lp:~indicator-network-developers/wpasupplicant/trunk

Created by Kalle Valo on 2010-06-04 and last modified on 2019-10-18
Get this branch:
bzr branch lp:~indicator-network-developers/wpasupplicant/trunk

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Indicator Network Developers
Project:
wpa_supplicant
Status:
Development

Import details

Import Status: Reviewed

This branch is an import of the HEAD branch of the Git repository at git://w1.fi/srv/git/hostap.git.

The next import is scheduled to run in 2 hours.

Last successful import was 3 hours ago.

Import started 3 hours ago on izar and finished 3 hours ago taking 20 seconds — see the log
Import started 9 hours ago on alnitak and finished 9 hours ago taking 20 seconds — see the log
Import started 15 hours ago on izar and finished 15 hours ago taking 20 seconds — see the log
Import started 21 hours ago on alnitak and finished 21 hours ago taking 20 seconds — see the log
Import started on 2019-10-20 on izar and finished on 2019-10-20 taking 20 seconds — see the log
Import started on 2019-10-20 on alnitak and finished on 2019-10-20 taking 20 seconds — see the log
Import started on 2019-10-20 on alnitak and finished on 2019-10-20 taking 20 seconds — see the log
Import started on 2019-10-20 on izar and finished on 2019-10-20 taking 20 seconds — see the log
Import started on 2019-10-19 on alnitak and finished on 2019-10-19 taking 20 seconds — see the log
Import started on 2019-10-19 on izar and finished on 2019-10-19 taking 20 seconds — see the log

Recent revisions

15112. By Jouni Malinen on 2019-10-18

tests: Make ap_ft_ap_oom4 more robust against compiler optimizations

It looks like the wpa_auth_get_seqnum() function might not always be
visible in the backtrace since the compiler may optimize that wrapper
away. Use the i802_get_seqnum() function instead as a trigger for the
get_seqnum operation failure trigger to avoid this.

Signed-off-by: Jouni Malinen <email address hidden>

15111. By Jouni Malinen <email address hidden> on 2019-10-18

FT-SAE: Add RSNXE into FT MIC

Protect RSNXE, if present, in FT Reassociation Request/Response frames.
This is needed for SAE H2E with FT.

Signed-off-by: Jouni Malinen <email address hidden>

15110. By Jouni Malinen <email address hidden> on 2019-10-18

Add RSNXE into (Re)Association Response frames

Add the new RSNXE into (Re)Association Response frames if any of the
capability bits is nonzero.

Signed-off-by: Jouni Malinen <email address hidden>

15109. By Jouni Malinen <email address hidden> on 2019-10-18

tests: WPA2-PSK-FT-SAE AP (H2E)

Signed-off-by: Jouni Malinen <email address hidden>

15108. By Jouni Malinen <email address hidden> on 2019-10-18

Merge wpa_supplicant and hostapd EAPOL-Key KDE parsers

Use a single struct definition and a single shared implementation for
parsing EAPOL-Key KDEs and IEs instead of maintaining more or less
identical functionality separately for wpa_supplicant and hostapd.

Signed-off-by: Jouni Malinen <email address hidden>

15107. By Jouni Malinen <email address hidden> on 2019-10-18

SAE: Verify that STA negotiated H2E if it claims to support it

If a STA indicates support for SAE H2E in RSNXE and H2E is enabled in
the AP configuration, require H2E to be used.

Signed-off-by: Jouni Malinen <email address hidden>

15106. By Jouni Malinen <email address hidden> on 2019-10-17

RSN: Verify RSNXE match between (Re)AssocReq and EAPOL-Key msg 2/4

If the STA advertises RSN Extension element, it has to be advertised
consistently in the unprotected ((Re)Association Request) and protected
(EAPOL-Key msg 2/4) frames. Verify that this is the case.

Signed-off-by: Jouni Malinen <email address hidden>

15105. By Jouni Malinen <email address hidden> on 2019-10-17

Add RSNXE into AP KDE parser

This is needed for SAE hash-to-element implementation.

Signed-off-by: Jouni Malinen <email address hidden>

15104. By Jouni Malinen <email address hidden> on 2019-10-17

Store a copy of Association Request RSNXE in AP mode for later use

This is needed to be able to compare the received RSNXE to a protected
version in EAPOL-Key msg 2/4.

Signed-off-by: Jouni Malinen <email address hidden>

15103. By Jouni Malinen <email address hidden> on 2019-10-17

SAE: Add RSNXE in Association Request and EAPOL-Key msg 2/4

Add the new RSNXE into (Re)Association Request frames and EAPOL-Key msg
2/4 when using SAE with hash-to-element mechanism enabled. This allows
the AP to verify that there was no downgrade attack when both PWE
derivation mechanisms are enabled.

Signed-off-by: Jouni Malinen <email address hidden>

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.

Subscribers

No subscribers.