Ecosyste.ms: OpenCollective
An open API service for software projects hosted on Open Collective.
github.com/vyos-legacy/wpa
VyOS wpa packages
https://github.com/vyos-legacy/wpa
95ee81e4e747e5abd5673aa6785164ae073efc68 authored over 14 years ago
These combinations are disallowed in WPS 2.0 (and do not work well
(or at all) with many deploye...
We need to clear the selected registrar timeout from wps_er_learn
when stopping the protocol run...
This can be used by a WPS UI to display the current AP configuration.
403b96fe4f31e4bf2ca7f2715da179bc7b025085 authored over 14 years ago
UIs can use this command to process a PIN entered by a user and to
validate the checksum digit (...
This is needed to update the pointers maintained within WPS code
to use the new configuration da...
7d698c4ec7f342ae4a048939584c54df479c09cf authored over 14 years ago
This is not a failure and should not be indicated as such in the
debug log.
Need to figure out whether the message is from a WSC 2.0 -based
device based on the unencrypted ...
This seems to be the easiest way of making sure the Config Methods
value is compliant with the W...
This allows more APs to be tried during the WPS timeout.
f648bc7d0d704b106396ed2d02715f50e3d5bc00 authored over 14 years ago
This makes it easier to read -dd debug logs in environments that
have multiple WPS or P2P devices.
This frame is supposed to include Response Type, not Request Type
attribute.
WPS 2.0 mandates the AP to include WPS IE in (Re)Association Response
if the matching (Re)Associ...
This makes it easier to figure out which device is sending invalid
Probe Request frames.
Instead of build time options (CONFIG_WPS_TESTING_EXTRA_CRED and
CONFIG_WPS_EXTENSIBILITY_TESTIN...
We need to accept both our own address and the ff:ff:ff:ff:ff:ff
as an indication of the AP havi...
If the peer is not authorized for GO Negotiation, wps_method is not
actually set. In that case, ...
The Beacon frame must include UUID-E and RF Bands attributes when
in active PBC mode to allow st...
9647120b07a0fc98de3a98d6187c73ccf982233e authored over 14 years ago
This makes it easier to figure out which AP is sending invalid
Beacon or Probe Response frames.
When generating the UUID based on MAC address, share the same UUID
with all interfaces. This fix...
The Version2 attribute was previous changed to a subelement and
the OOB code was missed during t...
Previously, wpa_supplicant remaining in scanning state without
trying to connect, but there is n...
3d32c6517dae078b4b9216e635d1d629fc715a77 authored over 14 years ago
This avoids double frees of bnctx and related crashes.
d52be1db7602d15185ff5bd1dbfd1b6271156dff authored over 14 years ago
This adds an initial EAP-pwd (RFC 5931) implementation. For now,
this requires OpenSSL.
Disconnection event may be received while in associating state.
Previously, wpa_supplicant could...
p2p_intra_bss configuration parameter can now be used to
disable/enable intra BSS distribution (...
ctrl_interface STA_AUTOCONNECT command can now be used to disable
automatic reconnection on rece...
Previously, the storage buffer for the Group BSSID was returned
regardless of whether it was inc...
4c0108340052c7f3be8950c4405267009f1f2f28 authored over 14 years ago
If the msg->device_name buffer is filled from two different sources,
the copy from the P2P Devic...
This allows the pending group interface to be removed if we fail
to join a running group. A long...
This adds some more time for WPS provisioning step in case the peer
takes long time to start gro...
The overlap condition cannot disappear before group formation timeout
hits, so there is no point...
This was supposed to be sent to external event monitors, i.e., to
use wpa_msg instead of wpa_pri...
Add (or complete Probe Request only) P2P peer entry when receiving
Provision Discovery Request f...
A new ctrl_interface command, WPS_CANCEL, can now be used to cancel
a pending or ongoing WPS ope...
Since this message now includes P2P Device Info attribute, it is
reasonable to learn the peer da...
Setting bssid to an empty string, "", or any can now be used to
clear the bssid_set flag in a ne...
c481048f7c57884814e40e9896e90a0d113c401b authored over 14 years ago
876103dc6c1ed4e80e2da1656ec655875a6c353d authored over 14 years ago
If an authorized (p2p_connect used locally) GO Negotiation is
rejected when receiving GO Negotia...
812bf56ab1e6b73d976beac7a250bf6efff6628d authored over 14 years ago
In order to avoid picking incorrect SSID from old scan results, use
SSID from GO Negotiation to ...
This avoids issues with using freed memory in p2p_group_deinit().
743ef79914373d75a3d7004a18de5973ee7a2fe6 authored over 14 years ago
This should not really happen, but it looks like the Listen command
may fail is something else (...
The scan operation before Provision Discovery Request may not include
the GO. However, we are li...
The following operations (scan and associate) were not run if the
Provisioning Discovery Respons...
ab218b7c728d8190b77e903c1f9c0908e8fed2ce authored over 14 years ago
This is needed to avoid issues with the previous TX command from
stopping long Listen state.
The previous version had a bug that could result in NULL pointer
dereference if the P2P IE inclu...
This is needed to make sure we do not try to accidentally enable GO
in channels that may not be ...
7fbf99aa6b7406e0820ec6c7d9a561e6d99e4ffd authored over 14 years ago
This is needed to be able to change parameters for dynamically
created interfaces between the cr...
ctrl_iface command "SET ampdu <0/1>" can now be used to
disable/enable A-MPDU aggregation.
This can happen, e.g., when a P2P client connects to a P2P group
using the infrastructure WLAN i...
2f837b41dc07dc992fbe3e4e2c9f56df67e4183e authored over 14 years ago
2d509b39b163ea208fb24891fac41af16b99f729 authored over 14 years ago
56815b2b7def60d29745b1a2c94117944d4f40e2 authored over 14 years ago
Previously, only Device Name string was handled, but similar trigger
is needed on Manufacturer, ...
0e14267a318b35df036536e497005c48acf9dbbb authored over 14 years ago
0cc8be3e450600d522e7aae69580e07966af15d9 authored over 14 years ago
This code could segfault on NULL pointer dereference at least when
ap_scan=2 is used.
This can be used to limit the number of clients allowed to connect
to the group on the GO.
This command is supposed to return the PIN value that was generated
or passed in as an argument....
P2P specification v1.15 fixed the description of the GAS fragmentation
to not duplicate NQP Quer...
For now, this applies to the test command that can be used to set
periodic NoA (p2p_set noa). Th...
Need to fetch P2P Device Address from the peers table in case the
p2p_connect join command uses ...
This event indicates the Device Password ID that the peer tried
to use in GO Negotiation. For ex...
When we receive Device Discoverability Response, we need to initiate
new GO Negotiation as quick...
If running in active GO mode to invite a device to join the group,
wait on operating channel ins...
Invitation Request must use the current operating frequency of the
group, not the default operat...
48e4377093d936823f296ba046106213b0361570 authored over 14 years ago
If enabled, cross connection allows GO to forward IPv4 packets
using masquerading NAT from the P...
6c6915f3db5c981234ef4aae9e614ded47a9a81c authored over 14 years ago
While this is not strictly speaking required by the P2P specification
for a not-P2P Managed Devi...
If extended listen timing is enabled, it should be advertised in
(Re)Association Request frames ...
31fd64cc2f47b610a998d9cb0faf9c33bd0e9f9f authored over 14 years ago
43a3863516957afda9148de2fbf5da433bfddcfd authored over 14 years ago
Previously, freed memory could be used as device name (and other similar
parameters) when buildi...
This avoids setting explicit Request-to-Enrollee request when
WPS 2.0 is used.
This is needed to make sure we have fresh BSS information for the GO.
ef922c4a340e4a05ec273568b2f99e26e71c6617 authored over 14 years agoNeed to get P2P Device Address, not the Interface Address.
2e062d5d7424f82b90d06ed7af2c891474138556 authored over 14 years agod5b20a73b25015e48de478a82a16363ca0d22e71 authored over 14 years ago
18eff3a3a72aed6f7387f840a64b3f450eee6e84 authored over 14 years ago
For client-invites-device case, the pre-authorization of an invitation
to running group will nee...
6d4747a9a24e80412a76657bfa6d4c52b2db848d authored over 14 years ago
This was added as a mandatory attribute in one of the recent spec
updates.
While there is no real value in this, the spec seems to mark this
attribute as mandatory from GO...
"wpa_cli p2p_set peer_filter <MAC address>" can now be used to
only allow a single P2P Device (b...
0x04 was being checked from incorrect location when skipping country
code validation.
18708aadfc95756d73f270ab47487980e76872eb authored over 14 years ago
Need to flush stored service entries when wpa_supplicant is being
terminated.
bf608cad5611c2f3ba05fb330a5e59131a3f39e3 authored over 14 years ago
706887fc2866e13b62d6ac9eda63cffd3baa772c authored over 14 years ago
6e6963ea866b748e84bc18f09baca348cf5d9489 authored over 14 years ago
This is mainly designed for testing and allows p2p_connect join auth
to be used to accept a spec...
If the P2P client (WPS Enrollee) uses a PIN from the GO (Registrar),
Device Password ID in M1 & ...