]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
4 years agowolfSSL: Client cert loading API fix
Juliusz Sosinowicz [Wed, 21 Oct 2020 15:59:53 +0000 (17:59 +0200)] 
wolfSSL: Client cert loading API fix

Client cert loading API should check equality to SSL_SUCCESS for
success.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
4 years agonl80211: Report invalid signal and noise when info is unavailable
Avraham Stern [Tue, 3 Nov 2020 07:54:16 +0000 (09:54 +0200)] 
nl80211: Report invalid signal and noise when info is unavailable

When the driver sends a CQM RSSI threshold event, wpa_supplicant queries
the driver for the signal and noise values. However, it is possible that
by that time the station has already disconnected from the AP, so these
values are no longer valid. In this case, indicate that these values are
invalid by setting them to WPA_INVALID_NOISE.

Previously a value of 0 would be reported, which may be confusing as
this is a valid value.

Since nl80211_get_link_signal() and nl80211_get_link_noise() already set
invalid values for a case of failure, just use the value set by these
functions even if they fail.

Signed-off-by: Avraham Stern <avraham.stern@intel.com>
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
Reviewed-by: Brian Norris <briannorris@chromium.org>
4 years agotests: remotehost: Introduce wait_event()
Janusz Dziedzic [Sat, 7 Nov 2020 10:49:15 +0000 (11:49 +0100)] 
tests: remotehost: Introduce wait_event()

Allow to run local/remote process like:
 - ubus listen
 - logread -f
 - tail -f
 - wpa_cli
 - hostapd_cli
And next wait for specific event(s).

Signed-off-by: Janusz Dziedzic <janusz.dziedzic@gmail.com>
4 years agotests: remotehost: Use correct name
Janusz Dziedzic [Sat, 7 Nov 2020 10:49:14 +0000 (11:49 +0100)] 
tests: remotehost: Use correct name

While we start thread use:
 - thread_run
 - therad_stop
 - thread_wait

Signed-off-by: Janusz Dziedzic <janusz.dziedzic@gmail.com>
4 years agowlantest: Allow missing RSNE in S1G beacon
Thomas Pedersen [Thu, 22 Oct 2020 18:20:32 +0000 (11:20 -0700)] 
wlantest: Allow missing RSNE in S1G beacon

S1G beacons save a few bytes by not requiring the RSNE in beacon if RSN
BSS is configured. Handle this in wlantest by only clearing RSNE from
the BSS info if frame is a Probe Response frame.

Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
4 years agotests: Skip dpp_enterprise_tcp tests without OpenSSL
Andrei Otcheretianski [Thu, 22 Oct 2020 15:01:37 +0000 (18:01 +0300)] 
tests: Skip dpp_enterprise_tcp tests without OpenSSL

Skip these tests if OpenSSL wasn't loaded, instead of crashing.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agotests: Determine number of parallel make jobs automatically
Jouni Malinen [Fri, 4 Dec 2020 09:49:04 +0000 (11:49 +0200)] 
tests: Determine number of parallel make jobs automatically

Use nproc (if available) instead of the hardcoded 8 parallel make jobs.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Skip test cases properly if tshark is not available
Jouni Malinen [Fri, 4 Dec 2020 09:43:45 +0000 (11:43 +0200)] 
tests: Skip test cases properly if tshark is not available

Instead of trying to process empty results, mark the test case as
skipped if tshark is not available.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agotests: Fix p2p_autogo_pref_chan_not_in_regulatory
Thomas Pedersen [Thu, 27 Aug 2020 22:58:55 +0000 (15:58 -0700)] 
tests: Fix p2p_autogo_pref_chan_not_in_regulatory

Sweden now allows channel 149 in the updated wireless-regdb. Choose
Japan for the negative test instead.

Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
4 years agoAdd option to ignore Probe Request frames when RSSI is too low
John Crispin [Wed, 12 Aug 2020 16:55:31 +0000 (18:55 +0200)] 
Add option to ignore Probe Request frames when RSSI is too low

Add a new hostapd configuration parameters rssi_ignore_probe_request to
ignore Probe Request frames received with too low RSSI.

Signed-off-by: John Crispin <john@phrozen.org>
4 years agowpa_supplicant: Initial connection speedup
Frederik Juul [Thu, 23 Jul 2020 08:39:41 +0000 (08:39 +0000)] 
wpa_supplicant: Initial connection speedup

Add initial_freq_list to wpa_supplicant configuration. This option
allows wpa_supplicant to scan a smaller list of frequencies when it
starts. This in turn allows for a faster connection to an already known
network. This limit applies only for the initial scan operation and does
not restrict other channels from being used in consecutive scans.

Tests have shown this to reduce the amount of time for connecting to a
network from roughly 3 seconds to roughly 0.1 second.

Signed-off-by: Frederik Juul <frederik.juul@3shape.com>
4 years agotests: DFS and no available channel after radar detection
Jouni Malinen [Wed, 2 Dec 2020 14:47:28 +0000 (16:47 +0200)] 
tests: DFS and no available channel after radar detection

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDFS: Enter DFS state if no available channel is found
David Bauer [Sat, 4 Jul 2020 08:12:21 +0000 (10:12 +0200)] 
DFS: Enter DFS state if no available channel is found

Previously hostapd would not stop transmitting when a DFS event was
detected and no available channel to switch to was available.

Disable and re-enable the interface to enter DFS state. This way, TX
does not happen until the kernel notifies hostapd about the NOP
expiring.

Signed-off-by: David Bauer <mail@david-bauer.net>
4 years agohostapd: Add ability to disable HT/VHT/HE per BSS
Shay Bar [Tue, 30 Jun 2020 14:23:46 +0000 (17:23 +0300)] 
hostapd: Add ability to disable HT/VHT/HE per BSS

Add the ability to disable HT/VHT/HE for specific BSS from hostapd.conf.

- Add disable_11ax boolean to hostapd_bss_config.
- Change disable_11n and disable_11ac to bool in hostapd_bss_config.
- Add configuration option to set these disable_11* parameters
  (which were previously used only automatically based on incompatible
  security parameters to disable HT/VHT).

Signed-off-by: Shay Bar <shay.bar@celeno.com>
4 years agomesh: Move mesh frequency setting to its own function
Markus Theil [Tue, 30 Jun 2020 12:19:06 +0000 (14:19 +0200)] 
mesh: Move mesh frequency setting to its own function

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agotests: DFS test for mesh
Markus Theil [Tue, 30 Jun 2020 12:19:04 +0000 (14:19 +0200)] 
tests: DFS test for mesh

Add a test which uses a DFS channel, waits for CAC afterwards successful
mesh join and then triggers a radar event and checks if the mesh comes
up again on the same device.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Fix DFS deinit/init
Markus Theil [Tue, 30 Jun 2020 12:19:03 +0000 (14:19 +0200)] 
mesh: Fix DFS deinit/init

The hostapd DFS code deinitializes and initializes the AP interface, if
a clean channel switch is not possible. In this case the AP code paths
would deinit the driver, for example nl80211, without wpa_supplicant
code paths getting notice of this.

Therefore add callbacks for wpa_supplicant mesh methods, which are
called on init/deinit of the AP BSS. These callbacks are then used to
handle the reset in the mesh code.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Fix for mesh init/deinit
Markus Theil [Tue, 30 Jun 2020 12:19:02 +0000 (14:19 +0200)] 
mesh: Fix for mesh init/deinit

Send mesh group started notification after join completion
callback is called.

Implement outstanding TODO, to leave the mesh network on deinit.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Fix mesh_oom test
Markus Theil [Tue, 30 Jun 2020 12:19:05 +0000 (14:19 +0200)] 
mesh: Fix mesh_oom test

Only change freq params, if ifmsh->freq is set initially, which only
happens if hostapd_get_hw_features in setup_interface2 succeeds.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Inform kernel driver about DFS handler in userspace
Peter Oh [Tue, 30 Jun 2020 12:19:01 +0000 (14:19 +0200)] 
mesh: Inform kernel driver about DFS handler in userspace

The kernel requires indication of DFS handler residing in user space
(NL80211_ATTR_HANDLE_DFS) to enable DFS channels.

Signed-off-by: Peter Oh <peter.oh@bowerswilkins.com>
4 years agomesh: Fix channel switch error during CAC
Peter Oh [Tue, 30 Jun 2020 12:19:00 +0000 (14:19 +0200)] 
mesh: Fix channel switch error during CAC

Mesh interface would have used its channel parameters that were
configured during initialization even after channel switch due to DFS
radar detection during CAC which could result in a channel switch error.
Fix the error by updating the channel parameters when channel has been
changed from the initial one.

Signed-off-by: Peter Oh <peter.oh@bowerswilkins.com>
4 years agonl80211: Do not set offchanok on DFS channels in non-ETSI for mesh
Peter Oh [Tue, 30 Jun 2020 12:18:59 +0000 (14:18 +0200)] 
nl80211: Do not set offchanok on DFS channels in non-ETSI for mesh

mac80211 does not allow mgmt tx to use off channel on
DFS channels in non-ETSI domain, because it will invalidate
CAC result on current operating channel.
(mac80211 commit: 34373d12f3cbb74960a73431138ef619d857996f)
Hence don't set offchanok for mgmt tx in case of DFS channels
in non-ETSI.

Signed-off-by: Peter Oh <peter.oh@bowerswilkins.com>
4 years agomesh: Update ssid->frequency as pri/sec channels switch
Peter Oh [Tue, 30 Jun 2020 12:18:57 +0000 (14:18 +0200)] 
mesh: Update ssid->frequency as pri/sec channels switch

ssid->frequency is one of the variables used to get the channel number
from a given frequency. Leaving it as unchanged when pri/sec channel
switch will cause picking up a wrong channel number after applying the
secondary channel offset for HT40 and leads to failing interface
bring-up.

Signed-off-by: Peter Oh <peter.oh@bowerswilkins.com>
4 years agomesh: Use setup completion callback to complete mesh join
Peter Oh [Tue, 30 Jun 2020 12:18:56 +0000 (14:18 +0200)] 
mesh: Use setup completion callback to complete mesh join

Mesh join function is the last function to be called during mesh join
process, but it's been called a bit earlier than it's supposed to be, so
that some mesh parameter values such as VHT capabilities were not
applied correct when mesh join is in process. Moreover, the current
design of mesh join that is called directly after mesh initialization
isn't suitable for DFS channels to use, since mesh join process should
be paused until DFS CAC is done and resumed after it's done.

The callback will be called by hostapd_setup_interface_complete_sync().
There is a possibility that completing mesh init fails, so add error
handling codes for that.

Signed-off-by: Peter Oh <peter.oh@bowerswilkins.com>
4 years agoQCA vendor attributes to configure TX and RX NSS
Sachin Ahuja [Mon, 23 Nov 2020 11:27:40 +0000 (16:57 +0530)] 
QCA vendor attributes to configure TX and RX NSS

Define QCA vendor attributes to dynamically configure TX NSS and RX NSS
to be used with QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION and
QCA_NL80211_VENDOR_SUBCMD_GET_WIFI_CONFIGURATION commands.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: WPA2-PSK and supplicant receiving unexpected EAPOL-Key frames
Jouni Malinen [Mon, 23 Nov 2020 19:28:19 +0000 (21:28 +0200)] 
tests: WPA2-PSK and supplicant receiving unexpected EAPOL-Key frames

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Use helper functions for PSK ext EAPOL-Key processing
Jouni Malinen [Mon, 23 Nov 2020 19:02:03 +0000 (21:02 +0200)] 
tests: Use helper functions for PSK ext EAPOL-Key processing

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAP: Check driver support while auto-selecting bandwidth for AP/P2P GO
Sreeramya Soratkal [Wed, 18 Nov 2020 10:51:29 +0000 (16:21 +0530)] 
AP: Check driver support while auto-selecting bandwidth for AP/P2P GO

If the maximum operating channel width for AP/P2P GO is not specified,
it is auto-selected during configuration. While selecting the channel
width, if VHT is supported and 160 MHz channels are available, 160 MHz
channel width is preferred to 80 MHz.

During the selection of the channel width, the corresponding driver
capabilities were not checked. As a result, the AP/P2P GO configuration
was set to use the available 160 MHz channels even if the driver did not
have capability to support the 160 MHz channel width causing failure to
start the AP/P2P GO.

Fix this by checking the driver support for the 160 MHz channel width
while selecting the channel width for AP/P2P GO.

Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
4 years agoAdd bus failure reason code to vendor indication
Arun Kumar Khandavalli [Fri, 20 Nov 2020 11:46:11 +0000 (17:16 +0530)] 
Add bus failure reason code to vendor indication

Add bus failure hang reason code in enum qca_wlan_vendor_hang_reason.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: ANQP protection indication
Jouni Malinen [Mon, 23 Nov 2020 18:35:00 +0000 (20:35 +0200)] 
tests: ANQP protection indication

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoIndicate whether additional ANQP elements were protected
Jouni Malinen [Mon, 23 Nov 2020 18:32:26 +0000 (20:32 +0200)] 
Indicate whether additional ANQP elements were protected

Store information on whether extra ANQP elements were received using the
protection alternative (protected GAS during an association using PMF)
and make this available through the control interface BSS command.

For example:
anqp[277]=<hexdump>
protected-anqp-info[277]=1

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd vendor attributes for TWT nudge request
Srinivas Girigowda [Wed, 28 Oct 2020 21:42:50 +0000 (14:42 -0700)] 
Add vendor attributes for TWT nudge request

TWT nudge is a combination of suspend and resume in a single request.
Add TWT nudge operation and QCA vendor attributes to support
the TWT nudge request.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoBSS: Use variable length array for IEs at the end of struct wpa_bss
Jouni Malinen [Mon, 16 Nov 2020 14:25:17 +0000 (16:25 +0200)] 
BSS: Use variable length array for IEs at the end of struct wpa_bss

Replace the previously used design "(u8 *) (bss + 1)" with a variable
length array at the end of struct wpa_bss bss->ies[] in hopes of making
this easier to understand for static analyzers.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoBSS: Use wrapper function for getting a pointer to the IE buffer
Jouni Malinen [Mon, 16 Nov 2020 14:21:56 +0000 (16:21 +0200)] 
BSS: Use wrapper function for getting a pointer to the IE buffer

This makes it easier to change the internal struct wpa_bss design for
storing the variable length IE buffers.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoBSS: Add wpa_bss_get_ie_ext() wrapper
Jouni Malinen [Mon, 16 Nov 2020 14:00:21 +0000 (16:00 +0200)] 
BSS: Add wpa_bss_get_ie_ext() wrapper

This removes need from the callers to know the struct wpa_bss details
for the location of the memory area for storing the IEs.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoMark wpa_bss_get_fils_cache_id() argument const
Jouni Malinen [Mon, 16 Nov 2020 13:52:22 +0000 (15:52 +0200)] 
Mark wpa_bss_get_fils_cache_id() argument const

This function does not modify the BSS entry.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Fix test description strings for couple of SAE cases
Jouni Malinen [Mon, 16 Nov 2020 13:36:59 +0000 (15:36 +0200)] 
tests: Fix test description strings for couple of SAE cases

Remove the extraneous closing parenthesis.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoChange list arguments to const where possible
Hai Shalom [Tue, 3 Nov 2020 02:14:11 +0000 (18:14 -0800)] 
Change list arguments to const where possible

Change struct dl_list pointer argument to const in list functions that
do not manipulate the list: dl_list_len() and dl_list_empty().

Signed-off-by: Hai Shalom <haishalom@google.com>
4 years agonl80211: Send the sae_pwe value to the driver
Rohan Dutta [Sat, 7 Nov 2020 13:53:24 +0000 (19:23 +0530)] 
nl80211: Send the sae_pwe value to the driver

Use NL80211_ATTR_SAE_PWE attribute to indicate the sae_pwe value
to the driver during the NL80211_CMD_START_AP and NL80211_CMD_CONNECT
in WPA3-Personal networks which are using SAE authentication.

Signed-off-by: Rohan Dutta <drohan@codeaurora.org>
4 years agoP2P: Disable P2P in the 6 GHz band for now
Vamsi Krishna [Mon, 16 Nov 2020 07:01:34 +0000 (12:31 +0530)] 
P2P: Disable P2P in the 6 GHz band for now

P2P usage in the 6 GHz band is not standardized yet by WFA. Disable P2P
operations in the 6 GHz band to avoid potential interop issues with
existing P2P devices in production. P2P operations in the 6 GHz band can
be reenabled later after defining standard ways to address potential
interop issues with existing P2P devices.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoP2P: Include p2p_6ghz_disable in global configuration
Sreeramya Soratkal [Thu, 29 Oct 2020 13:45:47 +0000 (19:15 +0530)] 
P2P: Include p2p_6ghz_disable in global configuration

Previously, the configuration to disable the 6 GHz band remained local
to the P2P interface. With this there is a possibility of 6 GHz channels
being included in the channel list when the channel list needs to be
updated if the state changes on one of the interfaces.

Include the configuration to disable the 6 GHz band for P2P as a global
configuration value to prevent the inclusion of 6 GHz channels in the
channel list for P2P when the channel list needs to be updated during
the state change in one of the interfaces.

Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
4 years agoAdd connect fail reason code from the driver to assoc reject event
Vinita S. Maloo [Thu, 15 Oct 2020 14:58:17 +0000 (20:28 +0530)] 
Add connect fail reason code from the driver to assoc reject event

Add support to report a vendor specific connect fail reason code fetched
from the driver to users by adding the reason code to the event
CTRL-EVENT-ASSOC-REJECT. Fetch the connect fail reason code when the
driver sends a failure connection result and append the reason code, if
available, to assoc reject event.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoVendor feature capability to support concurrent sessions on Wi-Fi bands
Sunil Dutt [Wed, 4 Nov 2020 16:09:38 +0000 (21:39 +0530)] 
Vendor feature capability to support concurrent sessions on Wi-Fi bands

Introduces a vendor specific feature capability
QCA_WLAN_VENDOR_FEATURE_CONCURRENT_BAND_SESSIONS to know if the device
supports concurrent network sessions on different Wi-Fi bands. This feature
capability is attributed to the hardware's capability to support the same
(e.g., DBS).

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd extra parameters to vendor command GPIO attribute
Nandha Kishore Easwaran [Wed, 11 Nov 2020 13:08:02 +0000 (18:38 +0530)] 
Add extra parameters to vendor command GPIO attribute

Add extra parameters mux_config, drive, and init_enable
to the GPIO config command.

Signed-off-by: Nandha Kishore Easwaran <nandhaki@codeaurora.org>
4 years agoSync with mac80211-next.git include/uapi/linux/nl80211.h
Jouni Malinen [Mon, 16 Nov 2020 11:14:27 +0000 (13:14 +0200)] 
Sync with mac80211-next.git include/uapi/linux/nl80211.h

This brings in nl80211 definitions as of 2020-11-11.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoSet NLA_F_NESTED flag with NL80211_ATTR_VENDOR_DATA conditionally
Vinita S. Maloo [Tue, 27 Oct 2020 18:03:59 +0000 (23:33 +0530)] 
Set NLA_F_NESTED flag with NL80211_ATTR_VENDOR_DATA conditionally

The newer kernel versions enforce strict netlink attribute policy
validation and will cause cfg80211 to reject vendor commands with
NL80211_ATTR_VENDOR_DATA if NLA_F_NESTED attribute is not set but
if the vendor command is expecting nested data within
NL80211_ATTR_VENDOR_DATA attribute.

Most of the earlier instances were addressed by adding NLA_F_NESTED
flag in nla_nest_start(). This commit addresses the remaining
instance in which NL80211_ATTR_VENDOR_DATA is populated using data
set by user through the control interface.

Enhance the control interface VENDOR command to indicate whether the
vendor subcommand uses nested attributes within NL80211_ATTR_VENDOR_DATA
attribute or not.

Set NLA_F_NESTED flag for existing QCA vendor commands which use nested
attributes within the NL80211_ATTR_VENDOR_DATA attributes so that the
old frameworks implementations for already existing commands work
without any issues.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd test configuration attr to enable/disable full bandwidth UL MU-MIMO
Srinivas Girigowda [Wed, 28 Oct 2020 21:18:01 +0000 (14:18 -0700)] 
Add test configuration attr to enable/disable full bandwidth UL MU-MIMO

Define a QCA vendor attribute
QCA_WLAN_VENDOR_ATTR_WIFI_TEST_CONFIG_FULL_BW_UL_MU_MIMO to
enable/disable full bandwidth UL MU-MIMO subfield in the HE PHY
capabilities information field for testing purposes.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoBSS/scan: More conversions to for_each_element_id()
Jouni Malinen [Wed, 4 Nov 2020 17:50:34 +0000 (19:50 +0200)] 
BSS/scan: More conversions to for_each_element_id()

Use the common IE parsing routine in hope of trying to make the length
checks easier for static analyzers. In addition, try to make the
*_vendor_ie_multi() cases easier to analyze as well even though they
cannot use for_each_element_id().

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agodbus: Check eloop registration failure in add_watch handler
Jouni Malinen [Wed, 4 Nov 2020 17:39:08 +0000 (19:39 +0200)] 
dbus: Check eloop registration failure in add_watch handler

Report failures at lower layer to the upper layer D-Bus handling of
socket registration to allow failures to be addressed more cleanly.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoBSS: Convert wpa_bss_get_vendor_ie() to use for_each_element_id()
Jouni Malinen [Tue, 3 Nov 2020 18:36:15 +0000 (20:36 +0200)] 
BSS: Convert wpa_bss_get_vendor_ie() to use for_each_element_id()

Use the common IE parsing routine in hope of trying to make the length
checks easier for static analyzers.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoMake GTK length validation for RSN Group 1/2 easier to analyze
Jouni Malinen [Tue, 3 Nov 2020 18:23:48 +0000 (20:23 +0200)] 
Make GTK length validation for RSN Group 1/2 easier to analyze

This extends the changes in commit c397eff82894 ("Make GTK length
validation easier to analyze") to cover the RSN case as well as the WPA.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Prepare for control interface message change
Jouni Malinen [Tue, 3 Nov 2020 19:08:52 +0000 (21:08 +0200)] 
tests: Prepare for control interface message change

Update ap_wpa2_psk_supp_proto_too_long_gtk_in_group_msg to accept
upcoming change in the parsing validation step that catches the issue.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoEAP-IKEv2: Try to make transform parser simpler to understand
Jouni Malinen [Tue, 3 Nov 2020 18:11:17 +0000 (20:11 +0200)] 
EAP-IKEv2: Try to make transform parser simpler to understand

Use a local variable to try to make ikev2_parse_proposal() easier for
static analyzers to understand. Bounds checking in the loop is really
done by the ikev2_parse_transform() function, so the p->num_transforms
value itself is of no importance for that part and even that was already
implicitly limited in range.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoHS 2.0: Clarify OSU Friendly Name length validation
Jouni Malinen [Tue, 3 Nov 2020 17:56:39 +0000 (19:56 +0200)] 
HS 2.0: Clarify OSU Friendly Name length validation

This extends the changes in commit 0570a3ea7d87 ("HS 2.0: Clarify OSU
Provider list length validation") to cover the length field for the OSU
Friendly Name value to try to get this easier for static analyzers to
understand.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoTDLS: Fix error path for TPK M1 send failure in testing functionality
Jouni Malinen [Tue, 3 Nov 2020 17:45:36 +0000 (19:45 +0200)] 
TDLS: Fix error path for TPK M1 send failure in testing functionality

The previous fix did not actually address this testing functionality
case correctly. Clear the peer pointer to avoid double freeing.

Fixes: a86078c87613 ("TDLS: Fix error path handling for TPK M1 send failures")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAvoid undefined behavior with memcpy PMK/PSK update
Jouni Malinen [Mon, 2 Nov 2020 16:46:35 +0000 (18:46 +0200)] 
Avoid undefined behavior with memcpy PMK/PSK update

When SAE is used, the local pointer pmk may point to sm->PMK. Skip the
memcpy operation in such a case since it is not really needed and use of
overlapping memory buffers is undefined behavior for memcpy().

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agonl80211: Fix filtering of unsupported bands/modes
Jouni Malinen [Mon, 2 Nov 2020 16:38:41 +0000 (18:38 +0200)] 
nl80211: Fix filtering of unsupported bands/modes

The loop for removing unsupported bands was assuming there is always
exactly one band/mode following the removed band. That was not at all
correct, so fix this by dynamically determining how many (if any) bands
need to be moved.

Fixes: 106d67a93c2d ("nl80211: Filter out unsupported bands")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: TDLS with SAE
Jouni Malinen [Mon, 2 Nov 2020 15:40:18 +0000 (17:40 +0200)] 
tests: TDLS with SAE

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoTDLS: Fix error path handling for TPK M1 send failures
Jouni Malinen [Mon, 2 Nov 2020 15:26:04 +0000 (17:26 +0200)] 
TDLS: Fix error path handling for TPK M1 send failures

Local allocation error or failure to get a random number could have
resulted in the peer entry getting freed and couple of the error path
cases in callers could have tried to reference or delete the peer after
that. Fix this by tracking the errors where the peer is freed.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Fix error path handling in enterprise provisioning
Jouni Malinen [Mon, 2 Nov 2020 14:52:01 +0000 (16:52 +0200)] 
DPP2: Fix error path handling in enterprise provisioning

The allocated memory pointed by the pem pointer was freed on an error
path without clearing the pointer to NULL before returning it from the
function. This could have resulted in use of freed memory in an error
case. Fix this by clearing the pointer so that the function returns NULL
properly in the case of this error.

Fixes: ace3723d9879 ("DPP2: Enterprise provisioning (Enrollee)")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoRemove unused variable update
Jouni Malinen [Mon, 2 Nov 2020 14:36:14 +0000 (16:36 +0200)] 
Remove unused variable update

Commit e8b85c078e73 ("iface match: Unspecified matched interfaces should
not log driver fails") removed the only use of the added interface wpa_s
pointer, but left that pointer setting in place. Remove it to keep
static analyzers happy.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Fix ppkey parsing
Jouni Malinen [Mon, 2 Nov 2020 14:31:02 +0000 (16:31 +0200)] 
DPP2: Fix ppkey parsing

DPP_CONFIGURATOR_ADD processing of the new ppkey parameter had a
copy-paste error in determining the correct length of this parameter.
Fix that by referencing the correct pointer.

Fixes: 9c1fbff07404 ("DPP2: Generate a privacy protection key for Configurator")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years ago6 GHz: Add support for missing 6 GHz operating classes
Veerendranath Jakkam [Wed, 16 Sep 2020 08:21:47 +0000 (13:51 +0530)] 
6 GHz: Add support for missing 6 GHz operating classes

Add support for missing 6 GHz operating classes as defined in
IEEE P802.11ax/D7.0.

This is needed to avoid OCV failures on the 6 GHz band when the channel
width is larger than 20 MHz.

Signed-off-by: Veerendranath Jakkam <vjakkam@codeaurora.org>
4 years ago6 GHz: Fix opclasses mapping in ieee80211_freq_to_channel_ext()
Veerendranath Jakkam [Wed, 16 Sep 2020 08:28:22 +0000 (13:58 +0530)] 
6 GHz: Fix opclasses mapping in ieee80211_freq_to_channel_ext()

Previously only primary channel number used to calculate 6GHz operating
class in ieee80211_freq_to_channel_ext() and it is always giving 131
operating class. Fix this by mapping operating class using chanwidth and
sec_channel also.

This is needed to avoid OCV failures on the 6 GHz band when the channel
width is larger than 20 MHz.

Signed-off-by: Veerendranath Jakkam <vjakkam@codeaurora.org>
4 years agoEAP-SIM peer: Send AT_IDENTITY first
Hai Shalom [Fri, 16 Oct 2020 19:47:28 +0000 (12:47 -0700)] 
EAP-SIM peer: Send AT_IDENTITY first

For EAP-SIM connections, reorder the order of the attributes in
EAP-Response/SIM/Start message: Send AT_IDENTITY first, then
AT_NONCE and AT_VERSION instead of AT_IDENTITY last. Even though there
is no order requirements in the RFC, some implementations expect the
order of the attributes to be exactly as described in the RFC figures.

Peer                                      Authenticator
|                                                 |
|                      +------------------------------+
|                      | Server does not have a       |
|                      | Subscriber identity available|
|                      | When starting EAP-SIM        |
|                      +------------------------------+
|                                                 |
|          EAP-Request/SIM/Start                  |
|          (AT_ANY_ID_REQ, AT_VERSION_LIST)       |
|<------------------------------------------------|
|                                                 |
|                                                 |
| EAP-Response/SIM/Start                          |
| (AT_IDENTITY, AT_NONCE_MT,                      |
|  AT_SELECTED_VERSION)                           |
|------------------------------------------------>|
|                                                 |

Signed-off-by: Hai Shalom <haishalom@google.com>
4 years agonl80211: Check for proper nlmsg allocation in send_and_recv_msgs_owner()
Pooventhiran G [Tue, 27 Oct 2020 06:24:21 +0000 (11:54 +0530)] 
nl80211: Check for proper nlmsg allocation in send_and_recv_msgs_owner()

When nlmsg allocation fails, nl80211_drv_msg() returns NULL and the call
to send_and_recv_msgs_owner() from nl80211_leave_ibss() could have ended
up dereferencing a NULL pointer. Fix this by make
send_and_recv_msgs_owner() more consistent with other send_and_recv*()
cases that check msg == NULL internally.

Fixes: 12ea7dee311b ("nl80211: Use nl80211 control port for receiving EAPOL frames")
Signed-off-by: Pooventhiran G <pooventh@codeaurora.org>
4 years agoDPP2: Explicitly check EC_KEY before dereferencing it
Disha Das [Tue, 27 Oct 2020 07:39:31 +0000 (13:09 +0530)] 
DPP2: Explicitly check EC_KEY before dereferencing it

In theory, the EVP_PKEY_get0_EC_KEY() could fail, so verify that it
succeeds before using the pointer to get the group.

Fixes: 65e94351dc4a ("DPP2: Reconfig Authentication Request processing and Response generation")
Signed-off-by: Disha Das <dishad@codeaurora.org>
4 years agoP2P: Consider BSS entry pending for P2P joining as a known BSS
Sreeramya Soratkal [Mon, 12 Oct 2020 10:42:14 +0000 (16:12 +0530)] 
P2P: Consider BSS entry pending for P2P joining as a known BSS

Consider the BSS entry that is pending for the P2P group join operation
also as a known network along with the existing configured networks.
This prevents removal of the BSS entry that is still in the process of
P2P join operation from the BSS table when the number of entries exceed
bss_max_count.

Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
4 years agonl80211: Filter out unsupported bands
Jouni Malinen [Mon, 26 Oct 2020 20:34:07 +0000 (22:34 +0200)] 
nl80211: Filter out unsupported bands

If the driver indicates capability for a band that
hostapd/wpa_supplicant does not support, the struct hostapd_hw_modes
array of bands got an empty entry for that with NUM_HOSTAPD_MODES as the
mode. This resulted in various issues, e.g., with fst_hw_mode_to_band()
hitting a WPA_ASSERT(0).

Fix this by filtering out unsupported bands from the internal data
structures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoP2P: Include p2p_add_cli_chan parameter while cloning the configuration
Sreeramya Soratkal [Thu, 24 Sep 2020 10:38:27 +0000 (16:08 +0530)] 
P2P: Include p2p_add_cli_chan parameter while cloning the configuration

The dynamically created P2P group interface did not consider the
channels that can be used by the P2P client during the P2P group
formation. Copy the p2p_add_cli_chan parameter while cloning the
configuration to the P2P group interface. This allows the dynamically
created group interface case to form the group in the specific
client-only channels when the device is a P2P client in the group.

Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
4 years agoVendor specific feature capability for Adaptive 11r
Sunil Dutt [Thu, 15 Oct 2020 13:38:45 +0000 (19:08 +0530)] 
Vendor specific feature capability for Adaptive 11r

Add feature capability indication for Adaptive 11r for the drivers
to advertize support for this.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd additional vendor specific hang reason codes
Arun Kumar Khandavalli [Thu, 22 Oct 2020 15:54:41 +0000 (21:24 +0530)] 
Add additional vendor specific hang reason codes

Add additional hang reason codes in enum qca_wlan_vendor_hang_reason to
address potential internal failure cases.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Update dpp_controller_rx_errors to use the assigned TCP port
Jouni Malinen [Tue, 20 Oct 2020 21:31:01 +0000 (00:31 +0300)] 
tests: Update dpp_controller_rx_errors to use the assigned TCP port

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Update the default port number for DPP-over-TCP
Jouni Malinen [Tue, 20 Oct 2020 21:29:38 +0000 (00:29 +0300)] 
DPP2: Update the default port number for DPP-over-TCP

IANA assigned the TCP port 8908 for DPP, so update the implementation to
match the formal assignment.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoFix couple more typos
Jouni Malinen [Mon, 19 Oct 2020 21:19:44 +0000 (00:19 +0300)] 
Fix couple more typos

Couple of similar cases that were not included in the previous commit.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agowpa_supplicant: Fix typos
Yegor Yefremov [Sun, 18 Oct 2020 17:28:23 +0000 (19:28 +0200)] 
wpa_supplicant: Fix typos

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
4 years agotests: SAE status code handling
Jouni Malinen [Mon, 19 Oct 2020 20:57:11 +0000 (23:57 +0300)] 
tests: SAE status code handling

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoSAE-PK: Do not accept SAE-PK status code when no PK is configured
Jouni Malinen [Mon, 19 Oct 2020 20:35:00 +0000 (23:35 +0300)] 
SAE-PK: Do not accept SAE-PK status code when no PK is configured

Make sae_status_success() more explicit by rejecting SAE-PK status code
when the AP is not configured with PK.

Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoSAE: Don't use potentially uninitialized keys
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:30 +0000 (11:06 +0300)] 
SAE: Don't use potentially uninitialized keys

If SAE_CONFIG_PK is not defined and sae->pk isn't zero (which is
possible as it is controlled by the commit message status code),
sae_derive_keys() may end up deriving PMK and KCK from an
uninitialized array. Fix that.

Fixes: 6b9e99e571ee ("SAE-PK: Extend SAE functionality for AP validation")
Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agowpa_supplicant: Remove unfeasible conditions in config parsing
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:29 +0000 (11:06 +0300)] 
wpa_supplicant: Remove unfeasible conditions in config parsing

pos can't be NULL in wpa_global_config_parse_str(), so there is no point
checking this, especially when pos was already dereferenced earlier.
Remove the redundant conditions.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agowpa_cli: Don't access uninitialized variables
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:28 +0000 (11:06 +0300)] 
wpa_cli: Don't access uninitialized variables

Don't print potentially uninitialized variables in wpa_ctrl_command_bss().
Some compilers and analyzers may warn about it.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agoOpenSSL: Make openssl_debug_dump_certificate() more robust
Pooventhiran G [Sun, 18 Oct 2020 15:30:09 +0000 (21:00 +0530)] 
OpenSSL: Make openssl_debug_dump_certificate() more robust

SSL_CTX_get0_certificate() returns NULL if no certificate is installed.
While this should not be the case here due to the loop in
openssl_debug_dump_certificate_chains() proceeding only if the
SSL_CTX_set_current_cert() returns success, it is safer to make
openssl_debug_dump_certificate() explicitly check against NULL before
trying to dump details about the certificate.

Signed-off-by: Pooventhiran G <pooventh@codeaurora.org>
4 years agobuild: lib.rules: Add common-clean
Johannes Berg [Thu, 15 Oct 2020 09:42:21 +0000 (11:42 +0200)] 
build: lib.rules: Add common-clean

During the build reshuffling, I missed this, so doing
'make clean' in a certain src/lib folder doesn't clean
up everything anymore. Fix that.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agowpa_supplicant: Fix frequency config for VHT/HE cases
Markus Theil [Wed, 14 Oct 2020 19:31:15 +0000 (21:31 +0200)] 
wpa_supplicant: Fix frequency config for VHT/HE cases

Fix compilation without CONFIG_P2P and only set secondary channel seg
idx if we use a mode supporting a sec channel for VHT/HE.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoFix spelling of "unexpected" in messages
Jouni Malinen [Fri, 16 Oct 2020 09:42:23 +0000 (12:42 +0300)] 
Fix spelling of "unexpected" in messages

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agohostapd: Fix typos
Yegor Yefremov [Thu, 15 Oct 2020 20:00:40 +0000 (22:00 +0200)] 
hostapd: Fix typos

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
4 years agoeap_peer: Add .gitignore with *.so
Johannes Berg [Fri, 16 Oct 2020 07:21:25 +0000 (09:21 +0200)] 
eap_peer: Add .gitignore with *.so

If wpa_supplicant is built with dynamic EAP methods,
the *.so files land here. Add them to .gitignore.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agoP2P: Stop old listen radio work before go to WAIT_PEER_IDLE state
Hu Wang [Wed, 29 Jul 2020 03:15:35 +0000 (11:15 +0800)] 
P2P: Stop old listen radio work before go to WAIT_PEER_IDLE state

P2P goes to Listen state while waiting for the peer to become ready for
GO Negotiation. If old listen radio work has not been completed, P2P
fails to go to listen state. This could happen in cases where P2P Action
frame transmission reused ongoing p2p-listen radio work.

p2p0: Add radio work 'p2p-listen'@0x
P2P-FIND-STOPPED
p2p0: Starting radio work 'p2p-listen'@0x after 0.010644 second wait
P2P: Use ongoing radio work for Action frame TX
P2P: Use ongoing radio work for Action frame TX
P2P: State CONNECT -> CONNECT
P2P: State CONNECT -> WAIT_PEER_IDLE
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Reject start_listen since p2p_listen_work already exists
P2P: Failed to start listen mode

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoMSCS: Fix decapsulating subelements from MSCS descriptor
Vamsi Krishna [Tue, 13 Oct 2020 15:51:13 +0000 (21:21 +0530)] 
MSCS: Fix decapsulating subelements from MSCS descriptor

Fix pointer sent for decapsulating subelements from MSCS descriptor
IE while processing (re)association response frames.

Fixes: af8ab3208d03 ("MSCS: Parse result of MSCS setup in (Re)Association Response frames")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd QCA interface for driver to report various connect fail reason codes
Vamsi Krishna [Thu, 8 Oct 2020 12:17:19 +0000 (17:47 +0530)] 
Add QCA interface for driver to report various connect fail reason codes

The connection process fails for several reasons and the status codes
defined in IEEE Std 802.11 do not cover the locally generated reason
codes. Add an attribute to QCA_NL80211_VENDOR_SUBCMD_GET_STA_INFO vendor
sub command which can be used by the driver/firmware to report various
additional reason codes for connection failures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agobuild: Fix libeap_peer.a build
Jouni Malinen [Wed, 14 Oct 2020 19:57:04 +0000 (22:57 +0300)] 
build: Fix libeap_peer.a build

The install target at the beginning of src/eap_peer/Makefile was
confusing make about the build rules for libeap_peer.a and overriding of
the install target between src/eap_peer/Makefile and src/lib.rules was
breaking installation of dynamic EAP peer *.so files.

Fix this by lib.rules defining a default for the install target so that
src/*/Makefile can override that and by moving the install target for
eap_peer to the end of the Makefile.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDFS: Use helper functions for VHT/HE parameters
Markus Theil [Tue, 30 Jun 2020 11:53:23 +0000 (13:53 +0200)] 
DFS: Use helper functions for VHT/HE parameters

This is needed to cover the HE-specific conf->he_oper_chwidth value in
addition to conf->vht_oper_chwidth.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agohw_features: Better debug messages for some error cases
Markus Theil [Tue, 30 Jun 2020 11:53:22 +0000 (13:53 +0200)] 
hw_features: Better debug messages for some error cases

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agowpa_supplicant: Enable VHT and HE in default config parameters
Markus Theil [Tue, 30 Jun 2020 11:53:21 +0000 (13:53 +0200)] 
wpa_supplicant: Enable VHT and HE in default config parameters

Enable VHT and HE as default config parameters in order for
wpa_supplicant AP mode to use it, if hw support is given.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agowpa_supplicant: Handle HT40 and mode downgrade in AP mode
Markus Theil [Tue, 30 Jun 2020 11:53:19 +0000 (13:53 +0200)] 
wpa_supplicant: Handle HT40 and mode downgrade in AP mode

Add some missing pieces to the interface configuration of AP/mesh mode
in wpa_supplicant.
 - check for secondary channel and HT40 capability
 - try to downgrade to IEEE 802.11b if 802.11g is not available
Especially with the HT40 check, this code now performs all settings,
which the deleted/duplicated mesh code did.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Fix channel init order, disable pri/sec channel switch
Markus Theil [Tue, 30 Jun 2020 11:53:18 +0000 (13:53 +0200)] 
mesh: Fix channel init order, disable pri/sec channel switch

wpa_supplicant_conf_ap_ht() has to happen before
hostapd_setup_interface() in order for its configuration settings to
have effect on interface configuration.

Disable primary and secondary channel switch because of missing tie
breaking rule/frames in mesh networks. A rather long comment about
this issue is placed in mesh.c in the corresponding place.

I was not able to reproduce the memory corruption during
mesh_secure_ocv_mix_legacy, which lead to a revert of a similar patch in
the past.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agotests: Remove wpas_mesh_open_5ghz_coex
Markus Theil [Tue, 30 Jun 2020 11:53:18 +0000 (13:53 +0200)] 
tests: Remove wpas_mesh_open_5ghz_coex

This is in preparation for an implementation change that ends up
contradicting the operations enforced in this test case for mesh coex.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoHE/VHT: Fix frequency setup with HE enabled
Markus Theil [Tue, 30 Jun 2020 11:53:17 +0000 (13:53 +0200)] 
HE/VHT: Fix frequency setup with HE enabled

Some places in the code base were not using the wrappers like
hostapd_set_oper_centr_freq_seg0_idx and friends. This could lead to
errors, for example when joining 80 MHz mesh networks. Fix this, by
enforcing usage of these wrappers.

wpa_supplicant_conf_ap_ht() now checks for HE capability before dealing
with VHT in order for these wrappers to work, as they first check HE
support in the config.

While doing these changes, I've noticed that the extra channel setup
code for mesh networks in wpa_supplicant/mesh.c should not be necessary
anymore and dropped it. wpa_supplicant_conf_ap_ht() should handle this
setup already.

Acked-by: John Crispin <john@phrozen.org>
Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoDPP2: Add privacyProtectionKey into Configurator backup/restore
Jouni Malinen [Tue, 13 Oct 2020 20:11:40 +0000 (23:11 +0300)] 
DPP2: Add privacyProtectionKey into Configurator backup/restore

This allows the privacyProtectionKey to be transferred to a new
Configurator similarly to the way c-sign-key is transferred.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Use ppKey to decrypt E'-id on Configurator
Jouni Malinen [Tue, 13 Oct 2020 17:57:26 +0000 (20:57 +0300)] 
DPP2: Use ppKey to decrypt E'-id on Configurator

Use the new privacy protection key to decrypt E'-id from Reconfig
Announcement frames.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>