aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd
Commit message (Collapse)AuthorAgeFilesLines
* hostapd_cli: Use os_exec() for action script executionHEADmasterJouni Malinen2015-10-201-17/+8
| | | | | | | | | | | Use os_exec() to run the action script operations to avoid undesired command line processing for control interface event strings. Previously, it could have been possible for some of the event strings to include unsanitized data which is not suitable for system() use. (CVE-2014-3686) Change-Id: If46d6cfcb9d7fc9700965e818315e5aa50fa11a5 Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com> Tested-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
* hostapd: enable dynamic modification of acl policyNadim Zubidat2012-11-063-2/+46
| | | | | | | | | add APIs for dynamically changing the macaddr_acl policy and mac addresses lists. once changed, hostapd will deauth stations which do not pass the new policy. Signed-off-by: Nadim Zubidat <nadimz@ti.com>
* hostap: add channel switch ability to AP & GO (INTERNAL)Victor Goldenshtein2012-09-131-0/+2
| | | | | | | | | | | | | | | Add channel switch command and handle channel switch request/complete events. New hostapd_eid_csa() which builds the channel switch announcement IE. Add this CSA to the beacon frame prior performing a channel switch and remove it once it's completed. New EVENT_REQ_CH_SW which indicates that the driver has requested to perform a channel switch. Signed-hostap: Victor Goldenshtein <victorg@ti.com>
* Android.mk: Define ANDROID_P2PEyal Shapira2012-08-021-0/+2
| | | | | | | | | | | | Changes within #ifdef ANDROID_P2P are BRCM additions which are non BRCM specific and there should be included. That's in contrast of ANDROID_BRCM_P2P_PATCH which mark parts that are BRCM implementation specific (like device_ap_sme) and therefore would be compiled in only when compiling with BRCM driver. Change-Id: I031f0908055756b6e85b64c5151c18b8a73b9841 Signed-off-by: Eyal Shapira <eyal@wizery.com>
* Restore OpenSSL ENGINE supportKenny Root2012-08-021-3/+0
| | | | We now use an OpenSSL ENGINE to support keystore functionality.
* Moving keystore to system/securityKenny Root2012-08-021-1/+1
| | | | | keystore used to be in frameworks/base/cmds/keystore, but this include needs to be changed to support the move to system/security
* Android: hostapd: enable N rates in build configIdo Reis2012-08-021-1/+1
| | | | Signed-off-by: Ido Reis <idor@ti.com>
* config: enable NL80211Luciano Coelho2012-08-021-1/+1
| | | | | | Just enable it in both hostapd and wpa_s. Signed-off-by: Luciano Coelho <coelho@ti.com>
* hostapd: add support for android created sockets (/dev/socket/)Yotam Rubin2012-08-023-6/+48
| | | | | | | | | | | | | | | | Add the same support that wpa_supplicant has with sockets created by the Android system using the init.rc services options Just as the supplicant, if the ctrl_iface is a name and not a path (i.e. doesn't start with '/') the hostapd will assume that this is an Android created socket named wpa_$(ctrl_iface) which is opened in /dev/socket/ hostapd_cli sockets will be created in /data/misc/wifi/sockets The hardcoded configuration is set in the Android.mk of hostapd just like it is with the supplicant. In addition, the hostapd_cli needs an Android property by the name ap.interface to hold the ctrl_iface name to connect to the hostapd's socket.
* Android: Do not use separate private libJouni Malinen2012-08-021-1/+2
| | | | | | | | The separate private library mechanism used in Android ICS is not very robust when wpa_supplicant/hostapd version changes since the external code is accessing some internal data structures directly. Avoid this type of issues by integrating the private library to be part of wpa_supplicant/hostapd build.
* Android: Define ANDROID_BRCM_P2P_PATCH for Broadcom specific buildsDmitry Shmidt2012-08-021-0/+4
| | | | | | | | | | | | | | | | This is combination of part from Dmitry Shmidt <dimitrysh@google.com> Thu, 21 Jul 2011 15:19:46 -0700 Change-Id: Iafec4bedbd33836d0a64e7ea054d8a46ef8ec204 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> and Jean-Baptiste Queru <jbq@google.com> Tue, 15 Nov 2011 18:41:36 -0800 Enable broadcom-specific patch with proper flag Change-Id: I5a0f5a2d65963deff3cd62b5e7ec090619c75a2c
* Android: Add src directory symlinksDmitry Shmidt2012-08-021-0/+1
| | | | | | | | These are from Android wpa_supplicant_8.git initial 0.8.X commit 8d520ff1dc2da35cdca849e982051b86468016d8. Change-Id: I26aec5afbbd4f4a1f5fd900912545b6f5050de64 Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* P2P: enable to set in the conf file the wmm paramsYoni Divinsky2012-07-301-73/+1
| | | | | | | | | | In case of P2P GO, the wpa_supplicant uses the default hostapd parameters. In the default parameters the ACM bit for video and voice are set to 1, meaning, P2P devices and stations which are connected to the GO cannot pass voice or video data packets. Signed-hostap: Yoni Divinsky <yoni.divinsky@ti.com>
* hostapd: Add IEEE 802.11ac VHT IEs into Beacon/Probe ResponseMahesh Palivela2012-06-301-0/+4
| | | | | | | IEEE 802.11ac VHT changes to include VHT IEs in Beacon and Probe Response frames. Signed-hostap: Mahesh Palivela <maheshp@posedge.com>
* hostapd: Initial IEEE 802.11ac (VHT) definitionsMahesh Palivela2012-06-304-0/+215
| | | | | | Add IEEE 802.11ac definitions for config, IEEE structures, constants. Signed-hostap: Mahesh Palivela <maheshp@posedge.com>
* WPS: Document NFC use cases with password/config tokenJouni Malinen2012-06-283-0/+63
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Add support for NCF password token from APJouni Malinen2012-06-283-1/+117
| | | | | | | | | | | | | | | | The new hostapd ctrl_iface command WPS_NFC_TOKEN can now be used to manage AP-as-Enrollee operations with NFC password token. WPS/NDEF parameters to this command can be used to generate a new NFC password token. enable/disable parameters can be used to enable/disable use of NFC password token (instead of AP PIN) for external Registrars. A preconfigured NFS password token can be used by providing its parameters with new hostapd.conf fields wps_nfc_dev_pw_id, wps_nfc_dh_pubkey, wps_nfc_dh_privkey, and wps_nfc_dev_pw. This use will also depend on WPS_NFC_TOKEN enable/disable commands, i.e., the configured NFS password token is disabled by default. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Add new mechanism for generation NFC configuration tokenJouni Malinen2012-06-282-0/+57
| | | | | | | | The new hostapd ctrl_iface command WPS_NFC_CONFIG_TOKEN can now be used to fetch payload for an NFC configuration token so that an external program can be used to write this on an NFC tag. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Add new mechanism for communicating NFC tag read eventsJouni Malinen2012-06-272-2/+70
| | | | | | | | | | | hostapd ctrl_iface can now be used to deliver payload from read operation of an NFC tag. This allows operations without having to have low-level NFC code within hostapd. For now, the new wps_nfc_tag_read command can be used with NFC password tokens for the case where the AP has an NFC device that is used to read an NFC tag from the station Enrollee. Signed-hostap: Jouni Malinen <j@w1.fi>
* RADIUS DAS: Validate Event-TimestampJouni Malinen2012-06-172-0/+11
| | | | | | | | | | DAS will now validate Event-Timestamp value to be within an acceptable time window (300 seconds by default; can be set using radius_das_time_window parameter). In addition, Event-Timestamp can be required in Disconnect-Request and CoA-Request messages with radius_das_require_event_timestamp=1. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Return error value on configuration check failureBaruch Siach2012-06-161-1/+1
| | | | | | Don't count errors since the number isn't used anyway. Signed-hostap: Baruch Siach <baruch@tkos.co.il>
* hostapd: Remove redundant variable initializationBaruch Siach2012-06-161-1/+1
| | | | | | The 'errors' variable is initialized later anyway. Signed-hostap: Baruch Siach <baruch@tkos.co.il>
* WNM: Add advertisement of BSS max idle periodJouni Malinen2012-05-272-0/+8
| | | | | | | | | | | If WNM is enabled for the build (CONFIG_WNM=y), add BSS max idle period information to the (Re)Association Response frame from the AP and parse this information on the station. For SME-in-wpa_supplicant case, add a timer to handle periodic transmission of the keep-alive frame. The actual request for the driver to transmit a frame is not yet implemented. Signed-hostap: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Make Android makefiles available under the BSD licenseDmitry Shmidt2012-05-141-0/+6
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Add ChangeLog entries from v1.0 releaseJouni Malinen2012-05-101-0/+107
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Add preliminary RADIUS dynamic authorization server (RFC 5176)Jouni Malinen2012-05-063-0/+50
| | | | | | | | | | This adds the basic DAS mechanism to enable hostapd to be configured to request dynamic authorization requests (Disconnect-Request and CoA-Request). This commit does not add actual processing of the requests, i.e., this will only receive and authenticate the requests and NAK them regardless of what operation is requested. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Allow addition of arbitrary RADIUS attributesJouni Malinen2012-05-052-0/+130
| | | | | | | | New configuration parameters radius_auth_req_attr and radius_acct_req_attr can now be used to add (or override) RADIUS attributes in Access-Request and Accounting-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Add optional Chargeable-User-Identity request (RFC 4372)Jouni Malinen2012-05-052-1/+9
| | | | | | | | radius_request_cui=1 configuration parameter can now be used to configure hostapd to request CUI from the RADIUS server by including Chargeable-User-Identity attribute into Access-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* hlr_auc_gw: Use 5 bit IND for SQN updatesJouni Malinen2012-05-051-5/+41
| | | | | | | | | | | Change the SQN generation mechanism to use not time-based Profile 2 as described in 3GPP TS 33.102 Annex C.3.2. The previous implementation used void IND (i.e.., all of SQN was SEQ1). The new default uses 5 bits of SQN as IND. The length of IND can be configured on the command line with the new -i<IND len in bits> parameter. -i0 would make hlr_auc_gw behave in the same way as the previous implementation. Signed-hostap: Jouni Malinen <j@w1.fi>
* hlr_auc_gw: Add support for updating Milenage file SQNJouni Malinen2012-05-031-5/+90
| | | | | | | | If the new command line argument -u is used, hlr_auc_gw will update the Milenage file SQN numbers when exiting based on what was the last SQN used during the process runtime. Signed-hostap: Jouni Malinen <j@w1.fi>
* hlr_auc_gw: Fix CONFIG_WPA_TRACE=y buildJouni Malinen2012-05-031-4/+9
| | | | | | Need to initialize tracing code and use correct free() wrapper. Signed-hostap: Jouni Malinen <j@w1.fi>
* EAP-AKA': Update to RFC 5448Jouni Malinen2012-05-021-0/+6
| | | | | | | | | | | | | | | There was a technical change between the last IETF draft version (draft-arkko-eap-aka-kdf-10) and RFC 5448 in the leading characters used in the username (i.e., use unique characters for EAP-AKA' instead of reusing the EAP-AKA ones). This commit updates EAP-AKA' server and peer implementations to use the leading characters based on the final RFC. Note: This will make EAP-AKA' not interoperate between the earlier draft version and the new version. Signed-hostap: Jouni Malinen <j@w1.fi> intended-for: hostap-1
* Make bind failure messages uniqueBen Greear2012-04-062-2/+2
| | | | | | This helps someone know which part of the code is complaining. Signed-hostap: Ben Greear <greearb@candelatech.com>
* hostapd: Do not allow HT in 11b modeSujith Manoharan2012-04-031-0/+6
| | | | | | | When the HW mode has been configured as 11b, disable HT operations. Signed-hostap: Sujith Manoharan <c_manoha@qca.qualcomm.com>
* Add wps_cancel for hostapd_cliAnirban Sirkhell2012-03-302-0/+11
| | | | | | | Implement wps_cancel for hostapd similarly to how it was already supported in wpa_supplicant AP mode. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* GAS server: Add support for ANQP Venue Name elementJouni Malinen2012-02-262-0/+55
| | | | | | | The new venue_name configuration parameter can now be used to configure the ANQP Venue Name values that stations can request through GAS. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Interworking: Add GAS server support for AP modeJay Katabathuni2012-02-263-0/+14
| | | | | | | | | | | This adds GAS/ANQP implementation into hostapd. This commit brings in the basic GAS/ANQP functionality, but only the ANQP Capability List element is supported. For testing purposes, hostapd control interface SET command can be used to set the gas_frag_limit parameter dynamically. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Android: Add PLATFORM_VERSION to VERSION_STR_POSTFIX definitionDmitry Shmidt2012-02-251-0/+2
| | | | Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Android: Add build configuration filesDmitry Shmidt2012-02-252-1/+191
| | | | | | | | These are from Android wpa_supplicant_8.git initial 0.8.X commit 8d520ff1dc2da35cdca849e982051b86468016d8 with some additional edits and renaming of .config files to android.config. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
* Add wpa_supplicant AP mode STA deauthenticate/disassociate commandsJithu Jance2012-02-251-167/+0
| | | | | | | | Move disassociate and deauthenticate commands to ctrl_iface_ap.c, so that they ares accessible for wpa_supplicant AP mode and wpa_cli (with CONFIG_AP option enabled). Signed-hostap: Jithu Jance <jithu@broadcom.com>
* hostapd: Allow 'none' driver to be started without ifnameJouni Malinen2012-02-161-1/+3
| | | | | | | | | Commit 0dcc4dc4b31d48ed32940b9adb0b9fcdcab32dc3 made driver initialization conditional on interface name being configured. This can break hostapd-as-RADIUS-server use case where this parameter does not really make any sense. Fix this with a special case for the none driver. Signed-hostap: Jouni Malinen <j@w1.fi>
* Move hostapd_for_each_interface() and hapd_interfaces into src/apJouni Malinen2012-02-161-23/+0
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Make sure ctrl_iface is not initialized multiple timesShan Palanisamy2012-02-161-1/+4
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Do not call driver_init if hostapd interface is not yet configuredShan Palanisamy2012-02-161-4/+6
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Do not call hapd_deinit if driver was not initializedShan Palanisamy2012-02-161-1/+1
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Allow config parameters to be set through ctrl_ifaceShan Palanisamy2012-02-163-1/+30
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Split hostapd security parameter updating into a separate functionJouni Malinen2012-02-161-57/+61
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Split config item parser into a separate functionShan Palanisamy2012-02-161-72/+85
| | | | | | | This makes it easier to use the configuration file parser for updating the configuration at run time. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Clear wpa_psk/passphrase when the other option is configuredShan Palanisamy2012-02-161-0/+4
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-1112-96/+24
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>