693 Commits

Author SHA1 Message Date
Kapil Gupta
80132653c7 fix(esp_wifi): Address some review comments 2025-01-03 16:47:00 +05:30
Aditi
2ecc3c3bc7 fix(wpa_supplicant): Remove the btm_rrm task from supplicant
This commit removes btm_rrm_t task and CONFIG_SUPPLICANT_TASK from
wpa_supplicant and make the functions work in wifi task's context.
2025-01-03 16:46:25 +05:30
Aditi
5948413c0e fix(wpa_supplicant): Fix for sending alternate ft-auth in roaming 2025-01-03 16:44:50 +05:30
Aditi
a1631199dc fix(wpa_supplicant): Add two separate flags for RRM and WNM
Added two separate flags CONFIG_RRM(80211k) and CONFIG_WNM(80211v)
    flags under IEEE80211KV support flag.
2025-01-03 16:44:49 +05:30
Aditi
bf991b5911 fix(wpa_supplicant): Add some minor fixes in roaming
1) Add a fix in roaming example for 11kvr
    2) Removed length constraint for neighbor report received.
2025-01-03 16:44:49 +05:30
Aditi
6c2bbadeaf fix(esp_wifi): Add fix for error handling for FT-Auth 2025-01-03 16:44:49 +05:30
Kapil Gupta
fbe9fcd7bf Merge branch 'bugfix/roaming_app_issues' into 'master'
fix(wifi): Fix some issues observed in roaming app

Closes WIFIBUG-904, WIFIBUG-881, and WIFIBUG-905

See merge request espressif/esp-idf!34519
2025-01-03 12:47:18 +08:00
Jiang Jiang Jian
c07555437e Merge branch 'bugfix/enable_eap_workarounds' into 'master'
fix(esp_wifi): Enable EAP workarounds by default

See merge request espressif/esp-idf!35860
2025-01-02 20:27:15 +08:00
Kapil Gupta
afeefc9e1e Merge branch 'bugfix/coverity_issue_supplicant' into 'master'
esp_wifi: Fix coverity issues

Closes IDF-11716 and IDF-11751

See merge request espressif/esp-idf!35865
2025-01-02 18:03:34 +08:00
Kapil Gupta
b3b1c19ed3 fix(esp_wifi): Enable EAP workarounds by default
Enabling this will make sure our behavior is same as upstream
wpa_supplicant.
2025-01-02 15:05:12 +08:00
Kapil Gupta
2577769813 fix(esp_wifi): Some more cleanup for roaming app 2025-01-02 11:47:18 +05:30
Kapil Gupta
6693354474 fix(wifi): Fix some issues observed in roaming app 2025-01-02 11:47:18 +05:30
Shreyas Sheth
81940d44bc fix(wifi): Resolve comments for softap fixes 2024-12-27 16:21:52 +05:30
Shreyas Sheth
d0631ec21d fix(wifi): Resolve comments on feature/softap_fixes_for_ceritification 2024-12-27 15:58:47 +05:30
Shreyas Sheth
d6054570e9 fix(wifi): Make sure auth is sent after sae process 2024-12-27 15:58:47 +05:30
Shreyas Sheth
484736976c feat(wifi): Add support for transition_disable for softAP
Bugfix rsnxe len for assoc req
2024-12-27 15:58:47 +05:30
Kapil Gupta
b72d39ab3e fix(esp_wifi): Fix coverity issue CID: 470126 2024-12-21 12:22:11 +08:00
Kapil Gupta
63e6ed35cb fix(esp_wifi): Fix coverity issue (CID:470090) 2024-12-21 12:22:11 +08:00
Sarvesh Bodakhe
6fd082f8ac feat(wpa_supplicant): Add WIFI_EVENT_AP_WRONG_PASSWORD in SoftAP
This event is triggered when external station tries connecting to softAP
with wrong password.

Currently supported softAP AUTH modes: WPA-PSK, WPA2-PSK and WPA3-PSK (SAE-auth)
2024-12-14 18:17:53 +05:30
Alexey Lapshin
22a38779fb fix(wpa_supplicant): remove duplicated code (endian.h) that exists in newlib component 2024-12-02 20:26:26 +07:00
Nachiket Kukade
1810e7bbe3 fix(wpa_supplicant): Add an exception in wpa_supplicant sbom.yml 2024-11-21 12:12:17 +08:00
yinqingzhao
f40c2cbc72 feat(wifi): avoid compiling components related to wifi when wifi is not supported 2024-11-19 11:02:09 +08:00
Kapil Gupta
197128b162 fix(wifi): Remove WPS IEs once WPS succeeds 2024-11-08 15:59:58 +05:30
sibeibei
7e5741953d fix(wifi): fix some wifi issues 241031
1. fix cant sleep if reconnect to connected ap
    2. clear pmk in internal reconnection
    3. update connect status for init-->auth
    4. add protection for probe request when wifi band is 5g
2024-10-31 19:03:01 +08:00
Shyamal Khachane
624878b6e2 fix(esp_wifi): Populate appropriate reason codes when softAP sends deauthentication
Populate appropriate reason for sending deauthentication when softAP receives
invalid RSN IE from association request
2024-10-21 11:31:17 +08:00
Sarvesh Bodakhe
6797c86135 fix(wifi): Fix wrong wifi reason codes reported on station and softAP
- Fix wrong reason code reported when softAP issues a disconnect for station
- Fix wrong reason code reported when association timeout happens at station
- Deprecate enums WIFI_REASON_ASSOC_EXPIRE, WIFI_REASON_NOT_AUTHED, WIFI_REASON_NOT_ASSOCED
  and use WIFI_REASON_DISASSOC_DUE_TO_INACTIVITY,
  WIFI_REASON_CLASS2_FRAME_FROM_NONAUTH_STA,
  WIFI_REASON_CLASS3_FRAME_FROM_NONASSOC_STA respectively
- Update wifi documentation related to reason codes
2024-10-21 11:31:17 +08:00
Nachiket Kukade
82e6c06193 feat(wpa_supplicant): Add sbom manifest file for wpa_supplicant 2024-10-15 12:27:54 +05:30
Sajia
ff4620fd70 fix(wifi): Add a check on hostapd instance while handling an Auth frame 2024-10-11 10:26:09 +08:00
Sarvesh Bodakhe
9ebfd93c5d fix(wpa_supplicant): Fix debug print in wps_start_msg_timer() 2024-10-07 16:31:43 +05:30
muhaidong
d918aa3ebd fix(wifi): fix miss internal wapi deinit issue 2024-09-30 10:02:29 +08:00
aditi
beda284524 feat(esp_wifi): Add esp-idf specific changes
Added esp-idf implementation specific changes on top of the upstream updates.
2024-09-29 19:13:20 +08:00
aditi
fbde07c953 feat(esp_wifi): Replace crypto_key with crypto_ec_key
Replaced all occurances of crypto_key with crypto_ec_key struct
    to make the code more consistent with upstream.
2024-09-29 19:13:20 +08:00
aditi_lonkar
cab4dc15f4 feat(esp_wifi): Restructure dpp crypto Layer APIs
1) Update dpp implementation as per upstram hostapd tag hostap_2_10.
2) Move dpp crypto routines into a separate source code file.
2024-09-29 19:13:20 +08:00
Aditi
7444127041 fix(wpa_supplicant): Add few fixes in dpp task 2024-09-27 14:00:24 +08:00
aditi
7fa1e5cf9a fix(wpa_supplicant): Add few fixes in btm_rrm task 2024-09-27 14:00:24 +08:00
aditi
c5892a4c96 fix(wpa_supplicant): Add few fixes in eloop task 2024-09-27 14:00:24 +08:00
aditi
35e96b977b fix(wpa_supplicant): Add few fixes in WPS task 2024-09-27 14:00:24 +08:00
aditi
9ceb0cffcc fix(wpa_supplicant): Add few fixes in eap client code 2024-09-27 14:00:24 +08:00
Jiang Jiang Jian
216e653de4 Merge branch 'bugfix/increase_leak_threshold_for_wpa_supplicant_dpp_test' into 'master'
fix(wpa_supplicant): add crypto init calls to address memory leak issue in tests

Closes IDFCI-2409

See merge request espressif/esp-idf!33731
2024-09-25 16:04:39 +08:00
Mahavir Jain
c89c316922
fix(wpa_supplicant): add crypto init calls to address memory leak issue in tests
- C61 does not feature MPI hardware and hence the other tests were
  getting executed first
- Memory leak threshold should be independent of target crypto
  peripherals and hence added to crypto init to test `setUp` call
2024-09-24 15:12:07 +05:30
yinqingzhao
a8ede32979 fix(wifi): modify some SOC_WIFI_SUPPORT_5G to CONFIG_SOC_WIFI_SUPPORT_5G 2024-09-24 13:14:51 +08:00
Jiang Jiang Jian
d076f0ad80 Merge branch 'feat/wifi_crypto_funcs_cleanup' into 'master'
Cleanup of wifi crypto funcs within wifi libs

See merge request espressif/esp-idf!30698
2024-09-23 21:08:50 +08:00
Jiang Jiang Jian
4530b0e395 Merge branch 'bugfix/sae_h2e_vulnerability_fix' into 'master'
fix(wifi): Sae check for invalid rejected group

See merge request espressif/esp-idf!33416
2024-09-23 20:32:00 +08:00
jgujarathi
52bcdb9400 refactor(esp_wifi): Cleanup of wifi crypto funcs within wifi libs
- Remove unnecessary funcs from wpa_crypto_funcs_t and consolidate some
  of their usages in wifi libs
2024-09-23 14:24:08 +05:30
Jouni Malinen
f9aa42b137 SAE: Check for invalid Rejected Groups element length explicitly on STA
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Fixes: 444d76f74f65 ("SAE: Check that peer's rejected groups are not enabled")
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
7fc4d894a9 SAE: Check that peer's rejected groups are not enabled
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-09-23 12:05:02 +08:00
Jouni Malinen
05874b938e SAE: Reject invalid Rejected Groups element in the parser
There is no need to depend on all uses (i.e., both hostapd and
wpa_supplicant) to verify that the length of the Rejected Groups field
in the Rejected Groups element is valid (i.e., a multiple of two octets)
since the common parser can reject the message when detecting this.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
ba76df4f69 SAE: Check for invalid Rejected Groups element length explicitly
Instead of practically ignoring an odd octet at the end of the element,
check for such invalid case explicitly. This is needed to avoid a
potential group downgrade attack.

Signed-off-by: Jouni Malinen <j@w1.fi>
2024-09-23 12:05:02 +08:00
Jouni Malinen
b6f91e403a SAE: Check that peer's rejected groups are not enabled in AP
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2024-09-23 12:05:02 +08:00
Kapil Gupta
d2e0eb7a52 fix(esp_wifi): Prevent memory overflow in WPS 2024-09-21 14:38:09 +05:30