aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap
Commit message (Collapse)AuthorAgeFilesLines
...
* AP: remove ssi_signal from ap_infoJohannes Berg2012-03-052-4/+1
| | | | | | It is never used. Signed-hostap: Johannes Berg <johannes.berg@intel.com>
* WPS: Invalidate wildcard PIN on other radios after successful useJouni Malinen2012-02-291-2/+8
| | | | | | | | If a wildcard PIN is used on any of the radios that hostapd is controlling, invalidate the matching PIN on all the other radios to avoid multiple uses of the same PIN. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* GAS server: Add support for ANQP Venue Name elementJouni Malinen2012-02-264-0/+41
| | | | | | | The new venue_name configuration parameter can now be used to configure the ANQP Venue Name values that stations can request through GAS. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* GAS server: Add support for ANQP Roaming Consortium listJouni Malinen2012-02-262-0/+27
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Interworking: Add GAS server support for AP modeJay Katabathuni2012-02-267-1/+708
| | | | | | | | | | | This adds GAS/ANQP implementation into hostapd. This commit brings in the basic GAS/ANQP functionality, but only the ANQP Capability List element is supported. For testing purposes, hostapd control interface SET command can be used to set the gas_frag_limit parameter dynamically. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Add hostapd_drv_send_action()Jay Katabathuni2012-02-262-0/+15
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Generate random ANonce instead of one based on CounterJouni Malinen2012-02-261-2/+15
| | | | | | | | | | | | Definition of ANonce selection in IEEE Std 802.11i-2004 is somewhat ambiguous. The Authenticator state machine uses a counter that is incremented by one for each 4-way handshake. However, the security analysis of 4-way handshake points out that unpredictable nonces help in preventing precomputation attacks. Instead of the state machine definition, use an unpredictable nonce value here to provide stronger protection against potential precomputation attacks. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add wpa_supplicant AP mode STA deauthenticate/disassociate commandsJithu Jance2012-02-252-0/+173
| | | | | | | | Move disassociate and deauthenticate commands to ctrl_iface_ap.c, so that they ares accessible for wpa_supplicant AP mode and wpa_cli (with CONFIG_AP option enabled). Signed-hostap: Jithu Jance <jithu@broadcom.com>
* Clear WEP configuration on interface deinitShan Palanisamy2012-02-161-0/+10
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Split hostapd_cleanup_iface() into two partsShan Palanisamy2012-02-161-7/+13
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Split hostapd_cleanup() into two partsShan Palanisamy2012-02-161-14/+20
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Move hostapd_for_each_interface() and hapd_interfaces into src/apJouni Malinen2012-02-162-1/+26
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Make sure ctrl_iface is not initialized multiple timesShan Palanisamy2012-02-161-0/+1
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Ignore TX status for Data frames from not associated STAJouni Malinen2012-02-141-1/+1
| | | | | | | | | | | | | | | | | Commit d9a38716ccf90b0ab307f570a30931684a1b8730 did this for hostapd_eapol_tx_status() but missed the older hostapd_tx_status() path. Address that case, too. The TX status event may be received after a station has been disassociated in cases where the disassociation is following a transmission of a Data frame. Ignore such events if the STA is not associated at the moment the event is being processed. This avoids confusing debug entries and rescheduling of the EAPOL TX timeouts for STAs that are still in the STA table, but are not really in active EAPOL session. Signed-hostap: Jouni Malinen <j@w1.fi> intended-for: hostap-1
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-1146-368/+92
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove the GPL notification from files contributed by AtherosJouni Malinen2012-02-112-16/+4
| | | | | | | Remove the GPL notification text from files that were initially contributed by Atheros Communications or Qualcomm Atheros. Signed-hostap: Jouni Malinen <j@w1.fi>
* Clear EAPOL authenticator authFail for PMKSA caching/FTJouni Malinen2012-02-041-1/+3
| | | | | | | | | | | | | | | | This fixes a corner case where a STA that has PMKSA cache entry (or valid FT keys) could try to use full EAPOL/EAP authentication and fail. If the STA will then try to use the still valid PMKSA cache entry (or FT) before the STA entry has been cleared, authFail could have been left to TRUE. That will make EAPOL authenticator PAE state machine enter HELD state even though authSuccess was already forced to TRUE. This results in the STA getting disconnected even though it should be allowed to continue with 4-way handshake. While this is unlikely to happen in practice, it is better to get this fixed by clearing authFail when setting authSuccess. Signed-hostap: Jouni Malinen <j@w1.fi> intended-for: hostap-1
* Ignore TX status for Data frames from not associated STAJouni Malinen2012-02-041-2/+6
| | | | | | | | | | | | | The TX status event may be received after a stations has been disassociated in cases where the disassociation is following a transmission of a Data frame. Ignore such events if the STA is not associated at the moment the event is being processed. This avoids confusing debug entries and rescheduling of the EAPOL TX timeouts for STAs that are still in the STA table, but are not really in active EAPOL session. Signed-hostap: Jouni Malinen <j@w1.fi> intended-for: hostap-1
* WPS: Disable AP PIN after 10 consecutive failuresJouni Malinen2012-01-302-3/+43
| | | | | | | | | | | While the exponential increase in the lockout period provides an efficient mitigation mechanism against brute force attacks, this additional trigger to enter indefinite lockout period (cleared by restarting hostapd) will limit attacks even further by giving maximum of 10 attempts (without authorized user action) even in a very long term attack. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* wpa_auth: Fix race in rejecting 4-way handshake for entropyNicolas Cavallari2012-01-291-8/+9
| | | | | | | | | | | | | | When there is not enough entropy and there are two station associating at the same time, one of the stations will be rejected, but during that rejection, the "reject_4way_hs_for_entropy" flag gets cleared. This may allow the second station to avoid rejection and complete a 4-Way Handshake with a GTK that will be cleared as soon as more entropy is available and another station connects. This reworks the logic to ban all 4-way handshakes until enough entropy is available. Signed-hostap: Nicolas Cavallari <cavallar@lri.fr>
* Fix ap_sta_disconnect() to clear EAPOL/WPA authenticator stateJouni Malinen2012-01-251-0/+2
| | | | | | | | | | | | | | | | Number of places in hostapd use ap_sta_disconnect() instead of ap_sta_disassociate() or ap_sta_deauthenticate(). There are some differences between these functions, e.g., in the area how quickly the EAPOL state machines get deinitialized. This can result in somewhat unexpected events since the EAPOL/WPA authenticator state machines could remain running after deauthentication. Address this by forcing EAPOL/WPA authenticator state machines to disabled state whenever ap_sta_disconnect() is called instead of waiting for the deauthentication callback or other timeout to clear the STA. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Work around interop issue with WPA type EAPOL-Key 4/4 in WPA2 modeJouni Malinen2012-01-221-1/+8
| | | | | | | | | | Some deployed station implementations seem to send msg 4/4 with incorrect type value in WPA2 mode. Add a workaround to ignore that issue so that such stations can interoperate with hostapd authenticator. The validation checks were added in commit f8e96eb6fd960a017793942cff0eb43b09f444c6. Signed-hostap: Jouni Malinen <j@w1.fi>
* P2P: Use Device ID attribute to filter Probe Request frames as GOJouni Malinen2012-01-081-0/+12
| | | | | | | | The Device ID attribute was already used in Listen state, but it was ignored in GO role. Verify that there is a match with Device ID in GO rule, too, before replying to the Probe Request frame. Signed-hostap: Jouni Malinen <j@w1.fi>
* Allow SNonce update after sending EAPOL-Key 3/4 if 1/4 was retransmittedJouni Malinen2012-01-022-19/+92
| | | | | | | | | | | | | Some supplicant implementations (e.g., Windows XP WZC) update SNonce for each EAPOL-Key 2/4. This breaks the workaround on accepting any of the pending requests, so allow the SNonce to be updated even if we have already sent out EAPOL-Key 3/4. While the issue was made less likely to occur when the retransmit timeout for the initial EAPOL-Key msg 1/4 was increased to 1000 ms, this fixes the problem even if that timeout is not long enough. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Do not disconnect STA based on inactivity on driver failureJouni Malinen2012-01-021-1/+7
| | | | | | | | | | Now that we can use driver_nl80211.c with non-mac80211 drivers that implement SME/MLME internally, we may not get inactivity time from the driver. If that is the case, we need to skip disconnection based on maximum inactivity timeout. This fixes some unexpected disconnection cases with ath6kl in AP mode. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Make inactivity polling configurableYogesh Ashok Powar2011-12-252-1/+6
| | | | | | | | | | | | | | | hostapd uses the poll method to check if the station is alive after the station has been inactive for ap_max_inactivity seconds. Make the poll mechanism configurable so that user can choose to disconnect idle clients. This can be especially useful when some devices/firmwares have restrictions on the number of clients that can connect to the AP and that limit is smaller than the total number of stations trying to use the AP. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com> Signed-off-by: Nishant Sarmukadam <nishants@marvell.com>
* Remove obsolete comment on removed PTK rekeying operationJouni Malinen2011-12-241-3/+0
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Increase initial group key handshake retransmit timeout to 500 msJouni Malinen2011-12-241-3/+5
| | | | | | | | | | The 100 ms timeout on retransmitting group key message can be too short for stations that are in power save mode or if there is a large number of association stations. While the retransmission of the EAPOL-Key frame should allow this to be recovered from, it is useful to avoid unnecessary frames to save soem CPU and power. Signed-hostap: Jouni Malinen <j@w1.fi>
* Drop priority level of the logger message for unexpected replay counterJouni Malinen2011-12-241-1/+1
| | | | | | | This can happen frequently during normal EAPOL-Key exchanges and there is no need to log it at info level. Signed-hostap: Jouni Malinen <j@w1.fi>
* P2P: Maintain a list of P2P Clients for persistent group on GOJouni Malinen2011-12-222-2/+2
| | | | | | | | | | Add a new persistent group network block field, p2p_client_list, to maintain a list of P2P Clients that have connected to a persistent group. This allows GO of a persistent group to figure out more easily whether re-invocation of a persistent group can be used with a specific peer device. Signed-hostap: Jouni Malinen <j@w1.fi>
* Lower RX_MGMT driver event debug level for Beacon framesJouni Malinen2011-12-181-1/+15
| | | | | | | | This event can be very frequent in AP mode when Beacon frames from neighboring BSSes are delivered to user space. Drop the debug message priority from DEBUG to EXCESSIVE for Beacon frames. Signed-hostap: Jouni Malinen <j@w1.fi>
* Make hostapd_eid_wmm_valid() return more logical return valuesJouni Malinen2011-12-172-7/+9
| | | | | | | Return 1/0 instead 0/-1 to indicate valid/invalid element so that the if statement makes more sense with !wmm_valid(). Signed-hostap: Jouni Malinen <j@w1.fi>
* AP: Pass station's WMM configuration to driver wrappersJason Young2011-12-174-12/+7
| | | | | | | This updates a previous patch did more or less the same thing by providing the qosinfo as a single variable to the driver wrappers. Signed-hostap: Jason Young <jason.young@dspg.com>
* AP: Add uapsd_queues and max_sp fieldsEliad Peller2011-12-174-6/+20
| | | | | | | | | Add uapsd_queues and max_sp fields to sta_info struct, and pass them to the sta_add callback. These values are determined by the WMM IE in the (Re)Association Request. Signed-off-by: Eliad Peller <eliad@wizery.com>
* AP: Consider U-APSD driver supportEliad Peller2011-12-171-1/+2
| | | | | | | Check whether the driver advertises support for U-APSD in AP mode, and evaluate wmm_uapsd only in this case. Signed-off-by: Eliad Peller <eliad@wizery.com>
* Allow WPA passphrase to be fetched with RADIUS Tunnel-Password attributeMichael Braun2011-12-117-5/+74
| | | | | | | | | | | | This allows per-device PSK to be configured for WPA-Personal using a RADIUS authentication server. This uses RADIUS-based MAC address ACL (macaddr_acl=2), i.e., Access-Request uses the MAC address of the station as the User-Name and User-Password. The WPA passphrase is returned in Tunnel-Password attribute in Access-Accept. This functionality can be enabled with the new hostapd.conf parameter, wpa_psk_radius. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
* Set driver Probe Response template for AP mode offloadArik Nemtsov2011-12-101-0/+42
| | | | | | | | | | | Configure a Probe Response template for drivers that support it. The template is updated when the Beacon template is updated. The Probe Response template is propagated to the driver via the set_ap() callback. Signed-hostap: Arik Nemtsov <arik@wizery.com> Signed-off-by: Arik Nemtsov <arik@wizery.com>
* Split Probe Response generation into a separate functionArik Nemtsov2011-12-101-102/+114
| | | | | | | | This is needed for Probe Response template, so move the code into a separate function that can be shared. Signed-hostap: Arik Nemtsov <arik@wizery.com> Signed-off-by: Arik Nemtsov <arik@wizery.com>
* Maintain internal copy of Probe Response offload capabilitiesArik Nemtsov2011-12-101-0/+7
| | | | | Signed-hostap: Arik Nemtsov <arik@wizery.com> Signed-off-by: Arik Nemtsov <arik@wizery.com>
* AP: Improve disconnect and timeout related loggingBen Greear2011-12-103-4/+9
| | | | | | | This previously helped when debugging some auth issues when hitting the AP with 128 association attempts all at once. Signed-off-by: Ben Greear <greearb@candelatech.com>
* AP: Convert some wpa_printf to wpa_msg/dbgBen Greear2011-12-102-5/+6
| | | | | | | This generates better log messages when running multiple interfaces in one process. Signed-off-by: Ben Greear <greearb@candelatech.com>
* Tell user why a channel cannot be used in AP modeBen Greear2011-12-101-2/+9
| | | | Signed-off-by: Ben Greear <greearb@candelatech.com>
* P2P: Append P2P Device Address to AP-STA-DISCONNECTED eventJithu Jance2011-12-101-8/+20
| | | | | | | | | Append "p2p_dev_addr" parameter to AP-STA-DISCONNECTED event for P2P connections. In addition, for AP-STA-CONNECTED event during P2P connection, the "dev_addr=" print is replaced with "p2p_dev_addr=" to be more consistent with other events. Signed-hostap: Jithu Jance <jithu@broadcom.com>
* Add MSK dump mechanism into hostapd RADIUS server for testingJouni Malinen2011-12-093-0/+11
| | | | | | | | | | | | | | Testing code can now be enabled in the hostapd RADIUS server to dump each derived MSK into a text file (e.g., to be used as an input to wlantest). This functionality is not included in the default build and can be enabled by adding the following line to hostapd/.config: CFLAGS += -DCONFIG_RADIUS_TEST The MSK dump file is specified with dump_msk_file parameter in hostapd.conf (path to the dump file). If this variable is not set, MSK dump mechanism is not enabled at run time. Signed-hostap: Jouni Malinen <j@w1.fi>
* Fix basic_rates copyingJouni Malinen2011-12-041-2/+2
| | | | | | | Commit e5693c4775bae65faa960f80889f98b0a6cb2e1c used incorrect sizeof to copy the basic rates. Signed-hostap: Jouni Malinen <j@w1.fi>
* Fix no-NEED_AP_MLME buildJouni Malinen2011-12-041-1/+1
| | | | | | | | Commit 34445d12eeb2eea53f50e5021e260dc0d07cbbbd forgot to convert the hostapd_prepare_rates() inline wrapper for builds that do not define NEED_AP_MLME. Signed-hostap: Jouni Malinen <j@w1.fi>
* Allow Action frames with unknown BSSID in GO modeArik Nemtsov2011-12-041-0/+5
| | | | | | | | | P2P invitation responses are transmitted with the BSSID set to the peer address. Pass these action frames up to allow the GO to receive the Invitation Response (and avoid sending the Invitation Request multiple times). Signed-off-by: Arik Nemtsov <arik@wizery.com>
* Convert hostapd_prepare_rates() to use struct hostapd_ifaceJouni Malinen2011-12-033-23/+23
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Merge set_rate_sets() driver_ops into set_ap()Jouni Malinen2011-12-036-13/+12
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove unused parameters from set_rate_sets()Jouni Malinen2011-12-033-8/+4
| | | | | | | Only setting of the basic rate set was supported, so remove the unused parameters. Signed-hostap: Jouni Malinen <j@w1.fi>