aboutsummaryrefslogtreecommitdiff
path: root/wpa_supplicant/ctrl_iface.c
diff options
context:
space:
mode:
Diffstat (limited to 'wpa_supplicant/ctrl_iface.c')
-rw-r--r--wpa_supplicant/ctrl_iface.c48
1 files changed, 0 insertions, 48 deletions
diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c
index 541de758..7301d50f 100644
--- a/wpa_supplicant/ctrl_iface.c
+++ b/wpa_supplicant/ctrl_iface.c
@@ -747,8 +747,6 @@ static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
break;
pos++;
}
- } else if (os_strcasecmp(cmd, "ft_rsnxe_used") == 0) {
- wpa_s->ft_rsnxe_used = atoi(value);
} else if (os_strcasecmp(cmd, "rsne_override_eapol") == 0) {
wpabuf_free(wpa_s->rsne_override_eapol);
if (os_strcmp(value, "NULL") == 0)
@@ -3959,9 +3957,7 @@ static const struct cipher_info ciphers[] = {
{ WPA_DRIVER_CAPA_ENC_GCMP_256, "GCMP-256", 0 },
{ WPA_DRIVER_CAPA_ENC_CCMP, "CCMP", 0 },
{ WPA_DRIVER_CAPA_ENC_GCMP, "GCMP", 0 },
-#ifndef CONFIG_NO_TKIP
{ WPA_DRIVER_CAPA_ENC_TKIP, "TKIP", 0 },
-#endif /* CONFIG_NO_TKIP */
{ WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE, "NONE", 0 },
#ifdef CONFIG_WEP
{ WPA_DRIVER_CAPA_ENC_WEP104, "WEP104", 1 },
@@ -3992,11 +3988,7 @@ static int ctrl_iface_get_capability_pairwise(int res, char *strict,
if (res < 0) {
if (strict)
return 0;
-#ifdef CONFIG_NO_TKIP
- len = os_strlcpy(buf, "CCMP NONE", buflen);
-#else /* CONFIG_NO_TKIP */
len = os_strlcpy(buf, "CCMP TKIP NONE", buflen);
-#endif /* CONFIG_NO_TKIP */
if (len >= buflen)
return -1;
return len;
@@ -4033,17 +4025,9 @@ static int ctrl_iface_get_capability_group(int res, char *strict,
if (strict)
return 0;
#ifdef CONFIG_WEP
-#ifdef CONFIG_NO_TKIP
- len = os_strlcpy(buf, "CCMP WEP104 WEP40", buflen);
-#else /* CONFIG_NO_TKIP */
len = os_strlcpy(buf, "CCMP TKIP WEP104 WEP40", buflen);
-#endif /* CONFIG_NO_TKIP */
#else /* CONFIG_WEP */
-#ifdef CONFIG_NO_TKIP
- len = os_strlcpy(buf, "CCMP", buflen);
-#else /* CONFIG_NO_TKIP */
len = os_strlcpy(buf, "CCMP TKIP", buflen);
-#endif /* CONFIG_NO_TKIP */
#endif /* CONFIG_WEP */
if (len >= buflen)
return -1;
@@ -7960,34 +7944,6 @@ static int wpas_ctrl_iface_driver_flags(struct wpa_supplicant *wpa_s,
}
-static int wpas_ctrl_iface_driver_flags2(struct wpa_supplicant *wpa_s,
- char *buf, size_t buflen)
-{
- int ret, i;
- char *pos, *end;
-
- ret = os_snprintf(buf, buflen, "%016llX:\n",
- (long long unsigned) wpa_s->drv_flags2);
- if (os_snprintf_error(buflen, ret))
- return -1;
-
- pos = buf + ret;
- end = buf + buflen;
-
- for (i = 0; i < 64; i++) {
- if (wpa_s->drv_flags2 & (1LLU << i)) {
- ret = os_snprintf(pos, end - pos, "%s\n",
- driver_flag2_to_string(1LLU << i));
- if (os_snprintf_error(end - pos, ret))
- return -1;
- pos += ret;
- }
- }
-
- return pos - buf;
-}
-
-
static int wpa_supplicant_pktcnt_poll(struct wpa_supplicant *wpa_s, char *buf,
size_t buflen)
{
@@ -8228,7 +8184,6 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
wpa_s->disable_sa_query = 0;
wpa_s->testing_resend_assoc = 0;
wpa_s->ignore_sae_h2e_only = 0;
- wpa_s->ft_rsnxe_used = 0;
wpa_s->reject_btm_req_reason = 0;
wpa_sm_set_test_assoc_ie(wpa_s->wpa, NULL);
os_free(wpa_s->get_pref_freq_list_override);
@@ -10758,9 +10713,6 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
} else if (os_strcmp(buf, "DRIVER_FLAGS") == 0) {
reply_len = wpas_ctrl_iface_driver_flags(wpa_s, reply,
reply_size);
- } else if (os_strcmp(buf, "DRIVER_FLAGS2") == 0) {
- reply_len = wpas_ctrl_iface_driver_flags2(wpa_s, reply,
- reply_size);
#ifdef ANDROID
} else if (os_strncmp(buf, "DRIVER ", 7) == 0) {
reply_len = wpa_supplicant_driver_cmd(wpa_s, buf + 7, reply,