Jithu Jance | 29 Jul 15:04 2014

[PATCH 1/1] P2P: Cancel pending action tx radio work on p2p_cancel

When p2p_cancel is invoked while the GO Neg action tx
was pending, the p2p_send_action_work was not getting
cleared.

Signed-off-by: Jithu Jance <jithu <at> broadcom.com>
---
 wpa_supplicant/p2p_supplicant.c |   23 +++++++++++++++++++++++
 1 file changed, 23 insertions(+)

diff --git a/wpa_supplicant/p2p_supplicant.c b/wpa_supplicant/p2p_supplicant.c
index f1269ad..d64cd21 100644
--- a/wpa_supplicant/p2p_supplicant.c
+++ b/wpa_supplicant/p2p_supplicant.c
 <at>  <at>  -5684,6 +5684,29  <at>  <at>  static void wpas_p2p_clear_pending_action_tx(struct wpa_supplicant *wpa_s)
 	if (!offchannel_pending_action_tx(wpa_s))
 		return;

+    if (wpa_s->p2p_send_action_work) {
+        struct send_action_work *awork;
+        awork = wpa_s->p2p_send_action_work->ctx;
+        if (awork->wait_time == 0) {
+            os_free(awork);
+            radio_work_done(wpa_s->p2p_send_action_work);
+            wpa_s->p2p_send_action_work = NULL;
+        } else {
+            /*
+             * In theory,   this should not be needed, but number of
+             * places in the P2P code is still using non-zero wait
+             * time for the last Action frame in the sequence and
+             * some of these do not call send_action_done().
(Continue reading)

khali singh | 29 Jul 07:39 2014
Picon

How to check my eap method for memory leak

Hi

I have now a working new EAP method that satifies my needs. But giving my coding skills, I want to know if there are memory leaks. IS there some easy to use tool for this. I have some experience with valgrind. But my hostapd should never stop running. Only at the end of an eap run, successful or unsuccessful, all the memory should be released. Is there some easy way out?

Thanks
Khali Singh
_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Elrippo | 28 Jul 21:21 2014
Picon

Configuration to kick off device after certain time


Hy there,

hoping for your help, i want to address a question for a configuration option.
I have hostapd running on an Ubuntu 12.04 server with Ethernet and wlan networks managed with dnsmasq.

I have a wlan network with 3 subnets, where one subnet is used for testing.
I would prefer an option where I can define that users, devices are kicked off after 15min for an hour.
Is this, or some kind of, option implemented in hostapd?

Thanks in advance,
Elrippo.
--
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elrippo <at> elrippoisland.net

Encrypted messages are welcome.
0x84DF1F7E6AE03644

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=otlL
-----END PGP PUBLIC KEY BLOCK-----

Elliott Hughes | 19 Jul 02:45 2014
Picon

[PATCH] Android: Always #include <sys/...>, not <linux/...>

Change-Id: I8c7f4b31ac828eb9cdb698e38a04256b8c3fc88c
Signed-off-by: Dmitry Shmidt <dimitrysh <at> google.com>
---
 src/utils/os_unix.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/utils/os_unix.c b/src/utils/os_unix.c
index d3860ae..7498967 100644
--- a/src/utils/os_unix.c
+++ b/src/utils/os_unix.c
 <at>  <at>  -12,7 +12,7  <at>  <at> 

 #ifdef ANDROID
 #include <sys/capability.h>
-#include <linux/prctl.h>
+#include <sys/prctl.h>
 #include <private/android_filesystem_config.h>
 #endif /* ANDROID */

--

-- 
2.0.0.526.g5318336
S├ębastien Pierre | 28 Jul 16:09 2014
Picon

Default URL redirection

Hi all,

I would like to setup a redirection to a specific URL when a user joins an open WiFi network. I've tried the "network_auth_type" configuration parameter, but without any success.

My setup is as follows:

- the server/AP hostname is "node"
- apache2 is running on port 80
- hostapd is configured in open network (no password)

now I tried with the following values for network_auth_type:

   network_auth_type=01http://node/hello

and then

   network_auth_type=02http://node/hello

but in both cases I can't access the WiFi network, nor do I see any request  logged on the apache2 access log.

I couldn't find more information about what exactly the different modes (01, 02, etc) do and how the redirect URL is used.

Many thanks,

-- Sébastien

_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Sunil Saraff | 24 Jul 09:02 2014
Picon

Handling time update in wpa_supplicant

Hi All,

I am working on a linux device using wpa_supplicant to connect to Wifi. 
The system boots with the epoch time 1970. 
After getting IP address, the system time is updated via SNTP to current time. 
When this happens all the timers in wpa_supplicant expire and all BSS entries are flushed. 
This causes Wifi to re-connect. 
Is there any fix available to avoid re-connection of Wifi? 

Thanks,
Sunil
_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Philippe Nunes | 23 Jul 12:16 2014
Picon

[PATCH] Fix writing of the wowlan_triggers parameter

The parameter wowlan_triggers is a global string and is not recognised
if it is embraced with double-quotes.

Signed-off-by: Philippe Nunes <philippe.nunes <at> linux.intel.com>
---
 wpa_supplicant/config_file.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/wpa_supplicant/config_file.c b/wpa_supplicant/config_file.c
index 98855d8..73ad57a 100644
--- a/wpa_supplicant/config_file.c
+++ b/wpa_supplicant/config_file.c
 <at>  <at>  -1170,7 +1170,7  <at>  <at>  static void wpa_config_write_global(FILE *f, struct wpa_config *config)
 			config->tdls_external_control);

 	if (config->wowlan_triggers)
-		fprintf(f, "wowlan_triggers=\"%s\"\n",
+		fprintf(f, "wowlan_triggers=%s\n",
 			config->wowlan_triggers);

 	if (config->bgscan)
--

-- 
1.8.1.2
De Cesco, Jonathan | 21 Jul 11:38 2014
Picon

[PATCH] Add explicit NULL check before accessing data pointer

Android private lib for nl80211 driver is sending
wpa_supplicant_event(drv->ctx, EVENT_CHANNEL_LIST_CHANGED, NULL);
For this event, data pointer validity is not checked before access.

Signed-off-by: Jonathan DE CESCO <jonathan.de.cesco <at> intel.com>
---
 wpa_supplicant/events.c |    5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c
index 4e84f6e..8cf2dd9 100644
--- a/wpa_supplicant/events.c
+++ b/wpa_supplicant/events.c
 <at>  <at>  -3369,8 +3369,9  <at>  <at>  void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
 		wpa_supplicant_set_state(wpa_s, WPA_INTERFACE_DISABLED);
 		break;
 	case EVENT_CHANNEL_LIST_CHANGED:
-		wpa_supplicant_update_channel_list(
-			wpa_s, &data->channel_list_changed);
+		if (data)
+			wpa_supplicant_update_channel_list(
+						wpa_s, &data->channel_list_changed);
 		break;
 	case EVENT_INTERFACE_UNAVAILABLE:
 		wpas_p2p_interface_unavailable(wpa_s);
--

-- 
1.7.9.5

---------------------------------------------------------------------
Intel Corporation SAS (French simplified joint stock company)
Registered headquarters: "Les Montalets"- 2, rue de Paris, 
92196 Meudon Cedex, France
Registration Number:  302 456 199 R.C.S. NANTERRE
Capital: 4,572,000 Euros

This e-mail and any attachments may contain confidential material for
the sole use of the intended recipient(s). Any review or distribution
by others is strictly prohibited. If you are not the intended
recipient, please contact the sender and delete all copies.
Drasko DRASKOVIC | 17 Jul 13:03 2014
Picon

Hostapd git is unaccesible

Hi Jouni,
hostapd git seems to be down:

drasko <at> Lenin:~/test$ git clone git://w1.fi/srv/git/hostap.git
Cloning into 'hostap'...
fatal: read error: Connection reset by peer

BR,
Drasko
xiaobingjian | 17 Jul 03:57 2014

Re:hotspot 2.0

    Hi:
        My hotspot2.o config file. And it work with iphone5s.
driver=atheros
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
interface=wlan1
ssid=hotspot
ieee8021x=1
eap_server=0
eap_message=hello
eapol_key_index_workaround=0
own_ip_addr=127.0.0.1
bridge=br0
wpa=2
wpa_key_mgmt=WPA-EAP
wpa_pairwise=CCMP
wpa_group_rekey=0
auth_server_addr=192.168.0.123
auth_server_port=1812
auth_server_shared_secret=hotspot
hs20=1
interworking=1
disable_dgaf=0
hessid=00:00:00:00:00:00
access_network_type=2
internet=0
asra=0
esr=0
uesa=0
venue_group=2
venue_type=8
domain_name=test
hs20_oper_friendly_name=eng:test
manage_p2p=1
allow_cross_connection=0
roaming_consortium=506f9a
roaming_consortium=001bc504bd
   And you shoul moify hostapd_eid_hs20_indication function because hotspot2.0 of hostapd release version is 2. However iphon5s only support 
release version 1.
   u8 * hostapd_eid_hs20_indication(struct hostapd_data *hapd, u8 *eid)
 {
if (!hapd->conf->hs20)
return eid;
*eid++ = WLAN_EID_VENDOR_SPECIFIC;
*eid++ = 5;
WPA_PUT_BE24(eid, OUI_WFA);
eid += 3;
*eid++ = HS20_INDICATION_OUI_TYPE;
/* Hotspot Configuration: DGAF Enabled */
eid++ = hapd->conf->disable_dgaf ? 0x01 : 0x00;
return eid;
 }


            . 


_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Dmitry Shmidt | 16 Jul 20:01 2014
Picon

[PATCH] Remove FreeRADIUS workaround from default configuration

Signed-off-by: Dmitry Shmidt <dimitrysh <at> google.com>
---
 src/eap_peer/eap_config.h    | 2 ++
 src/eap_peer/eap_ttls.c      | 2 +-
 wpa_supplicant/config_ssid.h | 3 ++-
 3 files changed, 5 insertions(+), 2 deletions(-)

diff --git a/src/eap_peer/eap_config.h b/src/eap_peer/eap_config.h
index 2591e11..f7d37c2 100644
--- a/src/eap_peer/eap_config.h
+++ b/src/eap_peer/eap_config.h
 <at>  <at>  -9,6 +9,8  <at>  <at> 
 #ifndef EAP_CONFIG_H
 #define EAP_CONFIG_H

+#define EAP_WORKAROUND_FREERADIUS BIT(0)
+
 /**
  * struct eap_peer_config - EAP peer configuration/credentials
  */
diff --git a/src/eap_peer/eap_ttls.c b/src/eap_peer/eap_ttls.c
index e110236..65a20cc 100644
--- a/src/eap_peer/eap_ttls.c
+++ b/src/eap_peer/eap_ttls.c
 <at>  <at>  -501,7 +501,7  <at>  <at>  static int eap_ttls_phase2_request_mschapv2(struct eap_sm *sm,
 	wpabuf_put(msg, pos - buf);
 	*resp = msg;

-	if (sm->workaround) {
+	if (sm->workaround & EAP_WORKAROUND_FREERADIUS) {
 		/* At least FreeRADIUS seems to be terminating
 		 * EAP-TTLS/MSHCAPV2 without the expected MS-CHAP-v2 Success
 		 * packet. */
diff --git a/wpa_supplicant/config_ssid.h b/wpa_supplicant/config_ssid.h
index ab474ff..dfed662 100644
--- a/wpa_supplicant/config_ssid.h
+++ b/wpa_supplicant/config_ssid.h
 <at>  <at>  -16,7 +16,8  <at>  <at> 
 #define MAX_SSID_LEN 32

 
-#define DEFAULT_EAP_WORKAROUND ((unsigned int) -1)
+#define DEFAULT_EAP_WORKAROUND (((unsigned int) -1) & \
+				~EAP_WORKAROUND_FREERADIUS)
 #define DEFAULT_EAPOL_FLAGS (EAPOL_FLAG_REQUIRE_KEY_UNICAST | \
 			     EAPOL_FLAG_REQUIRE_KEY_BROADCAST)
 #define DEFAULT_PROTO (WPA_PROTO_WPA | WPA_PROTO_RSN)
--

-- 
2.0.0.526.g5318336

Gmane