS Parameter Set element only for 2.4 GHz

From IEEE 802.11:
The DSSS Parameter Set element is present within Beacon frames
generated by STAs using Clause 15, Clause 16, and Clause 18
PHYs.
The element is present within Beacon frames generated by STAs
using a Clause 19 PHY in the 2.4 GHz band.

Same is applied to the Probe Response frame.

Do not include the DSSS Parameters Set element when operating on other
bands.

Signed-off-by: Jurijs Soloveckis <jsoloveckis@maxlinear.com>
21 months agocommon: Fix ieee802_11_rsnx_capab()
Daniel Gabay [Thu, 2 Nov 2023 13:21:52 +0000 (15:21 +0200)] 
common: Fix ieee802_11_rsnx_capab()

The function should return bool (0/1) and not int. In some environments
bool may be defined as unsigned char, so bits higher then 7 will be
discarded during the downcast. Fix it.

Signed-off-by: Daniel Gabay <daniel.gabay@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agotests: Work around race condition for TRANSITION-DISABLE processing
Jouni Malinen [Thu, 2 Nov 2023 13:57:39 +0000 (15:57 +0200)] 
tests: Work around race condition for TRANSITION-DISABLE processing

This event may be sent before CTRL-EVENT-CONNECTED, so modify the test
cases to wait directly for TRANSITION-DISABLE by skipping the separate
wait for CTRL-EVENT-CONNECTED.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Fix sigma_dut interaction with multiple status lines
Jouni Malinen [Thu, 2 Nov 2023 13:54:29 +0000 (15:54 +0200)] 
tests: Fix sigma_dut interaction with multiple status lines

It is possible for the sigma_dut process to be scheduled in a manner
that ends up combining the status,RUNNING and status,COMPLETE lines into
a single TCP message. This was supposed to be handled in the
sigma_dut_cmd() implementations, but that design had been broken by code
refactoring that changed the indentation level incorrectly.

Fixes: d68946d510e5 ("tests: sigma_dut and DPP push button first on Enrollee")
Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotest: Beacon protection and unicast Beacon frame
Jouni Malinen [Thu, 2 Nov 2023 13:31:32 +0000 (15:31 +0200)] 
test: Beacon protection and unicast Beacon frame

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)
Jouni Malinen [Tue, 31 Oct 2023 14:07:36 +0000 (16:07 +0200)] 
tests: HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMBSSID: Check xrates_supported for all BSSs explicitly
Jouni Malinen [Tue, 31 Oct 2023 13:52:42 +0000 (15:52 +0200)] 
MBSSID: Check xrates_supported for all BSSs explicitly

This is needed to avoid generating an nontransmitted BSS profile that
would claim the Extended Rates element to be non-inherited.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoMBSSID: Fix Non-Inheritance element encoding
Jouni Malinen [Tue, 31 Oct 2023 13:51:30 +0000 (15:51 +0200)] 
MBSSID: Fix Non-Inheritance element encoding

The List of Element ID Extensions field is not an optional field, so
include it in the Non-Inheritance element with Length=0 to indicate that
there is no Element ID Extension List.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoScan 6 GHz channels after change to 6 GHz-allowed regdom
Matthew Wang [Fri, 2 Jun 2023 22:15:11 +0000 (15:15 -0700)] 
Scan 6 GHz channels after change to 6 GHz-allowed regdom

Drivers will often report regdom changes in the middle of a scan if they
detect during that scan that the regulatory domain has changed. If this
happens and we enter a regdom that supports 6 GHz channels when the
previous one didn't (this often happens in 6 GHz-capable regdoms for
devices after suspend/resume), immediately trigger a 6 GHz-only scan if
we were not able to connect to an AP on a legacy band.

This should significantly improve connection time to 6 GHz AP after
regdom has been reset.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agoParse 6 GHz capability from driver capabilities
Matthew Wang [Fri, 2 Jun 2023 22:15:10 +0000 (15:15 -0700)] 
Parse 6 GHz capability from driver capabilities

Store 6 GHz capability on channel list update for wpa_supplicant use.
This will be used in the next commit to extend scanning behavior based
on changes to 6 GHz channel availability.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agonl80211: Fix uses_6ghz flag
Matthew Wang [Fri, 2 Jun 2023 22:15:09 +0000 (15:15 -0700)] 
nl80211: Fix uses_6ghz flag

Presence of any 6ghz channels indicates nl80211 driver 6 GHz support,
not non-DISABLED channels. This increases the timeout for scan
completion for cases where 6 GHz might get scanned even if all the
channel there are currently DISABLED.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agoUse default IEs in wpa_supplicant_trigger_scan()
Matthew Wang [Fri, 2 Jun 2023 22:15:08 +0000 (15:15 -0700)] 
Use default IEs in wpa_supplicant_trigger_scan()

wpa_supplicant_trigger_scan() previously wouldn't include any of the IEs
generated by wpa_supplicant_extra_ies(). Instruct it to do so in most
cases. This is necessary because MBO STAs are required to include MBO
capabilities in their Probe Request frames.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
21 months agotests: rrm_beacon_req_active_scan_fail to allow implementation change
Jouni Malinen [Tue, 31 Oct 2023 10:00:22 +0000 (12:00 +0200)] 
tests: rrm_beacon_req_active_scan_fail to allow implementation change

Use more specific condition for the allocation failure to allow
wpa_supplicant_trigger_scan() implementation to be modified without
making this test case fail.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Redesign bgscan_*_scan_failure to work with implementation change
Jouni Malinen [Tue, 31 Oct 2023 09:54:40 +0000 (11:54 +0200)] 
tests: Redesign bgscan_*_scan_failure to work with implementation change

Wait for allocation failure using wait_fail_trigger() instead of waiting
for a scan failure event since that failure event will go away with
implementation change.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: WPA3/GCMP-256 connection at Suite B 192-bit level and OKC
Jouni Malinen [Mon, 30 Oct 2023 17:53:18 +0000 (19:53 +0200)] 
tests: WPA3/GCMP-256 connection at Suite B 192-bit level and OKC

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoOKC with Suite B AKMPs in hostapd
Jouni Malinen [Mon, 30 Oct 2023 17:52:06 +0000 (19:52 +0200)] 
OKC with Suite B AKMPs in hostapd

To support Opportunistic Key Caching for Suite B key management, KCK
needs to be stored on PMKSA to derive the new PMKID correctly when
processing reassociation from a STA to a new AP.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoOKC with Suite B AKMPs in wpa_supplicant
Vinoth V [Fri, 28 Apr 2023 04:37:39 +0000 (10:07 +0530)] 
OKC with Suite B AKMPs in wpa_supplicant

To support Opportunistic Key Caching for Suite B key management, KCK
needs to be stored on PMKSA to derive the new PMKID correctly for the
new roaming AP.

Signed-off-by: Vinoth V <vinoth117@gmail.com>
21 months agoP2P: Pass the known BSSID to the driver to optimize scan time
Qiwei Cai [Mon, 29 May 2023 05:11:06 +0000 (13:11 +0800)] 
P2P: Pass the known BSSID to the driver to optimize scan time

After GO negotiation is completed, the P2P Client needs to scan the GO
before connecting. Only SSID was specified for this and the driver still
might need to scan all channels which wastes time. wpa_supplicant can
pass the known BSSID in the scan request in additional P2P cases and
this allows the driver sto stop the scan once the specific BSSID is
found. This helps reduce some time for P2P connection.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agonl80211: Skip interface down/up when setting MAC address
Hu Wang [Thu, 26 Oct 2023 08:51:38 +0000 (01:51 -0700)] 
nl80211: Skip interface down/up when setting MAC address

A driver may not support setting MAC address when interface is UP, so
wpa_supplicant used to always sets the interface down for MAC address
change.

Try to change the address first without setting the interface down and
then fall back to DOWN/set addr/UP if the first attempt failed. This can
reduce the interface setup time for time-critical use cases.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoEnable IPv6 in wpa_supplicant and eapol_test builds
Stefan Paetow [Fri, 2 Jun 2023 01:24:18 +0000 (02:24 +0100)] 
Enable IPv6 in wpa_supplicant and eapol_test builds

eapol_test needs this for RADIUS and wpa_supplicant can use this with
DPP over TCP.

Signed-off-by: Stefan Paetow (OpenSource) <oss@eons.net>
21 months agodbus: Use proper dbus_bool_t value TRUE instead of 1
Jouni Malinen [Sun, 29 Oct 2023 15:46:46 +0000 (17:46 +0200)] 
dbus: Use proper dbus_bool_t value TRUE instead of 1

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agodbus: Add NonColoc6GHz and 6GHzOnly flags in wpa_supplicant scan
Kaidong Wang [Tue, 10 Oct 2023 19:52:02 +0000 (19:52 +0000)] 
dbus: Add NonColoc6GHz and 6GHzOnly flags in wpa_supplicant scan

Handler function for "Scan" method call of a network device doesn't set
non_coloc_6ghz, therefore wpa_supplicant doesn't scan non-PSC channels
on 6GHz band only if a co-located AP was reported on the channel.

Add NonColoc6GHz and 6GHzOnly flags to the wpas_dbus_handler_scan, so
that dBus scan requests can cover non-PSC channels and scan only 6 GHz
channels.

Signed-off-by: Kaidong Wang <kaidong@chromium.org>
21 months agoSME: MLD: Handle reconfiguration Multi-Link element
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:50 +0000 (22:59 +0300)] 
SME: MLD: Handle reconfiguration Multi-Link element

Parse the reconfiguration Multi-Link element and:

- Don't select a BSS for connection if it is part of an MLD
  and is going to be removed.
- Don't scan for missing links that are to be removed.
- Don't include removed links in association.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agotests: AP MLD with two links and non-AP MLD sending ML Probe Request
Jouni Malinen [Sun, 29 Oct 2023 14:02:11 +0000 (16:02 +0200)] 
tests: AP MLD with two links and non-AP MLD sending ML Probe Request

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoTest command for sending ML probe request
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:49 +0000 (22:59 +0300)] 
Test command for sending ML probe request

Add a control interface to trigger ML probes for testing purposes.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agowpa_supplicant: Support ML probe request
Andrei Otcheretianski [Mon, 12 Jun 2023 19:59:49 +0000 (22:59 +0300)] 
wpa_supplicant: Support ML probe request

Add support for building and sending ML probe requests. During connect,
try to send an ML probe request if we are going to connect to an MLD AP
and the BSS information for some of the links is missing.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
Signed-off-by: Ilan Peer <ilan.peer@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
21 months agonl80211: Add support for minimal probe request content
Ilan Peer [Mon, 12 Jun 2023 19:59:48 +0000 (22:59 +0300)] 
nl80211: Add support for minimal probe request content

Extend 'struct wpa_driver_scan_params' to allow higher layer to indicate
if minimal probe request content should be included by the driver as part
of the scan logic.

Implement this with driver_nl80211, by setting
NL80211_SCAN_FLAG_MIN_PREQ_CONTENT.

Signed-off-by: Ilan Peer <ilan.peer@intel.com>
21 months agohostapd: Output BSS Color (he_bss_color) when using STATUS
Antonio Prcela [Tue, 13 Jun 2023 14:20:29 +0000 (16:20 +0200)] 
hostapd: Output BSS Color (he_bss_color) when using STATUS

Make the current HE BSS color available in STATUS command output since
this can change dynamically based on color collisions.

Signed-off-by: Antonio Prcela <antonio.prcela@gmail.com>
Signed-off-by: Antonio Prcela <antonio.prcela@sartura.hr>
21 months agoMore consistent use of mesh peer connected/disconnected notification
Jouni Malinen [Sun, 29 Oct 2023 08:49:43 +0000 (10:49 +0200)] 
More consistent use of mesh peer connected/disconnected notification

Use the wpas_notify_mesh_peer_*() functions for sending the control
interface events in addition to the D-Bus events so that these are all
done consistently.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoFix MESH-PEER-DISCONNECTED message logic on control iface
Nicolas Escande [Fri, 7 Jul 2023 13:37:18 +0000 (15:37 +0200)] 
Fix MESH-PEER-DISCONNECTED message logic on control iface

When using mesh we have incoherent
MESH-PEER-CONNECTED/MESH-PEER-DISCONNECTED messages when we restart one
of the devices without disconnecting it first. Sometimes we have the
right behavior, a peer disconnect and then a peer connect, sometimes we
only have a a peer connected without a peer disconnected first, and
sometimes we have nothing at all.

As the plink count seem to be correctly tracked and because we only send
the connected event on plink count increase, lets send the peer
disconnected event on plink count decrease.

Signed-off-by: Nicolas Escande <nico.escande@gmail.com>
21 months agoRespect disable_ht40/disable_vht/disable_he in AP/mesh mode
Nicolas Escande [Wed, 28 Jun 2023 12:17:04 +0000 (14:17 +0200)] 
Respect disable_ht40/disable_vht/disable_he in AP/mesh mode

When using wpa_supplicant to connect to a mesh network or to create an
AP, the current code doesn't respect all CONFIG_XXX_OVERRIDES network
parameters, just disable_ht in CONFIG_HT_OVERRIDES.

Add support for some of the others modulation related disable flags:
 - disable_ht40 with CONFIG_HT_OVERRIDES
 - disable_vht with CONFIG_VHT_OVERRIDES
 - disable_he with CONFIG_HE_OVERRIDES

Signed-off-by: Nicolas Escande <nico.escande@gmail.com>
21 months agonl80211: Change QoS Map configuration to be per bss, not radio
Eran Gonen [Sun, 30 Jul 2023 06:46:01 +0000 (06:46 +0000)] 
nl80211: Change QoS Map configuration to be per bss, not radio

Previously the NL80211_CMD_SET_QOS_MAP command was sent to the radio
interface. Send this command using nl80211_cmd_msg() and the bss,
instead of drv.

Signed-off-by: Arnon Meydav <ameydav@maxlinear.com>
21 months agoWNM: Choose the best available BSS, not just the first one
Ben Greear [Thu, 27 Jul 2023 16:02:11 +0000 (09:02 -0700)] 
WNM: Choose the best available BSS, not just the first one

This should allow STA to make better choice about which BSS to roam to.

Use estimated throughput as comparison value. Can improve the estimated
throughput calculation to improve this selection criteria if wanted in
the future.

Signed-off-by: Ben Greear <greearb@candelatech.com>
21 months agoSync with wireless-next.git include/uapi/linux/nl80211.h
Jouni Malinen [Sat, 28 Oct 2023 15:39:48 +0000 (18:39 +0300)] 
Sync with wireless-next.git include/uapi/linux/nl80211.h

This brings in nl80211 definitions as of 2023-10-23.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agodbus: Report guard interval and dual carrier modulation
David Ruth [Wed, 19 Jul 2023 17:29:15 +0000 (17:29 +0000)] 
dbus: Report guard interval and dual carrier modulation

Propagate guard interval as a double value and dual carrier modulation
as a boolean over D-Bus.

Signed-off-by: David Ruth <druth@chromium.org>
21 months agoAbort ongoing scan on DISCONNECT
Chaitanya Tata [Mon, 17 Jul 2023 19:51:37 +0000 (01:21 +0530)] 
Abort ongoing scan on DISCONNECT

Along with canceling queued scan, abort ongoing scan if any, this
ensures Wi-Fi interface is in usable state after disconnect is issued,
else subsequent scan after disconnect might fail with EBUSY.

Signed-off-by: Chaitanya Tata <Chaitanya.Tata@nordicsemi.no>
21 months agol2_packet_freebsd: Enable receiving priority tagged (VID=0) frames
R. Christian McDonald [Fri, 9 Jun 2023 16:27:12 +0000 (16:27 +0000)] 
l2_packet_freebsd: Enable receiving priority tagged (VID=0) frames

Certain internet service providers transmit VLAN 0 priority tagged
EAPOL frames from the ONT towards the residential gateway. VID 0
should be ignored, and the frame processed according to the priority
set in the 802.1P bits and the encapsulated EtherType (i.e., EAPOL).

The pcap filter utilized by l2_packet_* is inadquate for this use case.

Here we modify the pcap filter on FreeBSD to accept both unencapsulated
and encapsulated (with VLAN 0) EAPOL EtherTypes. This preserves the
original filter behavior while also matching on encapsulated EAPOL.

Additional work is required to support this handling on other platforms.

We also modify the rx_receive handler to offset the packet buffer
and length when handling dot1q encapsulated frames so the existing
packet parsing code works as-is.

Signed-off-by: R. Christian McDonald <rcm@rcm.sh>
Sponsored by: Rubicon Communications, LLC ("Netgate")

21 months agoWNM: Lower rankings of current AP if disassociation imminent bit set
Po-Hao Huang [Fri, 9 Jun 2023 09:26:43 +0000 (17:26 +0800)] 
WNM: Lower rankings of current AP if disassociation imminent bit set

If the current AP advertises disassociation imminent, move it to the
back of the candidate list so we don't select it again while other
candidates are available.

Signed-off-by: Po-Hao Huang <phhuang@realtek.com>
21 months agoP2P: Remove pending p2p-listen radio work on stopping listen
Jouni Malinen [Sat, 28 Oct 2023 14:23:25 +0000 (17:23 +0300)] 
P2P: Remove pending p2p-listen radio work on stopping listen

Some kind of race condition seemed to be hit at least in test sequence
"p2p_ext_vendor_elem_invitation pasn_comeback_after_0_sae" where the P2P
invitation response could have been received just after having scheduled
a new p2p-listen radio work, but before that work had been started. In
the case of accepted invitation, this could result in unnecessary extra
delay when that p2p-listen work ended up getting started at the exact
time that the local device was starting GO.

Avoid this race condition by removing the pending p2p-listen radio work
when P2P listen is stopped.

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agohostapd: Update op_class after AP channel switching
Michael-CY Lee [Fri, 25 Aug 2023 02:14:06 +0000 (10:14 +0800)] 
hostapd: Update op_class after AP channel switching

Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com>
21 months agoUse 6 GHz default noise when estimating 6 GHz SNR
Kaidong Wang [Mon, 28 Aug 2023 23:58:32 +0000 (23:58 +0000)] 
Use 6 GHz default noise when estimating 6 GHz SNR

wpa_supplicant underestimates 6 GHz SNR as it assumes 2 GHz default
noise in the estimation.

Use 6 GHz default noise when estimating 6 GHz SNR.

Signed-off-by: Kaidong Wang <kaidong@chromium.org>
21 months agoACS: Fix typo in bw_40 frequency array
Michael-CY Lee [Tue, 5 Sep 2023 01:43:25 +0000 (09:43 +0800)] 
ACS: Fix typo in bw_40 frequency array

The range for the 5 GHz channel 118 was encoded with an incorrect
channel number.

Fixes: ed8e13decc71 (ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan())
Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com>
21 months agotests: hwsim: Add more tracing
Johannes Berg [Mon, 25 Sep 2023 07:20:49 +0000 (09:20 +0200)] 
tests: hwsim: Add more tracing

Add SKB tracing (which shows now why/where a frame was dropped
in the stack), and also -T for stack trace at each event.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_mixed_security: Give AP time to set up stations
Johannes Berg [Mon, 25 Sep 2023 07:20:57 +0000 (09:20 +0200)] 
tests: ap_mixed_security: Give AP time to set up stations

Give the AP some time to set up stations fully (in the
kernel) so that traffic forwarding will work.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: GAS: Wait for STA before ANQP_GET
Johannes Berg [Mon, 25 Sep 2023 07:20:56 +0000 (09:20 +0200)] 
tests: GAS: Wait for STA before ANQP_GET

We can't do ANQP when the STA is connected but the AP hasn't fully set
up the STA yet, so wait on the AP side before continuing.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_open_poll_sta_no_ack: Fix mgmt-rx race
Johannes Berg [Mon, 25 Sep 2023 07:20:55 +0000 (09:20 +0200)] 
tests: ap_open_poll_sta_no_ack: Fix mgmt-rx race

We need to wait for the MGMT-RX event before disabling
ext_mgmt_frame_handling again, otherwise we might be disabling it and
hostapd only receives the deauth frame after we already disable it,
defeating the purpose of the test.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_pmf: Wait for STA appropriately
Johannes Berg [Mon, 25 Sep 2023 07:20:54 +0000 (09:20 +0200)] 
tests: ap_pmf: Wait for STA appropriately

With PMF, we cannot do even deauth unless we wait for the STA to have
fully connected on the AP side, the STA thinking it has isn't sufficient
since it immediately says so after M4. Add wait_sta() before disconnect,
and also before SA_QUERY.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: pmksa_cache: Wait for STA on AP side before query
Johannes Berg [Mon, 25 Sep 2023 07:20:53 +0000 (09:20 +0200)] 
tests: pmksa_cache: Wait for STA on AP side before query

Before querying the PMKSA cache, wait for the STA to have appeared on
the AP side, otherwise scheduling differences may have us asking when
the STA thinks it's connected but the AP hasn't fully processed that.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agoDon't disconnect on scan_freq update from control interface
Johannes Berg [Mon, 25 Sep 2023 07:20:52 +0000 (09:20 +0200)] 
Don't disconnect on scan_freq update from control interface

It doesn't make sense to disconnect on updates to the
network's scan_freq, and in fact doing so causes some
(timing-/scheduling-dependent) test failures.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_tdls: Wait before connectivity checks
Johannes Berg [Mon, 25 Sep 2023 07:20:51 +0000 (09:20 +0200)] 
tests: ap_tdls: Wait before connectivity checks

All processes need to have a bit of time to mark the kernel STAs
authorized, otherwise traffic may fail. Give them some time, and also
use check_connectivity() in connectivity() since it's the same check,
just different arguments.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: Blocked rekey: Give slightly more time
Johannes Berg [Mon, 25 Sep 2023 07:20:50 +0000 (09:20 +0200)] 
tests: Blocked rekey: Give slightly more time

Due to scheduling changes, we don't always now succeed to reconnect in
exactly 1 second, it might take 1.01. Give it 1.1 for a bit more leeway,
it's not clear why it should be exactly 1 second anyway.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_hs20: Add more wait_sta()
Johannes Berg [Mon, 25 Sep 2023 07:20:48 +0000 (09:20 +0200)] 
tests: ap_hs20: Add more wait_sta()

We should always wait_sta() so that we know we can even deauth next,
otherwise the key might not be installed yet by the time we try to
connect to the next AP.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: ap_hs20_connect_no_full_match: Add appropriate waits
Johannes Berg [Mon, 25 Sep 2023 07:20:47 +0000 (09:20 +0200)] 
tests: ap_hs20_connect_no_full_match: Add appropriate waits

We need to appropriately wait for the STA to connect/disconnect before
continuing with the test, add that.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: autogo_legacy: Wait for 4-way handshake
Johannes Berg [Mon, 25 Sep 2023 07:20:46 +0000 (09:20 +0200)] 
tests: autogo_legacy: Wait for 4-way handshake

We need to wait for the 4-way handshake to be completed on the GO side,
so the GO will actually have marked the station as authorized and will
forward packets.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: RRM: Wait for AP STA before requests to AP
Johannes Berg [Mon, 25 Sep 2023 07:20:45 +0000 (09:20 +0200)] 
tests: RRM: Wait for AP STA before requests to AP

Before requesting anything about the specific STA from the AP wait for
it to show up, so that things don't fail if the hostapd process didn't
yet get time to process things.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: PASN: Try get_ptksa() from AP a few times
Johannes Berg [Mon, 25 Sep 2023 07:20:44 +0000 (09:20 +0200)] 
tests: PASN: Try get_ptksa() from AP a few times

We wait for the PASN auth to complete on the wpas side, but there's no
indication of this on the AP side. So if scheduling ordering is bad, we
can ask the AP for the PTKSA cache before it even received the frame
from the kernel and created the PTKSA entry.

To fix this, try this a few times, to see if it becomes available.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: persistent_go_client_list: Ignore client order
Johannes Berg [Mon, 25 Sep 2023 07:20:43 +0000 (09:20 +0200)] 
tests: persistent_go_client_list: Ignore client order

Clients could connect in a different order depending on
timing differences, don't check for the order here.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: FT/RRM: Wait for STA before check_beacon_req()
Johannes Berg [Mon, 25 Sep 2023 07:20:42 +0000 (09:20 +0200)] 
tests: FT/RRM: Wait for STA before check_beacon_req()

check_beacon_req() will request from hostapd to request a beacon
report from the STA, but that only works if it already knows about
the STA. Due to scheduling issues, it may not know even if wpa_s
reports it has successfully connected, so also wait for the STA to
show up in hostapd before check_beacon_req().

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: Wait for radio work to start after DPP_LISTEN command
Johannes Berg [Mon, 25 Sep 2023 07:20:41 +0000 (09:20 +0200)] 
tests: Wait for radio work to start after DPP_LISTEN command

Since DPP listen is a radio work, it doesn't start immediately and
then we can end up missing whatever happens next in the test. Wait
for the radio work to start before continuing the test.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
21 months agotests: Multi-AP backhaul to backhaul+fronthaul BSS
Stefan Schake [Wed, 18 Oct 2023 09:21:38 +0000 (11:21 +0200)] 
tests: Multi-AP backhaul to backhaul+fronthaul BSS

Signed-off-by: Stefan Schake <stefan.schake@devolo.de>
21 months agoEnsure WDS is available on combined backhaul and fronthaul APs
Stefan Schake [Wed, 18 Oct 2023 09:21:38 +0000 (11:21 +0200)] 
Ensure WDS is available on combined backhaul and fronthaul APs

It is valid to configure an AP to be both backhaul and
fronthaul (multi_ap=3), so we should not test for a missing
fronthaul flag but instead test directly for backhaul capability.

Signed-off-by: Stefan Schake <stefan.schake@devolo.de>
21 months agodefconfig: Remove remaining reference to IEEE80211W symbol
Koen Vandeputte [Tue, 24 Oct 2023 12:16:13 +0000 (14:16 +0200)] 
defconfig: Remove remaining reference to IEEE80211W symbol

This symbol was removed in an earlier commit. Remove this leftover which
was forgotten then.

Fixes: 7d2ed8bae ("Remove CONFIG_IEEE80211W build parameter")
Signed-off-by: Koen Vandeputte <koen.vandeputte@citymesh.com>
21 months agotests: More thorough testing of PMF and need for association comeback
Jouni Malinen [Sat, 28 Oct 2023 08:34:35 +0000 (11:34 +0300)] 
tests: More thorough testing of PMF and need for association comeback

Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agoCheck the need for SA Query earlier in association processing
Jouni Malinen [Sat, 28 Oct 2023 08:31:42 +0000 (11:31 +0300)] 
Check the need for SA Query earlier in association processing

The way these checks were done for WPS enabled APs were unnecessarily
complex and missed one of the cases. Simplify this by doing the check
only once and do that earlier in the process to minimize changes to STA
state.

Fixes: a7f55f7f68f1 ("WPS: Enable SA Query checks for WPS AP")
Signed-off-by: Jouni Malinen <j@w1.fi>
21 months agotests: wpa_supplicant AP with all possible 20 MHz PRI for 80 MHz channel
Jouni Malinen [Fri, 27 Oct 2023 10:49:48 +0000 (13:49 +0300)] 
tests: wpa_supplicant AP with all possible 20 MHz PRI for 80 MHz channel

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoUpdate correct VHT/HE/EHT mode in channel switch event
Xinyue Ling [Thu, 8 Jun 2023 05:45:13 +0000 (13:45 +0800)] 
Update correct VHT/HE/EHT mode in channel switch event

Currently if ch_switch_vht_config is present, only ieee80211ac config
will be updated in hostapd_config and ieee80211ax/ieee80211be config may
be wrong. Fix this by adding handlings for ch_switch_he_config and
ch_switch_eht_config as well.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoAdd NULL check for pmksa cache free_cb() callback
Vinay Gannevaram [Wed, 11 Oct 2023 11:02:23 +0000 (16:32 +0530)] 
Add NULL check for pmksa cache free_cb() callback

free_cb can be NULL during the pmksa_cache_auth_init() from the modules
using libpasn.so. So check it explicitly before dereferencing.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: VHT80 and channel 161
Jouni Malinen [Thu, 26 Oct 2023 10:52:54 +0000 (13:52 +0300)] 
tests: VHT80 and channel 161

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: EHT+MLO AP with SAE and transition mode
Jouni Malinen [Wed, 25 Oct 2023 11:06:23 +0000 (14:06 +0300)] 
tests: EHT+MLO AP with SAE and transition mode

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agotests: Remove exception for SAE MLD testing
Jouni Malinen [Wed, 25 Oct 2023 10:53:35 +0000 (13:53 +0300)] 
tests: Remove exception for SAE MLD testing

hostapd now has support for SAE in MLD cases, so there is no need to
maintain this exception that allowed the test case to pass even if the
connection failed.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
21 months agoSAE: Remove current PMKSA from driver after reauth threshold is passed
Veerendranath Jakkam [Wed, 27 Sep 2023 05:57:13 +0000 (11:27 +0530)] 
SAE: Remove current PMKSA from driver after reauth threshold is passed

wpa_supplicant postpones expired PMKSA deletion untillassociation is
lost for SAE to avoid forced disconnection. But during this time the
driver may use the expired PMKSA for reassociation with the current
connected AP.

Remove the current PMKSA for SAE from the driver after reauth threshold
is passed when the driver takes care of BSS selection.

Signed-off-by: Veerendranath Jakkam <quic_vjakkam@quicinc.com>
22 months agoDouble the first group rekey timeout if over 100 associated stations
Sai Pratyusha Magam [Fri, 29 Sep 2023 15:27:05 +0000 (20:57 +0530)] 
Double the first group rekey timeout if over 100 associated stations

Increase the first group rekey timeout from 500 ms to 1000 ms when the
number of associated stations is greater than 100. This is to avoid
client disconnections due to group handshake timeout in multiclient
scenarios where it might take more than 500 ms to be able deliver Group
Key msg 1/2 to all associated STAs.

Signed-off-by: Sai Pratyusha Magam <quic_smagam@quicinc.com>
22 months agoReserve QCA vendor sub command id 234
Purushottam Kushwaha [Fri, 29 Sep 2023 09:27:28 +0000 (14:57 +0530)] 
Reserve QCA vendor sub command id 234

This is reserved for QCA use.

Signed-off-by: Purushottam Kushwaha <quic_pkushwah@quicinc.com>
22 months agoFILS: EHT additions
Aloka Dixit [Mon, 24 Jul 2023 23:16:26 +0000 (16:16 -0700)] 
FILS: EHT additions

Add support for EHT phy index and maximum NSS as per IEEE P802.11be/D4.0,
9.6.7.36 and 9.4.2.313.4.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoFILS: Fix NSS calculation for HE mode
Aloka Dixit [Mon, 24 Jul 2023 23:16:25 +0000 (16:16 -0700)] 
FILS: Fix NSS calculation for HE mode

Maximum NSS calculation for HE mode checks if both Tx and Rx support
a given NSS. Modify it to instead check if either of these two support
the given NSS.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoFILS: Rename local variable to indicate HE mode
Aloka Dixit [Mon, 24 Jul 2023 23:16:24 +0000 (16:16 -0700)] 
FILS: Rename local variable to indicate HE mode

Rename the local variable mcs_nss_size to he_mcs_nss_size in
hostapd_fils_discovery_cap() and hostapd_gen_fils_discovery_nss()
to limit its usage to HE mode.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoFILS: Move maximum NSS determination to a new function
Aloka Dixit [Mon, 24 Jul 2023 23:16:23 +0000 (16:16 -0700)] 
FILS: Move maximum NSS determination to a new function

Create a separate function to set the maximum number of spatial streams
in FILS discovery frames.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoFILS: Move phy index determination to new function
Aloka Dixit [Mon, 24 Jul 2023 23:16:22 +0000 (16:16 -0700)] 
FILS: Move phy index determination to new function

Move the phy index determination for FILS discovery frames to a new
function without changing the functionality. HE support is mandatory for
operating in the 6 GHz band hence the phy index will always be set to
FD_CAP_PHY_INDEX_HE for this band.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoDPP: Use CONFIG_SAE consistently to avoid a compiler warning
Jouni Malinen [Fri, 29 Sep 2023 14:07:56 +0000 (17:07 +0300)] 
DPP: Use CONFIG_SAE consistently to avoid a compiler warning

The sae_password_entry is used in this function only if CONFIG_SAE is
defined, so declare this variable only under the same condition.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agoAP MLD: Add missing CONFIG_SAE checks
Aloka Dixit [Mon, 24 Jul 2023 20:33:01 +0000 (13:33 -0700)] 
AP MLD: Add missing CONFIG_SAE checks

Fix the compilation errors caused by missing checks for CONFIG_SAE.

Signed-off-by: Aloka Dixit <quic_alokad@quicinc.com>
22 months agoUpdate Wide Bandwidth Channel Switch element
Yuvarani V [Wed, 27 Sep 2023 07:22:03 +0000 (12:52 +0530)] 
Update Wide Bandwidth Channel Switch element

Update Wide Bandwidth Channel Switch element as per IEEE
P802.11-REVme/D4.0, 9.4.2.159 (Wide Bandwidth Channel Switch element)
and Table 9-314 (VHT Operation Information subfields).

Update New Channel Width, New Channel Center Frequency Segment 0, and
New Channel Center Frequency Segment 1 fields as per IEEE
P802.11-REVme/D4.0 for 160 MHz and 80+80 MHz bandwidth. This replaces
the use of now deprecated Channel Width 2 and 3 values with a more
backwards compatible design.

Signed-off-by: Yuvarani V <quic_yuvarani@quicinc.com>
22 months agoSAE: Do not reject reauth threshold passed PMKSA in association event
Veerendranath Jakkam [Wed, 27 Sep 2023 04:55:34 +0000 (10:25 +0530)] 
SAE: Do not reject reauth threshold passed PMKSA in association event

Do not reject reauth threshold passed PMKSA indicated in successful
association event since the PMKSA is still valid.

Additionally, remove the reauth threshold passed PMKSA entry from the
driver to prevent using it further in the driver.

Signed-off-by: Veerendranath Jakkam <quic_vjakkam@quicinc.com>
22 months agoPASN: Copy PMK to PASN context on responder
Vinay Gannevaram [Tue, 26 Sep 2023 14:47:43 +0000 (20:17 +0530)] 
PASN: Copy PMK to PASN context on responder

Wi-Fi Aware pairing responder needs to forward the derive PMK to the
framework on successful pairing setup. The framework will set
corresponding PMK while a pairing verification is initiated by the
paired peer. Since the PMK is not updated for responder's PASN context,
framework does not have a valid PMK and verification fails. Hence copy
the derived PMK to PASN context.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agohostapd: Fix premature beacon set during association handling
Aditya Kumar Singh [Tue, 26 Sep 2023 07:42:39 +0000 (13:12 +0530)] 
hostapd: Fix premature beacon set during association handling

Currently, during association handling, if any of the iface parameters
changes due to some reason, it calls ieee802_11_set_beacons() function.
This function sets beacon for the all the BSSes in that iface even if
the beacon was not set already. This leads to setting the beacon
prematurely for some BSSes which was intentionally not started.

Fix the above issue by calling ieee802_11_update_beacons() function
instead. This function only updates the beacon if it was already set.

While at it, do the same while freeing STA entry.

Signed-off-by: Aditya Kumar Singh <quic_adisi@quicinc.com>
22 months agoAdd channel 144 (5720 MHz) into operating class conversion tables
Shuibing Dai [Tue, 19 Sep 2023 03:02:23 +0000 (20:02 -0700)] 
Add channel 144 (5720 MHz) into operating class conversion tables

Based on IEEE Std 802.11-2020 Table E-3 (Operating classes in Japan) and
Table E-4 (Global operating classes), we update channel 144 for those
corresponding operating classes.

The changes applicable to the global operating classes fixes an issue of
P2P GO not starting on channel 144 (frequency 5720 MHz) in cases where
the driver supports DFS operations.

Signed-off-by: Shuibing Dai <shuibing@google.com>
22 months agoRefine roam stats frame subtypes in a QCA vendor attribute
Chunquan Luo [Wed, 13 Sep 2023 12:17:34 +0000 (05:17 -0700)] 
Refine roam stats frame subtypes in a QCA vendor attribute

Enumeration qca_wlan_roam_stats_frame_subtype defines the various frame
subtypes which may be collected by the driver and reported via the
QCA_WLAN_VENDOR_ATTR_ROAM_STATS_FRAME_SUBTYPE attribute.

Two of the enumerators are:
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_PREAUTH
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_REASSOC

These were initially defined and used to respectively report
Authentication Response and Reassociation Response frames.

Now there is a requirement to also report Authentication Request and
Reassociation Request frames. In order to satisfy this requirement,
add two new enumerators:
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_AUTH_REQ
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_REASSOC_REQ

Note that the first of these uses the standard term "AUTH" instead of
the confusing term "PREAUTH" used previously.

And to align with that naming, and in order to clearly show the usage
of the original enumerators, rename them to:
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_AUTH_RESP
* QCA_WLAN_ROAM_STATS_FRAME_SUBTYPE_REASSOC_RESP

Furthermore, Authentication Request/Response frame refers to the
Authentication frames sent by the non-AP STA and AP, respectively.

And finally, to support backward compatibility with applications using
the original enumerators, redefine those in terms of the new names.

Signed-off-by: Chunquan Luo <quic_chunquan@quicinc.com>
22 months agoUpdate roam stats of AP BSSID to user space in a QCA vendor attribute
Chunquan Luo [Fri, 22 Sep 2023 02:55:25 +0000 (19:55 -0700)] 
Update roam stats of AP BSSID to user space in a QCA vendor attribute

Fetch AP BSSID from each roam connection frame and cache the info in the
WLAN driver. When user space gets roam stats by
QCA_WLAN_VENDOR_ATTR_ROAM_STATS_INFO, user space can now collect the AP
BSSID info for roam issue.

Signed-off-by: Chunquan Luo <quic_chunquan@quicinc.com>
22 months agoEAP-SIM/AKA peer: Simplify identity selection for MK derivation
Jouni Malinen [Thu, 21 Sep 2023 07:46:38 +0000 (10:46 +0300)] 
EAP-SIM/AKA peer: Simplify identity selection for MK derivation

Redesign the identity selection for MK derivation to be done explicitly
based on the last indicated identity (whether it is from
EAP-Response/Identity or method specific AT_IDENTITY) during the current
exchange. This makes the implementation cleaner and avoids cases were
more or less duplicated selection steps ended up being slightly
different. This is not as clean as it could otherwise be due to the
exception needed for the IMSI privacy case where the identity used in MK
derivation is actually not the one exchanged in the EAP messages.

Furthermore, this moves the somewhat confusing EAP method specific
tracking of the lasgt EAP-Response/Identity value from EAP-SIM/AKA into
the main EAP peer implementation.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agotests: Adding EAP-SIM/AKA coverage for ID selection
Jouni Malinen [Thu, 21 Sep 2023 07:56:42 +0000 (10:56 +0300)] 
tests: Adding EAP-SIM/AKA coverage for ID selection

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agoEAP-SIM/AKA server: Configurable limit to fast re-authentication
Jouni Malinen [Thu, 21 Sep 2023 08:02:38 +0000 (11:02 +0300)] 
EAP-SIM/AKA server: Configurable limit to fast re-authentication

Allow the EAP-SIM/AKA server to be configured to use a smaller limit for
the number of times fast re-authentication can be used before falling
back to running full authentication. This is particularly useful for EAP
peer testing to cover cases when falling back from fast
re-authentication to full authentication in various different cases.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agoEAP-SIM/AKA server: Allow method specific identity exchange to be skipped
Jouni Malinen [Thu, 21 Sep 2023 08:00:04 +0000 (11:00 +0300)] 
EAP-SIM/AKA server: Allow method specific identity exchange to be skipped

While the EAP-SIM/AKA RFCs recommend against doing this, some deployed
authentication servers use the identity from the EAP-Response/Identity
directly without using an EAP method specific indication (AT_IDENTITY).
Having a capability to configure hostapd EAP server to behave in this
manner helps in increasing testing coverage for the EAP peer
implementation.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agoEAP-SIM/AKA peer: Fix identity selection for MK derivation with AT_IDENTITY
Jouni Malinen [Thu, 21 Sep 2023 08:45:37 +0000 (11:45 +0300)] 
EAP-SIM/AKA peer: Fix identity selection for MK derivation with AT_IDENTITY

A case was missing in the way wpa_supplicant was tracking the identity
that is used when deriving MK if the EAP server does not follow the RFC
guidance on using EAP method specific identity determination (i.e.,
AT_IDENTITY for EAP-SIM/AKA) combined with a fallback from fast
re-authentication to full authentication. wpa_supplicant ended up using
the actual identity instead of the last identity included in an EAP
message even though MK derivation is supposed to use the identity that
was included in the last AT_IDENTITY or in the EAP-Response/Identity if
AT_IDENTITY was not used. This resulted in such an authentication
attempt failing due to incorrect MK being derived and AT_MAC validation
resulting in an mismatch.

Fix this by checking for the case where fast re-authentication is
attempted and the server recognizes the fast re-auth identity, but
decides to fall back to full authentication without a separate EAP
method specific identity exchange using AT_IDENTITY. This allows the
fast re-auth identity from EAP-Response/Identity to be used in MK
derivation in such cases.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
22 months agoDefine a QCA vendor attribute to set traffic shaping policy
Shailendra Singh [Wed, 13 Sep 2023 03:42:04 +0000 (09:12 +0530)] 
Define a QCA vendor attribute to set traffic shaping policy

Define a new QCA vendor attribute to configure traffic
shaping policy applied during coex scenarios.

Signed-off-by: Shailendra Singh <quic_shasing@quicinc.com>
22 months agoAdd _IS_ML flag attribute to the ADD_STA_NODE QCA vendor command
Adil Saeed Musthafa [Wed, 13 Sep 2023 22:56:03 +0000 (15:56 -0700)] 
Add _IS_ML flag attribute to the ADD_STA_NODE QCA vendor command

Add an attribute QCA_WLAN_VENDOR_ATTR_ADD_STA_NODE_IS_ML to the
ADD_STA_NODE command. If this attribute is set, it implies that the node
being added is an MLD node.

Signed-off-by: Adil Saeed Musthafa <quic_adilm@quicinc.com>
22 months agoExtend maximum allowed bandwidth update type QCA vendor interface
Veerendranath Jakkam [Wed, 6 Sep 2023 20:45:26 +0000 (02:15 +0530)] 
Extend maximum allowed bandwidth update type QCA vendor interface

Extend QCA_WLAN_VENDOR_ATTR_CONFIG_CHAN_WIDTH_UPDATE_TYPE attribute to
support handling interoperability issues with APs which don't handle
the maximum bandwidth change indication correctly.

Additionally define an enum for possible values of
QCA_WLAN_VENDOR_ATTR_CONFIG_CHAN_WIDTH_UPDATE_TYPE.

Signed-off-by: Veerendranath Jakkam <quic_vjakkam@quicinc.com>
22 months agoAdd QCA vendor attributes to indicate MLO capabilities
mukul sharma [Fri, 1 Sep 2023 11:24:05 +0000 (16:54 +0530)] 
Add QCA vendor attributes to indicate MLO capabilities

Add QCA vendor attributes to indicate various MLO capabilities supported
by the WLAN driver to userspace. These capabilities are usually reported
by the firmware during the initial bootup handshake with the driver.

Signed-off-by: Mukul Sharma <quic_mukul@quicinc.com>
22 months agoSplit long comment lines in QCA vendor related definitions
Yu Wang [Wed, 6 Sep 2023 06:10:20 +0000 (23:10 -0700)] 
Split long comment lines in QCA vendor related definitions

Fix one of the style problems in qca-vendor.h.

Signed-off-by: Yu Wang <quic_yyuwang@quicinc.com>