3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-25 17:59:25 +01:00
Commit Graph

6872 Commits

Author SHA1 Message Date
Denis Kenzior
6e4a86d311 TODO: Add RSNE decoder task for iwmon 2015-01-28 21:23:17 -06:00
Denis Kenzior
1cf513e360 TODO: Add BSS_CAPABILITY decoding task 2015-01-28 21:23:17 -06:00
Jukka Rissanen
2ceeca5355 TODO: Mark BSS and security coalesce task done
Update doc/features.txt with a short description of the feature.
2015-01-28 21:23:17 -06:00
Denis Kenzior
26010b8459 wiphy: Optimize scanning data structures
Instead of storing multiple copies of the same BSS (one hanging off the
netdev object and one hanging off the network object), we instead store
the BSS list only on the netdev object.

The network object gets a pointer to the BSS structure on the netdev
list.  As a side effect, the BSS list is always sorted properly.
2015-01-28 21:23:17 -06:00
Denis Kenzior
6f3e4ef594 wiphy: Restructure lost_bss() function
- Remove unneeded nesting
- Rework logic slightly
2015-01-28 21:23:17 -06:00
Jukka Rissanen
4c5498d4cd wiphy: Remove those networks that do not have any BSS
If all the BSSs having same SSID and security have disappeared
from network, then the network can be removed also.
2015-01-28 21:23:16 -06:00
Denis Kenzior
c283557215 wiphy: Remove unneeded brackets 2015-01-28 21:23:16 -06:00
Denis Kenzior
1894b75a18 wiphy: Remove unneeded nesting 2015-01-28 21:23:16 -06:00
Denis Kenzior
0303a095aa wiphy: Remove unneeded variable
Instead of always mallocing space for the ssid array, and then freeing
it in most circumstances, do the opposite.  Only allocate the array once
it is actually needed.  This has the side effect of removing an unneeded
variable and making the code simpler.
2015-01-28 21:23:16 -06:00
Denis Kenzior
9f042ff1b8 wiphy: Ignore BSSes with no SSID 2015-01-28 21:23:16 -06:00
Denis Kenzior
b342f819f9 wiphy: Make const correct 2015-01-28 21:23:16 -06:00
Jukka Rissanen
d27c947209 wiphy: expose network objects instead of BSSes
The idea here is that network object will contain a list of BSS
that have the same SSID and security setting. From user point of view,
we will connect to a certain SSID instead of connecting directly to
a BSS. We pick the best BSS automatically from the BSS list when
connecting to a SSID.
2015-01-28 21:23:16 -06:00
Denis Kenzior
25d6dba008 unit: Rework unit test 2015-01-28 21:23:16 -06:00
Denis Kenzior
ce3ffd732f scan: Make const correct 2015-01-28 21:23:16 -06:00
Denis Kenzior
3b618172e2 unit: Remove unneeded whitespace 2015-01-28 21:23:16 -06:00
Denis Kenzior
532e00f686 gitignore: Add unit/test-ssid-security 2015-01-28 21:23:16 -06:00
Jukka Rissanen
f7efdeb5e2 unit: Add checking of SSID security settings 2015-01-28 14:15:14 -06:00
Jukka Rissanen
8f73bc825f scan: Add utility to categorize BSS security type
Utility function gets the RSNE information element and
figures out whether the SSID is Open, WEP, PSK or 802.1X
network.
2015-01-28 12:34:01 -06:00
Jukka Rissanen
27b45f926b ie: Add capability enum 2015-01-28 12:33:47 -06:00
Jukka Rissanen
9e655106fa wiphy: MLME warning message text incorrect
MLME notify function prints error if wiphy or netdev is missing.
The error text in this case talks about scan notification instead
of more proper MLME notification.
2015-01-28 11:49:03 -06:00
Jukka Rissanen
bd6189aef0 main: Remove obsolete -S option
As there is no handler for -S option, we can remove it.
2015-01-26 21:53:55 -06:00
Jukka Rissanen
9c380ad95c main: DBus debug option -B was missing
It was not possible to activate DBus debugging.
2015-01-26 21:53:30 -06:00
Denis Kenzior
63a57453da monitor: Fix transaction_sequence byte-ordering
transaction_sequence must be compared in host byte-order
2015-01-22 12:42:20 -06:00
Denis Kenzior
5247695d56 mpdu: fix transaction_sequence byte-ordering
transaction_sequence was not being considered in host CPU byte order
2015-01-22 12:41:10 -06:00
Denis Kenzior
e60b814dc8 mpdu: algorithm was not swapped to host byte-order 2015-01-22 12:41:10 -06:00
Denis Kenzior
373d276dfc monitor: algorithm was not in host byte-order
auth.algorithm field is an __le16, so must be converted to host byte
order first.
2015-01-22 12:41:08 -06:00
Denis Kenzior
f94f3d561c monitor: duration should be printed in host-order 2015-01-22 12:28:47 -06:00
Tomasz Bursztyka
9e3cc8bf42 monitor: Print (de)authentication frame info
This patch adds decoding and printing of information contained in
authentication and de-authentication management frames.
2015-01-22 12:24:20 -06:00
Tomasz Bursztyka
1d76163fb1 TODO: Add a unit test task for the mpdu frames
All frames need their own unit-test.
2015-01-22 12:20:50 -06:00
Tomasz Bursztyka
33ab01f669 unit: Update to the new eapol_key_validate API
eapol_key_validate will directly return a const pointer if the
validation succeeds.
2015-01-22 12:20:19 -06:00
Tomasz Bursztyka
8f946c0cdc eapol: Change function signatures
The frame which comes in is an EAPoL-key frame, thus changing the name
accordingly (as well as the parameter names).

Also, returning the cast pointer instead of a boolean is easier to
use as there won't be any need to perform the cast ourselves afterward
2015-01-22 12:18:17 -06:00
Tomasz Bursztyka
8fba847b9d unit: Update to the new mpdu_validate API
mpdu_validate will directly return a const pointer if the validation
succeeds.
2015-01-22 12:16:33 -06:00
Tomasz Bursztyka
e02f02fa69 mpdu: Change the validation function signature
What comes in is a frame, and let's set it to uint8_t pointer, which is
semantically better than unsigned char.

Also, returning the cast pointer instead of a boolean is easier to
use as there won't be any need to perform the cast ourselves afterward
2015-01-22 12:14:47 -06:00
Tomasz Bursztyka
e573b7ca0f TODO: Updating PACKET_RECV_OUTPUT task
Since it's not implemented in the kernel, setting the priority to Low
and the complexity to 8.
2015-01-22 09:41:21 -06:00
Denis Kenzior
66c98d0998 HACKING: Add Submitting Patches section 2015-01-22 08:53:10 -06:00
Denis Kenzior
572fee1176 TODO: Add task to set TK into the kernel 2015-01-21 19:21:43 -06:00
Denis Kenzior
7199f61dc2 TODO: Add task to obtain Replay Counter
If Re-Key Offload is enabled, and a re-key occurs, the kernel will send
us an event with the updated Replay Counter.  This information needs to
be processed accordingly.
2015-01-21 19:20:07 -06:00
Denis Kenzior
66596c30bc TODO: Add new task for REKEY_DATA 2015-01-21 19:19:11 -06:00
Denis Kenzior
0a70aaefa7 TODO: Add Decode netlink REKEY_DATA attribute task 2015-01-21 19:18:33 -06:00
Denis Kenzior
ff2163a348 doc: Add overview of WPA Authentication 2015-01-21 18:43:52 -06:00
Tomasz Bursztyka
9b4011333b TODO: Removing the authentication frames parsing task 2015-01-21 14:39:20 -06:00
Tomasz Bursztyka
55d3283aeb mpdu: Add member 'ies' for mpdu_deauthentication
Even if this will never really be useful, it's better this way rather
than having a todo comment.
2015-01-21 14:37:27 -06:00
Tomasz Bursztyka
3d5fe2fddd mpdu: Validate beacon mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:31:26 -06:00
Tomasz Bursztyka
9ce1745ede mpdu: Validate timing advertisement mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:30:51 -06:00
Tomasz Bursztyka
8078f18c35 mpdu: Validate probe response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:30:12 -06:00
Tomasz Bursztyka
cc1cc64843 mpdu: Validate probe request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:29:39 -06:00
Tomasz Bursztyka
142a6a8a0c mpdu: Validate reassociation response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:29:05 -06:00
Tomasz Bursztyka
efcaefc5dd mpdu: Validate reassociation request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:21 -06:00
Tomasz Bursztyka
8353ac445d mpdu: Validate association response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:14 -06:00
Tomasz Bursztyka
5c9f1db01f mpdu: Validate association request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:07 -06:00