]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
4 years agotests: Extend ap_pmf_inject_auth to cover injection of AssocReq
Jouni Malinen [Sun, 28 Jul 2019 20:51:39 +0000 (23:51 +0300)] 
tests: Extend ap_pmf_inject_auth to cover injection of AssocReq

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agodragonfly: Disable use of groups using Brainpool curves
Jouni Malinen [Sat, 27 Jul 2019 20:19:17 +0000 (23:19 +0300)] 
dragonfly: Disable use of groups using Brainpool curves

Disable groups that use Brainpool curves for now since they leak more
timing information due to the prime not being close to a power of two.
This removes use of groups 28, 29, and 30 from SAE and EAP-pwd.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Remove testing of EAP-pwd with Brainpool curves
Jouni Malinen [Sat, 27 Jul 2019 20:35:45 +0000 (23:35 +0300)] 
tests: Remove testing of EAP-pwd with Brainpool curves

This is in preparation of marking groups using Brainpool curves disabled
for SAE and EAP-pwd.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Handle test retries through the same queue
Jouni Malinen [Sat, 27 Jul 2019 17:19:28 +0000 (20:19 +0300)] 
tests: Handle test retries through the same queue

This removes the separate rerun step from the parallel-vm.py processing
and instead, simply requeues the failed test cases into the same queue
that is used for the initial run. This is simpler and more efficient
since reruns start as soon as any VM is ready for processing them
instead of having to wait for all VMs to complete the first round.
Furthermore, this allows VMs to be stopped sooner when no more test
cases remain and that is helpful especially with the time travel patches
that make the wait-for-next-test step in the VM use all available CPU.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agonl80211: Add WMM parameters while updating TDLS peer entry
Sunil Dutt [Mon, 22 Jul 2019 16:04:27 +0000 (21:34 +0530)] 
nl80211: Add WMM parameters while updating TDLS peer entry

The AP mode fix for removing NL80211_ATTR_STA_WME from
NL80211_CMD_SET_STATION did not consider the TDLS case and that resulted
in incorrectly removing WMM parameters from TDLS STA entry updates. Fix
this by considering the WPA_STA_TDLS_PEER flag similarly to the other
update parameters.

Fixes: 6d14b98fc6fc ("nl80211: Do not add WMM parameters when updating an existing STA entry")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agowpa_cli: Add support to process DPP action events in action script
Disha Das [Thu, 20 Jun 2019 05:32:23 +0000 (11:02 +0530)] 
wpa_cli: Add support to process DPP action events in action script

Signed-off-by: Disha Das <dishad@codeaurora.org>
4 years agoAvoid nested enum wpas_mode declaration to allow C++ compilation
Jouni Malinen [Wed, 24 Jul 2019 16:49:24 +0000 (19:49 +0300)] 
Avoid nested enum wpas_mode declaration to allow C++ compilation

Move enum wpas_mode declaration to the global scope to avoid issues with
the recently added inline function wpas_mode_to_ieee80211_mode() using
it as an argument. This fixes C++ compilation issues with cases that
include wpa_supplicant_i.h.

Fixes: 3459c54ac78b ("mesh: Add support for HE mode")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoEAP-SIM server: Avoid void pointer arithmetic
Jouni Malinen [Wed, 24 Jul 2019 16:35:14 +0000 (19:35 +0300)] 
EAP-SIM server: Avoid void pointer arithmetic

This is a compiler specific extension and not compliant with the C
standard.

Fixes: 1c16b257a081 ("EAP-SIM: Add Session-Id derivation during fast-reauth")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoEAP-AKA server: Avoid void pointer arithmetic
Jouni Malinen [Wed, 24 Jul 2019 16:34:11 +0000 (19:34 +0300)] 
EAP-AKA server: Avoid void pointer arithmetic

This is a compiler specific extension and not compliant with the C
standard.

Fixes: 5eefa8115b88 ("EAP-AKA: Add Session-Id derivation during fast-reauth")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotrace: Avoid void pointer arithmetic
Jouni Malinen [Wed, 24 Jul 2019 16:33:06 +0000 (19:33 +0300)] 
trace: Avoid void pointer arithmetic

This is a compiler specific extension and not compliant with the C
standard.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP: Avoid void pointer arithmetic
Jouni Malinen [Wed, 24 Jul 2019 16:31:35 +0000 (19:31 +0300)] 
DPP: Avoid void pointer arithmetic

This is a compiler specific extension and not compliant with the C
standard.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: AKM suite selector reporting
Jouni Malinen [Wed, 24 Jul 2019 09:59:45 +0000 (12:59 +0300)] 
tests: AKM suite selector reporting

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoReport WPA/RSN protocol and AKM suite selector in STA MIB
Jouni Malinen [Wed, 24 Jul 2019 09:58:49 +0000 (12:58 +0300)] 
Report WPA/RSN protocol and AKM suite selector in STA MIB

The new "wpa" and "AKMSuiteSelector" entries in hostapd "STA <addr>"
control interface output can be used to determine the negotiated WPA/RSN
protocol and AKM suite of an associated station.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd missed wpa_akm_to_suite() selectors
Jouni Malinen [Wed, 24 Jul 2019 09:48:44 +0000 (12:48 +0300)] 
Add missed wpa_akm_to_suite() selectors

These SAE, OWE, DPP, and OSEN AKM suite selectors were covered in the
reverse conversion in rsn_key_mgmt_to_bitfield(), but were missing from
wpa_akm_to_suite(). Add them to make AKM suite selector reporting more
accurate in RADIUS Accounting messages (and future users of this
function).

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agodragonfly: SAE/EAP-pwd min PWE derivation iteration count to shared code
Jouni Malinen [Tue, 23 Jul 2019 18:21:30 +0000 (21:21 +0300)] 
dragonfly: SAE/EAP-pwd min PWE derivation iteration count to shared code

Use a shared function to determine the k parameter, i.e., the minimum
number of iterations of the PWE derivation loop, for SAE and EAP-pwd.
This makes it easier to fine-tune the parameter based on the negotiated
group, if desired.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Disabled EAP-pwd group
Jouni Malinen [Tue, 23 Jul 2019 10:31:50 +0000 (13:31 +0300)] 
tests: Disabled EAP-pwd group

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoEAP-pwd peer: Configurable set of groups with reduced default
Jouni Malinen [Tue, 23 Jul 2019 10:16:59 +0000 (13:16 +0300)] 
EAP-pwd peer: Configurable set of groups with reduced default

Make the EAP-pwd peer use same default set of allowed groups as the SAE
implementation in wpa_supplicant uses, i.e., the groups 19-21 using NIST
curves P-256, P-384, and P-521. Previously, all groups that were
supported by the crypto library were allowed. In practice, this change
disables use of the Brainpool curves (groups 28-30) with recent OpenSSL
versions.

The default set of groups can be overridden with a new phase1 network
profile parameter, eap_pwd_groups=<list of allowed ranges>. For example,
phase1="eap_pwd_groups=0-65535" would restore previous behavior of
allowing all implemented groups to be used while eap_pwd_groups=19,20
would enable only the groups using NIST curves P-256 and P-384 to be
used.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Prepare EAP-pwd test cases for allowed group configuration
Jouni Malinen [Tue, 23 Jul 2019 10:15:23 +0000 (13:15 +0300)] 
tests: Prepare EAP-pwd test cases for allowed group configuration

Enable all supported groups in the existing ap_wpa2_eap_pwd_groups and
ap_wpa2_eap_pwd_invalid_group test cases to maintain current testing
functionality once wpa_supplicant is modified to use a different default
for the enabled groups.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd QCA vendor attributes for ELNA bypass
Paul Zhang [Mon, 22 Jul 2019 10:57:11 +0000 (18:57 +0800)] 
Add QCA vendor attributes for ELNA bypass

Add attributes QCA_WLAN_VENDOR_ATTR_CONFIG_ELNA_BYPASS under
the enum qca_wlan_vendor_attr_config to support set and get
the ELNA bypass.

Signed-off-by: Paul Zhang <paulz@codeaurora.org>
4 years agoAdd a vendor attribute to configure disconnect IEs
Srinivas Dasari [Tue, 4 Jun 2019 07:20:17 +0000 (12:50 +0530)] 
Add a vendor attribute to configure disconnect IEs

Add a new vendor attribute QCA_WLAN_VENDOR_ATTR_DISCONNECT_IES
to configure disconnect IEs to the driver. Driver shall fill
these IEs in disassoc/deauth frame.
These IEs are expected to be considered only for the next
immediate disconnection (disassoc/deauth frame) originated by
the DUT, irrespective of the entity (user space/driver/firmware)
triggering the disconnection.
The host drivers are not expected to use the IEs set through
this interface for further disconnections after the first immediate
disconnection initiated post the configuration.
If the IEs are also updated through cfg80211 interface (after the
enhancement to cfg80211_disconnect), host driver is expected to
take the union of IEs from both of these interfaces and send in
further disassoc/deauth frames.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd QCA vendor command to support OEM data
Paul Zhang [Fri, 21 Jun 2019 06:11:11 +0000 (14:11 +0800)] 
Add QCA vendor command to support OEM data

Add a QCA vendor sub command QCA_NL80211_VENDOR_SUBCMD_OEM_DATA
with attributes qca_wlan_vendor_attr_oem_data_params to support
OEM data. It is used to send OEM data binary blobs from
application/service to firmware. The attributes defined in enum
qca_wlan_vendor_attr_oem_data_params are used to deliver the
parameters.

Signed-off-by: Paul Zhang <paulz@codeaurora.org>
4 years agoOpenSSL: Fix build with LibreSSL and BoringSSL
Jouni Malinen [Sat, 13 Jul 2019 19:40:50 +0000 (22:40 +0300)] 
OpenSSL: Fix build with LibreSSL and BoringSSL

The new certificate chain debug dumps used functions that are not
available with LibreSSL or BoringSSL.

Fixes: 857edf4bf43e ("OpenSSL: More debug prints of configured ciphers and certificates")
Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Fix TLS_CONN_TEAP_ANON_DH build with some library versions
Jouni Malinen [Sat, 13 Jul 2019 19:36:07 +0000 (22:36 +0300)] 
OpenSSL: Fix TLS_CONN_TEAP_ANON_DH build with some library versions

The OPENSSL_VERSION_NUMBER ifdef block left out the local variable that
is needed with all versions. In addition, SSL_set_security_level() is
not available with LibreSSL or BoringSSL.

Fixes: 3ec65a8e38a0 ("OpenSSL: Allow anon-DH cipher suites to be added for TEAP")
Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Fix build with OpenSSL 1.0.2 and 1.1.0 and LibreSSL
Jouni Malinen [Sat, 13 Jul 2019 19:19:30 +0000 (22:19 +0300)] 
OpenSSL: Fix build with OpenSSL 1.0.2 and 1.1.0 and LibreSSL

The tls_connection_get_cipher_suite() implementation used
SSL_CIPHER_get_protocol_id which was added in OpenSSL 1.1.1. Need to use
compatibility code with older versions.

Fixes: 94714ec341cc ("OpenSSL: Add tls_connection_get_cipher_suite()")
Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoEAP-TLS server: Add application data to indicate end of v1.3 handshake
Jouni Malinen [Sat, 13 Jul 2019 13:29:39 +0000 (16:29 +0300)] 
EAP-TLS server: Add application data to indicate end of v1.3 handshake

This adds an encrypted version of a one octet application data payload
to the end of the handshake when TLS v1.3 is used to indicate explicit
termination of the handshake (either after Finished message or after the
optional NewSessionTicket message). The current
draft-ietf-emu-eap-tls13-05 defines this to be a zero length payload,
but since that is not allowed by OpenSSL, use a one octet payload
instead for now with hopes of getting the draft specification updated
instead of having to modify OpenSSL for this.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoEAP-TLS peer: Handle possible application data at the end
Jouni Malinen [Fri, 12 Jul 2019 20:38:05 +0000 (23:38 +0300)] 
EAP-TLS peer: Handle possible application data at the end

EAP-TLS with TLS 1.3 uses an empty application data record from the
server to indicate end of the exchange, so EAP-TLS peer will need to
check for this special case and finish the exchange with an empty
EAP-TLS (ACK) so that the server can send out EAP-Success.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Parse msg_callback inner content type into debug messages
Jouni Malinen [Fri, 12 Jul 2019 19:42:13 +0000 (22:42 +0300)] 
OpenSSL: Parse msg_callback inner content type into debug messages

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: disable TLS 1.3 middlebox compatibility
Jouni Malinen [Fri, 12 Jul 2019 19:29:33 +0000 (22:29 +0300)] 
OpenSSL: disable TLS 1.3 middlebox compatibility

This will hopefully not be needed for EAP-TLS use cases since there
should not really be a middlebox that looks at the TLS layer details in
case of EAP authentication.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: EAP-TLS and both RSA and EC sertificates certificates
Jouni Malinen [Fri, 12 Jul 2019 15:11:46 +0000 (18:11 +0300)] 
tests: EAP-TLS and both RSA and EC sertificates certificates

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Allow two server certificates/keys to be configured on server
Jouni Malinen [Fri, 12 Jul 2019 15:11:53 +0000 (18:11 +0300)] 
OpenSSL: Allow two server certificates/keys to be configured on server

hostapd EAP server can now be configured with two separate server
certificates/keys to enable parallel operations using both RSA and ECC
public keys. The server will pick which one to use based on the client
preferences for the cipher suite (in the TLS ClientHello message). It
should be noted that number of deployed EAP peer implementations do not
filter out the cipher suite list based on their local configuration and
as such, configuration of alternative types of certificates on the
server may result in interoperability issues.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: More debug prints of configured ciphers and certificates
Jouni Malinen [Thu, 11 Jul 2019 19:40:08 +0000 (22:40 +0300)] 
OpenSSL: More debug prints of configured ciphers and certificates

This adds TLS server mode debug prints to make it easier to see what
exactly has been configured in OpenSSL.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: EAP-TLS and TLS 1.3 (EC certificates)
Jouni Malinen [Thu, 11 Jul 2019 13:10:43 +0000 (16:10 +0300)] 
tests: EAP-TLS and TLS 1.3 (EC certificates)

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoAdd Type-Code context to EAP-TLS 1.3 exported Key_Material and Method-Id
Ervin Oro [Mon, 15 Apr 2019 17:05:49 +0000 (20:05 +0300)] 
Add Type-Code context to EAP-TLS 1.3 exported Key_Material and Method-Id

Change to require the Type-Code in context for Key_Material and
Method-Id has now been published as draft-ietf-emu-eap-tls13-04.
https://tools.ietf.org/html/draft-ietf-emu-eap-tls13-04#section-2.3

Signed-off-by: Ervin Oro <ervin.oro@aalto.fi>
4 years agotests: EAP-TEAP
Jouni Malinen [Tue, 9 Jul 2019 13:56:02 +0000 (16:56 +0300)] 
tests: EAP-TEAP

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoEAP-TEAP server and peer implementation (RFC 7170)
Jouni Malinen [Tue, 9 Jul 2019 13:56:02 +0000 (16:56 +0300)] 
EAP-TEAP server and peer implementation (RFC 7170)

This adds support for a new EAP method: EAP-TEAP (Tunnel Extensible
Authentication Protocol). This should be considered experimental since
RFC 7170 has number of conflicting statements and missing details to
allow unambiguous interpretation. As such, there may be interoperability
issues with other implementations and this version should not be
deployed for production purposes until those unclear areas are resolved.

This does not yet support use of NewSessionTicket message to deliver a
new PAC (either in the server or peer implementation). In other words,
only the in-tunnel distribution of PAC-Opaque is supported for now. Use
of the NewSessionTicket mechanism would require TLS library support to
allow arbitrary data to be specified as the contents of the message.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoRemove obsolete defconfig notes regarding EAP-FAST support in OpenSSL
Jouni Malinen [Tue, 9 Jul 2019 13:43:05 +0000 (16:43 +0300)] 
Remove obsolete defconfig notes regarding EAP-FAST support in OpenSSL

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoReturn success/failure result from tls_prf_sha256()
Jouni Malinen [Thu, 27 Jun 2019 15:08:16 +0000 (18:08 +0300)] 
Return success/failure result from tls_prf_sha256()

The hash functions used within this function could fail in theory, so
provide the result to the caller.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Allow anon-DH cipher suites to be added for TEAP
Jouni Malinen [Tue, 9 Jul 2019 13:37:19 +0000 (16:37 +0300)] 
OpenSSL: Allow anon-DH cipher suites to be added for TEAP

Add a new TLS_CONN_* flag to provide a higher level mechanism for adding
(instead of fully replacing) allowed list of TLS ciphersuites for TEAP
provisioning purposes.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Add tls_connection_get_cipher_suite()
Jouni Malinen [Fri, 5 Jul 2019 15:07:14 +0000 (18:07 +0300)] 
OpenSSL: Add tls_connection_get_cipher_suite()

This can be used to fetch the 16-bit TLS cipher suite identifier.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoOpenSSL: Reject empty cipher list in tls_connection_set_cipher_list()
Jouni Malinen [Sat, 11 Feb 2017 13:56:47 +0000 (15:56 +0200)] 
OpenSSL: Reject empty cipher list in tls_connection_set_cipher_list()

Previously, this invalid call would have resulted in printing out a
string from uninitialized memory

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoAdd tls_get_tls_unique() to fetch "tls-unique" for channel binding
Jouni Malinen [Mon, 10 Aug 2015 18:21:40 +0000 (21:21 +0300)] 
Add tls_get_tls_unique() to fetch "tls-unique" for channel binding

This implements "tls-unique" derivation per RFC 5929, Section 3. This
will be needed for channel binding, e.g., with EAP-TEAP.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Allow test selection with prefix wildcards
Jouni Malinen [Tue, 9 Jul 2019 13:09:04 +0000 (16:09 +0300)] 
tests: Allow test selection with prefix wildcards

Test names can now use wildcard in the end (e.g., ap_wpa2_psk*) to match
all test cases with the specified prefix.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoSilence static analyzer warning about null termination of a string
Jouni Malinen [Sun, 7 Jul 2019 07:02:40 +0000 (10:02 +0300)] 
Silence static analyzer warning about null termination of a string

The buf[] array is initialized to zeros, so it was already null
terminated since the read() call did not allow the last character of the
buffer to be overwritten. Since that was apparently not enough to make
some static analyzers understand the design, use explicit null
termination after a successful read() call.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoRemove useless NULL comparison for an array
Jouni Malinen [Sun, 7 Jul 2019 06:58:46 +0000 (09:58 +0300)] 
Remove useless NULL comparison for an array

Now that the TLS peer_cert information is provided as a full struct to
handler functions, the altsubject pointer shows up as an array and
causes static analyzers to warn about unnecessary NULL comparison. Get
rid of that comparison now that it is clearly not needed anymore.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoEAP-pwd: Run through prf result processing even if it >= prime
Jouni Malinen [Mon, 24 Jun 2019 20:02:51 +0000 (23:02 +0300)] 
EAP-pwd: Run through prf result processing even if it >= prime

This reduces differences in timing and memory access within the
hunting-and-pecking loop for ECC groups that have a prime that is not
close to a power of two (e.g., Brainpool curves).

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoSAE: Run through prf result processing even if it >= prime
Jouni Malinen [Mon, 24 Jun 2019 20:01:06 +0000 (23:01 +0300)] 
SAE: Run through prf result processing even if it >= prime

This reduces differences in timing and memory access within the
hunting-and-pecking loop for ECC groups that have a prime that is not
close to a power of two (e.g., Brainpool curves).

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoMove MAC address randomization enable/disable to helper functions
Eric Caruso [Thu, 30 May 2019 18:10:46 +0000 (11:10 -0700)] 
Move MAC address randomization enable/disable to helper functions

This makes it easier to share this for D-Bus implementation.

Signed-off-by: Eric Caruso <ejcaruso@chromium.org>
4 years agotests: Fix scan_dfs false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:09 +0000 (10:51 +0900)] 
tests: Fix scan_dfs false negative by using common finalizer

scan_dfs fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix p2p_go_move_scm_peer_does_not_support false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:08 +0000 (10:51 +0900)] 
tests: Fix p2p_go_move_scm_peer_does_not_support false negative by using common finalizer

p2p_go_move_scm_peer_does_not_support fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix p2p_channel_5ghz_165_169_us false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:07 +0000 (10:51 +0900)] 
tests: Fix p2p_channel_5ghz_165_169_us false negative by using common finalizer

p2p_channel_5ghz_165_169_us fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix p2p_channel_5ghz_only false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:06 +0000 (10:51 +0900)] 
tests: Fix p2p_channel_5ghz_only false negative by using common finalizer

p2p_channel_5ghz_only fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix autogo_ht_vht false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:05 +0000 (10:51 +0900)] 
tests: Fix autogo_ht_vht false negative by using common finalizer

autogo_ht_vht fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix p2p_autogo_pref_chan_not_in_regulatory false negative by using common...
Masashi Honma [Tue, 25 Jun 2019 01:51:04 +0000 (10:51 +0900)] 
tests: Fix p2p_autogo_pref_chan_not_in_regulatory false negative by using common finalizer

p2p_autogo_pref_chan_not_in_regulatory fails with this message.

---------------
wlan0: Country code not reset back to 00: is SE
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80_to_24g_ht false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:03 +0000 (10:51 +0900)] 
tests: Fix ap_vht80_to_24g_ht false negative by using common finalizer

ap_vht80_to_24g_ht fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_40_fallback_to_20 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:02 +0000 (10:51 +0900)] 
tests: Fix ap_vht_40_fallback_to_20 false negative by using common finalizer

ap_vht_40_fallback_to_20 fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_tkip false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:01 +0000 (10:51 +0900)] 
tests: Fix ap_vht_tkip false negative by using common finalizer

ap_vht_tkip fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix prefer_vht40 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:51:00 +0000 (10:51 +0900)] 
tests: Fix prefer_vht40 false negative by using common finalizer

prefer_vht40 fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80_csa false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:59 +0000 (10:50 +0900)] 
tests: Fix ap_vht80_csa false negative by using common finalizer

ap_vht80_csa fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80plus80_invalid false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:58 +0000 (10:50 +0900)] 
tests: Fix ap_vht80plus80_invalid false negative by using common finalizer

ap_vht80plus80_invalid fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht160_no_ht40 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:57 +0000 (10:50 +0900)] 
tests: Fix ap_vht160_no_ht40 false negative by using common finalizer

ap_vht160_no_ht40 fails with this message.

---------------
wlan0: Country code not reset back to 00: is ZA
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_40 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:56 +0000 (10:50 +0900)] 
tests: Fix ap_vht_40 false negative by using common finalizer

ap_vht_40 fails with this message.

---------------
wlan0: Country code not reset back to 00: is DE
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_20 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:55 +0000 (10:50 +0900)] 
tests: Fix ap_vht_20 false negative by using common finalizer

ap_vht_20 fails with this message.

---------------
wlan0: Country code not reset back to 00: is DE
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80_invalid2 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:54 +0000 (10:50 +0900)] 
tests: Fix ap_vht80_invalid2 false negative by using common finalizer

ap_vht80_invalid2 fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80_invalid false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:53 +0000 (10:50 +0900)] 
tests: Fix ap_vht80_invalid false negative by using common finalizer

ap_vht80_invalid fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_wifi_generation false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:52 +0000 (10:50 +0900)] 
tests: Fix ap_vht_wifi_generation false negative by using common finalizer

ap_vht_wifi_generation fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:51 +0000 (10:50 +0900)] 
tests: Fix ap_vht80 false negative by using common finalizer

ap_vht80 fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_wps_conf_chan14 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:50 +0000 (10:50 +0900)] 
tests: Fix ap_wps_conf_chan14 false negative by using common finalizer

ap_wps_conf_chan14 fails with this message.

---------------
wlan0: Country code not reset back to 00: is JP
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_acs_vht160_scan_disable false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:49 +0000 (10:50 +0900)] 
tests: Fix ap_acs_vht160_scan_disable false negative by using common finalizer

ap_acs_vht160_scan_disable fails with this message.

---------------
wlan0: Country code not reset back to 00: is ZA
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix rrm_beacon_req_passive_scan_vht160 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:48 +0000 (10:50 +0900)] 
tests: Fix rrm_beacon_req_passive_scan_vht160 false negative by using common finalizer

rrm_beacon_req_passive_scan_vht160 fails with this message.

---------------
wlan0: Country code not reset back to 00: is ZA
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix rrm_beacon_req_table_vht false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:47 +0000 (10:50 +0900)] 
tests: Fix rrm_beacon_req_table_vht false negative by using common finalizer

rrm_beacon_req_table_vht fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_ht40_5ghz_disabled_sec false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:46 +0000 (10:50 +0900)] 
tests: Fix ap_ht40_5ghz_disabled_sec false negative by using common finalizer

ap_ht40_5ghz_disabled_sec fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_ht40_5ghz_invalid_pair false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:45 +0000 (10:50 +0900)] 
tests: Fix ap_ht40_5ghz_invalid_pair false negative by using common finalizer

ap_ht40_5ghz_invalid_pair fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta_force_2ghz false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:44 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta_force_2ghz false negative by using common finalizer

ap_track_sta_force_2ghz fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta_force_5ghz false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:43 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta_force_5ghz false negative by using common finalizer

ap_track_sta_force_5ghz fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta_no_auth_passive false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:42 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta_no_auth_passive false negative by using common finalizer

ap_track_sta_no_auth_passive fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta_no_auth false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:41 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta_no_auth false negative by using common finalizer

ap_track_sta_no_auth fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta_no_probe_resp false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:40 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta_no_probe_resp false negative by using common finalizer

ap_track_sta_no_probe_resp fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_track_sta false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:39 +0000 (10:50 +0900)] 
tests: Fix ap_track_sta false negative by using common finalizer

ap_track_sta fails with this message.

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix nfc_wps_handover_chan14 false negative by using common finalizer
Masashi Honma [Tue, 25 Jun 2019 01:50:38 +0000 (10:50 +0900)] 
tests: Fix nfc_wps_handover_chan14 false negative by using common finalizer

nfc_wps_handover_chan14 fails with this message.

---------------
wlan0: Country code not reset back to 00: is JP
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agoP2P: Fix memory size for os_memmove() in p2p_check_pref_chan()
Daisuke Niwa [Wed, 26 Jun 2019 06:27:33 +0000 (15:27 +0900)] 
P2P: Fix memory size for os_memmove() in p2p_check_pref_chan()

'sizeof' was not used with os_memmove() for an integer array. This lead
to an issue with part of the preferred channel list not being used.

Fixes: 79329ae0aa19 ("P2P: Verify local driver preferred frequencies for P2P use cases")
Signed-off-by: Daichi Ueura <daichi.ueura@sony.com>
4 years agoWPS: Fix a typo in a comment (use full WPA2-Personal name)
Jouni Malinen [Wed, 26 Jun 2019 17:01:34 +0000 (20:01 +0300)] 
WPS: Fix a typo in a comment (use full WPA2-Personal name)

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Fix ap_vht_use_sta_nsts false negative by using common finalizer
Masashi Honma [Thu, 6 Jun 2019 05:27:40 +0000 (14:27 +0900)] 
tests: Fix ap_vht_use_sta_nsts false negative by using common finalizer

ap_vht_use_sta_nsts fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht_capab_not_supported false negative by using common finalizer
Masashi Honma [Thu, 6 Jun 2019 05:27:39 +0000 (14:27 +0900)] 
tests: Fix ap_vht_capab_not_supported false negative by using common finalizer

ap_vht_capab_not_supported fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix ap_vht80c/d false negative by using common finalizer
Masashi Honma [Thu, 6 Jun 2019 05:27:38 +0000 (14:27 +0900)] 
tests: Fix ap_vht80c/d false negative by using common finalizer

ap_vht80c/d fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix dfs_radar2 false negative by using common finalizer
Masashi Honma [Thu, 6 Jun 2019 05:27:37 +0000 (14:27 +0900)] 
tests: Fix dfs_radar2 false negative by using common finalizer

dfs_radar2 fails with this message.

---------------
wlan0: Country code not reset back to 00: is FI
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agomesh: Add support for HE mode
Sven Eckelmann [Fri, 14 Jun 2019 14:49:21 +0000 (16:49 +0200)] 
mesh: Add support for HE mode

Mesh points can partially support HE features (when requiring no
controlling STA/AP) as long as hardware supports it. The kernel just
requires support for HE mesh and wpa_supplicant can forward the peer
capabilities to the kernel for further processing.

Signed-off-by: Sven Eckelmann <seckelmann@datto.com>
4 years agonl80211: Add driver multi iftype HE capability parsing
Sven Eckelmann [Fri, 14 Jun 2019 14:49:20 +0000 (16:49 +0200)] 
nl80211: Add driver multi iftype HE capability parsing

The HE capabilities are no longer per PHY but per iftype on this
specific PHY. It is therefore no longer enough to just parse the AP
capabilities.

The he_capabilities are now duplicated to store all information for
IEEE80211_MODE_* which hostap cares about. The nl80211 driver fills in
this information when the iftype supports HE. The rest of the code still
only uses the IEEE80211_HE_AP portion but can be extended later to also
use other HE capabilities.

Signed-off-by: Sven Eckelmann <seckelmann@datto.com>
4 years agowpa_supplicant: Fix type for ssid->mode comparisons
Sven Eckelmann [Fri, 14 Jun 2019 14:49:19 +0000 (16:49 +0200)] 
wpa_supplicant: Fix type for ssid->mode comparisons

The ssid->mode is from type enum wpas_mode and all its constants start
with WPAS_MODE_*. Still some of the code sections used the
IEEE80211_MODE_* defines instead of WPAS_MODE_*.

This should have no impact on the actual code because the constants for
INFRA, IBSS, AP and MESH had the same values.

Signed-off-by: Sven Eckelmann <seckelmann@datto.com>
4 years agoAP: Simplify "i" definition in hostapd_config_free_bss()
Andrei Otcheretianski [Wed, 19 Jun 2019 12:49:14 +0000 (15:49 +0300)] 
AP: Simplify "i" definition in hostapd_config_free_bss()

Declare the variable only once and reuse it instead of openning
unneeded scopes.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agoDPP: Fix documentation to include operating class for URI
Amit Khatri [Sun, 16 Jun 2019 03:10:37 +0000 (08:40 +0530)] 
DPP: Fix documentation to include operating class for URI

As per code dpp_parse_uri_chan_list() function checks "/" as separator
for operating class and operating channel. Update readme accordingly.

Signed-off-by: Amit Khatri <amit7861234@gmail.com>
4 years agoHE: Fix HE capability check for PPE threshold present
Sven Eckelmann [Wed, 12 Jun 2019 23:10:07 +0000 (01:10 +0200)] 
HE: Fix HE capability check for PPE threshold present

The the mask for PPE threshold present in the HE phy capability byte 6 is
0x80 and not 0x6. This incorrect mask breaks the length calculation and as
result the acceptance of the HE capabilities for STAs which either:

* don't have the PPE threshold present bit set AND the Codebook Size={7,5}
  MU Feedback or the Triggered SU Beamforming feedback bit set

* do have the PPE threshold present set AND neither the Codebook Size={7,5}
  MU Feedback nor the Triggered SU Beamforming feedback bit set

Fixes: 8f5fc369e263 ("HE: Fix HE Capabilities element variable length encoding")
Signed-off-by: Sven Eckelmann <seckelmann@datto.com>
4 years agolibtommath: Make sure fast_s_mp_mul_digs initializes the W[] array
Jouni Malinen [Sat, 22 Jun 2019 15:42:53 +0000 (18:42 +0300)] 
libtommath: Make sure fast_s_mp_mul_digs initializes the W[] array

Some compilers have started to warn about this and the use of two loops
with ix 0..pa-1 and 0..pa loop a bit suspicious, so better make sure the
array is initialized with zeros before extracting the terms from it.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoTLS: Move ASN.1 DER BOOLEAN validation into generic ASN.1 parsing
Jouni Malinen [Sat, 22 Jun 2019 15:36:57 +0000 (18:36 +0300)] 
TLS: Move ASN.1 DER BOOLEAN validation into generic ASN.1 parsing

This does not need to be specific to X.509, so move the BOOLEAN DER
encoding validation into asn1_get_next() to make it apply for all cases
instead of having to have the caller handle this separately.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoTLS: Only allow 0xff value as TRUE for ASN.1 DER encoded BOOLEAN
Jouni Malinen [Sat, 22 Jun 2019 15:27:36 +0000 (18:27 +0300)] 
TLS: Only allow 0xff value as TRUE for ASN.1 DER encoded BOOLEAN

While BER encoding allows any nonzero value to be used for TRUE, DER is
explicitly allowing only the value 0xff. Enforce this constraint in
X.509 parsing to be more strict with what is acceptable.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Add X.509v3 parsing example with invalid BasicConstraints
Jouni Malinen [Sat, 22 Jun 2019 15:15:22 +0000 (18:15 +0300)] 
tests: Add X.509v3 parsing example with invalid BasicConstraints

This is a regression test based on an input data from OSS-Fuzz.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoTLS: Fix X.509v3 BasicConstraints parsing
Jouni Malinen [Sat, 22 Jun 2019 15:11:24 +0000 (18:11 +0300)] 
TLS: Fix X.509v3 BasicConstraints parsing

Handling of the optional pathLenConstraint after cA was not done
properly. The position after cA needs to be compared to the end of the
SEQUENCE, not the end of the available buffer, to determine whether the
optional pathLenConstraint is present. In addition, when parsing
pathLenConstraint, the length of the remaining buffer was calculated
incorrectly by not subtracting the length of the header fields needed
for cA. This could result in reading couple of octets beyond the end of
the buffer before rejecting the ASN.1 data as invalid.

Credit to OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15408
Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: sigma_dut and UOSC when CA is not trusted
Jouni Malinen [Thu, 20 Jun 2019 20:46:46 +0000 (23:46 +0300)] 
tests: sigma_dut and UOSC when CA is not trusted

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoOpenSSL: Send cert event for the peer even on CA cert failure
Jouni Malinen [Thu, 20 Jun 2019 20:44:51 +0000 (23:44 +0300)] 
OpenSSL: Send cert event for the peer even on CA cert failure

This adds a CTRL-EVENT-EAP-PEER-CERT even for depth=0 even if a depth >
0 certificate results in peer certificate validation error. Previously,
this case resulted in the upper layers not getting any information about
the used peer certificate. Now that information is available, e.g., to
allow server certificate -based overriding of the trust to be done.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agowpadebug: Allow WebView to parse and load clear text (HTTP)
Purushottam Kushwaha [Wed, 12 Jun 2019 12:15:37 +0000 (17:45 +0530)] 
wpadebug: Allow WebView to parse and load clear text (HTTP)

Recent Android version doesn't allow cleartext parsing by WebView by
default:

Error message: ERR_CLEARTEXT_NOT_PERMITTED.

To resolve this wpadebug need to have following updated under
application definition of AndroidManifest.xml
 - android:usesCleartextTraffic="true"

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAvoid use of a shadowed local variable
Jouni Malinen [Tue, 18 Jun 2019 22:17:54 +0000 (01:17 +0300)] 
Avoid use of a shadowed local variable

The same len variable can be used for both needs within
ieee802_1x_get_keys() to avoid compiler warning about use of shadowed
variable.

Fixes: 0ee6885dae04 ("macsec: Store EAP-Key-Name as eapSessionId")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>