aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Silenced number of Doxygen warningsJouni Malinen2009-01-049-29/+33
|
* Remove wpa_gui from doxygen documentationsJouni Malinen2009-01-042-2/+2
| | | | | The *.ui.h were causing number of warnings and they do not need to be included in documentation.
* Fixed IMAGE_PATH for doxygen run in root directoryJouni Malinen2009-01-044-4/+4
|
* Remove temporary Qt build directories from Doxygen runJouni Malinen2009-01-042-2/+2
|
* Remove unwanted wpa_supplicant -> struct wpa_supplicant linksJouni Malinen2009-01-041-1/+6
| | | | | | | Replace " wpa_supplicant" with " %wpa_supplicant" except for "struct wpa_supplicant". This makes it easier to write Doxygen comments since there is no need to add the ugly '%' prefix to each instance of wpa_supplicant text showing up.
* Resolve a Doxygen warningJouni Malinen2009-01-041-3/+3
|
* Fixed Doxygen function linksJouni Malinen2009-01-041-29/+29
| | | | | No need to use explicit @link command, but must include () after function name (and in couple of cases, use the current function name).
* Completed Doxygen documentation for functions declared in wps/wps.hJouni Malinen2009-01-041-7/+54
|
* Use NULL, not 0, when comparing a pointerJouni Malinen2009-01-031-1/+1
|
* Added endianness annotation for sparseJouni Malinen2009-01-033-7/+7
|
* Fixed sparse warnings about integer vs. pointer useJouni Malinen2009-01-032-5/+4
| | | | | | | The configuration parsing functions seemed to have worked fine before, but these were real bugs even if they did not show up in practice. hostapd_ip_diff() was broken for IPv6 addresses (overwrote address and always returned 1.
* Removed sparse destinations since "CC=cgcc make" works fineJouni Malinen2009-01-032-12/+0
|
* Mark functions static if not used elsewhere and use proper prototypesJouni Malinen2009-01-0310-53/+50
|
* Include the header file to validate function prototype.Jouni Malinen2009-01-031-0/+1
|
* Moved WPS Registrar initialization from EAP peer to wps_supplicant.cJouni Malinen2009-01-032-57/+49
| | | | | This matches the style used in hostapd, i.e., Registrar is initialized only once and callbacks are now processed in wps_supplicant.c.
* Removed registrar pointer from wps_config and wps_dataJouni Malinen2009-01-036-25/+24
| | | | | wps_context::registrar can be used as the only location for this pointer.
* Removed duplicated authenticator yes/no from wps_config and wps_dataJouni Malinen2009-01-037-23/+8
| | | | | wps_context::ap is available for this purpose and there is no need to change between AP and not AP between protocol runs.
* Removed unused WPS_PENDING processing resultJouni Malinen2009-01-033-16/+1
|
* Added Doxygen documentation for WPS codeJouni Malinen2009-01-0311-43/+394
|
* Create all doxygen docs from root directory to get proper path namesJouni Malinen2009-01-036-47/+46
| | | | | | | This updated all doxygen runs to use the same style that was used for wpa_supplicant full documents. The full vs. fast configurations are now otherwise identical apart from fast not generating dot files or latex/pdf version of the documentation.
* Fixed number of doxygen warningsJouni Malinen2009-01-0213-13/+21
|
* Added more src subdirectories into doxygen docsJouni Malinen2009-01-024-8/+32
|
* Updated doxygen configuration files to work with new doxygenJouni Malinen2009-01-024-26/+15
| | | | | The doxygen run is not exactly warning free yet, but this gets a step closer to being able to produce something useful again.
* Move addr_un definitions to avoid using out-of-scope bufferJouni Malinen2009-01-021-1/+3
|
* Initialize wpa_ie_len to 0 if WPA IE is not set on all pathsJouni Malinen2009-01-021-1/+2
| | | | The new WPS code was not setting this in error case.
* Include ieee802_11_defs.h explicitly instead of assuming it gets includedJouni Malinen2009-01-021-0/+1
| | | | | Some build configurations failed to compile because this file did not get included.
* Replaced string comparison operator '==' with '=' to work with dashJouni Malinen2009-01-021-1/+1
|
* WPS: Generate UUID based on MAC address, if not setJouni Malinen2009-01-019-4/+50
| | | | | | Generate a SHA1 hash -based UUID from the local MAC address if the UUID was not configured. This makes it easier to prepare for WPS since there is no need to generate an UUID.
* WPS: Cleanup UUID and MAC address configurationJouni Malinen2009-01-014-10/+5
| | | | | No need to configure these separately for each Enrollee in wps_config since wps_context is now used both for Registrar and Enrollee.
* Include pending MFP defines in nl80211_copy.hJouni Malinen2008-12-313-12/+6
| | | | | This can be used to get rid of the extra cpp define since we have our local copy of wireless.h and nl80211.h.
* Sync nl80211.h copy with the current kernel versionJouni Malinen2008-12-311-0/+31
|
* Renamed nl80211 HT channel parameters to match with kernelJouni Malinen2008-12-312-17/+17
|
* MFP: Require MFP is it is enabled and AP scan shows support for itJouni Malinen2008-12-311-0/+12
| | | | | | When using ap_scan=1, we know before the association request that MFP will be supported, so we can as well require it. This helps mac80211 in configuring whether to enable MFP.
* MFP: Fix SA Query Action CategoryJouni Malinen2008-12-311-1/+1
| | | | | | | IEEE 802.11w/D7.0 incorrectly changed the Action Category from 8 to 7 when renaming Ping to SA Query. Category 7 is reserved for HT (IEEE 802.11n) and IEEE 802.11w will need to continue to use the category 8 that was allocated for it.
* Fixed SA Query Request lengthJouni Malinen2008-12-311-2/+1
| | | | Do not send extra 24 octets of random data in the end.
* Clear BIP keys, too, when removing broadcast keys with MFP enabledJouni Malinen2008-12-311-0/+13
|
* MFP: Remove mac80211 workaround of IGTK in monitor netdevJouni Malinen2008-12-311-5/+0
| | | | | | mac80211 can now figure out which key to use for injected frames (in most cases), so we can remove the workaround for configuring IGTK on the monitor interface that is used for injecting frames.
* Added ctrl_interface command for sending a SA Query requestJouni Malinen2008-12-305-24/+74
| | | | | This can be useful for testing IEEE 802.11w functionality, so provide means for manual request to send a SA Query request.
* Fix TLS message processing if Flags field is not presentJouni Malinen2008-12-301-2/+15
| | | | | | | | | | | | | | | | | | | | | | Previous version assumed that the Flags field is always present and ended up reading one octet past the end of the buffer should the Flags field be missing. The message length would also be set incorrectly (size_t)-1 or (size_t)-5, but it looks like reassembly code ended up failing in malloc before actually using this huge length to read data. RFC 2716 uses a somewhat unclear description on what exactly is included in the TLS Ack message ("no data" can refer to either Data field in 4.1 or TLS Data field in 4.2), so in theory, it would be possible for some implementations to not include Flags field. However, EAP-{PEAP,TTLS,FAST} need the Flags field in Ack messages, too, for indicating the used version. The EAP peer code will now accept the no-Flags case as an Ack message if EAP workarounds are enabled (which is the default behavior). If workarounds are disabled, the message without Flags field will be rejected. [Bug 292]
* Disconnect the STA if EAP timeout is reachedJouni Malinen2008-12-291-0/+16
| | | | | | | | | | There is not really much else the Authenticator can do if it does not receive valid EAP response from the Supplicant/EAP peer. EAP-Failure would need to be sent before trying to start again with EAP-Request/Identity, but that is not allowed before the EAP peer actually replies. Anyway, forcing a new association is likely to clean up peer state, too, so it can help fixing some issues that could have caused the peer not to be able to reply in the first place.
* WPS: Set recommended retransmission times with EAP method specific hintJouni Malinen2008-12-291-0/+10
|
* Fixed retransmission of EAP requests if no response is receivedJouni Malinen2008-12-294-33/+69
| | | | | | | | | | | | | | | | | It looks like this never survived the move from IEEE 802.1X-2001 to IEEE 802.1X-2004 and EAP state machine (RFC 4137). The retransmission scheduling and control is now in EAP authenticator and the calculateTimeout() producedure is used to determine timeout for retransmission (either dynamic backoff or value from EAP method hint). The recommended calculations based on SRTT and RTTVAR (RFC 2988) are not yet implemented since there is no round-trip time measurement available yet. This should make EAP authentication much more robust in environments where initial packets are lost for any reason. If the EAP method does not provide a hint on timeout, default schedule of 3, 6, 12, 20, 20, 20, ... seconds will be used.
* Add RADIUS server support for identity selection hint (RFC 4284)Jouni Malinen2008-12-265-0/+46
| | | | | | | | | | | Previously, only the delivery option 1 from RFC 4284 (EAP-Request/Identity from the AP) was supported. Now option 3 (subsequent EAP-Request/Identity from RADIUS server) can also be used when hostapd is used as a RADIUS server. The eap_user file will need to have a Phase 1 user entry pointing to Identity method in order for this to happen (e.g., "* Identity" in the end of the file). The identity hint is configured in the same was as for AP/Authenticator case (eap_message in hostapd.conf).
* NEED_BASE64 for WPSAndriy Tkachuk2008-12-262-0/+2
| | | | | It looks like we need base64 routines when compiling WPS in hostapd (used in src/wps/wps_registrar.c:910).
* Added a TODO item for sending protected Disassoc after failed SA QueryJouni Malinen2008-12-261-0/+13
|
* hostap.epitest.fi server is not at ISC anymore.Jouni Malinen2008-12-263-21/+3
|
* Added a note about IEEE 802.11w/D7.0 updateJouni Malinen2008-12-262-0/+2
|
* Do not use SA Query procedure if reassociation is part of FTJouni Malinen2008-12-261-1/+2
|
* Add Key Length field into IGTK sub-element (FTIE) per 802.11w/D7.0Jouni Malinen2008-12-262-5/+13
|
* Updated SA Query procedure to use timeouts per 802.11w/D7.0Jouni Malinen2008-12-267-40/+78
| | | | | The previous max_attempts * timeout is now replaced with two timeouts (one for each retry, the other one for maximum wait).