lp:~indicator-network-developers/wpasupplicant/trunk

Created by Kalle Valo on 2010-06-04 and last modified on 2020-02-25
Get this branch:
bzr branch lp:~indicator-network-developers/wpasupplicant/trunk

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Indicator Network Developers
Project:
wpa_supplicant
Status:
Development

Import details

Import Status: Reviewed

This branch is an import of the HEAD branch of the Git repository at git://w1.fi/srv/git/hostap.git.

The next import is scheduled to run in 25 minutes.

Last successful import was 5 hours ago.

Import started 5 hours ago on alnitak and finished 5 hours ago taking 25 seconds — see the log
Import started 11 hours ago on alnitak and finished 11 hours ago taking 30 seconds — see the log
Import started 18 hours ago on alnitak and finished 18 hours ago taking 30 seconds — see the log
Import started on 2020-02-25 on alnitak and finished on 2020-02-25 taking 30 seconds — see the log
Import started on 2020-02-24 on alnitak and finished on 2020-02-24 taking 30 seconds — see the log
Import started on 2020-02-24 on alnitak and finished on 2020-02-24 taking 30 seconds — see the log
Import started on 2020-02-24 on alnitak and finished on 2020-02-24 taking 25 seconds — see the log
Import started on 2020-02-24 on alnitak and finished on 2020-02-24 taking 40 seconds — see the log
Import started on 2020-02-23 on alnitak and finished on 2020-02-23 taking 40 seconds — see the log
Import started on 2020-02-23 on alnitak and finished on 2020-02-23 taking 30 seconds — see the log

Recent revisions

15627. By Jouni Malinen 20 hours ago

tests/fuzzing: Update WPA set_key() handler prototype

Update the fizzing test tools to use the new set_key() prototype, i.e.,
add the new key_flag argument, to get rid of compiler warnings.

Signed-off-by: Jouni Malinen <email address hidden>

15626. By Jouni Malinen 20 hours ago

tests/fuzzing: Fix build after CONFIG_IEEE80211N=y removal

Commit f3bcd6960346 ("Remove CONFIG_IEEE80211N build option") broke
couple of fuzzing test tools due to missing wpa_scan_results_free(). Fix
that by pulling in driver_common.o.

Signed-off-by: Jouni Malinen <email address hidden>

15625. By Sunil Dutt <email address hidden> on 2020-02-24

Introduce QCA_WLAN_VENDOR_ATTR_CONFIG_ROAM_REASON

This attribute enables/disables the host driver to send roam reason
information in the Reassociation Request frame to the AP in the same
ESS.

Signed-off-by: Jouni Malinen <email address hidden>

15624. By Sunil Dutt <email address hidden> on 2020-02-24

Fix enum qca_wlan_vendor_attr_config value prefix

Couple of the attributes were defined with inconsistent prefix in the
name (missing "CONFIG_"). Fix these to use the common prefix for all
enum qca_wlan_vendor_attr_config values. Add defined values for the
incorrect names to avoid issues with existing users.

Signed-off-by: Jouni Malinen <email address hidden>

15623. By Jouni Malinen <email address hidden> on 2020-02-24

tests: WPS PBC session overlap detection with single BSSID selected

Update grpform_pbc_overlap not to require PBC session overlap to be
detected since in this sequence a single BSSID is specified and other
APs can be ignored while checking for session overlap. Add other test
cases to explicitly check for the PBC session overlap detection in
non-P2P and P2P cases when the BSSID is specified.

Signed-off-by: Jouni Malinen <email address hidden>

15622. By Jouni Malinen <email address hidden> on 2020-02-24

WPS: Ignore other APs if PBC is used with a specific BSSID

While the WSC specification requires the Enrollee to stop PBC
provisioning if the scan sees multiple APs in active PBC mode, this is
problematic due to some deployed devices continuing to advertise PBC
mode for extended duration (or even permanently). Such an environment
will still need to prevent wildcard AP selection with PBC since an
incorrect device could be selected. However, if the Enrollee device has
been explicitly requested to connect to a specific AP based on its
BSSID, the other APs in scan results can be ignored without affecting
which AP would be selected (only the one matching the specified BSSID is
acceptable).

Start filtering scan results for PBC session overlap check based on the
locally specified constraint on the BSSID, if one is set. This allows
PBC to be used with "WPS_PBC <BSSID>" command in environment where
another AP device is claiming to be in active PBC mode while "WPS_PBC"
command will still continue to reject provisioning since the correct AP
cannot be selected.

This will also cover the P2P cases where P2P_CONNECT is used to start or
authorize GO Negotiation and joining-a-GO with a specific P2P GO
Interface Address (BSSID).

Signed-off-by: Jouni Malinen <email address hidden>

15621. By Jouni Malinen <email address hidden> on 2020-02-24

nl80211: Beacon protection capability flag and default key type

Add a new capability flag based on the nl80211 feature advertisement and
start using the new default key type for Beacon protection. This enables
AP mode functionality to allow Beacon protection to be enabled. This is
also enabling the previously added ap_pmf_beacon_protection_* hwsim test
cases.

Signed-off-by: Jouni Malinen <email address hidden>

15620. By Jouni Malinen on 2020-02-24

Sync with mac80211-next.git include/uapi/linux/nl80211.h

This brings in nl80211 definitions as of 2020-02-24.

Signed-off-by: Jouni Malinen <email address hidden>

15619. By Jouni Malinen on 2020-02-23

Fix a type in wpa_supplicant defconfig

ap_mode=1 explanation in CONFIG_NO_SCAN_PROCESSING=y was really supposed
to be talking about ap_scan=1.

Signed-off-by: Jouni Malinen <email address hidden>

15618. By Alexander Wetzel <email address hidden> on 2020-02-23

Simplify wpa_deny_ptk0_rekey documentation

Signed-off-by: Alexander Wetzel <email address hidden>

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.

Subscribers

No subscribers.