DPP: Allow version number to be overridden for testing purposes
"SET dpp_version_override <ver>" can now be used to request wpa_supplicant and hostapd to support a subset of DPP versions. In practice, the only valid case for now is to fall back from DPP version 2 support to version 1 in builds that include CONFIG_DPP2=y. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
c3c38bc8b9
commit
12c8eacf73
12 changed files with 63 additions and 24 deletions
|
@ -696,6 +696,8 @@ static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
|
|||
ret = -1;
|
||||
else
|
||||
dpp_nonce_override_len = hex_len / 2;
|
||||
} else if (os_strcasecmp(cmd, "dpp_version_override") == 0) {
|
||||
dpp_version_override = atoi(value);
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
#endif /* CONFIG_DPP */
|
||||
#ifdef CONFIG_TESTING_OPTIONS
|
||||
|
@ -8160,6 +8162,11 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
|||
dpp_pkex_ephemeral_key_override_len = 0;
|
||||
dpp_protocol_key_override_len = 0;
|
||||
dpp_nonce_override_len = 0;
|
||||
#ifdef CONFIG_DPP2
|
||||
dpp_version_override = 2;
|
||||
#else /* CONFIG_DPP2 */
|
||||
dpp_version_override = 1;
|
||||
#endif /* CONFIG_DPP2 */
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
#endif /* CONFIG_DPP */
|
||||
|
||||
|
|
|
@ -2580,10 +2580,12 @@ skip_connector:
|
|||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
|
||||
#ifdef CONFIG_DPP2
|
||||
/* Protocol Version */
|
||||
wpabuf_put_le16(msg, DPP_ATTR_PROTOCOL_VERSION);
|
||||
wpabuf_put_le16(msg, 1);
|
||||
wpabuf_put_u8(msg, 2);
|
||||
if (DPP_VERSION > 1) {
|
||||
/* Protocol Version */
|
||||
wpabuf_put_le16(msg, DPP_ATTR_PROTOCOL_VERSION);
|
||||
wpabuf_put_le16(msg, 1);
|
||||
wpabuf_put_u8(msg, DPP_VERSION);
|
||||
}
|
||||
#endif /* CONFIG_DPP2 */
|
||||
|
||||
/* TODO: Timeout on AP response */
|
||||
|
|
|
@ -2703,7 +2703,8 @@ static int wpa_supplicant_event_associnfo(struct wpa_supplicant *wpa_s,
|
|||
|
||||
#ifdef CONFIG_DPP2
|
||||
wpa_sm_set_dpp_z(wpa_s->wpa, NULL);
|
||||
if (wpa_s->key_mgmt == WPA_KEY_MGMT_DPP && wpa_s->dpp_pfs) {
|
||||
if (DPP_VERSION > 1 && wpa_s->key_mgmt == WPA_KEY_MGMT_DPP &&
|
||||
wpa_s->dpp_pfs) {
|
||||
struct ieee802_11_elems elems;
|
||||
|
||||
if (ieee802_11_parse_elems(data->assoc_info.resp_ies,
|
||||
|
@ -4373,7 +4374,7 @@ static void wpas_event_assoc_reject(struct wpa_supplicant *wpa_s,
|
|||
* the status code defined in the DPP R2 tech spec.
|
||||
* WLAN_STATUS_AKMP_NOT_VALID is addressed in the same manner as an
|
||||
* interoperability workaround with older hostapd implementation. */
|
||||
if (wpa_s->current_ssid &&
|
||||
if (DPP_VERSION > 1 && wpa_s->current_ssid &&
|
||||
wpa_s->current_ssid->key_mgmt == WPA_KEY_MGMT_DPP &&
|
||||
wpa_s->current_ssid->dpp_pfs == 0 &&
|
||||
(data->assoc_reject.status_code ==
|
||||
|
|
|
@ -1793,7 +1793,7 @@ void sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode,
|
|||
#endif /* CONFIG_OWE */
|
||||
|
||||
#ifdef CONFIG_DPP2
|
||||
if (wpa_s->key_mgmt == WPA_KEY_MGMT_DPP && ssid &&
|
||||
if (DPP_VERSION > 1 && wpa_s->key_mgmt == WPA_KEY_MGMT_DPP && ssid &&
|
||||
ssid->dpp_netaccesskey && ssid->dpp_pfs != 2 &&
|
||||
!ssid->dpp_pfs_fallback) {
|
||||
struct rsn_pmksa_cache_entry *pmksa;
|
||||
|
|
|
@ -3087,7 +3087,8 @@ static u8 * wpas_populate_assoc_ies(
|
|||
#endif /* CONFIG_OWE */
|
||||
|
||||
#ifdef CONFIG_DPP2
|
||||
if (wpa_sm_get_key_mgmt(wpa_s->wpa) == WPA_KEY_MGMT_DPP &&
|
||||
if (DPP_VERSION > 1 &&
|
||||
wpa_sm_get_key_mgmt(wpa_s->wpa) == WPA_KEY_MGMT_DPP &&
|
||||
ssid->dpp_netaccesskey &&
|
||||
ssid->dpp_pfs != 2 && !ssid->dpp_pfs_fallback) {
|
||||
struct rsn_pmksa_cache_entry *pmksa;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue