Jouni Malinen [Sat, 12 Apr 2014 20:25:11 +0000 (23:25 +0300)]
Add forgotten ampdu_factor into wpa_supplicant.conf
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 20:11:02 +0000 (23:11 +0300)]
tests: IBSS with fixed BSSID
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 20:01:58 +0000 (23:01 +0300)]
tests: HS 2.0 connection using connect API
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 19:52:41 +0000 (22:52 +0300)]
tests: Opportunistic key caching with the connect API
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 19:47:49 +0000 (22:47 +0300)]
tests: Wildcard SSID with PSK/passphrase
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 19:46:54 +0000 (22:46 +0300)]
Re-enable use of wildcard SSID with passphrase
This used to work, but it looks like the disabled-PSK-network check
ended up rejecting confiurations that configured a wildcard SSID with a
passphrase (instead of PSK).
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 19:30:48 +0000 (22:30 +0300)]
tests: More IBSS WPA-None coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 17:28:37 +0000 (20:28 +0300)]
tests: P2P GO removing persistent client based on invitation result
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 17:16:22 +0000 (20:16 +0300)]
tests: P2P group interface removed due to GO Negotiation failure
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 17:08:13 +0000 (20:08 +0300)]
tests: P2P group idle timeout on GO
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 17:03:24 +0000 (20:03 +0300)]
tests: p2p_find with progressive scan
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 16:48:57 +0000 (19:48 +0300)]
tests: SCAN_INTERVAL setting
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 16:43:24 +0000 (19:43 +0300)]
tests: filter_ssids=1
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 16:27:57 +0000 (19:27 +0300)]
tests: Association timeout
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 16:09:35 +0000 (19:09 +0300)]
tests: INTERFACE DISABLED/ENABLED events based on ifdown/up
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 16:02:23 +0000 (19:02 +0300)]
tests: Reconnect to the same BSS on inactivity disconnection
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 15:53:35 +0000 (18:53 +0300)]
tests: WNM keep-alive
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 15:47:48 +0000 (18:47 +0300)]
tests: auto_interworking=1
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 15:31:25 +0000 (18:31 +0300)]
tests: AP_SCAN 0/2 and externally triggered connection
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 14:16:07 +0000 (17:16 +0300)]
tests: BSS_EXPIRE_COUNT/AGE
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 13:51:15 +0000 (16:51 +0300)]
tests: ENABLE/DISABLE_NETWORK
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 13:42:22 +0000 (16:42 +0300)]
tests: Radio work canceling during interface removal
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 13:41:45 +0000 (16:41 +0300)]
Fix a debug print to have a space between words
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 13:25:18 +0000 (16:25 +0300)]
tests: EXT PW with no valid PSK found
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 13:17:04 +0000 (16:17 +0300)]
tests: RSN IBSS reconnection
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 12:51:52 +0000 (15:51 +0300)]
tests: autoscan
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 08:56:55 +0000 (11:56 +0300)]
tests: bgscan test cases
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 12 Apr 2014 08:48:05 +0000 (11:48 +0300)]
Add CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events
This allows external programs to monitor driver signal change events
through wpa_supplicant when bgscan is used.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 22:11:25 +0000 (01:11 +0300)]
tests: P2P_LISTEN with timeout
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 22:06:09 +0000 (01:06 +0300)]
tests: RADIO_WORK timeout
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 22:02:19 +0000 (01:02 +0300)]
tests: SIGNAL_POLL and PKTCNT_POLL
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:58:52 +0000 (00:58 +0300)]
tests: WNM_SLEEP with additional parameters
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:27:20 +0000 (00:27 +0300)]
tests: HS20_ICON_REQUEST
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:18:07 +0000 (00:18 +0300)]
tests: HS20_ANQP_GET
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:16:38 +0000 (00:16 +0300)]
tests: P2P_SERVICE_DEL
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:05:34 +0000 (00:05 +0300)]
tests: ctrl_iface LIST_CREDS
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 21:00:51 +0000 (00:00 +0300)]
tests: ctrl_iface SCAN_RESULTS
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:56:57 +0000 (23:56 +0300)]
tests: ctrl_iface LOG_LEVEL
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:48:36 +0000 (23:48 +0300)]
tests: ctrl_iface BLACKLIST
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:47:46 +0000 (23:47 +0300)]
Fix ctrl_iface BLACKLIST return value
Adding a new entry was returning FAIL on success due to incorrect
assumption of wpa_blacklist_add() returning 0 on success (it returns the
positive blacklist count).
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:34:47 +0000 (23:34 +0300)]
tests: ctrl_iface BSSID command
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:27:26 +0000 (23:27 +0300)]
tests: NFC_REPORT_HANDOVER error cases
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 20:04:18 +0000 (23:04 +0300)]
tests: Additional WPS ctrl_iface coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 19:56:42 +0000 (22:56 +0300)]
tests: ctrl_iface invalid MAC address
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Fri, 11 Apr 2014 19:30:43 +0000 (22:30 +0300)]
tests: Increase ctrl_iface SET test coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
Andres Morales [Thu, 27 Feb 2014 00:05:21 +0000 (16:05 -0800)]
P2P: Add NFC_HANDOVER commands to p2p_redir list
These commands can be executed on the P2P interface thus should be
redirected to it when issued to the global control interface.
Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
Fionn Cleary [Fri, 4 Apr 2014 13:49:53 +0000 (15:49 +0200)]
Add reassociate command to dbus doxygen
Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
Fionn Cleary [Fri, 4 Apr 2014 13:45:26 +0000 (15:45 +0200)]
Fix reassociate dbus method
- Reassociate was only working when there was already a connect in
place, which is not how the REASSOCIATE command from the ctrl
interface works.
Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
Daichi Ueura [Sun, 6 Apr 2014 07:35:12 +0000 (16:35 +0900)]
wpa_cli: Fix wrong comparison in wpa_cli_cmd_interface
Signed-off-by: Daichi Ueura <daichi.ueura@gmail.com>
Felix Fietkau [Sun, 6 Apr 2014 11:11:53 +0000 (13:11 +0200)]
nl80211: Handle multiple interface combinations for P2P
The first combination may allow single-channel concurrency for
P2P + managed, but there may be others that allow multi-channel
concurrency. Parse all of them to find the maximum number of channels.
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Jouni Malinen [Fri, 11 Apr 2014 15:55:42 +0000 (18:55 +0300)]
HS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER
The trust roots in the PPS MO point to a DER encoded X.509 certificate.
Signed-off-by: Jouni Malinen <j@w1.fi>
Nirav Shah [Mon, 7 Apr 2014 22:12:19 +0000 (03:42 +0530)]
P2P: Add retry mechanism for GO Negotiation Confirmation
wpa_supplicant now retries for P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if
it doesn't receive acknowledgement for GO Negotiation Confirmation
frame. Currently, P2P_GO_NEG_CNF_MAX_RETRY_COUNT is set to 1.
While this is not strictly speaking following the P2P specification,
this can improve robustness of GO Negotiation in environments with
interference and also with peer devices that do not behave properly
(e.g., by not remaining awake on the negotiation channel through the
full GO Negotiation).
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Sunil Dutt [Wed, 9 Apr 2014 09:12:08 +0000 (14:42 +0530)]
P2P: Mark the scan in p2p_in_invitation as p2p_probe
Mark the scan performed by the P2P Client in search of the GO
during the persistant reinvocation as a p2p_probe to avoid
unnecessary use of 802.11b rates.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Abhishek Singh [Thu, 10 Apr 2014 12:23:40 +0000 (17:53 +0530)]
nl80211: Use LEAVE_IBSS with driver-based-SME
NL80211_CMD_LEAVE_IBSS was used only with wpa_supplicant-based SME.
Extend this to drivers that implement SME internally.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Amarnath Hullur Subramanyam [Fri, 4 Apr 2014 20:40:58 +0000 (13:40 -0700)]
Android: Add qca-vendor.h to be exported
Add qca-vendor.h along with wpa_ctrl.h to be exported to
common staged location.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Wed, 9 Apr 2014 10:02:53 +0000 (13:02 +0300)]
OpenSSL: Detect and prevent TLS heartbeat attack
Some OpenSSL versions have vulnerability in TLS heartbeat request
processing. Check the processed message to determine if the attack has
been used and if so, do not send the response to the peer. This does not
prevent the buffer read overflow within OpenSSL, but this prevents the
attacker from receiving the information.
This change is an additional layer of protection if some yet to be
identified paths were to expose this OpenSSL vulnerability. However, the
way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant
was already rejecting the messages before the response goes out and as
such, this additional change is unlikely to be needed to avoid the
issue.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 22:35:01 +0000 (01:35 +0300)]
tests: WNM BSS TM Req with neighbor report subelements
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 22:34:17 +0000 (01:34 +0300)]
WNM: Remove unnecessary present flag
The structures are all allocated, so the pointer can be compared to NULL
to determine whether the subelement was present.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 22:32:28 +0000 (01:32 +0300)]
WNM: Fix neighbor report subelement formats
Number of of subelements were using incorrect format definition.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 22:20:24 +0000 (01:20 +0300)]
WNM: Fix neighbor report subelement parser to not leak memory
If a subelement is unexpectedly included multiple times, the parser must
not re-allocate memory for the entry without first freeing the old
allocation.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 21:53:55 +0000 (00:53 +0300)]
WNM: Fix neighbor report subelement parser
Only the Neighbor Report element should be included here, so verify that
the element id matches. In addition, verify that each subelement has
valid length before using the data.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 19:45:11 +0000 (22:45 +0300)]
Document and rename HT Capability/Operation fields
This makes the definitions match the terminology used in IEEE Std
802.11-2012 and makes it easier to understand how the HT Operation
element subfields are used.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 19:05:02 +0000 (22:05 +0300)]
tests: Remove [PSMP] parameter
This is not used anymore.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 19:02:14 +0000 (22:02 +0300)]
Remove PSMP option from ht_capab
This was used to fill in the "PSMP support" subfield that was defined
during P802.11n development. However, this subfield was marked reserved
in the published IEEE Std 802.11n-2009 and it is not supported by
current drivers that use hostapd for SME either. As such, there is not
much point in maintaining this field as ht_capab parameter within
hostapd either.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Amarnath Hullur Subramanyam [Tue, 1 Apr 2014 18:13:49 +0000 (11:13 -0700)]
nl80211: Add QCA vendor subcmd for NAN
QCA vendor extension is used for NAN functionality. This defines the
subcommand and attribute to address this.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 09:32:58 +0000 (12:32 +0300)]
Fix CONFIG_AP=y build without CONFIG_P2P=y
Commit
ca9bc5b5666a08c741ddd21c451ecb92aa33a11a used P2P functionality
from ap.c without proper ifdef CONFIG_P2P.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Mon, 7 Apr 2014 09:26:04 +0000 (12:26 +0300)]
P2P: Clear p2p_in_invitation on cancel
Commit
41d5ce9e0b7b37dd84fbf3c1aa5ed571c32321d4 added scan optimizations
for P2P invitation cases. However, it left a path where the invitation
state was not cleared and as such, introduced potential issues for
following scans that ended up getting incorrectly optimized for a single
channel regardless of parameters. Fix this by clearing p2p_in_invitation
more carefully, especially on p2p_cancel command.
p2p_cancel is now also run from the FLUSH command to avoid issues with
hwsim test cases (e.g., persistent_group_per_sta_psk followed by
ap_open_tdls resulted in an error due to p2p_in_invitation remaining set
after FLUSH).
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Sun, 6 Apr 2014 21:26:03 +0000 (00:26 +0300)]
tests: BSS Transition Management Request protocol tests
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Mon, 7 Apr 2014 10:35:18 +0000 (13:35 +0300)]
WNM: Fix deinit path to clean neighbor report count
wnm_deallocate_memory() left wnm_num_neighbor_report set while freeing
the allocated buffer of neighbor reports. If this function was called
twice in a row without having went through new neighbor report parsing,
invalid pointers could have been freed resulted in segfault.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen [Sun, 6 Apr 2014 13:52:14 +0000 (16:52 +0300)]
tests: Verify STATUS-WPS passphrase on GO
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:42:27 +0000 (16:42 +0300)]
WPS NFC: Remove NFC_RX_HANDOVER_SEL
The newer NFC_REPORT_HANDOVER command is more general version that
handles the cases where NFC_RX_HANDOVER_SEL could potentially have been
used. In addition, with the new WPS NFC design, it is important to
receive the handover request message that was used in the handover in
addition to the select message, so the NFC_RX_HANDOVER_SEL command on
its own would not be sufficient for this.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:33:23 +0000 (16:33 +0300)]
tests: WPS_CHECK_PIN with invalid PIN length
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:31:44 +0000 (16:31 +0300)]
tests: Use random WPS PIN
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:26:22 +0000 (16:26 +0300)]
tests: Verify random WPS PIN generation
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:22:46 +0000 (16:22 +0300)]
tests: GO selecting specific peer to join using PBC
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:09:01 +0000 (16:09 +0300)]
tests: wpa_supplicant GET_CAPABILITY
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 13:00:25 +0000 (16:00 +0300)]
tests: SET uapsd
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 12:55:18 +0000 (15:55 +0300)]
tests: SET pno freq parameter
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 12:53:13 +0000 (15:53 +0300)]
tests: SET blob
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 12:46:32 +0000 (15:46 +0300)]
tests: disallow_aps
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 12:36:01 +0000 (15:36 +0300)]
tests: wpa_supplicant bssid_filter
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 12:16:24 +0000 (15:16 +0300)]
tests: ctrl_iface LEVEL command
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 10:49:05 +0000 (13:49 +0300)]
tests: WPS operations on channel 14 and on 5 GHz band
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 10:40:40 +0000 (13:40 +0300)]
tests: WPS parameter update using SET
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 10:18:55 +0000 (13:18 +0300)]
tests: WPS fragmentation when using PIN and WPS_REG
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 10:11:32 +0000 (13:11 +0300)]
tests: Add option for running test cases that take a long time
run-tests.py now takes an optional --long parameter that can be used to
enable running of test cases that take a long time (multiple minutes).
By default, such test cases are skipped to avoid making the normal test
run take excessive amounts of time.
As an initial long test case, verify WPS PBC walk time expiration (two
minutes).
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 09:49:52 +0000 (12:49 +0300)]
tests: WPS-M2D or WPS-FAIL while trying to join a group
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 08:18:10 +0000 (11:18 +0300)]
WPS: Remove unused WEP related functionality
Now that WPS 2.0 support is enabled unconditionally, WEP and Shared auth
type are not allowed. This made some of the older code unused and that
can now be removed to clean up the implementation. There is still one
place where WEP is allowed for testing purposes: wpa_supplicant as
Registrar trying to configure an AP to use WEP. That is now only allowed
in CONFIG_TESTING_OPTIONS=y builds, though.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 08:09:03 +0000 (11:09 +0300)]
tests: WPS cred event for external use
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 08:03:26 +0000 (11:03 +0300)]
tests: WPS operation with other networks already configured
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sun, 6 Apr 2014 07:55:50 +0000 (10:55 +0300)]
tests: Increase Wi-Fi Display testing coverage
Add more subelements, WSD, and disabling of Wi-Fi Display.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 21:52:13 +0000 (00:52 +0300)]
tests: Increas EAP-pwd fragmentation coverage
Verify fragmentation of additional message types.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 21:51:00 +0000 (00:51 +0300)]
EAP-pwd peer: Fix fragmentation of PWD-Confirm-Resp
This is somewhat of a corner case since there is no real point in using
so short a fragmentation threshold that it would result in this message
getting fragmented. Anyway, it is better be complete and support this
case as well.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 21:19:26 +0000 (00:19 +0300)]
EAP-pwd: Fix memory leak on error path with fragmentation
If fragmentation is used, the temporary inbuf/outbuf could have been
leaked in error cases (e.g., reaching maximum number of roundtrips).
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 21:05:06 +0000 (00:05 +0300)]
tests: WPA2-PSK AP with PMF association comeback (using DROP_SA)
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 20:59:31 +0000 (23:59 +0300)]
Move DROP_SA command to be within ifdef CONFIG_TESTING_OPTIONS
This is a test command and has no use in production builds.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 20:56:03 +0000 (23:56 +0300)]
tests: wpa_supplicant MIB command output for WPA/WPA2 information
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 20:35:17 +0000 (23:35 +0300)]
tests: WPA (v1) with CCMP
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 20:30:16 +0000 (23:30 +0300)]
Remove used KDE addition code from EAPOL-Key msg 4/4
EAPOL-Key msg 4/4 has no specified KDE use, so remove the unused code to
simplify the implementation.
Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen [Sat, 5 Apr 2014 16:52:18 +0000 (19:52 +0300)]
WNM: Fix regression in Sleep Mode exit key data parsing
Commit
dbfb8e82ff69e6c7969b7cd23e53fd39b3e896e7 changed the Action frame
RX payload pointer design to point to a different field. WNM Sleep Mode
Response handler updated one of the uses to accommodate this change, but
that commit missed another use for key data length. This resulted in GTK
and IGTK being ignored in many cases when waking up from WNM Sleep Mode
with PMF enabled.
Signed-off-by: Jouni Malinen <j@w1.fi>