muhaidong
103a53c80a
wpa_supplicant: try install gtk before send 2 of 2
2022-09-17 19:08:13 +08:00
Kapil Gupta
465996fba5
wpa_supplicant: fix invalid pointer free
2022-07-28 12:47:31 +00:00
Shreyas Sheth
341a92aaa5
esp_wifi: WPA3 SAE keep default value as h2e and hunting and pecking for sae pwe
2022-07-22 12:23:13 +05:30
Kapil Gupta
951928960b
esp_wifi: WPA2 enterprise related changes
...
1. Removed DHE ciphers when mbedTLS is disabled since they take
too much processing power.
2. Removed support of SHA384 and SHA512 when mbedTLS is disabled
due to too much processing needed.
3. Fixed bugs in crypto_hash_init API which was causing
EAP connections to fail when mbedTLS was enabled.
4. Cleaned some code of crypto_hash_***
2022-07-21 13:33:18 +05:30
Jiang Jiang Jian
633a9f744a
Merge branch 'bugfix/OWE_memory_leak' into 'master'
...
esp_wifi : fixed OWE memory leak
See merge request espressif/esp-idf!19061
2022-07-18 17:20:36 +08:00
Kapil Gupta
882ad4e5e7
Merge branch 'feature/eloop_debug_framework' into 'master'
...
wpa_supplicant: Add debug info for eloop functions
See merge request espressif/esp-idf!18451
2022-07-18 14:17:25 +08:00
Shyamal Khachane
88db86672d
fix for OWE memory leak
2022-07-15 14:29:32 +05:30
Shreyas Sheth
591c7a496c
esp_wifi: WPA3 SAE H2E support for station
2022-06-20 18:51:11 +05:30
Kapil Gupta
7fae6ce4f2
Correct SSID copy length during WPS scan
2022-06-18 13:26:48 +00:00
Kapil Gupta
6212a50edd
wpa_supplicant: Add debug info for eloop functions
2022-06-16 10:36:34 +05:30
Shyamal Khachane
6d55761f60
OWE support for station
2022-06-15 17:20:24 +05:30
Kapil Gupta
bb23d783c0
Merge branch 'bugfix/sta_rejoin_softap_mode_issue' into 'master'
...
wpa_supplicant: Add changes to deinit sta_info correctly
Closes WIFI-4441
See merge request espressif/esp-idf!18395
2022-06-07 21:47:14 +08:00
Kapil Gupta
ed2bed49c0
wpa_supplicant: Add changes to deinit sta_info correctly
...
Incase sta pointer is not null during station join, deinit of
previous sm causing crash due to incorrect typecast.
Add changes to correct this.
2022-06-07 11:41:53 +05:30
Kapil Gupta
28a06d07f7
Corrected hash size for sta_info structure
2022-06-06 16:38:04 +05:30
Kapil Gupta
2aa6853d3e
Remove strcpy/strncpy function callings from supplicant
2022-06-06 11:03:35 +05:30
Kapil Gupta
916a4d6524
Fix coverity reported issues
2022-06-06 11:03:35 +05:30
Kapil Gupta
944690a5e7
Correct condition for not to use pmk caching
2022-06-06 11:03:35 +05:30
Jiang Jiang Jian
8efa4d64e0
Merge branch 'feature/add_task_wrappers' into 'master'
...
wpa_supplicant: Add osi layer for FreeRTOS calls
Closes WIFI-2996
See merge request espressif/esp-idf!11734
2022-05-30 10:29:50 +08:00
Kapil Gupta
777b2caa1c
wpa_supplicant: Move ETS/ESP timers to eloop
2022-05-29 09:32:16 +05:30
Jiang Jiang Jian
2042840974
Merge branch 'bugfix/sae_pmk_caching_issue' into 'master'
...
esp_wifi: Do not use pmkid caching when SSID is changed
Closes WIFI-4422
See merge request espressif/esp-idf!18244
2022-05-29 00:18:19 +08:00
Kapil Gupta
1cf54db433
esp_wifi: Changes to not use pmkid caching when SSID is changed
2022-05-25 15:11:26 +05:30
Kapil Gupta
a6811adac7
wpa_supplicant: Add WPS registrar support for softAP mode
2022-05-24 12:11:53 +05:30
Kapil Gupta
df1a15e918
wpa_supplicant: Add upstream files for wps registrar
2022-05-24 12:11:53 +05:30
Kapil Gupta
ee33c6ae05
esp_wifi: Add APIs to check BTM and RRM support of connected AP
2022-05-16 15:57:59 +05:30
Kapil Gupta
c2429f1cf9
wpa_supplicant: sync eap code with upstream
2022-05-13 12:57:47 +08:00
Kapil Gupta
36321fda82
Merge branch 'feature/eloop_timer' into 'master'
...
wpa_supplicant: Add timer based eloop implementation
See merge request espressif/esp-idf!17430
2022-05-12 12:30:44 +08:00
Kapil Gupta
ecc87cfc8d
wpa_supplicant: wps code updation
...
Update WPS code with upstream. Also moved ESP specific code
in another esp code folder.
2022-05-11 12:18:52 +00:00
Kapil Gupta
d06daee350
wpa_supplicant: Add timer based eloop implementation
2022-05-11 17:45:23 +05:30
Kapil Gupta
cb222740bd
Merge branch 'bugfix/coverity_fixes' into 'master'
...
wpa_supplicant: Fix issues reported by coverity
Closes WIFI-4390
See merge request espressif/esp-idf!17915
2022-05-05 18:17:27 +08:00
kapil.gupta
3d5ca7ee6e
wpa_supplicant: Add support for FT psk
2022-05-01 16:16:51 +05:30
Kapil Gupta
f38e6cb4fa
Merge branch 'bugfix/tkip_countermeasure_changes' into 'master'
...
wpa_supplicant: Unicast key renew in TKIP mic failure
See merge request espressif/esp-idf!17819
2022-04-28 18:50:44 +08:00
Kapil Gupta
f070e2db6d
wpa_supplicant: Fix issues reported by coverity
2022-04-26 21:40:27 +05:30
Kapil Gupta
9a818cf31d
wpa_supplicant: Unicast key renew in TKIP mic failure
...
Currently we always request group key renew for during
TKIP mic failure. Add support for unicast/multicast
key renew as per packet.
2022-04-26 17:43:34 +05:30
Ivan Grokhotkov
708e99497b
global: add dependency on esp_timer component and include esp_timer.h
...
Some components were including esp_timer.h without declaring a
dependency on esp_timer component. This used to work due to a
transitive public dependency on esp_timer from freertos component.
Add explicit dependencies where needed.
Also some source files were using esp_timer functions without
including the header file. This used to work because esp_timer.h was
included from freertos port header file. This commit adds esp_timer.h
includes where needed.
2022-04-25 18:39:23 +02:00
Hrudaynath Dhabe
079b5b1857
Merge branch 'bugfix/do_not_allow_unauthenticated_encrypted_key_data' into 'master'
...
esp_wifi: Ignore unauthenticated encrypted EAPOL-Key data
Closes IDFGH-6773
See merge request espressif/esp-idf!17105
2022-04-20 16:32:45 +08:00
Hrudaynath Dhabe
57905c7ecf
esp_wifi: Ignore unauthenticated encrypted EAPOL-Key data and fix
...
handling of key RSC.
Closes https://github.com/espressif/esp-idf/issues/8401
2022-04-14 17:13:49 +05:30
Kapil Gupta
62eb06e386
wpa_supplicant: Add CA certification bundle support
...
Add support for CA certificate bundle support for server
certificate validation
2022-04-05 10:57:09 +05:30
Anton Maklakov
6200d2328d
Merge branch 'bugfix/printf-placeholder-for-time_t' into 'master'
...
components: correct printf() placeholder for time_t
See merge request espressif/esp-idf!17439
2022-03-17 16:08:08 +08:00
Kapil Gupta
2bdaa49cb0
Merge branch 'bugfix/pvs_warning_fixes' into 'master'
...
wpa_supplicant: fix issues reported in static analysis
Closes IDF-2733
See merge request espressif/esp-idf!17499
2022-03-17 12:47:05 +08:00
Kapil Gupta
6da52cf0d8
wpa_supplicant: static analysis fixes
2022-03-16 10:50:49 +05:30
Kapil Gupta
a1b842b1c6
wpa_supplicant: Add changes to fix broken dpp crypto
2022-03-14 18:26:35 +05:30
Anton Maklakov
e27f1331e4
components: correct printf() placeholder for time_t
...
Using C99 %jd, https://en.cppreference.com/w/c/chrono/time_t
2022-03-14 14:05:47 +07:00
Kapil Gupta
c098c253b1
wpa_supplicant: Add BTM security checks
2022-03-09 03:58:39 +00:00
0xFEEDC0DE64
9b7c345bce
Fix compiler error in mbedtls
...
Closes https://github.com/espressif/esp-idf/pull/8500
Closes https://github.com/espressif/esp-idf/issues/8499
Closes IDFGH-6879
Closes IDFGH-6881
2022-03-07 12:15:08 +05:30
Aditya Patwardhan
72f12a0c8c
Fix issue in wpa_supplicant
2022-03-03 01:37:10 +05:30
Laukik Hase
3925365351
ci: Fix pre-check
stage failing tests
...
- Updated license headers
- Re-enabled public headers and static analysis checks
- Fix public header file check failure
Co-authored-by: Aditya Patwardhan <aditya.patwardhan@espressif.com>
2022-03-03 01:37:10 +05:30
Aditya Patwardhan
60b167f2d6
mbedtls-3.1 update: Removed the MBEDTLS_PRIVATE
from multiple files
...
after they have been again made public in mbedtls-3.1
*Added `MBEDTLS_ALLOW_PRIVATE_ACCESS` in some files.
2022-03-03 01:37:10 +05:30
Kapil Gupta
6a164cc5bc
Fix issues in wpa2 enterprise with mbedTLS 3.0
2022-03-03 01:37:10 +05:30
Aditya Patwardhan
3b71bd7326
mbedtls-3.0: Fixed ESP32 build issues
...
- Added MBEDLTS_PRIVATE(...) wherever necessary
- For functions like mbedtls_pk_parse_key(...), it is necessary to pass the RNG function
pointers as parameter. Solved for dependent components: wpa_supplicant & openSSL
- For libcoap, the SSLv2 ClientHello handshake method has been deprecated, need to handle this.
Currently, corresponding snippet has been commented.
- Examples tested: hello-world | https_request | wifi_prov_mgr
mbedtls-3.0: Fixed ESP32-C3 & ESP32-S3 build issues
- Removed MBEDTLS_DEPRECATED_REMOVED macro from sha1 port
- DS peripheral: esp_ds_rsa_sign -> removed unsused 'mode' argument
- Added MBEDTLS_PRIVATE(...) wherever required
mbedtls-3.0: Fixed ESP32-S2 build issues
- Fixed outdated function prototypes and usage in mbedlts/port/aes/esp_aes_gcm.c due to changes in GCM module
mbedtls-3.0: Fixed ESP32-H2 build issues
ci: Fixing build stage
- Added MBEDTLS_PRIVATE(...) wherever required
- Added RNG function parameter
- Updated GCM Module changes
- Updated Copyright notices
- Tests:
- build_esp_idf_tests_cmake_esp32
- build_esp_idf_tests_cmake_esp32s2
- build_esp_idf_tests_cmake_esp32c3
- build_esp_idf_tests_cmake_esp32s3
ci: Fixing build stage (mbedtls-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing build stage (example-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
ci: Fixing target_test stage
- Updated test SSL version to TLS_v1_2
- Tests:
- example_test_protocols 1/2
ci: Fixing build stage
- Added checks for MBEDTLS_DHM_C (disabled by default)
- Updated esp_cryptoauthlib submodule
- Updated factory partition size for legacy BLE provisioning example
- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3
Co-authored-by: Laukik Hase <laukik.hase@espressif.com>
2022-03-03 01:37:10 +05:30
Aditya Patwardhan
45122533e0
mbedtls-3 update:
...
1) Fix build issue in mbedtls
2) skip the public headers check in IDF
3)Update Kconfig Macros
4)Remove deprecated config options
5) Update the sha API according to new nomenclature
6) Update mbedtls_rsa_init usage
7) Include mbedtls/build_info.h instead of mbedtls/config.h
8) Dont include check_config.h
9) Add additional error message in esp_blufi_api.h
2022-03-03 01:37:10 +05:30