diff options
author | Hai Shalom <haishalom@google.com> | 2019-02-11 12:01:50 -0800 |
---|---|---|
committer | Peiyong Lin <lpy@google.com> | 2019-02-11 22:30:04 +0000 |
commit | bf6e0baa89b80019dee7ebfbee1fc34581255a19 (patch) | |
tree | fcd62236b41c2ce5b04923ba7a5a0213c8397ead /src/rsn_supp/wpa.c | |
parent | 39bc25d3a79c1375de430a7918d949c1a86f70c6 (diff) | |
download | wpa_supplicant_8-bf6e0baa89b80019dee7ebfbee1fc34581255a19.tar.gz |
Revert "[wpa_supplicant] Cumulative patch from c4e90da6d"
This reverts commit 39bc25d3a79c1375de430a7918d949c1a86f70c6.
Test: Compilation
Change-Id: Iae7670429466958911b5296cb1359bceecc0b03e
Exempt-From-Owner-Approval: Revert since it's breaking the build
Diffstat (limited to 'src/rsn_supp/wpa.c')
-rw-r--r-- | src/rsn_supp/wpa.c | 156 |
1 files changed, 2 insertions, 154 deletions
diff --git a/src/rsn_supp/wpa.c b/src/rsn_supp/wpa.c index 9b1f0986..72a2d662 100644 --- a/src/rsn_supp/wpa.c +++ b/src/rsn_supp/wpa.c @@ -20,10 +20,8 @@ #include "crypto/sha512.h" #include "common/ieee802_11_defs.h" #include "common/ieee802_11_common.h" -#include "common/ocv.h" #include "eap_common/eap_defs.h" #include "eapol_supp/eapol_supp_sm.h" -#include "drivers/driver.h" #include "wpa.h" #include "eloop.h" #include "preauth.h" @@ -620,33 +618,6 @@ static void wpa_supplicant_process_1_of_4(struct wpa_sm *sm, kde = sm->assoc_wpa_ie; kde_len = sm->assoc_wpa_ie_len; -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - u8 *pos; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_printf(MSG_WARNING, - "Failed to get channel info for OCI element in EAPOL-Key 2/4"); - goto failed; - } - - kde_buf = os_malloc(kde_len + 2 + RSN_SELECTOR_LEN + 3); - if (!kde_buf) { - wpa_printf(MSG_WARNING, - "Failed to allocate memory for KDE with OCI in EAPOL-Key 2/4"); - goto failed; - } - - os_memcpy(kde_buf, kde, kde_len); - kde = kde_buf; - pos = kde + kde_len; - if (ocv_insert_oci_kde(&ci, &pos) < 0) - goto failed; - kde_len = pos - kde; - } -#endif /* CONFIG_OCV */ - #ifdef CONFIG_P2P if (sm->p2p) { kde_buf = os_malloc(kde_len + 2 + RSN_SELECTOR_LEN + 1); @@ -1447,26 +1418,6 @@ static void wpa_supplicant_process_3_of_4(struct wpa_sm *sm, } #endif /* CONFIG_P2P */ -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, - "Failed to get channel info to validate received OCI in EAPOL-Key 3/4"); - return; - } - - if (ocv_verify_tx_params(ie.oci, ie.oci_len, &ci, - channel_width_to_int(ci.chanwidth), - ci.seg1_idx) != 0) { - wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, "%s", - ocv_errorstr); - return; - } - } -#endif /* CONFIG_OCV */ - if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info, &sm->ptk) < 0) { goto failed; @@ -1560,26 +1511,6 @@ static int wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm, } maxkeylen = gd->gtk_len = ie.gtk_len - 2; -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, - "Failed to get channel info to validate received OCI in EAPOL-Key group msg 1/2"); - return -1; - } - - if (ocv_verify_tx_params(ie.oci, ie.oci_len, &ci, - channel_width_to_int(ci.chanwidth), - ci.seg1_idx) != 0) { - wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, "%s", - ocv_errorstr); - return -1; - } - } -#endif /* CONFIG_OCV */ - if (wpa_supplicant_check_group_cipher(sm, sm->group_cipher, gd->gtk_len, maxkeylen, &gd->key_rsc_len, &gd->alg)) @@ -1700,17 +1631,11 @@ static int wpa_supplicant_send_2_of_2(struct wpa_sm *sm, size_t mic_len, hdrlen, rlen; struct wpa_eapol_key *reply; u8 *rbuf, *key_mic; - size_t kde_len = 0; - -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) - kde_len = OCV_OCI_KDE_LEN; -#endif /* CONFIG_OCV */ mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); hdrlen = sizeof(*reply) + mic_len + 2; rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL, - hdrlen + kde_len, &rlen, (void *) &reply); + hdrlen, &rlen, (void *) &reply); if (rbuf == NULL) return -1; @@ -1732,27 +1657,7 @@ static int wpa_supplicant_send_2_of_2(struct wpa_sm *sm, WPA_REPLAY_COUNTER_LEN); key_mic = (u8 *) (reply + 1); - WPA_PUT_BE16(key_mic + mic_len, kde_len); /* Key Data Length */ - -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - u8 *pos; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_printf(MSG_WARNING, - "Failed to get channel info for OCI element in EAPOL-Key 2/2"); - os_free(rbuf); - return -1; - } - - pos = key_mic + mic_len + 2; /* Key Data */ - if (ocv_insert_oci_kde(&ci, &pos) < 0) { - os_free(rbuf); - return -1; - } - } -#endif /* CONFIG_OCV */ + WPA_PUT_BE16(key_mic + mic_len, 0); wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 2/2"); return wpa_eapol_key_send(sm, &sm->ptk, ver, sm->bssid, ETH_P_EAPOL, @@ -2959,9 +2864,6 @@ int wpa_sm_set_param(struct wpa_sm *sm, enum wpa_sm_conf_params param, case WPA_PARAM_MFP: sm->mfp = value; break; - case WPA_PARAM_OCV: - sm->ocv = value; - break; default: break; } @@ -3036,19 +2938,6 @@ int wpa_sm_pmf_enabled(struct wpa_sm *sm) } -int wpa_sm_ocv_enabled(struct wpa_sm *sm) -{ - struct wpa_ie_data rsn; - - if (!sm->ocv || !sm->ap_rsn_ie) - return 0; - - return wpa_parse_wpa_ie_rsn(sm->ap_rsn_ie, sm->ap_rsn_ie_len, - &rsn) >= 0 && - (rsn.capabilities & WPA_CAPABILITY_OCVC); -} - - /** * wpa_sm_set_assoc_wpa_ie_default - Generate own WPA/RSN IE from configuration * @sm: Pointer to WPA state machine data from wpa_sm_init() @@ -3928,8 +3817,6 @@ static int fils_ft_build_assoc_req_rsne(struct wpa_sm *sm, struct wpabuf *buf) if (sm->mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) capab |= WPA_CAPABILITY_MFPC; #endif /* CONFIG_IEEE80211W */ - if (sm->ocv) - capab |= WPA_CAPABILITY_OCVC; wpabuf_put_le16(buf, capab); /* PMKID Count */ @@ -4064,26 +3951,6 @@ struct wpabuf * fils_build_assoc_req(struct wpa_sm *sm, const u8 **kek, /* TODO: FILS IP Address Assignment */ -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - u8 *pos; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_printf(MSG_WARNING, - "FILS: Failed to get channel info for OCI element"); - wpabuf_free(buf); - return NULL; - } - - pos = wpabuf_put(buf, OCV_OCI_EXTENDED_LEN); - if (ocv_insert_extended_oci(&ci, pos) < 0) { - wpabuf_free(buf); - return NULL; - } - } -#endif /* CONFIG_OCV */ - wpa_hexdump_buf(MSG_DEBUG, "FILS: Association Request plaintext", buf); *kek = sm->ptk.kek; @@ -4247,25 +4114,6 @@ int fils_process_assoc_resp(struct wpa_sm *sm, const u8 *resp, size_t len) goto fail; } -#ifdef CONFIG_OCV - if (wpa_sm_ocv_enabled(sm)) { - struct wpa_channel_info ci; - - if (wpa_sm_channel_info(sm, &ci) != 0) { - wpa_printf(MSG_WARNING, - "Failed to get channel info to validate received OCI in FILS (Re)Association Response frame"); - goto fail; - } - - if (ocv_verify_tx_params(elems.oci, elems.oci_len, &ci, - channel_width_to_int(ci.chanwidth), - ci.seg1_idx) != 0) { - wpa_printf(MSG_WARNING, "FILS: %s", ocv_errorstr); - goto fail; - } - } -#endif /* CONFIG_OCV */ - /* Key Delivery */ if (!elems.key_delivery) { wpa_printf(MSG_DEBUG, "FILS: No Key Delivery element"); |