Kapil Gupta
746abfa199
fix(esp_wifi): Fix stack curruption in btm task (v5.3)
2025-02-14 12:53:59 +05:30
Jiang Jiang Jian
2ff653bc56
Merge branch 'bugfix/skip_memory_reordering_wpa2_semaphr_v5.3' into 'release/v5.3'
...
fix(esp_wifi): fixed stack corruption in WiFi tasks (v5.3)
See merge request espressif/esp-idf!36937
2025-02-14 14:31:29 +08:00
Kapil Gupta
135a320b3c
fix(esp_wifi): Fix stack corruption in wpa3 task
2025-02-13 14:23:35 +05:30
Kapil Gupta
70ad8d04ed
fix(esp_wifi): fixed Stack corruption in DPP task
2025-02-13 14:23:35 +05:30
Kapil Gupta
d6dec98447
fix(esp_wifi): fixed Stack corruption in WPS processing
2025-02-13 14:23:35 +05:30
Kapil Gupta
565b8914ae
fix(esp_wifi): Fixed memory corruption in wifi enterprise
...
Closes https://github.com/espressif/esp-idf/issues/15370
2025-02-13 14:23:35 +05:30
Shreyas Sheth
467524f067
fix(wifi): Fixed memory leak occurring in SAE PK connection
2025-02-13 12:03:16 +05:30
Jiang Jiang Jian
a46ac40ca8
Merge branch 'bugfix/wps_scan_freq_v5.3' into 'release/v5.3'
...
fix(esp_wifi): Reduce scan frequency in WPS (v5.3)
See merge request espressif/esp-idf!36820
2025-02-12 16:15:57 +08:00
Jiang Jiang Jian
a7ce0206bd
Merge branch 'bugfix/analyzer_issues_supplicant_v5.3' into 'release/v5.3'
...
fix(esp_wifi): fix some analyzer issues (v5.3)
See merge request espressif/esp-idf!36826
2025-02-12 13:57:44 +08:00
Sarvesh Bodakhe
dac80a87a4
fix(wifi): Add some wifi bugfixes and features
...
1. Fix issue of increased stack usage when failure_retry_cnt is set
and wifi driver internally retries connection attempts
2. Add WIFI_EVENT_AP_WRONG_PASSWORD in SoftAP.
This event is triggered when external station tries connecting to softAP
with wrong password.
Current supported softAP AUTH modes: WPA-PSK, WPA2-PSK and WPA3-PSK (SAE-auth)
2025-02-11 12:14:10 +05:30
Kapil Gupta
4442fe7787
fix(esp_wifi): Add review comments and some cleanup
2025-02-10 15:46:50 +05:30
Kapil Gupta
0b4bfb451f
fix(esp_wifi): fix some analyzer issues
...
Closes https://github.com/espressif/esp-idf/issues/15097
Closes https://github.com/espressif/esp-idf/issues/15098
Closes https://github.com/espressif/esp-idf/issues/15099
2025-02-10 15:46:50 +05:30
Kapil Gupta
074235e261
fix(esp_wifi): Reduce scan frequency in WPS
2025-02-10 15:31:46 +05:30
Kapil Gupta
b6a87e7e6d
fix(esp_wifi): Enable EAP workarounds by default
...
Enabling this will make sure our behavior is same as upstream
wpa_supplicant.
2025-01-17 13:53:18 +08:00
yinqingzhao
93582b8221
feat(wifi): avoid compiling components related to wifi when wifi is not supported
2025-01-08 16:47:34 +08:00
Shyamal Khachane
c61e3f4dd3
fix(esp_wifi): Populate appropriate reason codes when softAP sends deauthentication
...
Populate appropriate reason for sending deauthentication when softAP receives
invalid RSN IE from association request
2024-12-10 20:08:02 +05:30
Sarvesh Bodakhe
e2d73046b3
fix(wifi): Fix wrong wifi reason codes reported on station and softAP
...
- Fix wrong reason code reported when softAP issues a disconnect for station
- Fix wrong reason code reported when association timeout happens at station
- Deprecate enums WIFI_REASON_ASSOC_EXPIRE, WIFI_REASON_NOT_AUTHED, WIFI_REASON_NOT_ASSOCED
and use WIFI_REASON_DISASSOC_DUE_TO_INACTIVITY,
WIFI_REASON_CLASS2_FRAME_FROM_NONAUTH_STA,
WIFI_REASON_CLASS3_FRAME_FROM_NONASSOC_STA respectively
- Update wifi documentation related to reason codes
2024-12-10 20:08:00 +05:30
Sarvesh Bodakhe
55a93548da
fix(wpa_supplicant): Fix debug print in wps_start_msg_timer()
2024-12-10 20:07:39 +05:30
Harshit Malpani
83413257af
fix(wpa_supplicant): Fix build errors for exclusive TLSv1.3 mbedtls config
...
Co-authored-by: Sarvesh Bodakhe <sarvesh.bodakhe@espressif.com >
2024-12-10 13:07:44 +08:00
Jiang Jiang Jian
369befb8fc
Merge branch 'fix/add_sbom_exception_v5.3' into 'release/v5.3'
...
Add an exception in wpa_supplicant sbom.yml (Backport v5.3)
See merge request espressif/esp-idf!35063
2024-12-09 17:22:18 +08:00
Kapil Gupta
3a8cf533bc
fix(wifi): Remove WPS IEs once WPS succeeds
2024-12-06 18:54:35 +08:00
Nachiket Kukade
78b5ff0750
fix(wpa_supplicant): Add an exception in wpa_supplicant sbom.yml
2024-11-21 11:52:05 +05:30
sibeibei
64067f4cf0
fix(wifi): fix some wifi issues 241031
...
1. fix cant sleep if reconnect to connected ap
2. clear pmk in internal reconnection
3. update connect status for init-->auth
2024-11-15 16:35:50 +08:00
Kapil Gupta
9f27f51dbe
fix(esp_wifi): Remove duplicate declaration of function
2024-10-25 23:32:14 +05:30
jgujarathi
74bb92cc5f
fix(esp_wifi): Stops roaming app upon application initiated disconnect
...
Stops roaming app when the application initiates a disconnect.
Roaming app if enabled will be restarted when the station reconnects again.
2024-10-25 23:32:14 +05:30
jgujarathi
33214e4d68
fix(esp_supplicant): Fix compilation issues with btm and rrm status funcs
...
- Ensure that the btm and rrm status funcs can be used even if 80211.kv
are not enabled in menuconfig. They will return false in such cases.
2024-10-25 23:32:14 +05:30
Jiang Jiang Jian
9c2e021bed
Merge branch 'feature/add_dpp_crypto_layer_v53' into 'release/v5.3'
...
feat(esp_wifi): Restructure dpp crypto Layer APIs
See merge request espressif/esp-idf!34319
2024-10-25 19:38:08 +08:00
Jiang Jiang Jian
3eef7a1d92
Merge branch 'bugfix/wpa2_ent_fixes_v53' into 'release/v5.3'
...
Few fixes in wpa_supplicant(v5.3)
See merge request espressif/esp-idf!34275
2024-10-24 13:03:03 +08:00
Jiang Jiang Jian
915c011ca5
Merge branch 'feat/add_sbom_wpa_supplicant_v5.3' into 'release/v5.3'
...
feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant (Backport v5.3)
See merge request espressif/esp-idf!34272
2024-10-24 11:18:29 +08:00
wangtao@espressif.com
71bb752d98
feat(wifi): support esp32c2 eco4 wifi bringup
2024-10-22 17:05:13 +08:00
muhaidong
9c55f57fa4
fix(wifi): fix miss internal wapi deinit issue
2024-10-18 14:24:52 +08:00
aditi
c807ce97d9
feat(esp_wifi): Add esp-idf specific changes
...
Added esp-idf implementation specific changes on top of the upstream updates.
2024-10-18 11:36:16 +05:30
aditi
7490867a4d
feat(esp_wifi): Replace crypto_key with crypto_ec_key
...
Replaced all occurances of crypto_key with crypto_ec_key struct
to make the code more consistent with upstream.
2024-10-18 11:36:01 +05:30
aditi_lonkar
d45588ff51
feat(esp_wifi): Restructure dpp crypto Layer APIs
...
1) Update dpp implementation as per upstram hostapd tag hostap_2_10.
2) Move dpp crypto routines into a separate source code file.
2024-10-18 11:34:37 +05:30
Aditi
8057de95d7
fix(wpa_supplicant): Add few fixes in dpp task
2024-10-18 11:26:16 +05:30
aditi
e148c20c07
fix(wpa_supplicant): Add few fixes in btm_rrm task
2024-10-18 11:26:08 +05:30
aditi
afd8449418
fix(wpa_supplicant): Add few fixes in eloop task
2024-10-18 11:26:01 +05:30
aditi
78f5d3b11d
fix(wpa_supplicant): Add few fixes in WPS task
2024-10-18 11:25:52 +05:30
aditi
e142c11dd0
fix(wpa_supplicant): Add few fixes in eap client code
2024-10-18 11:25:21 +05:30
Nachiket Kukade
fabf233666
feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant
2024-10-18 09:57:22 +05:30
Sajia
3ff63b3bfc
fix(wifi): Add a check on hostapd instance while handling an Auth frame
2024-10-11 15:16:16 +05:30
Jiang Jiang Jian
21858b4144
Merge branch 'bugfix/sae_h2e_vulnerability_fix_v5.3' into 'release/v5.3'
...
fix(wifi): Sae check for invalid rejected group (v5.3)
See merge request espressif/esp-idf!33979
2024-10-08 19:37:33 +08:00
Jouni Malinen
b18849638e
SAE: Check for invalid Rejected Groups element length explicitly on STA
...
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.
Fixes: 444d76f74f65 ("SAE: Check that peer's rejected groups are not enabled")
Signed-off-by: Jouni Malinen <j@w1.fi >
2024-10-07 12:25:45 +05:30
Jouni Malinen
c6fee11bfc
SAE: Check that peer's rejected groups are not enabled
...
Signed-off-by: Jouni Malinen <jouni@codeaurora.org >
2024-10-07 12:25:45 +05:30
Jouni Malinen
90317ded69
SAE: Reject invalid Rejected Groups element in the parser
...
There is no need to depend on all uses (i.e., both hostapd and
wpa_supplicant) to verify that the length of the Rejected Groups field
in the Rejected Groups element is valid (i.e., a multiple of two octets)
since the common parser can reject the message when detecting this.
Signed-off-by: Jouni Malinen <j@w1.fi >
2024-10-07 12:25:45 +05:30
Jouni Malinen
5f7a3b6d48
SAE: Check for invalid Rejected Groups element length explicitly
...
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.
Signed-off-by: Jouni Malinen <j@w1.fi >
2024-10-07 12:25:45 +05:30
Jouni Malinen
6b3bf4d0e7
SAE: Check that peer's rejected groups are not enabled in AP
...
Signed-off-by: Jouni Malinen <jouni@codeaurora.org >
2024-10-07 12:25:45 +05:30
Kapil Gupta
bff34554df
fix(wifi): Add channel bit definition
2024-10-07 09:54:17 +05:30
Kapil Gupta
640f9750a4
fix(esp_wifi): Prevent memory overflow in WPS
2024-10-06 16:52:25 +05:30
Kapil Gupta
f430a553de
fix(esp_wifi): Mask some error conditions in WPS
...
Mask some error conditions in WPS to increase the probability of
WPS success.
2024-10-06 16:52:25 +05:30