Wykres commitów

283 Commity (2d084314336fac173fc54509f97465ca1f626408)

Autor SHA1 Wiadomość Data
Mahavir Jain 8250edbf22 Merge branch 'bugfix/mbedtls_deprecated_options' into 'master'
mbedtls: Remove deprecated options from mbedtls/esp_config.h

Closes IDFGH-7296

See merge request espressif/esp-idf!18008
2022-05-30 10:38:08 +08:00
Jiang Jiang Jian 8efa4d64e0 Merge branch 'feature/add_task_wrappers' into 'master'
wpa_supplicant: Add osi layer for FreeRTOS calls

Closes WIFI-2996

See merge request espressif/esp-idf!11734
2022-05-30 10:29:50 +08:00
Jiang Jiang Jian 0e94779b2e Merge branch 'feature/support_esp32c2_wifi_new' into 'master'
Bringup ESP32C2 Wi-Fi

Closes IDF-3905

See merge request espressif/esp-idf!18136
2022-05-29 18:25:24 +08:00
Kapil Gupta 777b2caa1c wpa_supplicant: Move ETS/ESP timers to eloop 2022-05-29 09:32:16 +05:30
Jiang Jiang Jian 2042840974 Merge branch 'bugfix/sae_pmk_caching_issue' into 'master'
esp_wifi: Do not use pmkid caching when SSID is changed

Closes WIFI-4422

See merge request espressif/esp-idf!18244
2022-05-29 00:18:19 +08:00
Zhang Jun Hao fcf8c84ad5 fix potential leak of memory check error 2022-05-28 08:52:55 +00:00
Laukik Hase 28ac0b12fb
mbedtls: Remove deprecated options from mbedtls/esp_config.h
- Removed options related to RC4 ciphersuite, SSL3 and TLS1
  (as per mbedtls v3.1.0)
2022-05-28 10:21:06 +05:30
Kapil Gupta 0cdad0a002 wpa_supplicant: Add wrappers for FreeRTOS APIs 2022-05-26 15:23:21 +05:30
Kapil Gupta 1cf54db433 esp_wifi: Changes to not use pmkid caching when SSID is changed 2022-05-25 15:11:26 +05:30
Kapil Gupta a6811adac7 wpa_supplicant: Add WPS registrar support for softAP mode 2022-05-24 12:11:53 +05:30
Kapil Gupta df1a15e918 wpa_supplicant: Add upstream files for wps registrar 2022-05-24 12:11:53 +05:30
Kapil Gupta ee33c6ae05 esp_wifi: Add APIs to check BTM and RRM support of connected AP 2022-05-16 15:57:59 +05:30
Kapil Gupta c2429f1cf9 wpa_supplicant: sync eap code with upstream 2022-05-13 12:57:47 +08:00
Kapil Gupta 36321fda82 Merge branch 'feature/eloop_timer' into 'master'
wpa_supplicant: Add timer based eloop implementation

See merge request espressif/esp-idf!17430
2022-05-12 12:30:44 +08:00
Kapil Gupta ecc87cfc8d wpa_supplicant: wps code updation
Update WPS code with upstream. Also moved ESP specific code
in another esp code folder.
2022-05-11 12:18:52 +00:00
Kapil Gupta 9c27cf93fc Add testcase for eloop execution 2022-05-11 17:45:23 +05:30
Kapil Gupta d06daee350 wpa_supplicant: Add timer based eloop implementation 2022-05-11 17:45:23 +05:30
Kapil Gupta cb222740bd Merge branch 'bugfix/coverity_fixes' into 'master'
wpa_supplicant: Fix issues reported by coverity

Closes WIFI-4390

See merge request espressif/esp-idf!17915
2022-05-05 18:17:27 +08:00
kapil.gupta 3d5ca7ee6e wpa_supplicant: Add support for FT psk 2022-05-01 16:16:51 +05:30
Kapil Gupta f38e6cb4fa Merge branch 'bugfix/tkip_countermeasure_changes' into 'master'
wpa_supplicant: Unicast key renew in TKIP mic failure

See merge request espressif/esp-idf!17819
2022-04-28 18:50:44 +08:00
Kapil Gupta f070e2db6d wpa_supplicant: Fix issues reported by coverity 2022-04-26 21:40:27 +05:30
Kapil Gupta 9a818cf31d wpa_supplicant: Unicast key renew in TKIP mic failure
Currently we always request group key renew for during
TKIP mic failure. Add support for unicast/multicast
key renew as per packet.
2022-04-26 17:43:34 +05:30
Ivan Grokhotkov 708e99497b
global: add dependency on esp_timer component and include esp_timer.h
Some components were including esp_timer.h without declaring a
dependency on esp_timer component. This used to work due to a
transitive public dependency on esp_timer from freertos component.
Add explicit dependencies where needed.
Also some source files were using esp_timer functions without
including the header file. This used to work because esp_timer.h was
included from freertos port header file. This commit adds esp_timer.h
includes where needed.
2022-04-25 18:39:23 +02:00
Hrudaynath Dhabe 079b5b1857 Merge branch 'bugfix/do_not_allow_unauthenticated_encrypted_key_data' into 'master'
esp_wifi: Ignore unauthenticated encrypted EAPOL-Key data

Closes IDFGH-6773

See merge request espressif/esp-idf!17105
2022-04-20 16:32:45 +08:00
Nachiket Kukade bd40793771 Merge branch 'bugfix/dpp_pkey_api_fix' into 'master'
Move adding prefix/postfix of DPP key to example

Closes IDFGH-7116

See merge request espressif/esp-idf!17383
2022-04-19 15:04:13 +08:00
Kapil Gupta 86013e918a Merge branch 'feature/mbedtls_default_bundle_wpa_ent' into 'master'
wpa_supplicant: Add CA certification bundle support

See merge request espressif/esp-idf!17055
2022-04-18 19:47:45 +08:00
Hrudaynath Dhabe 57905c7ecf esp_wifi: Ignore unauthenticated encrypted EAPOL-Key data and fix
handling of key RSC.

Closes https://github.com/espressif/esp-idf/issues/8401
2022-04-14 17:13:49 +05:30
Nachiket Kukade 8dea7cbed6 wpa_supplicant/dpp: Avoid deadlock while deleting DPP task
Closes https://github.com/espressif/esp-idf/issues/8724
2022-04-14 16:54:47 +05:30
Nachiket Kukade 282d3c6188 wpa_supplicant/dpp: Move adding prefix/postfix of DPP key to example
1. Move adding of prefix/postfix to the private key to example code.
   This is to preserve forward compatibility when more curves are supported.
2. Documentation correction of bootstrapping key configuration.
2022-04-14 16:54:47 +05:30
Kapil Gupta 92c18f11d9 wpa_supplicant: Remove scan done event in task 2022-04-06 19:49:52 +05:30
Kapil Gupta 62eb06e386 wpa_supplicant: Add CA certification bundle support
Add support for CA certificate bundle support for server
certificate validation
2022-04-05 10:57:09 +05:30
Anton Maklakov 6200d2328d Merge branch 'bugfix/printf-placeholder-for-time_t' into 'master'
components: correct printf() placeholder for time_t

See merge request espressif/esp-idf!17439
2022-03-17 16:08:08 +08:00
Kapil Gupta 2bdaa49cb0 Merge branch 'bugfix/pvs_warning_fixes' into 'master'
wpa_supplicant: fix issues reported in static analysis

Closes IDF-2733

See merge request espressif/esp-idf!17499
2022-03-17 12:47:05 +08:00
Kapil Gupta 6da52cf0d8 wpa_supplicant: static analysis fixes 2022-03-16 10:50:49 +05:30
Kapil Gupta a1b842b1c6 wpa_supplicant: Add changes to fix broken dpp crypto 2022-03-14 18:26:35 +05:30
Anton Maklakov e27f1331e4 components: correct printf() placeholder for time_t
Using C99 %jd, https://en.cppreference.com/w/c/chrono/time_t
2022-03-14 14:05:47 +07:00
Kapil Gupta 9130988299 Merge branch 'bugfix/security_validation' into 'master'
wpa_supplicant: Add BTM security checks

Closes WIFI-4075 and WIFI-4081

See merge request espressif/esp-idf!16619
2022-03-10 15:14:06 +08:00
Sagar Bijwe 6501eff7f5 Remove legacy system event framework. 2022-03-09 15:53:45 +05:30
Kapil Gupta c098c253b1 wpa_supplicant: Add BTM security checks 2022-03-09 03:58:39 +00:00
Zim Kalinowski 0440aca4e3 Merge branch 'feature/reevaluate_headers_include_dirs' into 'master'
esp_hw_support/esp_system: Re-evaluate header inclusions and include directories

See merge request espressif/esp-idf!16763
2022-03-08 01:32:24 +08:00
0xFEEDC0DE64 9b7c345bce Fix compiler error in mbedtls
Closes https://github.com/espressif/esp-idf/pull/8500
Closes https://github.com/espressif/esp-idf/issues/8499
Closes IDFGH-6879
Closes IDFGH-6881
2022-03-07 12:15:08 +05:30
Sudeep Mohanty a9fda54d39 esp_hw_support/esp_system: Re-evaluate header inclusions and include directories
This commit updates the visibility of various header files and cleans up
some unnecessary inclusions. Also, this commit removes certain header
include paths which were maintained for backward compatibility.
2022-03-07 11:18:08 +05:30
Jiang Jiang Jian 1068c7720b Merge branch 'bugfix/ignore_pmf_capable_flag' into 'master'
Always connect Station in PMF mode if possible

Closes WIFI-4320

See merge request espressif/esp-idf!17023
2022-03-03 19:34:36 +08:00
Aditya Patwardhan 72f12a0c8c Fix issue in wpa_supplicant 2022-03-03 01:37:10 +05:30
Laukik Hase 3925365351 ci: Fix `pre-check` stage failing tests
- Updated license headers
- Re-enabled public headers and static analysis checks
- Fix public header file check failure

Co-authored-by: Aditya Patwardhan <aditya.patwardhan@espressif.com>
2022-03-03 01:37:10 +05:30
Aditya Patwardhan 60b167f2d6 mbedtls-3.1 update: Removed the `MBEDTLS_PRIVATE` from multiple files
after they have been again made public in mbedtls-3.1

*Added `MBEDTLS_ALLOW_PRIVATE_ACCESS` in some files.
2022-03-03 01:37:10 +05:30
Kapil Gupta 6a164cc5bc Fix issues in wpa2 enterprise with mbedTLS 3.0 2022-03-03 01:37:10 +05:30
Aditya Patwardhan 3b71bd7326 mbedtls-3.0: Fixed ESP32 build issues
- Added MBEDLTS_PRIVATE(...) wherever necessary
- For functions like mbedtls_pk_parse_key(...), it is necessary to pass the RNG function
  pointers as parameter. Solved for dependent components: wpa_supplicant & openSSL
- For libcoap, the SSLv2 ClientHello handshake method has been deprecated, need to handle this.
  Currently, corresponding snippet has been commented.
- Examples tested: hello-world | https_request | wifi_prov_mgr

mbedtls-3.0: Fixed ESP32-C3 & ESP32-S3 build issues
- Removed MBEDTLS_DEPRECATED_REMOVED macro from sha1 port
- DS peripheral: esp_ds_rsa_sign -> removed unsused 'mode' argument
- Added MBEDTLS_PRIVATE(...) wherever required

mbedtls-3.0: Fixed ESP32-S2 build issues
- Fixed outdated function prototypes and usage in mbedlts/port/aes/esp_aes_gcm.c due to changes in GCM module

mbedtls-3.0: Fixed ESP32-H2 build issues

ci: Fixing build stage
- Added MBEDTLS_PRIVATE(...) wherever required
- Added RNG function parameter
- Updated GCM Module changes
- Updated Copyright notices

- Tests:
- build_esp_idf_tests_cmake_esp32
- build_esp_idf_tests_cmake_esp32s2
- build_esp_idf_tests_cmake_esp32c3
- build_esp_idf_tests_cmake_esp32s3

ci: Fixing build stage (mbedtls-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes

- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3

ci: Fixing build stage (example-related changes)
- Added MBEDTLS_PRIVATE(...) wherever required
- Updated SHAXXX functions
- Updated esp_config according to mbedtls changes

- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3

ci: Fixing target_test stage
- Updated test SSL version to TLS_v1_2

- Tests:
- example_test_protocols 1/2

ci: Fixing build stage
- Added checks for MBEDTLS_DHM_C (disabled by default)
- Updated esp_cryptoauthlib submodule
- Updated factory partition size for legacy BLE provisioning example

- Tests:
- build_examples_cmake_esp32
- build_examples_cmake_esp32s2
- build_examples_cmake_esp32c3
- build_examples_cmake_esp32s3

Co-authored-by: Laukik Hase <laukik.hase@espressif.com>
2022-03-03 01:37:10 +05:30
Aditya Patwardhan 45122533e0 mbedtls-3 update:
1) Fix build issue in mbedtls
2) skip the public headers check in IDF
3)Update Kconfig Macros
4)Remove deprecated config options
5) Update the sha API according to new nomenclature
6) Update mbedtls_rsa_init usage
7) Include mbedtls/build_info.h instead of mbedtls/config.h
8) Dont include check_config.h
9) Add additional error message in esp_blufi_api.h
2022-03-03 01:37:10 +05:30
Aditya Patwardhan 0483bfbbfe Initial Changes for updating mbedtls to v3.0 2022-03-03 01:37:09 +05:30