|
|
@@ -31,7 +31,7 @@
|
|
|
};
|
|
|
|
|
|
enum hostapd_chan_status {
|
|
|
-@@ -169,6 +170,7 @@ struct hostapd_data {
|
|
|
+@@ -171,6 +172,7 @@ struct hostapd_data {
|
|
|
struct hostapd_iface *iface;
|
|
|
struct hostapd_config *iconf;
|
|
|
struct hostapd_bss_config *conf;
|
|
|
@@ -39,7 +39,7 @@
|
|
|
int interface_added; /* virtual interface added for this BSS */
|
|
|
unsigned int started:1;
|
|
|
unsigned int disabled:1;
|
|
|
-@@ -628,6 +630,7 @@ hostapd_alloc_bss_data(struct hostapd_if
|
|
|
+@@ -630,6 +632,7 @@ hostapd_alloc_bss_data(struct hostapd_if
|
|
|
struct hostapd_bss_config *bss);
|
|
|
int hostapd_setup_interface(struct hostapd_iface *iface);
|
|
|
int hostapd_setup_interface_complete(struct hostapd_iface *iface, int err);
|
|
|
@@ -126,7 +126,7 @@
|
|
|
if (res == HOSTAPD_ACL_PENDING)
|
|
|
return;
|
|
|
|
|
|
-@@ -5445,7 +5457,7 @@ static void handle_assoc(struct hostapd_
|
|
|
+@@ -5447,7 +5459,7 @@ static void handle_assoc(struct hostapd_
|
|
|
int resp = WLAN_STATUS_SUCCESS;
|
|
|
u16 reply_res = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
|
const u8 *pos;
|
|
|
@@ -135,7 +135,7 @@
|
|
|
struct sta_info *sta;
|
|
|
u8 *tmp = NULL;
|
|
|
#ifdef CONFIG_FILS
|
|
|
-@@ -5658,6 +5670,11 @@ static void handle_assoc(struct hostapd_
|
|
|
+@@ -5660,6 +5672,11 @@ static void handle_assoc(struct hostapd_
|
|
|
left = res;
|
|
|
}
|
|
|
#endif /* CONFIG_FILS */
|
|
|
@@ -147,7 +147,7 @@
|
|
|
|
|
|
/* followed by SSID and Supported rates; and HT capabilities if 802.11n
|
|
|
* is used */
|
|
|
-@@ -5756,6 +5773,13 @@ static void handle_assoc(struct hostapd_
|
|
|
+@@ -5758,6 +5775,13 @@ static void handle_assoc(struct hostapd_
|
|
|
}
|
|
|
#endif /* CONFIG_FILS */
|
|
|
|
|
|
@@ -161,7 +161,7 @@
|
|
|
fail:
|
|
|
|
|
|
/*
|
|
|
-@@ -5849,6 +5873,7 @@ static void handle_disassoc(struct hosta
|
|
|
+@@ -5851,6 +5875,7 @@ static void handle_disassoc(struct hosta
|
|
|
wpa_printf(MSG_DEBUG, "disassocation: STA=" MACSTR " reason_code=%d",
|
|
|
MAC2STR(mgmt->sa),
|
|
|
le_to_host16(mgmt->u.disassoc.reason_code));
|
|
|
@@ -169,7 +169,7 @@
|
|
|
|
|
|
sta = ap_get_sta(hapd, mgmt->sa);
|
|
|
if (sta == NULL) {
|
|
|
-@@ -5918,6 +5943,8 @@ static void handle_deauth(struct hostapd
|
|
|
+@@ -5920,6 +5945,8 @@ static void handle_deauth(struct hostapd
|
|
|
/* Clear the PTKSA cache entries for PASN */
|
|
|
ptksa_cache_flush(hapd->ptksa, mgmt->sa, WPA_CIPHER_NONE);
|
|
|
|
|
|
@@ -180,7 +180,7 @@
|
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "Station " MACSTR " trying "
|
|
|
--- a/src/ap/beacon.c
|
|
|
+++ b/src/ap/beacon.c
|
|
|
-@@ -823,6 +823,12 @@ void handle_probe_req(struct hostapd_dat
|
|
|
+@@ -852,6 +852,12 @@ void handle_probe_req(struct hostapd_dat
|
|
|
u16 csa_offs[2];
|
|
|
size_t csa_offs_len;
|
|
|
struct radius_sta rad_info;
|
|
|
@@ -193,7 +193,7 @@
|
|
|
|
|
|
if (hapd->iconf->rssi_ignore_probe_request && ssi_signal &&
|
|
|
ssi_signal < hapd->iconf->rssi_ignore_probe_request)
|
|
|
-@@ -1009,6 +1015,12 @@ void handle_probe_req(struct hostapd_dat
|
|
|
+@@ -1038,6 +1044,12 @@ void handle_probe_req(struct hostapd_dat
|
|
|
}
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
|
@@ -283,7 +283,7 @@
|
|
|
ifdef CONFIG_CODE_COVERAGE
|
|
|
CFLAGS += -O0 -fprofile-arcs -ftest-coverage
|
|
|
LIBS += -lgcov
|
|
|
-@@ -960,6 +966,9 @@ ifdef CONFIG_CTRL_IFACE_MIB
|
|
|
+@@ -962,6 +968,9 @@ ifdef CONFIG_CTRL_IFACE_MIB
|
|
|
CFLAGS += -DCONFIG_CTRL_IFACE_MIB
|
|
|
endif
|
|
|
OBJS += ../src/ap/ctrl_iface_ap.o
|
|
|
@@ -295,7 +295,7 @@
|
|
|
CFLAGS += -DEAP_SERVER -DEAP_SERVER_IDENTITY
|
|
|
--- a/wpa_supplicant/wpa_supplicant.c
|
|
|
+++ b/wpa_supplicant/wpa_supplicant.c
|
|
|
-@@ -7017,6 +7017,8 @@ struct wpa_supplicant * wpa_supplicant_a
|
|
|
+@@ -7241,6 +7241,8 @@ struct wpa_supplicant * wpa_supplicant_a
|
|
|
}
|
|
|
#endif /* CONFIG_P2P */
|
|
|
|
|
|
@@ -304,7 +304,7 @@
|
|
|
return wpa_s;
|
|
|
}
|
|
|
|
|
|
-@@ -7043,6 +7045,8 @@ int wpa_supplicant_remove_iface(struct w
|
|
|
+@@ -7267,6 +7269,8 @@ int wpa_supplicant_remove_iface(struct w
|
|
|
struct wpa_supplicant *parent = wpa_s->parent;
|
|
|
#endif /* CONFIG_MESH */
|
|
|
|
|
|
@@ -313,7 +313,7 @@
|
|
|
/* Remove interface from the global list of interfaces */
|
|
|
prev = global->ifaces;
|
|
|
if (prev == wpa_s) {
|
|
|
-@@ -7346,8 +7350,12 @@ int wpa_supplicant_run(struct wpa_global
|
|
|
+@@ -7570,8 +7574,12 @@ int wpa_supplicant_run(struct wpa_global
|
|
|
eloop_register_signal_terminate(wpa_supplicant_terminate, global);
|
|
|
eloop_register_signal_reconfig(wpa_supplicant_reconfig, global);
|
|
|
|
|
|
@@ -336,7 +336,7 @@
|
|
|
|
|
|
extern const char *const wpa_supplicant_version;
|
|
|
extern const char *const wpa_supplicant_license;
|
|
|
-@@ -321,6 +322,8 @@ struct wpa_global {
|
|
|
+@@ -322,6 +323,8 @@ struct wpa_global {
|
|
|
#endif /* CONFIG_WIFI_DISPLAY */
|
|
|
|
|
|
struct psk_list_entry *add_psk; /* From group formation */
|
|
|
@@ -345,7 +345,7 @@
|
|
|
};
|
|
|
|
|
|
|
|
|
-@@ -605,6 +608,7 @@ struct wpa_supplicant {
|
|
|
+@@ -708,6 +711,7 @@ struct wpa_supplicant {
|
|
|
unsigned char own_addr[ETH_ALEN];
|
|
|
unsigned char perm_addr[ETH_ALEN];
|
|
|
char ifname[100];
|
|
|
@@ -363,7 +363,7 @@
|
|
|
|
|
|
|
|
|
#ifndef WPS_PIN_SCAN_IGNORE_SEL_REG
|
|
|
-@@ -392,6 +393,8 @@ static int wpa_supplicant_wps_cred(void
|
|
|
+@@ -393,6 +394,8 @@ static int wpa_supplicant_wps_cred(void
|
|
|
wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute",
|
|
|
cred->cred_attr, cred->cred_attr_len);
|
|
|
|
|
|
@@ -463,7 +463,7 @@
|
|
|
|
|
|
--- a/src/ap/dfs.c
|
|
|
+++ b/src/ap/dfs.c
|
|
|
-@@ -1193,6 +1193,8 @@ int hostapd_dfs_radar_detected(struct ho
|
|
|
+@@ -1196,6 +1196,8 @@ int hostapd_dfs_radar_detected(struct ho
|
|
|
"freq=%d ht_enabled=%d chan_offset=%d chan_width=%d cf1=%d cf2=%d",
|
|
|
freq, ht_enabled, chan_offset, chan_width, cf1, cf2);
|
|
|
|