Kouchali Samira | 23 Jul 23:45 2016



I have a question about the code. Which part of the code do this task: receive the frames from the channel and
check the type of the incoming traffic (management frame or control frame or data frame)?

Yuri | 23 Jul 23:37 2016

[BUG REPORT] wpa_supplicant 2.5 saves the same network to wpa_supplicant.conf many times

Spotted the problem on FreeBSD 10.3, while using wpa_gui. All from 
FreeBSD ports.

Sections are exactly identical, replaced letters with X

         ssid="Xxxxxxx X Xxxxxx, XX"

Masashi Honma | 22 Jul 01:52 2016

[PATCH] mesh: Remove HT IEs if HT is disabled

Previouly, HT capability IE and HT information IE was included in
beacon and Mesh Peering Open/Confirm frames even though HT is
disabled by disable_ht=1. This patch removes these.

Signed-off-by: Masashi Honma <masashi.honma <at> gmail.com>
 src/drivers/driver_nl80211.c    | 6 ++++++
 wpa_supplicant/wpa_supplicant.c | 6 ++++++
 2 files changed, 12 insertions(+)

diff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c
index 18468c9..848f23f 100644
--- a/src/drivers/driver_nl80211.c
+++ b/src/drivers/driver_nl80211.c
 <at>  <at>  -3829,6 +3829,12  <at>  <at>  static int nl80211_put_freq_params(struct nl_msg *msg,
 		wpa_printf(MSG_DEBUG, "  * channel_type=%d", ct);
 		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE, ct))
 			return -ENOBUFS;
+	} else {
+		wpa_printf(MSG_DEBUG, "  * channel_type=%d",
+			   NL80211_CHAN_NO_HT);
+		if (nla_put_u32(msg, NL80211_ATTR_WIPHY_CHANNEL_TYPE,
+				NL80211_CHAN_NO_HT))
+			return -ENOBUFS;
 	return 0;
diff --git a/wpa_supplicant/wpa_supplicant.c b/wpa_supplicant/wpa_supplicant.c
index 6999bbb..aa4efd3 100644
--- a/wpa_supplicant/wpa_supplicant.c
(Continue reading)

David Weidenkopf | 20 Jul 02:37 2016

[RFC 3/3] Network steering feature

The network steering system steers client STAs to the infrastructure AP
with the best RSSI. APs collaborate and can use several methods to direct
client STAs to transition to the best AP.

Please review the attached txt for further details regarding this RFC.

This RFC builds upon the previous two RFCs, "BSS transition with candidate
list" and "Client station blacklist support".
The network steering system steers client STAs to the infrastructure AP with the best RSSI. APs
collaborate and can use several methods to direct client STAs to transition to the best AP.

The network steering system executes a protocol state machine on each participating AP. The APs exchange
protocol messages, using the DS, to determine if a client STA should transition to a different AP. APs
collect client STA RSSI information from probe requests. When a client STA associates to a participating
AP, the network steering system begins tracking the client STA. The associated AP begins distributing
its client STA RSSI information to other participating APs. As this RSSI information is received, the
receiving AP compares it to the latest RSSI value it received from probe requests. If its local RSSI value
is better, it contacts the AP that sent the client STA RSSI and requests the client be transitioned to itself.

State Machine
The table below specifies the state machine that is executed on each AP for each client. An AP creates a state
(Continue reading)

Linus Lüssing | 20 Jul 15:13 2016

Trouble getting eap_server=1 to run: "Supplicant used different EAP type: 1 (Identity)"


I'm currently trying to get a hostapd v2.3 running for WPA-EAP on
a Debian unstable (kernel 4.6). I am trying to connect with a Nokia N900
(OS: Linux/Maemo) which unfortunately always results in the lines:

  wlan0: STA 00:0d:d5:8c:7a:97 IEEE 802.1X: authentication failed - EAP type: 0 ((null))
  wlan0: STA 00:0d:d5:8c:7a:97 IEEE 802.1X: Supplicant used different EAP type: 1 (Identity)

On the N900 GUI I have selected the following options:

Certificate: None
User: testuser
Password: testpw

On the hostapd side, eap_user.conf looks like this:

"testuser"      TTLS
"testuser"      TTLS-MSCHAPV2   "testpw"        [2]

And hostapd-eap.conf like this:

(Continue reading)

David Weidenkopf | 20 Jul 02:34 2016

[RFC 2/3] BSS transition with candidate list

This patch extends BSS transition (802.11v) support. It includes a new
simplified BSS Transition function in the CLI command. This function allows
the user to specify the client station and a target BSS transition
candidate which is included as a neighbor report. The BSS Transition
request packet is then automatically filled in with the appropriate data
for bssid of the target AP, the channel of the target AP, and the
preference value of the AP.
Hostap mailing list
Hostap <at> lists.infradead.org
David Weidenkopf | 20 Jul 02:33 2016

[RFC 1/3] Client station blacklist support

This patch implements hostapd-based client station blacklisting. It
includes new CLI commands to add, remove, clear, and show the blacklist.
Client stations in the blacklist will be denied authentication,
association, and re-association with the AP. The AP will not respond to
probe requests from clients in the blacklist.
Hostap mailing list
Hostap <at> lists.infradead.org
Jonathan Afek | 19 Jul 22:49 2016

[PATCH] tests: Add an option to use random ssids for remote tests

More than one instance of a remote test can be executed
in a signle room. This option will make the different
instances use different ssids.

Signed-off-by: Jonathan Afek <jonathanx.afek <at> intel.com>
 tests/hwsim/hostapd.py        | 7 ++++++-
 tests/hwsim/wpasupplicant.py  | 8 ++++++--
 tests/remote/hwsim_wrapper.py | 4 ++++
 tests/remote/rutils.py        | 8 ++++++++
 4 files changed, 24 insertions(+), 3 deletions(-)

diff --git a/tests/hwsim/hostapd.py b/tests/hwsim/hostapd.py
index 51ad02e..65126a0 100644
--- a/tests/hwsim/hostapd.py
+++ b/tests/hwsim/hostapd.py
 <at>  <at>  -406,7 +406,12  <at>  <at>  def add_ap(apdev, params, wait_enabled=True, no_enable=False, timeout=30):
                    "acct_server_addr", "osu_server_uri" ]
         for field in fields:
             if field in params:
-                hapd.set(field, params[field])
+                if hostname is not None and field in ["ssid", "ssid2"]:
+                    import rutils
+                    prefix = rutils.RandomSsid.ssid_prefix
+                    hapd.set(field, prefix + params[field])
+                else:
+                    hapd.set(field, params[field])
         for f,v in params.items():
             if f in fields:
(Continue reading)

Roshan Pius | 19 Jul 19:44 2016

[PATCH v1] Move network add/remove operations to a common function

All the 3 control interfaces: socket based, dbus & binder needs to perform the
same sequence of steps for network add/remove. So, move these to a common
utility method in |wpa_supplicant.c| instead of duplicating the code everywhere.

Signed-off-by: Roshan Pius <rpius <at> google.com>
 wpa_supplicant/ctrl_iface.c             | 52 ++-----------------
 wpa_supplicant/dbus/dbus_new_handlers.c | 29 ++---------
 wpa_supplicant/dbus/dbus_old_handlers.c | 20 ++------
 wpa_supplicant/wpa_supplicant.c         | 89 +++++++++++++++++++++++++++++++++
 wpa_supplicant/wpa_supplicant_i.h       |  2 +
 5 files changed, 106 insertions(+), 86 deletions(-)

diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c
index e75323d..ce63af5 100644
--- a/wpa_supplicant/ctrl_iface.c
+++ b/wpa_supplicant/ctrl_iface.c
 <at>  <at>  -2919,15 +2919,10  <at>  <at>  static int wpa_supplicant_ctrl_iface_add_network(


-	ssid = wpa_config_add_network(wpa_s->conf);
+	ssid = wpa_supplicant_add_network(wpa_s);
 	if (ssid == NULL)
 		return -1;

-	wpas_notify_network_added(wpa_s, ssid);
-	ssid->disabled = 1;
-	wpa_config_set_network_defaults(ssid);
(Continue reading)

Carlo Santos | 19 Jul 17:21 2016

Modifying power-save mode behavior


I was hoping to modify client-side behaviors related to power save
mode. Which file(s) should I look into?
Sabrina Dubroca | 19 Jul 11:56 2016

[PATCH 0/8] mka fixes

This patchset contains a variety of fixes for the MKA code (src/pae).

I've been working on adding support for the new macsec driver present
in the Linux kernel, as well as adding a new mode (pre-shared CAK/CKN
pair) and new configuration options for the current MKA code.  The
bugs fixed by these patches have been found during that work.

This series is the first part of this work.  Next I also have some
cleanups to the MKA code, and patches to add the new features.
You can have a look at the current state of that work here:


The macsec_linux driver depends on recent commits in libnl:


Sabrina Dubroca (8):
  mka: fix multiple key server election bugs
  mka: fix memory leak in ieee802_1x_kay_create_live_peer
  mka: fix length when encoding SAK-use
  mka: avoid inconsistent state in move_live_peer
  mka: add error handling around move_live_peer
  mka: avoid reading past the end of mka_body_handler
  mka: add check for body length when decoding peers
  mka: fix use after free

 src/pae/ieee802_1x_kay.c | 74 +++++++++++++++++++++++++++---------------------
 1 file changed, 41 insertions(+), 33 deletions(-)

(Continue reading)