aboutsummaryrefslogtreecommitdiff
path: root/package/network/services/hostapd
Commit message (Collapse)AuthorAge
* hostapd: fix a null pointer dereference in wpa_supplicant on teardownFelix Fietkau2024-05-01
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: Fix compile against mbedtsl 3.6Hauke Mehrtens2024-04-28
| | | | | | Fix compile of the mbedtls extension for hostapd. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* hostapd: fix a crash corner caseFelix Fietkau2024-04-13
| | | | | | On some setup failures, iface->bss can be NULL Signed-off-by: Felix Fietkau <nbd@nbd.name>
* treewide: update PKG_MIRROR_HASH to zstPaul Spooren2024-04-06
| | | | | | | When using zst instead of xz, the hash changes. This commit fixes the hash for packages and tools in core. Signed-off-by: Paul Spooren <mail@aparcar.org>
* hostapd: fix Config.in dependenciesFelix Fietkau2024-04-05
| | | | | | | hostapd packages were accidentally left out. Clean up this mess by changing the dependencies to hostapd-common Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: slightly clean up patchesFelix Fietkau2024-04-04
| | | | | | | | - move build/ifdef related changes together to the 200 patch range - reduce adding/removing include statements across patches - move patches away from the 99x patch range to simplify maintenance Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: replace "argument list too long" fix with a simpler versionFelix Fietkau2024-04-04
| | | | | | Less convoluted and more robust Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: remove workaround for broken WPA IEs in ancient devicesFelix Fietkau2024-04-04
| | | | | | Affected devices were already quite old when this patch was added. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: adjust patches to work with git amEneas U de Queiroz2024-04-04
| | | | | | | | | | | | | | | | | This adds From:, Date: and Subject: to patches, allowing one to run 'git am' to import the patches to a hostapd git repository. From: and Date: fields were taken from the OpenWrt commit where the patches were first introduced. Most of the Subject: also followed suit, except for: - 300-noscan.patch: Took the description from the LuCI web interface - 350-nl80211_del_beacon_bss.patch: Used the file name The order of the files in the patch was changed to match what git format-patch does. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
* hostapd: remove unused fixEneas U de Queiroz2024-04-04
| | | | | | | | | | | | Patch 050-build_fix.patch fixes the abscence of sha384-kdf.o from the list of needed objetct files when FILS is selected without any other option that will select the .o file. While it is a bug waiting to be fixes upstream, it is not needed for OpenWrt use case, because OWE already selects sha384-kdf.o, and FILS is selected along with OWE. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
* hostapd: bump to 2024-03-09Eneas U de Queiroz2024-04-04
| | | | | | | | | | | | | | | | | This brings many changes, including fixes for a couple of memory leaks, and improved interoperability with 802.11r. There are also many changes related to 802.11be, which is not enabled at this time. Fixed upstream: - 022-hostapd-fix-use-of-uninitialized-stack-variables.patch - 180-driver_nl80211-fix-setting-QoS-map-on-secondary-BSSs.patch - 993-2023-10-28-ACS-Fix-typo-in-bw_40-frequency-array.patch Switch PKG_SOURCE_URL to https, since http is not currently working. Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com> Tested-by: Ilya Katsnelson <me@0upti.me> Tested by: Andrew Sim <andrewsimz@gmail.com>
* hostapd: fix Argument list too long build errorRobert Marko2024-03-25
| | | | | | | | | | | | | | | Currently, both CI and local builds of wpa-supplicant will fail with: /bin/sh: Argument list too long Its happening as the argument list for mkdir in build.rules is too large and over the MAX_ARG_STRLEN limit. It seems that recent introduction of APK compatible version schema has increased the argument size and thus pushed it over the limit uncovering the issue. Fixes: e8725a932e16 ("treewide: use APK compatible version schema") Signed-off-by: Robert Marko <robimarko@gmail.com>
* treewide: use APK compatible version schemaPaul Spooren2024-03-22
| | | | | | | | | | | | | | | | | Different from OPKG, APK uses a deterministic version schema which chips the version into chunks and compares them individually. This enforces a certain schema which was previously entirely flexible. - Releases are added at the very and end prefixed with an `r` like `1.2.3-r3`. - Hashes are prefixed with a `~` like `1.2.3~abc123`. - Dates become semantic versions, like `2024.04.01` - Extra tags are possible like `_git`, `_alpha` and more. For full details see the APK test list: https://gitlab.alpinelinux.org/alpine/apk-tools/-/blob/master/test/version.data Signed-off-by: Paul Spooren <mail@aparcar.org>
* wifi-scripts: add new package, move wifi scripts to a single placeFelix Fietkau2024-02-03
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fail R0KH and R1KH derivation when wpa_psk_file is usedRany Hany2024-01-25
| | | | | | | | | When wpa_psk_file is used, there is a chance that no PSK is set. This means that the FT key will be generated using only the mobility domain which could be considered a security vulnerability but only for a very specific and niche config. Signed-off-by: Rany Hany <rany_hany@riseup.net>
* hostapd: fix 11r defaults when using SAEJesus Fernandez Manzano2024-01-25
| | | | | | | | When using WPA3-SAE or WPA2/WPA3 Personal Mixed, we can not use ft_psk_generate_local because it will break FT for SAE. Instead use the r0kh and r1kh configuration approach. Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.ai>
* hostapd: fix 11r defaults when using WPAJesus Fernandez Manzano2024-01-25
| | | | | | | | | | | | | | 802.11r can not be used when selecting WPA. It needs at least WPA2. This is because 802.11r advertises FT support in-part through the Authentication and Key Management (AKM) suites in the Robust Security Network (RSN) Information Element, which was included in the 802.11i amendment and WPA2 certification program. Pre-standard WPA did not include the RSN IE, but the WPA IE. This IE can not advertise the AKM suite for FT. Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.ai>
* hostapd: remove obsolete functionFelix Fietkau2024-01-25
| | | | | | Leftover from authsae, which was removed a long time ago Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: ACS: Fix typo in bw_40 frequency arrayDavid Bauer2024-01-18
| | | | | | | | | | | [Upstream Backport] The range for the 5 GHz channel 118 was encoded with an incorrect channel number. Fixes: ed8e13decc71 (ACS: Extract bw40/80/160 freqs out of acs_usable_bwXXX_chan()) Signed-off-by: Michael Lee <michael-cy.lee@mediatek.com> Signed-off-by: David Bauer <mail@david-bauer.net>
* hostapd: add back missing function for updating wpa_supplicant macaddr listFelix Fietkau2024-01-13
| | | | | | | Make the call deferred instead of blocking to avoid deadlock issues Fixes: 3df9322771cc ("hostapd: make ubus calls to wpa_supplicant asynchronous") Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix an exception in hostapd.uc on interface add failureFelix Fietkau2024-01-13
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* Revert "mac80211: rework interface setup, fix race condition"Felix Fietkau2024-01-13
| | | | | | | | This reverts commit b7f9742da82fa9b122e8d63e48a9a5c0dec298f2. There are several reports of regressions with this commit. Will be added back once I've figured out and fixed the cause Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mac80211: rework interface setup, fix race conditionFelix Fietkau2024-01-11
| | | | | | | Only tell netifd about vifs when the setup is complete and hostapd + wpa_supplicant have been notified Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: make ubus calls to wpa_supplicant asynchronousFelix Fietkau2024-01-11
| | | | | | | | This fixes a deadlock issue where depending on the setup order, hostapd and wpa_supplicant could end up waiting for each other Reported-by: Michael-cy Lee (李峻宇) <Michael-cy.Lee@mediatek.com> Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing NULL pointer check on radar notificationFelix Fietkau2024-01-09
| | | | | | Fixes a race condition that can lead to a hostapd crash Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: use new udebug ubus api to make debug rings configurableFelix Fietkau2023-11-30
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing acl entries for udebugFelix Fietkau2023-11-20
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add udebug supportFelix Fietkau2023-11-20
| | | | | | | This is not activated by default and must be explicitly enabled via ubus It supports reporting log messages and netlink packets Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix undeclared variable iface_nameNazar Mokrynskyi2023-11-19
| | | Signed-off-by: Nazar Mokrynskyi <nazar@mokrynskyi.com>
* hostapd: refresh patchesChristian Marangi2023-11-09
| | | | | | Refresh patches for hostapd using make package/hostapd/refresh. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: permit 40MHz in 802.1s only also for 2.4GHz g/n with noscanChristian Marangi2023-11-09
| | | | | | | | | | | | | Currently for 802.1s only, for wifi 2.4GHz in g/n mode, 40MHz is never permitted. This is probably due to the complexity of setting periodic check for the intolerant bit. When noscan option is set, we ignore the presence of the intoleran bit in near AP, so we can enable 40MHz and ignore any complex logic for checking. Fixes: #13112 Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: permit also channel 7 for 2.5GHz to be set to HT40PLUSChristian Marangi2023-11-09
| | | | | | | Also channel 7 for 2.4GHz can be set to HT40PLUS. Permit this and add it to the list of the channels. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: fix broke noscan option for meshChristian Marangi2023-11-09
| | | | | | | | | noscan option for mesh was broken and actually never applied. This is caused by a typo where ssid->noscan value is check instead of conf->noscan resulting in the logic swapped and broken. Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
* hostapd: use rtnl to set up interfacesFelix Fietkau2023-11-08
| | | | | | In wpa_supplicant, set up wlan interfaces before adding them Signed-off-by: Felix Fietkau <nbd@nbd.name>
* wifi: fix applying mesh parameters when wpa_supplicant is in useFelix Fietkau2023-11-08
| | | | | | | Apply them directly using nl80211 after setting up the interface. Use the same method in wdev.uc as well Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix broken WPS on broadcom-wl and ath11kPetr Štetiar2023-11-01
| | | | | | | | | | | | | | | | | | | | Upgrading wpa_supplicant from 2.9 to 2.10 breaks broadcom-wl/ath11k based adapters. The reason for it is hostapd tries to install additional IEs for scanning while the driver does not support this. The kernel indicates the maximum number of bytes for additional scan IEs using the NL80211_ATTR_MAX_SCAN_IE_LEN attribute. Save this value and only add additional scan IEs in case the driver can accommodate these additional IEs. Bug: http://lists.infradead.org/pipermail/hostap/2022-January/040178.html Bug-Debian: https://bugs.debian.org/1004524 Bug-ArchLinux: https://bugs.archlinux.org/task/73495 Upstream-Status: Changes Requested [https://patchwork.ozlabs.org/project/hostap/patch/20220130192200.10883-1-mail@david-bauer.net] Reported-by: Étienne Morice <neon.emorice@mail.com> Tested-by: Étienne Morice <neon.emorice@mail.com> Signed-off-by: David Bauer <mail@david-bauer.net> Signed-off-by: Petr Štetiar <ynezz@true.cz>
* hostapd: fix OWE association with mbedtlsDavid Bauer2023-10-31
| | | | | | | | | | | | | | | | The code for hostapd-mbedtls did not work when used for OWE association. When handling association requests, the buffer offsets and length assumptions were incorrect, leading to never calculating the y point, thus denying association. Also when crafting the association response, the buffer contained the trailing key-type. Fix up both issues to adhere to the specification and make hostapd-mbedtls work with the OWE security type. Signed-off-by: David Bauer <mail@david-bauer.net>
* hostapd: do not trim trailing whitespace, except for newlineFelix Fietkau2023-10-31
| | | | | | Fixes adding SSID or key with trailing whitespace Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: increase PKG_RELEASE to fix buildsNick Hainke2023-09-29
| | | | | | | Recent hostapd changes just edited the ucode files. It is required to bump the PKG_RELEASE to include the newest changes in the latest builds. Signed-off-by: Nick Hainke <vincent@systemli.org>
* hostapd: fix wpa_supplicant mac address allocation on ap+staFelix Fietkau2023-09-28
| | | | | | | | | | | If the full interface is restarted while bringing up an AP, it can trigger a wpa_supplicant interface start before wpa_supplicant is notified of the allocated mac addresses. Fix this by moving the iface_update_supplicant_macaddr call to just after the point where mac addresses are allocated. Reported-by: Michael-cy Lee (李峻宇) <Michael-cy.Lee@mediatek.com> Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix mac address of interfaces created via wdev.ucFelix Fietkau2023-09-27
| | | | | | Use the wdev config with the generated MAC address Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix rare crash with AP+STA and ACS enabledFelix Fietkau2023-09-25
| | | | | | | Ensure that the iface disable in uc_hostapd_iface_start also clears the ACS state. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix patch rebase after a crash fixFelix Fietkau2023-09-22
| | | | | | | | The patch refresh accidentally moved the hostapd_ucode_free_iface call to the wrong function Fixes: e9722aef9e84 ("hostapd: fix a crash when disabling an interface during channel list update") Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix wpa_supplicant bringup with non-nl80211 driversFelix Fietkau2023-09-22
| | | | | | Needed for wired 802.1x Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing NULL pointer check in uc_hostapd_iface_stopFelix Fietkau2023-09-20
| | | | | | Avoid crashing if the interface has already been removed Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix a crash when disabling an interface during channel list updateFelix Fietkau2023-09-20
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: use phy name for hostapd interfaces instead of first-bss ifnameFelix Fietkau2023-09-19
| | | | | | Improves reliability in error handling Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: fix dynamically adding interfaces with 802.11ax support disabled in ↵Felix Fietkau2023-09-18
| | | | | | | | the build Move an important code line outside of #ifdef CONFIG_IEEE80211AX Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: add missing ubus ACL entries for AP+client (#13449)Felix Fietkau2023-09-15
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* hostapd: support dynamic reload of vlan files when renaming interfacesFelix Fietkau2023-09-15
| | | | | | | Avoids unnecessary AP restart on ifname changes when wifi-vlan sections are present. Signed-off-by: Felix Fietkau <nbd@nbd.name>