]> git.ipfire.org Git - thirdparty/hostap.git/log
thirdparty/hostap.git
4 years agonl80211: Filter out unsupported bands
Jouni Malinen [Mon, 26 Oct 2020 20:34:07 +0000 (22:34 +0200)] 
nl80211: Filter out unsupported bands

If the driver indicates capability for a band that
hostapd/wpa_supplicant does not support, the struct hostapd_hw_modes
array of bands got an empty entry for that with NUM_HOSTAPD_MODES as the
mode. This resulted in various issues, e.g., with fst_hw_mode_to_band()
hitting a WPA_ASSERT(0).

Fix this by filtering out unsupported bands from the internal data
structures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoP2P: Include p2p_add_cli_chan parameter while cloning the configuration
Sreeramya Soratkal [Thu, 24 Sep 2020 10:38:27 +0000 (16:08 +0530)] 
P2P: Include p2p_add_cli_chan parameter while cloning the configuration

The dynamically created P2P group interface did not consider the
channels that can be used by the P2P client during the P2P group
formation. Copy the p2p_add_cli_chan parameter while cloning the
configuration to the P2P group interface. This allows the dynamically
created group interface case to form the group in the specific
client-only channels when the device is a P2P client in the group.

Signed-off-by: Sreeramya Soratkal <ssramya@codeaurora.org>
4 years agoVendor specific feature capability for Adaptive 11r
Sunil Dutt [Thu, 15 Oct 2020 13:38:45 +0000 (19:08 +0530)] 
Vendor specific feature capability for Adaptive 11r

Add feature capability indication for Adaptive 11r for the drivers
to advertize support for this.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd additional vendor specific hang reason codes
Arun Kumar Khandavalli [Thu, 22 Oct 2020 15:54:41 +0000 (21:24 +0530)] 
Add additional vendor specific hang reason codes

Add additional hang reason codes in enum qca_wlan_vendor_hang_reason to
address potential internal failure cases.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Update dpp_controller_rx_errors to use the assigned TCP port
Jouni Malinen [Tue, 20 Oct 2020 21:31:01 +0000 (00:31 +0300)] 
tests: Update dpp_controller_rx_errors to use the assigned TCP port

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Update the default port number for DPP-over-TCP
Jouni Malinen [Tue, 20 Oct 2020 21:29:38 +0000 (00:29 +0300)] 
DPP2: Update the default port number for DPP-over-TCP

IANA assigned the TCP port 8908 for DPP, so update the implementation to
match the formal assignment.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoFix couple more typos
Jouni Malinen [Mon, 19 Oct 2020 21:19:44 +0000 (00:19 +0300)] 
Fix couple more typos

Couple of similar cases that were not included in the previous commit.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agowpa_supplicant: Fix typos
Yegor Yefremov [Sun, 18 Oct 2020 17:28:23 +0000 (19:28 +0200)] 
wpa_supplicant: Fix typos

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
4 years agotests: SAE status code handling
Jouni Malinen [Mon, 19 Oct 2020 20:57:11 +0000 (23:57 +0300)] 
tests: SAE status code handling

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoSAE-PK: Do not accept SAE-PK status code when no PK is configured
Jouni Malinen [Mon, 19 Oct 2020 20:35:00 +0000 (23:35 +0300)] 
SAE-PK: Do not accept SAE-PK status code when no PK is configured

Make sae_status_success() more explicit by rejecting SAE-PK status code
when the AP is not configured with PK.

Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoSAE: Don't use potentially uninitialized keys
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:30 +0000 (11:06 +0300)] 
SAE: Don't use potentially uninitialized keys

If SAE_CONFIG_PK is not defined and sae->pk isn't zero (which is
possible as it is controlled by the commit message status code),
sae_derive_keys() may end up deriving PMK and KCK from an
uninitialized array. Fix that.

Fixes: 6b9e99e571ee ("SAE-PK: Extend SAE functionality for AP validation")
Fixes: 20ccf97b3dc1 ("SAE-PK: AP functionality")
Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agowpa_supplicant: Remove unfeasible conditions in config parsing
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:29 +0000 (11:06 +0300)] 
wpa_supplicant: Remove unfeasible conditions in config parsing

pos can't be NULL in wpa_global_config_parse_str(), so there is no point
checking this, especially when pos was already dereferenced earlier.
Remove the redundant conditions.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agowpa_cli: Don't access uninitialized variables
Andrei Otcheretianski [Mon, 19 Oct 2020 08:06:28 +0000 (11:06 +0300)] 
wpa_cli: Don't access uninitialized variables

Don't print potentially uninitialized variables in wpa_ctrl_command_bss().
Some compilers and analyzers may warn about it.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
4 years agoOpenSSL: Make openssl_debug_dump_certificate() more robust
Pooventhiran G [Sun, 18 Oct 2020 15:30:09 +0000 (21:00 +0530)] 
OpenSSL: Make openssl_debug_dump_certificate() more robust

SSL_CTX_get0_certificate() returns NULL if no certificate is installed.
While this should not be the case here due to the loop in
openssl_debug_dump_certificate_chains() proceeding only if the
SSL_CTX_set_current_cert() returns success, it is safer to make
openssl_debug_dump_certificate() explicitly check against NULL before
trying to dump details about the certificate.

Signed-off-by: Pooventhiran G <pooventh@codeaurora.org>
4 years agobuild: lib.rules: Add common-clean
Johannes Berg [Thu, 15 Oct 2020 09:42:21 +0000 (11:42 +0200)] 
build: lib.rules: Add common-clean

During the build reshuffling, I missed this, so doing
'make clean' in a certain src/lib folder doesn't clean
up everything anymore. Fix that.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agowpa_supplicant: Fix frequency config for VHT/HE cases
Markus Theil [Wed, 14 Oct 2020 19:31:15 +0000 (21:31 +0200)] 
wpa_supplicant: Fix frequency config for VHT/HE cases

Fix compilation without CONFIG_P2P and only set secondary channel seg
idx if we use a mode supporting a sec channel for VHT/HE.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoFix spelling of "unexpected" in messages
Jouni Malinen [Fri, 16 Oct 2020 09:42:23 +0000 (12:42 +0300)] 
Fix spelling of "unexpected" in messages

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agohostapd: Fix typos
Yegor Yefremov [Thu, 15 Oct 2020 20:00:40 +0000 (22:00 +0200)] 
hostapd: Fix typos

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
4 years agoeap_peer: Add .gitignore with *.so
Johannes Berg [Fri, 16 Oct 2020 07:21:25 +0000 (09:21 +0200)] 
eap_peer: Add .gitignore with *.so

If wpa_supplicant is built with dynamic EAP methods,
the *.so files land here. Add them to .gitignore.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agoP2P: Stop old listen radio work before go to WAIT_PEER_IDLE state
Hu Wang [Wed, 29 Jul 2020 03:15:35 +0000 (11:15 +0800)] 
P2P: Stop old listen radio work before go to WAIT_PEER_IDLE state

P2P goes to Listen state while waiting for the peer to become ready for
GO Negotiation. If old listen radio work has not been completed, P2P
fails to go to listen state. This could happen in cases where P2P Action
frame transmission reused ongoing p2p-listen radio work.

p2p0: Add radio work 'p2p-listen'@0x
P2P-FIND-STOPPED
p2p0: Starting radio work 'p2p-listen'@0x after 0.010644 second wait
P2P: Use ongoing radio work for Action frame TX
P2P: Use ongoing radio work for Action frame TX
P2P: State CONNECT -> CONNECT
P2P: State CONNECT -> WAIT_PEER_IDLE
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Reject start_listen since p2p_listen_work already exists
P2P: Failed to start listen mode

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoMSCS: Fix decapsulating subelements from MSCS descriptor
Vamsi Krishna [Tue, 13 Oct 2020 15:51:13 +0000 (21:21 +0530)] 
MSCS: Fix decapsulating subelements from MSCS descriptor

Fix pointer sent for decapsulating subelements from MSCS descriptor
IE while processing (re)association response frames.

Fixes: af8ab3208d03 ("MSCS: Parse result of MSCS setup in (Re)Association Response frames")
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoAdd QCA interface for driver to report various connect fail reason codes
Vamsi Krishna [Thu, 8 Oct 2020 12:17:19 +0000 (17:47 +0530)] 
Add QCA interface for driver to report various connect fail reason codes

The connection process fails for several reasons and the status codes
defined in IEEE Std 802.11 do not cover the locally generated reason
codes. Add an attribute to QCA_NL80211_VENDOR_SUBCMD_GET_STA_INFO vendor
sub command which can be used by the driver/firmware to report various
additional reason codes for connection failures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agobuild: Fix libeap_peer.a build
Jouni Malinen [Wed, 14 Oct 2020 19:57:04 +0000 (22:57 +0300)] 
build: Fix libeap_peer.a build

The install target at the beginning of src/eap_peer/Makefile was
confusing make about the build rules for libeap_peer.a and overriding of
the install target between src/eap_peer/Makefile and src/lib.rules was
breaking installation of dynamic EAP peer *.so files.

Fix this by lib.rules defining a default for the install target so that
src/*/Makefile can override that and by moving the install target for
eap_peer to the end of the Makefile.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDFS: Use helper functions for VHT/HE parameters
Markus Theil [Tue, 30 Jun 2020 11:53:23 +0000 (13:53 +0200)] 
DFS: Use helper functions for VHT/HE parameters

This is needed to cover the HE-specific conf->he_oper_chwidth value in
addition to conf->vht_oper_chwidth.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agohw_features: Better debug messages for some error cases
Markus Theil [Tue, 30 Jun 2020 11:53:22 +0000 (13:53 +0200)] 
hw_features: Better debug messages for some error cases

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agowpa_supplicant: Enable VHT and HE in default config parameters
Markus Theil [Tue, 30 Jun 2020 11:53:21 +0000 (13:53 +0200)] 
wpa_supplicant: Enable VHT and HE in default config parameters

Enable VHT and HE as default config parameters in order for
wpa_supplicant AP mode to use it, if hw support is given.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agowpa_supplicant: Handle HT40 and mode downgrade in AP mode
Markus Theil [Tue, 30 Jun 2020 11:53:19 +0000 (13:53 +0200)] 
wpa_supplicant: Handle HT40 and mode downgrade in AP mode

Add some missing pieces to the interface configuration of AP/mesh mode
in wpa_supplicant.
 - check for secondary channel and HT40 capability
 - try to downgrade to IEEE 802.11b if 802.11g is not available
Especially with the HT40 check, this code now performs all settings,
which the deleted/duplicated mesh code did.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agomesh: Fix channel init order, disable pri/sec channel switch
Markus Theil [Tue, 30 Jun 2020 11:53:18 +0000 (13:53 +0200)] 
mesh: Fix channel init order, disable pri/sec channel switch

wpa_supplicant_conf_ap_ht() has to happen before
hostapd_setup_interface() in order for its configuration settings to
have effect on interface configuration.

Disable primary and secondary channel switch because of missing tie
breaking rule/frames in mesh networks. A rather long comment about
this issue is placed in mesh.c in the corresponding place.

I was not able to reproduce the memory corruption during
mesh_secure_ocv_mix_legacy, which lead to a revert of a similar patch in
the past.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agotests: Remove wpas_mesh_open_5ghz_coex
Markus Theil [Tue, 30 Jun 2020 11:53:18 +0000 (13:53 +0200)] 
tests: Remove wpas_mesh_open_5ghz_coex

This is in preparation for an implementation change that ends up
contradicting the operations enforced in this test case for mesh coex.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoHE/VHT: Fix frequency setup with HE enabled
Markus Theil [Tue, 30 Jun 2020 11:53:17 +0000 (13:53 +0200)] 
HE/VHT: Fix frequency setup with HE enabled

Some places in the code base were not using the wrappers like
hostapd_set_oper_centr_freq_seg0_idx and friends. This could lead to
errors, for example when joining 80 MHz mesh networks. Fix this, by
enforcing usage of these wrappers.

wpa_supplicant_conf_ap_ht() now checks for HE capability before dealing
with VHT in order for these wrappers to work, as they first check HE
support in the config.

While doing these changes, I've noticed that the extra channel setup
code for mesh networks in wpa_supplicant/mesh.c should not be necessary
anymore and dropped it. wpa_supplicant_conf_ap_ht() should handle this
setup already.

Acked-by: John Crispin <john@phrozen.org>
Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agoDPP2: Add privacyProtectionKey into Configurator backup/restore
Jouni Malinen [Tue, 13 Oct 2020 20:11:40 +0000 (23:11 +0300)] 
DPP2: Add privacyProtectionKey into Configurator backup/restore

This allows the privacyProtectionKey to be transferred to a new
Configurator similarly to the way c-sign-key is transferred.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Use ppKey to decrypt E'-id on Configurator
Jouni Malinen [Tue, 13 Oct 2020 17:57:26 +0000 (20:57 +0300)] 
DPP2: Use ppKey to decrypt E'-id on Configurator

Use the new privacy protection key to decrypt E'-id from Reconfig
Announcement frames.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Use the new privacy protection key to protect E-id on Enrollee
Jouni Malinen [Tue, 13 Oct 2020 17:53:09 +0000 (20:53 +0300)] 
DPP2: Use the new privacy protection key to protect E-id on Enrollee

Use ppKey instead of C-sign-key to encrypted E-id to E'-id into Reconfig
Announcement frame on the Enrollee side.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Copy received ppKey into wpa_supplicant network profile
Jouni Malinen [Tue, 13 Oct 2020 17:29:27 +0000 (20:29 +0300)] 
DPP2: Copy received ppKey into wpa_supplicant network profile

Store the received privacy protection key from Connector into
wpa_supplicant network profile and indicate it through the control
interface similarly to C-sign-key.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Parse ppKey from Connector
Jouni Malinen [Tue, 13 Oct 2020 17:24:56 +0000 (20:24 +0300)] 
DPP2: Parse ppKey from Connector

This will be used to protect E-id in Reconfig Announcement frames.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Add ppKey into Connector
Jouni Malinen [Tue, 13 Oct 2020 17:16:58 +0000 (20:16 +0300)] 
DPP2: Add ppKey into Connector

This provides the new privacy protection key to the Enrollee so that
this can be used to protect E-id in Reconfig Announcement frames.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP2: Generate a privacy protection key for Configurator
Jouni Malinen [Tue, 13 Oct 2020 16:59:29 +0000 (19:59 +0300)] 
DPP2: Generate a privacy protection key for Configurator

Generate a new key for Configurator. This is either generated
automatically for the specified curve or provided from external source
with the new ppkey=<val> argument similarly to the way c-sign-key was
previously generated.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agoDPP: Make dpp_keygen_configurator() a static function
Jouni Malinen [Tue, 13 Oct 2020 16:48:29 +0000 (19:48 +0300)] 
DPP: Make dpp_keygen_configurator() a static function

This was not used anywhere outside dpp.c.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Silence compiler warnings from test-base64
Jouni Malinen [Mon, 12 Oct 2020 18:40:08 +0000 (21:40 +0300)] 
tests: Silence compiler warnings from test-base64

Use typecasting to match the base64_{encode,decode}() function prototype
for signed/unsigned char buffer.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Build test-https and test-https_server as part of ALL
Jouni Malinen [Mon, 12 Oct 2020 18:37:25 +0000 (21:37 +0300)] 
tests: Build test-https and test-https_server as part of ALL

Even though these are not part of run-tests, it is simpler to just build
them like all other tests/test-* tools.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove unnecessary libraries from tests/test-*.c build
Jouni Malinen [Mon, 12 Oct 2020 18:35:26 +0000 (21:35 +0300)] 
tests: Remove unnecessary libraries from tests/test-*.c build

These libraries are not needed anymore with the remaining tests/test-*.c
tools.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete ASN.1 parser/fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:23:02 +0000 (21:23 +0300)] 
tests: Remove obsolete ASN.1 parser/fuzzer

tests/fuzzing/asn1 replaced this more than a year ago, so get rid of the
now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete TLS fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:20:12 +0000 (21:20 +0300)] 
tests: Remove obsolete TLS fuzzer

tests/fuzzing/tls-{client,server} replaced this more than a year ago, so
get rid of the now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete EAPOL-Key fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:17:45 +0000 (21:17 +0300)] 
tests: Remove obsolete EAPOL-Key fuzzer

tests/fuzzing/eapol-key-{auth,supp} replaced this more than a year ago,
so get rid of the now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete json fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:13:08 +0000 (21:13 +0300)] 
tests: Remove obsolete json fuzzer

tests/fuzzing/json replaced this more than a year ago, so get rid
of the now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete ap-mgmt-fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:10:01 +0000 (21:10 +0300)] 
tests: Remove obsolete ap-mgmt-fuzzer

tests/fuzzing/ap-mgmt replaced this more than a year ago, so get rid
of the now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete eapol-fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:06:58 +0000 (21:06 +0300)] 
tests: Remove obsolete eapol-fuzzer

tests/fuzzing/eapol-supp replaced this more than a year ago, so get rid
of the now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete wnm-fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:04:46 +0000 (21:04 +0300)] 
tests: Remove obsolete wnm-fuzzer

tests/fuzzing/wnm replaced this more than a year ago, so get rid of the
now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agotests: Remove obsolete p2p-fuzzer
Jouni Malinen [Mon, 12 Oct 2020 18:00:52 +0000 (21:00 +0300)] 
tests: Remove obsolete p2p-fuzzer

tests/fuzzing/p2p replaced this more than a year ago, so get rid of the
now obsolete version.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
4 years agobuild: Make more library things common
Johannes Berg [Mon, 12 Oct 2020 10:14:05 +0000 (12:14 +0200)] 
build: Make more library things common

We don't really need to duplicate more of this, so just
move the lib.rules include to the end and do more of the
stuff that's common anyway there.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agobuild: Make a common library build
Johannes Berg [Mon, 12 Oct 2020 10:14:04 +0000 (12:14 +0200)] 
build: Make a common library build

Derive the library name from the directory name, and let each
library Makefile only declare the objects that are needed.

This reduces duplicate code for the ar call. While at it, also
pretty-print that call.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agobuild: Rebuild libs all the time
Johannes Berg [Mon, 12 Oct 2020 09:30:53 +0000 (11:30 +0200)] 
build: Rebuild libs all the time

When files change that go into a static library such as libutils.a, then
libutils.a doesn't get rebuilt from, e.g., wlantest because the
top-level Makefile just calls the library make if the library doesn't
exist yet.

Change that by making the library depend on a phony target (cannot make
it itself phony due to the pattern) so that the build will always
recurse into the library build, and check there if the library needs to
be rebuilt.

While at it, remove the (actually unnecessary) mkdir so it doesn't get
done each and every time you do 'make'.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agomesh: Stop SAE auth timer when mesh node is removed
Udhayakumar Mahendiran [Mon, 12 Oct 2020 11:15:29 +0000 (16:45 +0530)] 
mesh: Stop SAE auth timer when mesh node is removed

Not doing this could cause wpa_supplicant to crash.

Signed-off-by: Udhayakumar Mahendiran <udhayakumar@qubercomm.com>
4 years agotests: Fix mesh_open_vht_160 false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:07 +0000 (08:23 +0900)] 
tests: Fix mesh_open_vht_160 false negative by using common finalizer

mesh_open_vht_160 might fail with this message:

---------------
wlan0: Country code not reset back to 00: is ZA
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix wpas_mesh_open_vht_80p80 false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:06 +0000 (08:23 +0900)] 
tests: Fix wpas_mesh_open_vht_80p80 false negative by using common finalizer

wpas_mesh_open_vht_80p80 might fail with this message:

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix wpas_mesh_open_vht20 false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:05 +0000 (08:23 +0900)] 
tests: Fix wpas_mesh_open_vht20 false negative by using common finalizer

wpas_mesh_open_vht20 might fails with this message:

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix wpas_mesh_open_vht40 false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:04 +0000 (08:23 +0900)] 
tests: Fix wpas_mesh_open_vht40 false negative by using common finalizer

wpas_mesh_open_vht40 might fail with this message:

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix wpas_mesh_open_ht40 false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:03 +0000 (08:23 +0900)] 
tests: Fix wpas_mesh_open_ht40 false negative by using common finalizer

wpas_mesh_open_ht40 might fail with this message:

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix wpas_mesh_open_5ghz false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:02 +0000 (08:23 +0900)] 
tests: Fix wpas_mesh_open_5ghz false negative by using common finalizer

wpas_mesh_open_5ghz might fail with this message:

---------------
wlan0: Country code not reset back to 00: is US
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agotests: Fix mesh_secure_ocv_mix_legacy false negative by using common finalizer
Masashi Honma [Sun, 28 Jun 2020 23:23:01 +0000 (08:23 +0900)] 
tests: Fix mesh_secure_ocv_mix_legacy false negative by using common finalizer

mesh_secure_ocv_mix_legacy might fail with this message:

---------------
wlan0: Country code not reset back to 00: is AZ
wlan0: Country code cleared back to 00
---------------

This patch fixes the issue.

Signed-off-by: Masashi Honma <masashi.honma@gmail.com>
4 years agobuild: Fix dependency file inclusion
Johannes Berg [Sun, 11 Oct 2020 19:24:34 +0000 (21:24 +0200)] 
build: Fix dependency file inclusion

The objs.mk include changes for archive files broke things
completely and none of the dependency files (*.d) ever got
included, as the expansion there ended up empty.

Clearly, my mistake, I should've tested that better. As we
don't need the %.a files in the list there use filter-out
to remove them, rather than what I had lazily wanted to do,
which was trying to read %.d files for them. The filter-out
actually works, and avoids looking up files that can never
exist in the first place.

Fixes: 87098d3324e0 ("build: Put archive files into build/ folder too")
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agomacsec_linux: Fix receive-lowest-PN setting
Ze Gan [Thu, 2 Jul 2020 04:16:52 +0000 (12:16 +0800)] 
macsec_linux: Fix receive-lowest-PN setting

Setting of the PN for the receive SA failed because the SCI wasn't
provided. Fix this by adding the needed attribute to the command.

Signed-off-by: Ze Gan <ganze718@gmail.com>
4 years agoDPP2: Add DPP_CHIRP commands to hostapd_cli and wpa_cli
Wystan Schmidt [Fri, 24 Jul 2020 21:29:39 +0000 (15:29 -0600)] 
DPP2: Add DPP_CHIRP commands to hostapd_cli and wpa_cli

Add the DPP control interface chirp commands to the CLIs for greater
visibility and ease of use.

Signed-off-by: Wystan Schmidt <wystan.schmidt@charter.com>
4 years agoP2P: Set ap_configured_cb during group reform process
Jimmy Chen [Wed, 26 Aug 2020 10:55:45 +0000 (18:55 +0800)] 
P2P: Set ap_configured_cb during group reform process

We found that if REMOVE-AND-REFORM occurs before a group is started,
it would not send out GROUP-STARTED-EVENT after AP is enabled.

In the remove-and-reform process, ap_configured_cb is cleared. If a
group is not started, p2p_go_configured() will not be called after
completing AP setup. Fix this by preserving the callback parameters.

Signed-off-by: Jimmy Chen <jimmycmchen@google.com>
4 years agoP2P: Fallback to GO negotiation after running out of GO scan attempts
Jimmy Chen [Wed, 2 Sep 2020 08:50:11 +0000 (16:50 +0800)] 
P2P: Fallback to GO negotiation after running out of GO scan attempts

We found a problem that p2p_fallback_to_go_neg is not handled correctly
after running out of GO scan attempts. When autojoin is enabled and a
group is found in old scan results, supplicant would try to scan the
group several times. If the group is still not found, it reports group
formation failure while p2p_fallback_to_go_neg is enabled already.

If p2p_fallback_to_go_neg is enabled, it should fallback to GO
negotiation, but not report group formation failure after running out of
GO scan attempts.

Signed-off-by: Jimmy Chen <jimmycmchen@google.com>
4 years agohostapd_cli: Add dpp_bootstrap_set command
Andrew Beltrano [Mon, 14 Sep 2020 22:42:59 +0000 (22:42 +0000)] 
hostapd_cli: Add dpp_bootstrap_set command

Expose DPP_BOOTSTRAP_SET through hostapd_cli command
dpp_bootstrap_set <id> <configurator params..>

Signed-off-by: Andrew Beltrano <anbeltra@microsoft.com>
4 years agowpa_cli: Add dpp_bootstrap_set command
Andrew Beltrano [Mon, 14 Sep 2020 22:42:55 +0000 (22:42 +0000)] 
wpa_cli: Add dpp_bootstrap_set command

Expose DPP_BOOTSTRAP_SET through wpa_cli command dpp_bootstrap_set <id>
<configurator params..>

Signed-off-by: Andrew Beltrano <anbeltra@microsoft.com>
4 years agotests: build.sh: Avoid copying .config if identical
Johannes Berg [Sun, 11 Oct 2020 09:04:38 +0000 (11:04 +0200)] 
tests: build.sh: Avoid copying .config if identical

If the .config file is already identical, avoid copying it even if -f
was specified; this improves build time if nothing has changed.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agotests: build.sh: Remove 'make clean' steps
Johannes Berg [Sun, 11 Oct 2020 09:01:03 +0000 (11:01 +0200)] 
tests: build.sh: Remove 'make clean' steps

Since the build artifacts are now landing in distinct directories, we
don't need to 'make clean' and save some rebuild time.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agowpaspy: Allow building with python3
Johannes Berg [Sun, 11 Oct 2020 08:20:51 +0000 (10:20 +0200)] 
wpaspy: Allow building with python3

Add the necessary modified module registration code to allow building
wpaspy with python3. Also clean up the wpaspy_close() function to not
poke into the python version specific details.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agogitignore: Remove obsolete mac80211_hwsim entry
Jouni Malinen [Sun, 11 Oct 2020 16:36:18 +0000 (19:36 +0300)] 
gitignore: Remove obsolete mac80211_hwsim entry

That directory was removed last year, so no need to try to ignore the
build result from there anymore.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agogitignore: Clean up a bit
Johannes Berg [Sun, 11 Oct 2020 08:06:14 +0000 (10:06 +0200)] 
gitignore: Clean up a bit

Now that we no longer leave build artifacts outside the build folder, we
can clean up the gitignore a bit. Also move more things to per-folder
files that we mostly had already anyway.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agomesh: Allow channel switch command
Markus Theil [Fri, 26 Jun 2020 14:20:43 +0000 (16:20 +0200)] 
mesh: Allow channel switch command

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agobuild: Put archive files into build/ folder too
Johannes Berg [Sun, 11 Oct 2020 07:58:58 +0000 (09:58 +0200)] 
build: Put archive files into build/ folder too

This is something I hadn't previously done, but there are
cases where it's needed, e.g., building 'wlantest' and then
one of the tests/fuzzing/*/ projects, they use a different
configuration (fuzzing vs. not fuzzing).

Perhaps more importantly, this gets rid of the last thing
that was dumped into the source directories, apart from
the binaries themselves.

Note that due to the use of thin archives, this required
building with absolute paths.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agobuild: Use the new build system for fuzz tests
Johannes Berg [Sun, 11 Oct 2020 07:58:57 +0000 (09:58 +0200)] 
build: Use the new build system for fuzz tests

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agowolfSSL: Fix wrong types in tls_wolfssl.c
Juliusz Sosinowicz [Tue, 4 Aug 2020 09:48:23 +0000 (11:48 +0200)] 
wolfSSL: Fix wrong types in tls_wolfssl.c

wolfSSL_X509_get_ext_d2i() returns STACK_OF(GENERAL_NAME)* for
ALT_NAMES_OID therefore wolfSSL_sk_value needs to expect a
WOLFSSL_GENERAL_NAME*.

In addition, explicitly check for NULL return from wolfSSL_sk_value().

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
4 years agohostapd: Fix error message for radius_accept_attr config option
Pali Rohár [Sat, 10 Oct 2020 17:45:29 +0000 (19:45 +0200)] 
hostapd: Fix error message for radius_accept_attr config option

Error message contained wrong config option.

Signed-off-by: Pali Rohár <pali@kernel.org>
4 years agonl80211: Unbreak mode processing due to presence of S1G band
Thomas Pedersen [Thu, 27 Aug 2020 22:59:40 +0000 (15:59 -0700)] 
nl80211: Unbreak mode processing due to presence of S1G band

If kernel advertises a band with channels < 2.4 GHz
hostapd/wpa_supplicant gets confused and assumes this is an IEEE
802.11b, corrupting the real IEEE 802.11b band info.

Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
4 years agoD-Bus: Share 'remove all networks' with CLI
Brian Norris [Thu, 20 Aug 2020 02:09:35 +0000 (19:09 -0700)] 
D-Bus: Share 'remove all networks' with CLI

The D-Bus implementation of RemoveAllNetworks differs wildly from the
CLI implementation. Let's share the implementations.

This resolves use-after-free bugs I noticed, where we continue to use
the 'wpa_s->current_ssid' wpa_ssid object after freeing it, because we
didn't bother to disconnect from (and set to NULL) current_ssid before
freeing it.

Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agotests: dbus: Add test for RemoveAllNetworks while connected
Brian Norris [Thu, 20 Aug 2020 02:09:34 +0000 (19:09 -0700)] 
tests: dbus: Add test for RemoveAllNetworks while connected

This likely passes today (at least without ASAN), but without the next
commit, it trips up a use-after-free bug, which ASAN can catch.

So consider this a regression test.

Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agotests: run-tests: Do not use sudo if already root
Brian Norris [Thu, 25 Jun 2020 20:22:02 +0000 (13:22 -0700)] 
tests: run-tests: Do not use sudo if already root

Among other things, sudo can disrupt environment variables that a caller
provides.

Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agotests: Skip busctl tests when not available
Brian Norris [Thu, 25 Jun 2020 20:22:01 +0000 (13:22 -0700)] 
tests: Skip busctl tests when not available

Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agowpa_supplicant: Do not retry scan if operation is not supported
Georg Müller [Thu, 18 Jun 2020 14:39:12 +0000 (16:39 +0200)] 
wpa_supplicant: Do not retry scan if operation is not supported

When using NetworkManager to set up an access point, there seems to be a
race condition which can lead to a new log message every second.

The following message appears in AP mode:

    CTRL-EVENT-SCAN-FAILED ret=-95 retry=1

Normally, this log message only appears once. But then (and only then)
the race is triggered and they appear every second, the following log
messages are also present:

    Reject scan trigger since one is already pending
    Failed to initiate AP scan

This patch just disables the retry for requests where the operation is
not supported anyway.

Signed-off-by: Georg Müller <georgmueller@gmx.net>
4 years agoP2P: Limit P2P_DEVICE name to appropriate ifname size
Benjamin Berg [Tue, 25 Aug 2020 06:29:02 +0000 (08:29 +0200)] 
P2P: Limit P2P_DEVICE name to appropriate ifname size

Otherwise the WPA_IF_P2P_DEVICE cannot be created if the base ifname is
long enough. As this is not a netdev device, it is acceptable if the
name is not completely unique. As such, simply insert a NUL byte at the
appropriate place.

Signed-off-by: Benjamin Berg <bberg@redhat.com>
4 years agomesh: Set correct address for mesh default broadcast/multicast keys
Markus Theil [Fri, 12 Jun 2020 14:49:44 +0000 (16:49 +0200)] 
mesh: Set correct address for mesh default broadcast/multicast keys

wpa_drv_set_key() was called with a NULL address for IGTK and MGTK
before this patch. The nl80211 driver will then not add the
NL80211_KEY_DEFAULT_TYPE_MULTICAST flag for the key, which wrongly marks
this key also as a default unicast key in the Linux kernel.

With SAE this is no real problem in practice, as a pairwise key will be
negotiated in mesh mode, before the first data frame gets send. When
using IEEE 802.1X in a mesh network in the future, this gets a problem,
as Linux now will encrypt EAPOL frames with the default key, which is
also marked for unicast usage without this patch.

Signed-off-by: Markus Theil <markus.theil@tu-ilmenau.de>
4 years agotests: D-Bus Roam
Jouni Malinen [Sat, 10 Oct 2020 17:15:34 +0000 (20:15 +0300)] 
tests: D-Bus Roam

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoDBus: Add "Roam" command support
Brian Norris [Tue, 23 Jun 2020 17:39:02 +0000 (10:39 -0700)] 
DBus: Add "Roam" command support

Add D-Bus interface for ROAM command, imitating the existing wpa_cli
command.

Chromium OS has been carrying a form of this patch for a very long time.
I've cleaned it up a bit and documented it.

Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agoUse consistent spelling of "homogeneous"
Jouni Malinen [Sat, 10 Oct 2020 14:48:59 +0000 (17:48 +0300)] 
Use consistent spelling of "homogeneous"

The 'H' in HESSID was originally spelled "homogenous" in IEEE Std
802.11-2016 abbreviations and acronyms list, but that was changed in
REVmd to the significantly more common spelling "homonegeneous". Update
this older version to match the new spelling to be consistent throughout
the repository.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agodoc: Fix typos
Yegor Yefremov [Sat, 10 Oct 2020 06:10:58 +0000 (08:10 +0200)] 
doc: Fix typos

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
4 years agowpa_supplicant: Clear blacklist when SSID configs change
Kevin Lund [Thu, 11 Jun 2020 21:11:19 +0000 (14:11 -0700)] 
wpa_supplicant: Clear blacklist when SSID configs change

If the stored configurations for an SSID have changed, we can no longer
trust the current blacklist state of that SSID, since the updated
configs could change the behavior of the network. E.g., the BSS could be
blacklisted due to a bad password, and the config could be updated to
store the correct password. In this case, keeping the BSS in the
blacklist will prevent the user from connecting to the BSS after the
correct password has been updated.

Add the value was_changed_recently to the wpa_ssid struct. Update this
value every time a config is changed through wpa_set_config(). Check
this value in wpa_blacklist_get() to clear the blacklist whenever the
configs of current_ssid have changed.

This solution was chosen over simply clearing the blacklist whenever
configs change because the user should be able to change configs on an
inactive SSID without affecting the blacklist for the currently active
SSID. This way, the blacklist won't be cleared until the user attempts
to connect to the inactive network again. Furthermore, the blacklist is
stored per-BSSID while configs are stored per-SSID, so we don't have the
option to just clear out certain blacklist entries that would be
affected by the configs.

Finally, the function wpa_supplicant_reload_configuration() causes the
configs to be reloaded from scratch, so after a call to this function
all bets are off as to the relevance of our current blacklist state.
Thus, we clear the entire blacklist within this function.

Signed-off-by: Kevin Lund <kglund@google.com>
Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agowpa_supplicant: Add new blacklist tests
Kevin Lund [Thu, 11 Jun 2020 21:11:18 +0000 (14:11 -0700)] 
wpa_supplicant: Add new blacklist tests

This change adds some barebones tests for new blacklisting functionality
to wpas_module_tests.c. The tests ensure some basic functionality for
the functions wpa_blacklist_is_blacklisted() and wpa_blacklist_update().

Signed-off-by: Kevin Lund <kglund@google.com>
Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agowpa_supplicant: Add wpa_blacklist_update()
Kevin Lund [Thu, 11 Jun 2020 21:11:17 +0000 (14:11 -0700)] 
wpa_supplicant: Add wpa_blacklist_update()

This change adds the function wpa_blacklist_update(), which goes through
all blacklist entries and deletes them if their blacklist expired over
an hour ago. The purpose of this is to remove stale entries from the
blacklist which likely do not reflect the current condition of device's
network surroundings. This function is called whenever the blacklist is
polled, meaning that the caller always gets an up-to-date reflection of
the blacklist.

Another solution to clearing the blacklist that was considered was
to slowly reduce the counts of blacklist entries over time, and delete
them if the counts dropped below 0. We decided to go with the current
solution instead because an AP's "problematic" status is really a binary
thing: either the AP is no longer problematic, or it's still causing us
problems. So if we see any more problems within a reasonable amount of
time, it makes sense to just keep the blacklist where it was since the
AP is likely still undergoing the same issue. If we go a significant
amount of time (semi-arbitrarily chosen as 1 hour) without any issues
with an AP, it's reasonable to behave as if the AP is no longer
undergoing the same issue. If we see more problems at a later time, we
can start the blacklisting process fresh again, treating this as a brand
new issue.

Signed-off-by: Kevin Lund <kglund@google.com>
Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agowpa_supplicant: Implement time-based blacklisting
Kevin Lund [Thu, 11 Jun 2020 21:11:16 +0000 (14:11 -0700)] 
wpa_supplicant: Implement time-based blacklisting

wpa_supplicant keeps a blacklist of BSSs in order to prevent repeated
associations to problematic APs*. Currently, this blacklist is
completely cleared whenever we successfully connect to any AP. This
causes problematic behavior when in the presence of both a bad AP and
a good AP. The device can repeatedly attempt to roam to the bad AP
because it is clearing the blacklist every time it connects to the good
AP. This results in the connection constantly ping-ponging between the
APs, leaving the user stuck without connection.

Instead of clearing the blacklist, implement timeout functionality which
allows association attempts to blacklisted APs after some time has
passed. Each time a BSS would be added to the blacklist, increase the
duration of this timeout exponentially, up to a cap of 1800 seconds.
This means that the device will no longer be able to immediately attempt
to roam back to a bad AP whenever it successfully connects to any other
AP.

Other details:
The algorithm for building up the blacklist count and timeout duration
on a given AP has been designed to be minimally obtrusive. Starting with
a fresh blacklist, the device may attempt to connect to a problematic AP
no more than 6 times in any ~45 minute period. Once an AP has reached a
blacklist count >= 6, the device may attempt to connect to it no more
than once every 30 minutes. The goal of these limits is to find an
ideal balance between minimizing connection attempts to bad APs while
still trying them out occasionally to see if the problems have stopped.

The only exception to the above limits is that the blacklist is still
completely cleared whenever there are no APs available in a scan. This
means that if all nearby APs have been blacklisted, all APs will be
completely exonerated regardless of their blacklist counts or how close
their blacklist entries are to expiring. When all nearby APs have been
blacklisted we know that every nearby AP is in some way problematic.
Once we know that every AP is causing problems, it doesn't really make
sense to sort them beyond that because the blacklist count and timeout
duration don't necessarily reflect the degree to which an AP is
problematic (i.e. they can be manipulated by external factors such as
the user physically moving around). Instead, its best to restart the
blacklist and let the normal roaming algorithm take over to maximize
our chance of getting the best possible connection quality.

As stated above, the time-based blacklisting algorithm is designed to
be minimally obtrusive to user experience, so occasionally restarting
the process is not too impactful on the user.

*problematic AP: rejects new clients, frequently de-auths clients, very
poor connection quality, etc.

Signed-off-by: Kevin Lund <kglund@google.com>
Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agowpa_supplicant: Track consecutive connection failures
Kevin Lund [Thu, 11 Jun 2020 21:11:15 +0000 (14:11 -0700)] 
wpa_supplicant: Track consecutive connection failures

Within wpas_connection_failed(), the 'count' value of wpa_blacklist is
erroneously used as a tally of the number times the device has failed
to associate to a given BSSID without making a successful connection.
This is not accurate because there are a variety of ways a BSS can be
added to the blacklist beyond failed association such as interference
or deauthentication. This 'count' is lost whenever the blacklist is
cleared, so the wpa_supplicant stores an additional value
'extra_blacklist_count' which helps persist the 'count' through clears.
These count values are used to determine how long to wait to rescan
after a failed connection attempt.

While this logic was already slightly wrong, it would have been
completely broken by the upcoming change which adds time-based
blacklisting functionality. With the upcoming change, 'count' values
are not cleared on association, and thus do not necessarily even
approximate the "consecutive connection failures" which they were being
used for.

This change seeks to remove this unnecessary overloading of the
blacklist 'count' by directly tracking consecutive connection failures
within the wpa_supplicant struct, independent of the blacklist. This new
'consecutive_conn_failures' is iterated with every connection failure
and cleared when any successful connection is made. This change also
removes the now unused 'extra_blacklist_count' value.

Signed-off-by: Kevin Lund <kglund@google.com>
Signed-off-by: Brian Norris <briannorris@chromium.org>
4 years agotests: Prepare ap_blacklist_all for implementation change
Jouni Malinen [Sat, 10 Oct 2020 15:33:57 +0000 (18:33 +0300)] 
tests: Prepare ap_blacklist_all for implementation change

The blacklist design will be modified in the following commits and that
would result in this validation step based on the older implementation
starting to fail. Remove this check to avoid such testing failures.

Signed-off-by: Jouni Malinen <j@w1.fi>
4 years agoFix STA mode default TXOP Limit values for AC_VI and AC_VO
Yogesh Kulkarni [Tue, 9 Jun 2020 19:32:40 +0000 (01:02 +0530)] 
Fix STA mode default TXOP Limit values for AC_VI and AC_VO

commit f4e3860f ("Fix AP mode default TXOP Limit values for AC_VI
and AC_VO") corrects the default values of txop_limit from 93/46
to 94/47 for AP. STA would also need the same change.

Signed-off-by: Yogesh Kulkarni <yogesh.kulkarni@nxp.com>
Signed-off-by: Cathy Luo <xiaohua.luo@nxp.com>
Signed-off-by: Ganapathi Bhat <ganapathi.bhat@nxp.com>
4 years agogitignore: Add various things
Johannes Berg [Fri, 18 Sep 2020 09:50:01 +0000 (11:50 +0200)] 
gitignore: Add various things

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agobuild: Allow overriding BUILDDIR from command line
Johannes Berg [Fri, 18 Sep 2020 09:50:00 +0000 (11:50 +0200)] 
build: Allow overriding BUILDDIR from command line

You can now specify BUILDDIR= on the make command line,
e.g., in order to put that into a tmpfs or similar.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agotests: Use new build system for the tests
Johannes Berg [Fri, 18 Sep 2020 09:49:58 +0000 (11:49 +0200)] 
tests: Use new build system for the tests

I had previously kept that building in the sources, but
we can also change that.

Signed-off-by: Johannes Berg <johannes.berg@intel.com>
4 years agotests: Rewrite .gitignore file
Johannes Berg [Fri, 18 Sep 2020 09:49:56 +0000 (11:49 +0200)] 
tests: Rewrite .gitignore file

The file was already outdated again, so rewrite it to ignore
anything but c, h and sh files that start with "test-".

Signed-off-by: Johannes Berg <johannes.berg@intel.com>