mech_eap.git
10 years agoAdd forgotten ampdu_factor into wpa_supplicant.conf
Jouni Malinen [Sat, 12 Apr 2014 20:25:11 +0000 (23:25 +0300)]
Add forgotten ampdu_factor into wpa_supplicant.conf

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: IBSS with fixed BSSID
Jouni Malinen [Sat, 12 Apr 2014 20:11:02 +0000 (23:11 +0300)]
tests: IBSS with fixed BSSID

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS 2.0 connection using connect API
Jouni Malinen [Sat, 12 Apr 2014 20:01:58 +0000 (23:01 +0300)]
tests: HS 2.0 connection using connect API

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Opportunistic key caching with the connect API
Jouni Malinen [Sat, 12 Apr 2014 19:52:41 +0000 (22:52 +0300)]
tests: Opportunistic key caching with the connect API

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Wildcard SSID with PSK/passphrase
Jouni Malinen [Sat, 12 Apr 2014 19:47:49 +0000 (22:47 +0300)]
tests: Wildcard SSID with PSK/passphrase

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoRe-enable use of wildcard SSID with passphrase
Jouni Malinen [Sat, 12 Apr 2014 19:46:54 +0000 (22:46 +0300)]
Re-enable use of wildcard SSID with passphrase

This used to work, but it looks like the disabled-PSK-network check
ended up rejecting confiurations that configured a wildcard SSID with a
passphrase (instead of PSK).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: More IBSS WPA-None coverage
Jouni Malinen [Sat, 12 Apr 2014 19:30:48 +0000 (22:30 +0300)]
tests: More IBSS WPA-None coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P GO removing persistent client based on invitation result
Jouni Malinen [Sat, 12 Apr 2014 17:28:37 +0000 (20:28 +0300)]
tests: P2P GO removing persistent client based on invitation result

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P group interface removed due to GO Negotiation failure
Jouni Malinen [Sat, 12 Apr 2014 17:16:22 +0000 (20:16 +0300)]
tests: P2P group interface removed due to GO Negotiation failure

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P group idle timeout on GO
Jouni Malinen [Sat, 12 Apr 2014 17:08:13 +0000 (20:08 +0300)]
tests: P2P group idle timeout on GO

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: p2p_find with progressive scan
Jouni Malinen [Sat, 12 Apr 2014 17:03:24 +0000 (20:03 +0300)]
tests: p2p_find with progressive scan

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SCAN_INTERVAL setting
Jouni Malinen [Sat, 12 Apr 2014 16:48:57 +0000 (19:48 +0300)]
tests: SCAN_INTERVAL setting

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: filter_ssids=1
Jouni Malinen [Sat, 12 Apr 2014 16:43:24 +0000 (19:43 +0300)]
tests: filter_ssids=1

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Association timeout
Jouni Malinen [Sat, 12 Apr 2014 16:27:57 +0000 (19:27 +0300)]
tests: Association timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: INTERFACE DISABLED/ENABLED events based on ifdown/up
Jouni Malinen [Sat, 12 Apr 2014 16:09:35 +0000 (19:09 +0300)]
tests: INTERFACE DISABLED/ENABLED events based on ifdown/up

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Reconnect to the same BSS on inactivity disconnection
Jouni Malinen [Sat, 12 Apr 2014 16:02:23 +0000 (19:02 +0300)]
tests: Reconnect to the same BSS on inactivity disconnection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WNM keep-alive
Jouni Malinen [Sat, 12 Apr 2014 15:53:35 +0000 (18:53 +0300)]
tests: WNM keep-alive

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: auto_interworking=1
Jouni Malinen [Sat, 12 Apr 2014 15:47:48 +0000 (18:47 +0300)]
tests: auto_interworking=1

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: AP_SCAN 0/2 and externally triggered connection
Jouni Malinen [Sat, 12 Apr 2014 15:31:25 +0000 (18:31 +0300)]
tests: AP_SCAN 0/2 and externally triggered connection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: BSS_EXPIRE_COUNT/AGE
Jouni Malinen [Sat, 12 Apr 2014 14:16:07 +0000 (17:16 +0300)]
tests: BSS_EXPIRE_COUNT/AGE

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ENABLE/DISABLE_NETWORK
Jouni Malinen [Sat, 12 Apr 2014 13:51:15 +0000 (16:51 +0300)]
tests: ENABLE/DISABLE_NETWORK

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Radio work canceling during interface removal
Jouni Malinen [Sat, 12 Apr 2014 13:42:22 +0000 (16:42 +0300)]
tests: Radio work canceling during interface removal

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix a debug print to have a space between words
Jouni Malinen [Sat, 12 Apr 2014 13:41:45 +0000 (16:41 +0300)]
Fix a debug print to have a space between words

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: EXT PW with no valid PSK found
Jouni Malinen [Sat, 12 Apr 2014 13:25:18 +0000 (16:25 +0300)]
tests: EXT PW with no valid PSK found

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: RSN IBSS reconnection
Jouni Malinen [Sat, 12 Apr 2014 13:17:04 +0000 (16:17 +0300)]
tests: RSN IBSS reconnection

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: autoscan
Jouni Malinen [Sat, 12 Apr 2014 12:51:52 +0000 (15:51 +0300)]
tests: autoscan

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: bgscan test cases
Jouni Malinen [Sat, 12 Apr 2014 08:56:55 +0000 (11:56 +0300)]
tests: bgscan test cases

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoAdd CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events
Jouni Malinen [Sat, 12 Apr 2014 08:48:05 +0000 (11:48 +0300)]
Add CTRL-EVENT-SIGNAL-CHANGE for bgscan signal update events

This allows external programs to monitor driver signal change events
through wpa_supplicant when bgscan is used.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P_LISTEN with timeout
Jouni Malinen [Fri, 11 Apr 2014 22:11:25 +0000 (01:11 +0300)]
tests: P2P_LISTEN with timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: RADIO_WORK timeout
Jouni Malinen [Fri, 11 Apr 2014 22:06:09 +0000 (01:06 +0300)]
tests: RADIO_WORK timeout

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SIGNAL_POLL and PKTCNT_POLL
Jouni Malinen [Fri, 11 Apr 2014 22:02:19 +0000 (01:02 +0300)]
tests: SIGNAL_POLL and PKTCNT_POLL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WNM_SLEEP with additional parameters
Jouni Malinen [Fri, 11 Apr 2014 21:58:52 +0000 (00:58 +0300)]
tests: WNM_SLEEP with additional parameters

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS20_ICON_REQUEST
Jouni Malinen [Fri, 11 Apr 2014 21:27:20 +0000 (00:27 +0300)]
tests: HS20_ICON_REQUEST

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: HS20_ANQP_GET
Jouni Malinen [Fri, 11 Apr 2014 21:18:07 +0000 (00:18 +0300)]
tests: HS20_ANQP_GET

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: P2P_SERVICE_DEL
Jouni Malinen [Fri, 11 Apr 2014 21:16:38 +0000 (00:16 +0300)]
tests: P2P_SERVICE_DEL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface LIST_CREDS
Jouni Malinen [Fri, 11 Apr 2014 21:05:34 +0000 (00:05 +0300)]
tests: ctrl_iface LIST_CREDS

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface SCAN_RESULTS
Jouni Malinen [Fri, 11 Apr 2014 21:00:51 +0000 (00:00 +0300)]
tests: ctrl_iface SCAN_RESULTS

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface LOG_LEVEL
Jouni Malinen [Fri, 11 Apr 2014 20:56:57 +0000 (23:56 +0300)]
tests: ctrl_iface LOG_LEVEL

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface BLACKLIST
Jouni Malinen [Fri, 11 Apr 2014 20:48:36 +0000 (23:48 +0300)]
tests: ctrl_iface BLACKLIST

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoFix ctrl_iface BLACKLIST return value
Jouni Malinen [Fri, 11 Apr 2014 20:47:46 +0000 (23:47 +0300)]
Fix ctrl_iface BLACKLIST return value

Adding a new entry was returning FAIL on success due to incorrect
assumption of wpa_blacklist_add() returning 0 on success (it returns the
positive blacklist count).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface BSSID command
Jouni Malinen [Fri, 11 Apr 2014 20:34:47 +0000 (23:34 +0300)]
tests: ctrl_iface BSSID command

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: NFC_REPORT_HANDOVER error cases
Jouni Malinen [Fri, 11 Apr 2014 20:27:26 +0000 (23:27 +0300)]
tests: NFC_REPORT_HANDOVER error cases

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Additional WPS ctrl_iface coverage
Jouni Malinen [Fri, 11 Apr 2014 20:04:18 +0000 (23:04 +0300)]
tests: Additional WPS ctrl_iface coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface invalid MAC address
Jouni Malinen [Fri, 11 Apr 2014 19:56:42 +0000 (22:56 +0300)]
tests: ctrl_iface invalid MAC address

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Increase ctrl_iface SET test coverage
Jouni Malinen [Fri, 11 Apr 2014 19:30:43 +0000 (22:30 +0300)]
tests: Increase ctrl_iface SET test coverage

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoP2P: Add NFC_HANDOVER commands to p2p_redir list
Andres Morales [Thu, 27 Feb 2014 00:05:21 +0000 (16:05 -0800)]
P2P: Add NFC_HANDOVER commands to p2p_redir list

These commands can be executed on the P2P interface thus should be
redirected to it when issued to the global control interface.

Signed-off-by: Dmitry Shmidt <dimitrysh@google.com>
10 years agoAdd reassociate command to dbus doxygen
Fionn Cleary [Fri, 4 Apr 2014 13:49:53 +0000 (15:49 +0200)]
Add reassociate command to dbus doxygen

Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
10 years agoFix reassociate dbus method
Fionn Cleary [Fri, 4 Apr 2014 13:45:26 +0000 (15:45 +0200)]
Fix reassociate dbus method

- Reassociate was only working when there was already a connect in
  place, which is not how the REASSOCIATE command from the ctrl
  interface works.

Signed-off-by: Fionn Cleary <fionn.cleary@streamunlimited.com>
10 years agowpa_cli: Fix wrong comparison in wpa_cli_cmd_interface
Daichi Ueura [Sun, 6 Apr 2014 07:35:12 +0000 (16:35 +0900)]
wpa_cli: Fix wrong comparison in wpa_cli_cmd_interface

Signed-off-by: Daichi Ueura <daichi.ueura@gmail.com>
10 years agonl80211: Handle multiple interface combinations for P2P
Felix Fietkau [Sun, 6 Apr 2014 11:11:53 +0000 (13:11 +0200)]
nl80211: Handle multiple interface combinations for P2P

The first combination may allow single-channel concurrency for
P2P + managed, but there may be others that allow multi-channel
concurrency. Parse all of them to find the maximum number of channels.

Signed-off-by: Felix Fietkau <nbd@openwrt.org>
10 years agoHS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER
Jouni Malinen [Fri, 11 Apr 2014 15:55:42 +0000 (18:55 +0300)]
HS 2.0 SPP server: Fix aaa_trust_root_cert_url example to use DER

The trust roots in the PPS MO point to a DER encoded X.509 certificate.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoP2P: Add retry mechanism for GO Negotiation Confirmation
Nirav Shah [Mon, 7 Apr 2014 22:12:19 +0000 (03:42 +0530)]
P2P: Add retry mechanism for GO Negotiation Confirmation

wpa_supplicant now retries for P2P_GO_NEG_CNF_MAX_RETRY_COUNT times if
it doesn't receive acknowledgement for GO Negotiation Confirmation
frame. Currently, P2P_GO_NEG_CNF_MAX_RETRY_COUNT is set to 1.

While this is not strictly speaking following the P2P specification,
this can improve robustness of GO Negotiation in environments with
interference and also with peer devices that do not behave properly
(e.g., by not remaining awake on the negotiation channel through the
full GO Negotiation).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoP2P: Mark the scan in p2p_in_invitation as p2p_probe
Sunil Dutt [Wed, 9 Apr 2014 09:12:08 +0000 (14:42 +0530)]
P2P: Mark the scan in p2p_in_invitation as p2p_probe

Mark the scan performed by the P2P Client in search of the GO
during the persistant reinvocation as a p2p_probe to avoid
unnecessary use of 802.11b rates.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agonl80211: Use LEAVE_IBSS with driver-based-SME
Abhishek Singh [Thu, 10 Apr 2014 12:23:40 +0000 (17:53 +0530)]
nl80211: Use LEAVE_IBSS with driver-based-SME

NL80211_CMD_LEAVE_IBSS was used only with wpa_supplicant-based SME.
Extend this to drivers that implement SME internally.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoAndroid: Add qca-vendor.h to be exported
Amarnath Hullur Subramanyam [Fri, 4 Apr 2014 20:40:58 +0000 (13:40 -0700)]
Android: Add qca-vendor.h to be exported

Add qca-vendor.h along with wpa_ctrl.h to be exported to
common staged location.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoOpenSSL: Detect and prevent TLS heartbeat attack
Jouni Malinen [Wed, 9 Apr 2014 10:02:53 +0000 (13:02 +0300)]
OpenSSL: Detect and prevent TLS heartbeat attack

Some OpenSSL versions have vulnerability in TLS heartbeat request
processing. Check the processed message to determine if the attack has
been used and if so, do not send the response to the peer. This does not
prevent the buffer read overflow within OpenSSL, but this prevents the
attacker from receiving the information.

This change is an additional layer of protection if some yet to be
identified paths were to expose this OpenSSL vulnerability. However, the
way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant
was already rejecting the messages before the response goes out and as
such, this additional change is unlikely to be needed to avoid the
issue.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: WNM BSS TM Req with neighbor report subelements
Jouni Malinen [Mon, 7 Apr 2014 22:35:01 +0000 (01:35 +0300)]
tests: WNM BSS TM Req with neighbor report subelements

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Remove unnecessary present flag
Jouni Malinen [Mon, 7 Apr 2014 22:34:17 +0000 (01:34 +0300)]
WNM: Remove unnecessary present flag

The structures are all allocated, so the pointer can be compared to NULL
to determine whether the subelement was present.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Fix neighbor report subelement formats
Jouni Malinen [Mon, 7 Apr 2014 22:32:28 +0000 (01:32 +0300)]
WNM: Fix neighbor report subelement formats

Number of of subelements were using incorrect format definition.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Fix neighbor report subelement parser to not leak memory
Jouni Malinen [Mon, 7 Apr 2014 22:20:24 +0000 (01:20 +0300)]
WNM: Fix neighbor report subelement parser to not leak memory

If a subelement is unexpectedly included multiple times, the parser must
not re-allocate memory for the entry without first freeing the old
allocation.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoWNM: Fix neighbor report subelement parser
Jouni Malinen [Mon, 7 Apr 2014 21:53:55 +0000 (00:53 +0300)]
WNM: Fix neighbor report subelement parser

Only the Neighbor Report element should be included here, so verify that
the element id matches. In addition, verify that each subelement has
valid length before using the data.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoDocument and rename HT Capability/Operation fields
Jouni Malinen [Mon, 7 Apr 2014 19:45:11 +0000 (22:45 +0300)]
Document and rename HT Capability/Operation fields

This makes the definitions match the terminology used in IEEE Std
802.11-2012 and makes it easier to understand how the HT Operation
element subfields are used.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: Remove [PSMP] parameter
Jouni Malinen [Mon, 7 Apr 2014 19:05:02 +0000 (22:05 +0300)]
tests: Remove [PSMP] parameter

This is not used anymore.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoRemove PSMP option from ht_capab
Jouni Malinen [Mon, 7 Apr 2014 19:02:14 +0000 (22:02 +0300)]
Remove PSMP option from ht_capab

This was used to fill in the "PSMP support" subfield that was defined
during P802.11n development. However, this subfield was marked reserved
in the published IEEE Std 802.11n-2009 and it is not supported by
current drivers that use hostapd for SME either. As such, there is not
much point in maintaining this field as ht_capab parameter within
hostapd either.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agonl80211: Add QCA vendor subcmd for NAN
Amarnath Hullur Subramanyam [Tue, 1 Apr 2014 18:13:49 +0000 (11:13 -0700)]
nl80211: Add QCA vendor subcmd for NAN

QCA vendor extension is used for NAN functionality. This defines the
subcommand and attribute to address this.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoFix CONFIG_AP=y build without CONFIG_P2P=y
Jouni Malinen [Mon, 7 Apr 2014 09:32:58 +0000 (12:32 +0300)]
Fix CONFIG_AP=y build without CONFIG_P2P=y

Commit ca9bc5b5666a08c741ddd21c451ecb92aa33a11a used P2P functionality
from ap.c without proper ifdef CONFIG_P2P.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agoP2P: Clear p2p_in_invitation on cancel
Jouni Malinen [Mon, 7 Apr 2014 09:26:04 +0000 (12:26 +0300)]
P2P: Clear p2p_in_invitation on cancel

Commit 41d5ce9e0b7b37dd84fbf3c1aa5ed571c32321d4 added scan optimizations
for P2P invitation cases. However, it left a path where the invitation
state was not cleared and as such, introduced potential issues for
following scans that ended up getting incorrectly optimized for a single
channel regardless of parameters. Fix this by clearing p2p_in_invitation
more carefully, especially on p2p_cancel command.

p2p_cancel is now also run from the FLUSH command to avoid issues with
hwsim test cases (e.g., persistent_group_per_sta_psk followed by
ap_open_tdls resulted in an error due to p2p_in_invitation remaining set
after FLUSH).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: BSS Transition Management Request protocol tests
Jouni Malinen [Sun, 6 Apr 2014 21:26:03 +0000 (00:26 +0300)]
tests: BSS Transition Management Request protocol tests

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWNM: Fix deinit path to clean neighbor report count
Jouni Malinen [Mon, 7 Apr 2014 10:35:18 +0000 (13:35 +0300)]
WNM: Fix deinit path to clean neighbor report count

wnm_deallocate_memory() left wnm_num_neighbor_report set while freeing
the allocated buffer of neighbor reports. If this function was called
twice in a row without having went through new neighbor report parsing,
invalid pointers could have been freed resulted in segfault.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
10 years agotests: Verify STATUS-WPS passphrase on GO
Jouni Malinen [Sun, 6 Apr 2014 13:52:14 +0000 (16:52 +0300)]
tests: Verify STATUS-WPS passphrase on GO

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWPS NFC: Remove NFC_RX_HANDOVER_SEL
Jouni Malinen [Sun, 6 Apr 2014 13:42:27 +0000 (16:42 +0300)]
WPS NFC: Remove NFC_RX_HANDOVER_SEL

The newer NFC_REPORT_HANDOVER command is more general version that
handles the cases where NFC_RX_HANDOVER_SEL could potentially have been
used. In addition, with the new WPS NFC design, it is important to
receive the handover request message that was used in the handover in
addition to the select message, so the NFC_RX_HANDOVER_SEL command on
its own would not be sufficient for this.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS_CHECK_PIN with invalid PIN length
Jouni Malinen [Sun, 6 Apr 2014 13:33:23 +0000 (16:33 +0300)]
tests: WPS_CHECK_PIN with invalid PIN length

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Use random WPS PIN
Jouni Malinen [Sun, 6 Apr 2014 13:31:44 +0000 (16:31 +0300)]
tests: Use random WPS PIN

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Verify random WPS PIN generation
Jouni Malinen [Sun, 6 Apr 2014 13:26:22 +0000 (16:26 +0300)]
tests: Verify random WPS PIN generation

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: GO selecting specific peer to join using PBC
Jouni Malinen [Sun, 6 Apr 2014 13:22:46 +0000 (16:22 +0300)]
tests: GO selecting specific peer to join using PBC

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: wpa_supplicant GET_CAPABILITY
Jouni Malinen [Sun, 6 Apr 2014 13:09:01 +0000 (16:09 +0300)]
tests: wpa_supplicant GET_CAPABILITY

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SET uapsd
Jouni Malinen [Sun, 6 Apr 2014 13:00:25 +0000 (16:00 +0300)]
tests: SET uapsd

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SET pno freq parameter
Jouni Malinen [Sun, 6 Apr 2014 12:55:18 +0000 (15:55 +0300)]
tests: SET pno freq parameter

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: SET blob
Jouni Malinen [Sun, 6 Apr 2014 12:53:13 +0000 (15:53 +0300)]
tests: SET blob

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: disallow_aps
Jouni Malinen [Sun, 6 Apr 2014 12:46:32 +0000 (15:46 +0300)]
tests: disallow_aps

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: wpa_supplicant bssid_filter
Jouni Malinen [Sun, 6 Apr 2014 12:36:01 +0000 (15:36 +0300)]
tests: wpa_supplicant bssid_filter

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: ctrl_iface LEVEL command
Jouni Malinen [Sun, 6 Apr 2014 12:16:24 +0000 (15:16 +0300)]
tests: ctrl_iface LEVEL command

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS operations on channel 14 and on 5 GHz band
Jouni Malinen [Sun, 6 Apr 2014 10:49:05 +0000 (13:49 +0300)]
tests: WPS operations on channel 14 and on 5 GHz band

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS parameter update using SET
Jouni Malinen [Sun, 6 Apr 2014 10:40:40 +0000 (13:40 +0300)]
tests: WPS parameter update using SET

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS fragmentation when using PIN and WPS_REG
Jouni Malinen [Sun, 6 Apr 2014 10:18:55 +0000 (13:18 +0300)]
tests: WPS fragmentation when using PIN and WPS_REG

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Add option for running test cases that take a long time
Jouni Malinen [Sun, 6 Apr 2014 10:11:32 +0000 (13:11 +0300)]
tests: Add option for running test cases that take a long time

run-tests.py now takes an optional --long parameter that can be used to
enable running of test cases that take a long time (multiple minutes).
By default, such test cases are skipped to avoid making the normal test
run take excessive amounts of time.

As an initial long test case, verify WPS PBC walk time expiration (two
minutes).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS-M2D or WPS-FAIL while trying to join a group
Jouni Malinen [Sun, 6 Apr 2014 09:49:52 +0000 (12:49 +0300)]
tests: WPS-M2D or WPS-FAIL while trying to join a group

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWPS: Remove unused WEP related functionality
Jouni Malinen [Sun, 6 Apr 2014 08:18:10 +0000 (11:18 +0300)]
WPS: Remove unused WEP related functionality

Now that WPS 2.0 support is enabled unconditionally, WEP and Shared auth
type are not allowed. This made some of the older code unused and that
can now be removed to clean up the implementation. There is still one
place where WEP is allowed for testing purposes: wpa_supplicant as
Registrar trying to configure an AP to use WEP. That is now only allowed
in CONFIG_TESTING_OPTIONS=y builds, though.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS cred event for external use
Jouni Malinen [Sun, 6 Apr 2014 08:09:03 +0000 (11:09 +0300)]
tests: WPS cred event for external use

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPS operation with other networks already configured
Jouni Malinen [Sun, 6 Apr 2014 08:03:26 +0000 (11:03 +0300)]
tests: WPS operation with other networks already configured

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Increase Wi-Fi Display testing coverage
Jouni Malinen [Sun, 6 Apr 2014 07:55:50 +0000 (10:55 +0300)]
tests: Increase Wi-Fi Display testing coverage

Add more subelements, WSD, and disabling of Wi-Fi Display.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: Increas EAP-pwd fragmentation coverage
Jouni Malinen [Sat, 5 Apr 2014 21:52:13 +0000 (00:52 +0300)]
tests: Increas EAP-pwd fragmentation coverage

Verify fragmentation of additional message types.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoEAP-pwd peer: Fix fragmentation of PWD-Confirm-Resp
Jouni Malinen [Sat, 5 Apr 2014 21:51:00 +0000 (00:51 +0300)]
EAP-pwd peer: Fix fragmentation of PWD-Confirm-Resp

This is somewhat of a corner case since there is no real point in using
so short a fragmentation threshold that it would result in this message
getting fragmented. Anyway, it is better be complete and support this
case as well.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoEAP-pwd: Fix memory leak on error path with fragmentation
Jouni Malinen [Sat, 5 Apr 2014 21:19:26 +0000 (00:19 +0300)]
EAP-pwd: Fix memory leak on error path with fragmentation

If fragmentation is used, the temporary inbuf/outbuf could have been
leaked in error cases (e.g., reaching maximum number of roundtrips).

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPA2-PSK AP with PMF association comeback (using DROP_SA)
Jouni Malinen [Sat, 5 Apr 2014 21:05:06 +0000 (00:05 +0300)]
tests: WPA2-PSK AP with PMF association comeback (using DROP_SA)

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoMove DROP_SA command to be within ifdef CONFIG_TESTING_OPTIONS
Jouni Malinen [Sat, 5 Apr 2014 20:59:31 +0000 (23:59 +0300)]
Move DROP_SA command to be within ifdef CONFIG_TESTING_OPTIONS

This is a test command and has no use in production builds.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: wpa_supplicant MIB command output for WPA/WPA2 information
Jouni Malinen [Sat, 5 Apr 2014 20:56:03 +0000 (23:56 +0300)]
tests: wpa_supplicant MIB command output for WPA/WPA2 information

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agotests: WPA (v1) with CCMP
Jouni Malinen [Sat, 5 Apr 2014 20:35:17 +0000 (23:35 +0300)]
tests: WPA (v1) with CCMP

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoRemove used KDE addition code from EAPOL-Key msg 4/4
Jouni Malinen [Sat, 5 Apr 2014 20:30:16 +0000 (23:30 +0300)]
Remove used KDE addition code from EAPOL-Key msg 4/4

EAPOL-Key msg 4/4 has no specified KDE use, so remove the unused code to
simplify the implementation.

Signed-off-by: Jouni Malinen <j@w1.fi>
10 years agoWNM: Fix regression in Sleep Mode exit key data parsing
Jouni Malinen [Sat, 5 Apr 2014 16:52:18 +0000 (19:52 +0300)]
WNM: Fix regression in Sleep Mode exit key data parsing

Commit dbfb8e82ff69e6c7969b7cd23e53fd39b3e896e7 changed the Action frame
RX payload pointer design to point to a different field. WNM Sleep Mode
Response handler updated one of the uses to accommodate this change, but
that commit missed another use for key data length. This resulted in GTK
and IGTK being ignored in many cases when waking up from WNM Sleep Mode
with PMF enabled.

Signed-off-by: Jouni Malinen <j@w1.fi>