aboutsummaryrefslogtreecommitdiffstats
path: root/src/common/wpa_common.c
Commit message (Collapse)AuthorAgeFilesLines
* P2P: enable to set in the conf file the wmm paramsYoni Divinsky2012-07-301-0/+70
| | | | | | | | | | In case of P2P GO, the wpa_supplicant uses the default hostapd parameters. In the default parameters the ACM bit for video and voice are set to 1, meaning, P2P devices and stations which are connected to the GO cannot pass voice or video data packets. Signed-hostap: Yoni Divinsky <yoni.divinsky@ti.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* FT: Share IE parser implementation for Authenticator and SupplicantJouni Malinen2011-07-161-0/+148
| | | | | These are almost identical, so there is no point in using separate implementations.
* WPA: Add more info for EAPOL-Key Nonce/MIC debuggingJouni Malinen2011-01-151-0/+2
|
* Share WPA IE parser function for RSN authenticator/supplicantJouni Malinen2010-11-121-0/+138
| | | | | | There is no point in maintaining two almost identical versions of this parser. Move WPA IE parser into wpa_common.c similarly to what was already the case with RSN IE parse.
* Make wpa_compare_rsn_ie() handle missing IEsJouni Malinen2010-04-101-0/+3
|
* FT: Fix FT 4-Way Handshake to include PMKR1Name in messages 2 and 3Jouni Malinen2010-04-071-0/+113
| | | | | | | | | | | | | | | | | | | IEEE Std 802.11r-2008, 11A.4.2 describes FT initial mobility domain association in an RSN to include PMKR1Name in the PMKID-List field in RSN IE in messages 2/4 and 3/4. This makes the RSN IE not be bitwise identical with the values used in Beacon, Probe Response, (Re)association Request frames. The previous versions of wpa_supplicant and hostapd did not add the PMKR1Name value in EAPOL-Key frame and did not accept it if added (due to bitwise comparison of RSN IEs). This commit fixes the implementation to be compliant with the standard by adding the PMKR1Name value into EAPOL-Key messages during FT 4-Way Handshake and by verifying that the received value matches with the value derived locally. This breaks interoperability with previous wpa_supplicant/hostapd versions.
* Remove src/crypto from default include pathJouni Malinen2009-11-291-5/+5
| | | | | | In addition, start ordering header file includes to be in more consistent order: system header files, src/utils, src/*, same directory as the *.c file.
* Add AP mode WPA status into ctrl_ifaceJouni Malinen2009-10-161-0/+67
|
* Verify that EAPOL-Key MIC generation succeedsJouni Malinen2009-08-161-3/+3
| | | | This can now fail, e.g., if trying to use TKIP in FIPS mode.
* Allow SHA256-based key handshake to be used without 802.11rJouni Malinen2009-02-191-2/+2
| | | | | | Previously, both CONFIG_IEEE80211W=y and CONFIG_IEEE80211R=y were needed to enable SHA256-based key handshake (WPA-PSK-SHA256 and WPA-EAP-SHA256). This can now be done with just CONFIG_IEEE80211W=y.
* Moved rsn_pmkid() into shared code to avoid duplicationJouni Malinen2009-01-141-0/+34
|
* Added support for using SHA256-based stronger key derivation for WPA2Jouni Malinen2008-08-311-2/+16
| | | | | | IEEE 802.11w/D6.0 defines new AKMPs to indicate SHA256-based algorithms for key derivation (and AES-CMAC for EAPOL-Key MIC). Add support for using new AKMPs and clean up AKMP processing with helper functions in defs.h.
* IEEE Std 802.11r-2008 has been released, so update referencesJouni Malinen2008-08-151-4/+4
|
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-271-0/+556