Commit Graph

670 Commits

Author SHA1 Message Date
Kapil Gupta
746abfa199 fix(esp_wifi): Fix stack curruption in btm task (v5.3) 2025-02-14 12:53:59 +05:30
Jiang Jiang Jian
2ff653bc56 Merge branch 'bugfix/skip_memory_reordering_wpa2_semaphr_v5.3' into 'release/v5.3'
fix(esp_wifi): fixed stack corruption in WiFi tasks (v5.3)

See merge request espressif/esp-idf!36937
2025-02-14 14:31:29 +08:00
Kapil Gupta
135a320b3c fix(esp_wifi): Fix stack corruption in wpa3 task 2025-02-13 14:23:35 +05:30
Kapil Gupta
70ad8d04ed fix(esp_wifi): fixed Stack corruption in DPP task 2025-02-13 14:23:35 +05:30
Kapil Gupta
d6dec98447 fix(esp_wifi): fixed Stack corruption in WPS processing 2025-02-13 14:23:35 +05:30
Kapil Gupta
565b8914ae fix(esp_wifi): Fixed memory corruption in wifi enterprise
Closes https://github.com/espressif/esp-idf/issues/15370
2025-02-13 14:23:35 +05:30
Shreyas Sheth
467524f067 fix(wifi): Fixed memory leak occurring in SAE PK connection 2025-02-13 12:03:16 +05:30
Jiang Jiang Jian
a46ac40ca8 Merge branch 'bugfix/wps_scan_freq_v5.3' into 'release/v5.3'
fix(esp_wifi): Reduce scan frequency in WPS (v5.3)

See merge request espressif/esp-idf!36820
2025-02-12 16:15:57 +08:00
Jiang Jiang Jian
a7ce0206bd Merge branch 'bugfix/analyzer_issues_supplicant_v5.3' into 'release/v5.3'
fix(esp_wifi): fix some analyzer issues (v5.3)

See merge request espressif/esp-idf!36826
2025-02-12 13:57:44 +08:00
Sarvesh Bodakhe
dac80a87a4 fix(wifi): Add some wifi bugfixes and features
1. Fix issue of increased stack usage when failure_retry_cnt is set
   and wifi driver internally retries connection attempts

2. Add WIFI_EVENT_AP_WRONG_PASSWORD in SoftAP.
   This event is triggered when external station tries connecting to softAP
   with wrong password.

   Current supported softAP AUTH modes: WPA-PSK, WPA2-PSK and WPA3-PSK (SAE-auth)
2025-02-11 12:14:10 +05:30
Kapil Gupta
4442fe7787 fix(esp_wifi): Add review comments and some cleanup 2025-02-10 15:46:50 +05:30
Kapil Gupta
0b4bfb451f fix(esp_wifi): fix some analyzer issues
Closes https://github.com/espressif/esp-idf/issues/15097
Closes https://github.com/espressif/esp-idf/issues/15098
Closes https://github.com/espressif/esp-idf/issues/15099
2025-02-10 15:46:50 +05:30
Kapil Gupta
074235e261 fix(esp_wifi): Reduce scan frequency in WPS 2025-02-10 15:31:46 +05:30
Kapil Gupta
b6a87e7e6d fix(esp_wifi): Enable EAP workarounds by default
Enabling this will make sure our behavior is same as upstream
wpa_supplicant.
2025-01-17 13:53:18 +08:00
yinqingzhao
93582b8221 feat(wifi): avoid compiling components related to wifi when wifi is not supported 2025-01-08 16:47:34 +08:00
Shyamal Khachane
c61e3f4dd3 fix(esp_wifi): Populate appropriate reason codes when softAP sends deauthentication
Populate appropriate reason for sending deauthentication when softAP receives
invalid RSN IE from association request
2024-12-10 20:08:02 +05:30
Sarvesh Bodakhe
e2d73046b3 fix(wifi): Fix wrong wifi reason codes reported on station and softAP
- Fix wrong reason code reported when softAP issues a disconnect for station
- Fix wrong reason code reported when association timeout happens at station
- Deprecate enums WIFI_REASON_ASSOC_EXPIRE, WIFI_REASON_NOT_AUTHED, WIFI_REASON_NOT_ASSOCED
  and use WIFI_REASON_DISASSOC_DUE_TO_INACTIVITY,
  WIFI_REASON_CLASS2_FRAME_FROM_NONAUTH_STA,
  WIFI_REASON_CLASS3_FRAME_FROM_NONASSOC_STA respectively
- Update wifi documentation related to reason codes
2024-12-10 20:08:00 +05:30
Sarvesh Bodakhe
55a93548da fix(wpa_supplicant): Fix debug print in wps_start_msg_timer() 2024-12-10 20:07:39 +05:30
Harshit Malpani
83413257af fix(wpa_supplicant): Fix build errors for exclusive TLSv1.3 mbedtls config
Co-authored-by: Sarvesh Bodakhe <sarvesh.bodakhe@espressif.com>
2024-12-10 13:07:44 +08:00
Jiang Jiang Jian
369befb8fc Merge branch 'fix/add_sbom_exception_v5.3' into 'release/v5.3'
Add an exception in wpa_supplicant sbom.yml (Backport v5.3)

See merge request espressif/esp-idf!35063
2024-12-09 17:22:18 +08:00
Kapil Gupta
3a8cf533bc fix(wifi): Remove WPS IEs once WPS succeeds 2024-12-06 18:54:35 +08:00
Nachiket Kukade
78b5ff0750 fix(wpa_supplicant): Add an exception in wpa_supplicant sbom.yml 2024-11-21 11:52:05 +05:30
sibeibei
64067f4cf0 fix(wifi): fix some wifi issues 241031
1. fix cant sleep if reconnect to connected ap
    2. clear pmk in internal reconnection
    3. update connect status for init-->auth
2024-11-15 16:35:50 +08:00
Kapil Gupta
9f27f51dbe fix(esp_wifi): Remove duplicate declaration of function 2024-10-25 23:32:14 +05:30
jgujarathi
74bb92cc5f fix(esp_wifi): Stops roaming app upon application initiated disconnect
Stops roaming app when the application initiates a disconnect.
Roaming app if enabled will be restarted when the station reconnects again.
2024-10-25 23:32:14 +05:30
jgujarathi
33214e4d68 fix(esp_supplicant): Fix compilation issues with btm and rrm status funcs
- Ensure that the btm and rrm status funcs can be used even if 80211.kv
  are not enabled in menuconfig. They will return false in such cases.
2024-10-25 23:32:14 +05:30
Jiang Jiang Jian
9c2e021bed Merge branch 'feature/add_dpp_crypto_layer_v53' into 'release/v5.3'
feat(esp_wifi): Restructure dpp crypto Layer APIs

See merge request espressif/esp-idf!34319
2024-10-25 19:38:08 +08:00
Jiang Jiang Jian
3eef7a1d92 Merge branch 'bugfix/wpa2_ent_fixes_v53' into 'release/v5.3'
Few fixes in wpa_supplicant(v5.3)

See merge request espressif/esp-idf!34275
2024-10-24 13:03:03 +08:00
Jiang Jiang Jian
915c011ca5 Merge branch 'feat/add_sbom_wpa_supplicant_v5.3' into 'release/v5.3'
feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant (Backport v5.3)

See merge request espressif/esp-idf!34272
2024-10-24 11:18:29 +08:00
wangtao@espressif.com
71bb752d98 feat(wifi): support esp32c2 eco4 wifi bringup 2024-10-22 17:05:13 +08:00
muhaidong
9c55f57fa4 fix(wifi): fix miss internal wapi deinit issue 2024-10-18 14:24:52 +08:00
aditi
c807ce97d9 feat(esp_wifi): Add esp-idf specific changes
Added esp-idf implementation specific changes on top of the upstream updates.
2024-10-18 11:36:16 +05:30
aditi
7490867a4d feat(esp_wifi): Replace crypto_key with crypto_ec_key
Replaced all occurances of crypto_key with crypto_ec_key struct
    to make the code more consistent with upstream.
2024-10-18 11:36:01 +05:30
aditi_lonkar
d45588ff51 feat(esp_wifi): Restructure dpp crypto Layer APIs
1) Update dpp implementation as per upstram hostapd tag hostap_2_10.
2) Move dpp crypto routines into a separate source code file.
2024-10-18 11:34:37 +05:30
Aditi
8057de95d7 fix(wpa_supplicant): Add few fixes in dpp task 2024-10-18 11:26:16 +05:30
aditi
e148c20c07 fix(wpa_supplicant): Add few fixes in btm_rrm task 2024-10-18 11:26:08 +05:30
aditi
afd8449418 fix(wpa_supplicant): Add few fixes in eloop task 2024-10-18 11:26:01 +05:30
aditi
78f5d3b11d fix(wpa_supplicant): Add few fixes in WPS task 2024-10-18 11:25:52 +05:30
aditi
e142c11dd0 fix(wpa_supplicant): Add few fixes in eap client code 2024-10-18 11:25:21 +05:30
Nachiket Kukade
fabf233666 feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant 2024-10-18 09:57:22 +05:30
Sajia
3ff63b3bfc fix(wifi): Add a check on hostapd instance while handling an Auth frame 2024-10-11 15:16:16 +05:30
Jiang Jiang Jian
21858b4144 Merge branch 'bugfix/sae_h2e_vulnerability_fix_v5.3' into 'release/v5.3'
fix(wifi): Sae check for invalid rejected group (v5.3)

See merge request espressif/esp-idf!33979
2024-10-08 19:37:33 +08:00
Jouni Malinen
b18849638e SAE: Check for invalid Rejected Groups element length explicitly on STA
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Fixes: 444d76f74f65 ("SAE: Check that peer's rejected groups are not enabled")
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-10-07 12:25:45 +05:30
Jouni Malinen
c6fee11bfc SAE: Check that peer's rejected groups are not enabled
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-10-07 12:25:45 +05:30
Jouni Malinen
90317ded69 SAE: Reject invalid Rejected Groups element in the parser
There is no need to depend on all uses (i.e., both hostapd and
wpa_supplicant) to verify that the length of the Rejected Groups field
in the Rejected Groups element is valid (i.e., a multiple of two octets)
since the common parser can reject the message when detecting this.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-10-07 12:25:45 +05:30
Jouni Malinen
5f7a3b6d48 SAE: Check for invalid Rejected Groups element length explicitly
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-10-07 12:25:45 +05:30
Jouni Malinen
6b3bf4d0e7 SAE: Check that peer's rejected groups are not enabled in AP
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-10-07 12:25:45 +05:30
Kapil Gupta
bff34554df fix(wifi): Add channel bit definition 2024-10-07 09:54:17 +05:30
Kapil Gupta
640f9750a4 fix(esp_wifi): Prevent memory overflow in WPS 2024-10-06 16:52:25 +05:30
Kapil Gupta
f430a553de fix(esp_wifi): Mask some error conditions in WPS
Mask some error conditions in WPS to increase the probability of
WPS success.
2024-10-06 16:52:25 +05:30