Commit Graph

689 Commits

Author SHA1 Message Date
Kapil Gupta
85156cceff fix(esp_wifi): Address some review comments 2025-01-20 14:18:14 +08:00
Aditi
7900eeca4e fix(wpa_supplicant): Remove the btm_rrm task from supplicant
This commit removes btm_rrm_t task and CONFIG_SUPPLICANT_TASK from
wpa_supplicant and make the functions work in wifi task's context.
2025-01-20 14:17:58 +08:00
Aditi
5f2fb56755 fix(wpa_supplicant): Fix for sending alternate ft-auth in roaming 2025-01-20 14:17:48 +08:00
Aditi
318ad17991 fix(wpa_supplicant): Add two separate flags for RRM and WNM
Added two separate flags CONFIG_RRM(80211k) and CONFIG_WNM(80211v)
    flags under IEEE80211KV support flag.
2025-01-20 14:17:38 +08:00
Aditi
3f3c3d9a14 fix(wpa_supplicant): Add some minor fixes in roaming
1) Add a fix in roaming example for 11kvr
    2) Removed length constraint for neighbor report received.
2025-01-20 14:17:27 +08:00
Aditi
bdc099af7f fix(esp_wifi): Add fix for error handling for FT-Auth 2025-01-20 14:17:17 +08:00
Nachiket Kukade
ba8494eb87 fix(wpa_supplicant): Fix some coverity issues in wpa_supplicant
1. Fix leak in SoftAP while sending SAE Confirm
2. Move NULL check before pointer is getting used
3. Remove some dead code
2025-01-15 19:42:12 +05:30
wangtao@espressif.com
08db2390e5 fix(wifi): fix build issue when disable wpa3 sae 2025-01-15 19:42:12 +05:30
Shreyas Sheth
29a95d30cc fix(wifi): Resolve comments for softap fixes 2025-01-15 19:42:12 +05:30
Shreyas Sheth
913999b8c3 fix(wifi): Resolve comments on feature/softap_fixes_for_ceritification 2025-01-15 19:42:11 +05:30
Shreyas Sheth
98c47bbfae fix(wifi): Make sure auth is sent after sae process 2025-01-15 19:42:11 +05:30
Shreyas Sheth
81070bce92 feat(wifi): Add support for transition_disable for softAP
Bugfix rsnxe len for assoc req
2025-01-15 19:42:11 +05:30
Sarvesh Bodakhe
716c5731ec feat(wpa_supplicant): Add WIFI_EVENT_AP_WRONG_PASSWORD in SoftAP
This event is triggered when external station tries connecting to softAP
with wrong password.

Currently supported softAP AUTH modes: WPA-PSK, WPA2-PSK and WPA3-PSK (SAE-auth)
2025-01-15 19:42:11 +05:30
Kapil Gupta
5abadc5b38 fix(esp_wifi): Enable EAP workarounds by default
Enabling this will make sure our behavior is same as upstream
wpa_supplicant.
2025-01-03 17:42:53 +05:30
Jiang Jiang Jian
bc89933ad6 Merge branch 'bugfix/wps_ie_reset_v54' into 'release/v5.4'
fix(wifi): Remove WPS IEs once WPS succeeds (v5.4)

See merge request espressif/esp-idf!35071
2024-11-22 14:39:24 +08:00
Jiang Jiang Jian
5e65f632a3 Merge branch 'feature/avoid_compiling_wifi_components_when_wifi_is_unsupported_v5.4' into 'release/v5.4'
feat(wifi): avoid compiling components related to wifi when wifi is not supported(Backport v5.4)

See merge request espressif/esp-idf!35062
2024-11-22 13:42:51 +08:00
Kapil Gupta
234dce0e7f fix(wifi): Remove WPS IEs once WPS succeeds 2024-11-21 13:42:29 +05:30
yinqingzhao
a34f1eb6f9 feat(wifi): avoid compiling components related to wifi when wifi is not supported 2024-11-21 14:18:41 +08:00
Nachiket Kukade
8580f9f622 fix(wpa_supplicant): Add an exception in wpa_supplicant sbom.yml 2024-11-21 11:48:19 +05:30
sibeibei
49b8292f51 fix(wifi): fix some wifi issues 241031
1. fix cant sleep if reconnect to connected ap
    2. clear pmk in internal reconnection
    3. update connect status for init-->auth
    4. add protection for probe request when wifi band is 5g
2024-11-08 12:08:59 +08:00
Shyamal Khachane
624878b6e2 fix(esp_wifi): Populate appropriate reason codes when softAP sends deauthentication
Populate appropriate reason for sending deauthentication when softAP receives
invalid RSN IE from association request
2024-10-21 11:31:17 +08:00
Sarvesh Bodakhe
6797c86135 fix(wifi): Fix wrong wifi reason codes reported on station and softAP
- Fix wrong reason code reported when softAP issues a disconnect for station
- Fix wrong reason code reported when association timeout happens at station
- Deprecate enums WIFI_REASON_ASSOC_EXPIRE, WIFI_REASON_NOT_AUTHED, WIFI_REASON_NOT_ASSOCED
  and use WIFI_REASON_DISASSOC_DUE_TO_INACTIVITY,
  WIFI_REASON_CLASS2_FRAME_FROM_NONAUTH_STA,
  WIFI_REASON_CLASS3_FRAME_FROM_NONASSOC_STA respectively
- Update wifi documentation related to reason codes
2024-10-21 11:31:17 +08:00
Nachiket Kukade
82e6c06193 feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant 2024-10-15 12:27:54 +05:30
Sajia
ff4620fd70 fix(wifi): Add a check on hostapd instance while handling an Auth frame 2024-10-11 10:26:09 +08:00
Sarvesh Bodakhe
9ebfd93c5d fix(wpa_supplicant): Fix debug print in wps_start_msg_timer() 2024-10-07 16:31:43 +05:30
muhaidong
d918aa3ebd fix(wifi): fix miss internal wapi deinit issue 2024-09-30 10:02:29 +08:00
aditi
beda284524 feat(esp_wifi): Add esp-idf specific changes
Added esp-idf implementation specific changes on top of the upstream updates.
2024-09-29 19:13:20 +08:00
aditi
fbde07c953 feat(esp_wifi): Replace crypto_key with crypto_ec_key
Replaced all occurances of crypto_key with crypto_ec_key struct
    to make the code more consistent with upstream.
2024-09-29 19:13:20 +08:00
aditi_lonkar
cab4dc15f4 feat(esp_wifi): Restructure dpp crypto Layer APIs
1) Update dpp implementation as per upstram hostapd tag hostap_2_10.
2) Move dpp crypto routines into a separate source code file.
2024-09-29 19:13:20 +08:00
Aditi
7444127041 fix(wpa_supplicant): Add few fixes in dpp task 2024-09-27 14:00:24 +08:00
aditi
7fa1e5cf9a fix(wpa_supplicant): Add few fixes in btm_rrm task 2024-09-27 14:00:24 +08:00
aditi
c5892a4c96 fix(wpa_supplicant): Add few fixes in eloop task 2024-09-27 14:00:24 +08:00
aditi
35e96b977b fix(wpa_supplicant): Add few fixes in WPS task 2024-09-27 14:00:24 +08:00
aditi
9ceb0cffcc fix(wpa_supplicant): Add few fixes in eap client code 2024-09-27 14:00:24 +08:00
Jiang Jiang Jian
216e653de4 Merge branch 'bugfix/increase_leak_threshold_for_wpa_supplicant_dpp_test' into 'master'
fix(wpa_supplicant): add crypto init calls to address memory leak issue in tests

Closes IDFCI-2409

See merge request espressif/esp-idf!33731
2024-09-25 16:04:39 +08:00
Mahavir Jain
c89c316922 fix(wpa_supplicant): add crypto init calls to address memory leak issue in tests
- C61 does not feature MPI hardware and hence the other tests were
  getting executed first
- Memory leak threshold should be independent of target crypto
  peripherals and hence added to crypto init to test `setUp` call
2024-09-24 15:12:07 +05:30
yinqingzhao
a8ede32979 fix(wifi): modify some SOC_WIFI_SUPPORT_5G to CONFIG_SOC_WIFI_SUPPORT_5G 2024-09-24 13:14:51 +08:00
Jiang Jiang Jian
d076f0ad80 Merge branch 'feat/wifi_crypto_funcs_cleanup' into 'master'
Cleanup of wifi crypto funcs within wifi libs

See merge request espressif/esp-idf!30698
2024-09-23 21:08:50 +08:00
Jiang Jiang Jian
4530b0e395 Merge branch 'bugfix/sae_h2e_vulnerability_fix' into 'master'
fix(wifi): Sae check for invalid rejected group

See merge request espressif/esp-idf!33416
2024-09-23 20:32:00 +08:00
jgujarathi
52bcdb9400 refactor(esp_wifi): Cleanup of wifi crypto funcs within wifi libs
- Remove unnecessary funcs from wpa_crypto_funcs_t and consolidate some
  of their usages in wifi libs
2024-09-23 14:24:08 +05:30
Jouni Malinen
f9aa42b137 SAE: Check for invalid Rejected Groups element length explicitly on STA
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Fixes: 444d76f74f65 ("SAE: Check that peer's rejected groups are not enabled")
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
7fc4d894a9 SAE: Check that peer's rejected groups are not enabled
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-09-23 12:05:02 +08:00
Jouni Malinen
05874b938e SAE: Reject invalid Rejected Groups element in the parser
There is no need to depend on all uses (i.e., both hostapd and
wpa_supplicant) to verify that the length of the Rejected Groups field
in the Rejected Groups element is valid (i.e., a multiple of two octets)
since the common parser can reject the message when detecting this.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
ba76df4f69 SAE: Check for invalid Rejected Groups element length explicitly
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
b6f91e403a SAE: Check that peer's rejected groups are not enabled in AP
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-09-23 12:05:02 +08:00
Kapil Gupta
d2e0eb7a52 fix(esp_wifi): Prevent memory overflow in WPS 2024-09-21 14:38:09 +05:30
Kapil Gupta
5d792910be Merge branch 'bugfix/wps_timer_causing_disconnect' into 'master'
fix(esp_wifi): Disable WPS timers once WPS succeed

Closes WIFIBUG-393

See merge request espressif/esp-idf!33240
2024-09-21 15:03:19 +08:00
Kapil Gupta
0c9d7c9dd0 Merge branch 'bugfix/2g_5g_wnm_scan' into 'master'
fix(esp_wifi): Add changes to enable 5ghz scan

Closes WIFIBUG-773

See merge request espressif/esp-idf!33657
2024-09-20 22:20:26 +08:00
Kapil Gupta
3629909b11 fix(esp_wifi): Mask some error conditions in WPS
Mask some error conditions in WPS to increase the probability of
WPS success.
2024-09-20 22:08:01 +08:00
Kapil Gupta
3a35b26de1 fix(esp_wifi): Disable WPS timers once WPS succeed 2024-09-20 22:08:01 +08:00