mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2025-10-09 18:47:23 +02:00
treewide: fix spelling mistakes
This commit is contained in:
parent
d81de65533
commit
0868418ad1
4
TODO
4
TODO
@ -110,7 +110,7 @@ Wireless monitor
|
|||||||
|
|
||||||
- Subscribe to all nl80211 multicast groups at startup
|
- Subscribe to all nl80211 multicast groups at startup
|
||||||
|
|
||||||
It seems the nlmon packets are limited to actual subscribed mutlicast
|
It seems the nlmon packets are limited to actual subscribed multicast
|
||||||
groups. To get a complete picture of all the nl80211 commands and
|
groups. To get a complete picture of all the nl80211 commands and
|
||||||
events, it is required that iwmon adds membership to all multicast
|
events, it is required that iwmon adds membership to all multicast
|
||||||
groups that the nl80211 lists.
|
groups that the nl80211 lists.
|
||||||
@ -234,7 +234,7 @@ Wireless daemon
|
|||||||
|
|
||||||
- Implement Enrollee Session Overlap Detection after WSC Protocol Run
|
- Implement Enrollee Session Overlap Detection after WSC Protocol Run
|
||||||
|
|
||||||
WSC Best Practices v2.0.1, Section 3.15 describes an enhacement to detect
|
WSC Best Practices v2.0.1, Section 3.15 describes an enhancement to detect
|
||||||
PBC session overlaps. The Enrollee is asked to perform an extra scan without
|
PBC session overlaps. The Enrollee is asked to perform an extra scan without
|
||||||
the PBC request in the ProbeRequest frames after EAP-WSC completes
|
the PBC request in the ProbeRequest frames after EAP-WSC completes
|
||||||
successfully. If another AP in PBC mode is found, then a SessionOverlap
|
successfully. If another AP in PBC mode is found, then a SessionOverlap
|
||||||
|
@ -11,7 +11,7 @@ from iwd import IWD
|
|||||||
|
|
||||||
class Test8021xNetwork(unittest.TestCase):
|
class Test8021xNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following connection scenarios:
|
The below test cases excesise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -11,7 +11,7 @@ from iwd import IWD
|
|||||||
|
|
||||||
class TestOpenNetwork(unittest.TestCase):
|
class TestOpenNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following connection scenarios:
|
The below test cases excesise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -11,7 +11,7 @@ from iwd import IWD
|
|||||||
|
|
||||||
class TestWpaNetwork(unittest.TestCase):
|
class TestWpaNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases exercise the following connection scenarios:
|
The below test cases exercise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -104,7 +104,7 @@ class Test(unittest.TestCase):
|
|||||||
|
|
||||||
self.assertTrue(self.profile_is_encrypted('ssidCCMP.psk'))
|
self.assertTrue(self.profile_is_encrypted('ssidCCMP.psk'))
|
||||||
|
|
||||||
# Tests that a profile that doesn't decrypt wont become a known network
|
# Tests that a profile that doesn't decrypt won't become a known network
|
||||||
def test_decryption_failure(self):
|
def test_decryption_failure(self):
|
||||||
bad_config = \
|
bad_config = \
|
||||||
'''
|
'''
|
||||||
|
@ -12,7 +12,7 @@ from hostapd import HostapdCLI
|
|||||||
|
|
||||||
class TestWpaNetwork(unittest.TestCase):
|
class TestWpaNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following connection scenarios:
|
The below test cases excesise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -12,7 +12,7 @@ from hostapd import HostapdCLI
|
|||||||
|
|
||||||
class TestOpenNetwork(unittest.TestCase):
|
class TestOpenNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following connection scenarios:
|
The below test cases excesise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -12,7 +12,7 @@ from hostapd import HostapdCLI
|
|||||||
|
|
||||||
class TestWpaNetwork(unittest.TestCase):
|
class TestWpaNetwork(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following connection scenarios:
|
The below test cases excesise the following connection scenarios:
|
||||||
|
|
||||||
Network config is
|
Network config is
|
||||||
present at start time: Connect: AutoConnect: Result:
|
present at start time: Connect: AutoConnect: Result:
|
||||||
|
@ -11,7 +11,7 @@ from iwd import NetworkType
|
|||||||
|
|
||||||
class TestMFP(unittest.TestCase):
|
class TestMFP(unittest.TestCase):
|
||||||
'''
|
'''
|
||||||
The bellow test cases excesise the following MFP option setting scenarios:
|
The below test cases excesise the following MFP option setting scenarios:
|
||||||
|
|
||||||
IWD_MFP: AP_MFP: Result:
|
IWD_MFP: AP_MFP: Result:
|
||||||
0 0 No MFP, connection succeeds
|
0 0 No MFP, connection succeeds
|
||||||
|
@ -137,7 +137,7 @@ class Test(unittest.TestCase):
|
|||||||
# since (T2 - T1) / 2 is shorter than 60s. It is now about 10s since the last
|
# since (T2 - T1) / 2 is shorter than 60s. It is now about 10s since the last
|
||||||
# renewal or 5s before the next DHCPREQUEST frame that is going to be lost. We'll
|
# renewal or 5s before the next DHCPREQUEST frame that is going to be lost. We'll
|
||||||
# wait T1 seconds, so until about 10s after the failed attempt, we'll check that
|
# wait T1 seconds, so until about 10s after the failed attempt, we'll check that
|
||||||
# there was no renewal by that time, just in case, and we'll reenable frame delivery.
|
# there was no renewal by that time, just in case, and we'll re-enable frame delivery.
|
||||||
# We'll then wait another 60s and we should see the lease has been successfully
|
# We'll then wait another 60s and we should see the lease has been successfully
|
||||||
# renewed some 10 seconds earlier on the 1st DHCPREQUEST retransmission.
|
# renewed some 10 seconds earlier on the 1st DHCPREQUEST retransmission.
|
||||||
#
|
#
|
||||||
|
@ -17,7 +17,7 @@ from hwsim import Hwsim
|
|||||||
class Test(unittest.TestCase):
|
class Test(unittest.TestCase):
|
||||||
# Normally the time between a failed roam attempt and the next roam attempt
|
# Normally the time between a failed roam attempt and the next roam attempt
|
||||||
# is 60 seconds (default RoamRetryInterval). Test that we retry roaming
|
# is 60 seconds (default RoamRetryInterval). Test that we retry roaming
|
||||||
# faster if the transision looks like this: LOW [roam] [same bss] HIGH LOW.
|
# faster if the transition looks like this: LOW [roam] [same bss] HIGH LOW.
|
||||||
def test_fast_retry(self):
|
def test_fast_retry(self):
|
||||||
hwsim = Hwsim()
|
hwsim = Hwsim()
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@ from hostapd import HostapdCLI
|
|||||||
from hwsim import Hwsim
|
from hwsim import Hwsim
|
||||||
|
|
||||||
class Test(unittest.TestCase):
|
class Test(unittest.TestCase):
|
||||||
# Test that we do not periodically retry roaming if the transision looks
|
# Test that we do not periodically retry roaming if the transition looks
|
||||||
# like this: LOW [roam] [new bss] HIGH.
|
# like this: LOW [roam] [new bss] HIGH.
|
||||||
def test_stop_retry(self):
|
def test_stop_retry(self):
|
||||||
hwsim = Hwsim()
|
hwsim = Hwsim()
|
||||||
|
@ -1481,10 +1481,10 @@ class IWD(AsyncOpAbstract):
|
|||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def create_in_storage(file_name, file_content, storage_dir=IWD_STORAGE_DIR):
|
def create_in_storage(file_name, file_content, storage_dir=IWD_STORAGE_DIR):
|
||||||
fo = open(storage_dir + '/' + file_name, 'w')
|
f = open(storage_dir + '/' + file_name, 'w')
|
||||||
|
|
||||||
fo.write(file_content)
|
f.write(file_content)
|
||||||
fo.close()
|
f.close()
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def _ensure_storage_dir_exists(storage_dir):
|
def _ensure_storage_dir_exists(storage_dir):
|
||||||
|
@ -237,7 +237,7 @@ class Wpas:
|
|||||||
('' if go_intent is None else ' go_intent=' + str(go_intent)))
|
('' if go_intent is None else ' go_intent=' + str(go_intent)))
|
||||||
self.wait_for_event('OK')
|
self.wait_for_event('OK')
|
||||||
|
|
||||||
# Pre-accept the next GO Negotiation Request from this peer to avoid the extra Respone + Request frames
|
# Pre-accept the next GO Negotiation Request from this peer to avoid the extra Response + Request frames
|
||||||
def p2p_authorize(self, peer, pin=None, go_intent=None):
|
def p2p_authorize(self, peer, pin=None, go_intent=None):
|
||||||
self._rx_data = []
|
self._rx_data = []
|
||||||
self._ctrl_request('P2P_CONNECT ' + peer['p2p_dev_addr'] + ' ' + ('pbc' if pin is None else pin) +
|
self._ctrl_request('P2P_CONNECT ' + peer['p2p_dev_addr'] + ' ' + ('pbc' if pin is None else pin) +
|
||||||
|
@ -186,5 +186,5 @@ void diagnostic_display(struct l_dbus_message_iter *dict,
|
|||||||
return;
|
return;
|
||||||
|
|
||||||
parse_error:
|
parse_error:
|
||||||
display_error("Error parsing dignostics");
|
display_error("Error parsing diagnostics");
|
||||||
}
|
}
|
||||||
|
@ -219,7 +219,7 @@ static void network_display_inline(const char *margin, const void *data)
|
|||||||
|
|
||||||
display("%s%s %s %s\n", margin, network->name ? network->name : "",
|
display("%s%s %s %s\n", margin, network->name ? network->name : "",
|
||||||
network->type ? network->type : "",
|
network->type ? network->type : "",
|
||||||
network->connected ? "connected" : "diconnected");
|
network->connected ? "connected" : "disconnected");
|
||||||
}
|
}
|
||||||
|
|
||||||
static void *network_create(void)
|
static void *network_create(void)
|
||||||
|
@ -322,10 +322,10 @@ M18: Use appropriate logging levels
|
|||||||
An appropriate log level should be used depending on the type of message
|
An appropriate log level should be used depending on the type of message
|
||||||
being logged. Logging is done using the l_log APIs in ELL:
|
being logged. Logging is done using the l_log APIs in ELL:
|
||||||
|
|
||||||
l_error An unexpected condition ocurred. These are generally fatal to the
|
l_error An unexpected condition occurred. These are generally fatal to the
|
||||||
current connection/protocol that is running but not generally to IWD's
|
current connection/protocol that is running but not generally to IWD's
|
||||||
overall operation.
|
overall operation.
|
||||||
l_warn An unexpected, but non-fatal condition ocurred
|
l_warn An unexpected, but non-fatal condition occurred
|
||||||
l_notice Should not be used directly. This log level is reserved for special
|
l_notice Should not be used directly. This log level is reserved for special
|
||||||
event type notifications which is handled by iwd_notice().
|
event type notifications which is handled by iwd_notice().
|
||||||
l_info Information that is expected during normal operation. l_info's use
|
l_info Information that is expected during normal operation. l_info's use
|
||||||
|
@ -135,7 +135,7 @@ Object path /net/connman/iwd/{phy0,phy1,...}/{1,2,...}
|
|||||||
void StartConfigurator(object agent_path)
|
void StartConfigurator(object agent_path)
|
||||||
|
|
||||||
Start a shared code configurator using an agent
|
Start a shared code configurator using an agent
|
||||||
(distingushed by 'agent_path') to obtain the shared
|
(distinguished by 'agent_path') to obtain the shared
|
||||||
code. This method is meant for an automated use case
|
code. This method is meant for an automated use case
|
||||||
where a configurator is capable of configuring multiple
|
where a configurator is capable of configuring multiple
|
||||||
enrollees, and distinguishing between them by their
|
enrollees, and distinguishing between them by their
|
||||||
@ -196,7 +196,7 @@ Methods void Release() [noreply]
|
|||||||
string RequestSharedCode(string identifier)
|
string RequestSharedCode(string identifier)
|
||||||
|
|
||||||
This method gets called when a shared code is requested
|
This method gets called when a shared code is requested
|
||||||
for a particular enrollee, distingushed by the
|
for a particular enrollee, distinguished by the
|
||||||
identifier. The shared code agent should lookup the
|
identifier. The shared code agent should lookup the
|
||||||
identifier and return the shared code, or return an
|
identifier and return the shared code, or return an
|
||||||
error if not found.
|
error if not found.
|
||||||
|
@ -5,7 +5,7 @@ credentials for your e.g. cable/cellular provider, or via a dedicated account
|
|||||||
like Boingo. Lots of these services also allow you to roam between networks.
|
like Boingo. Lots of these services also allow you to roam between networks.
|
||||||
|
|
||||||
The underlying authentication is standard WPA2-Enterprise but Hotspot 2.0 adds a
|
The underlying authentication is standard WPA2-Enterprise but Hotspot 2.0 adds a
|
||||||
'discovery' stage to identifiying networks. This discovery is done using ANQP,
|
'discovery' stage to identifying networks. This discovery is done using ANQP,
|
||||||
which queries the network for additional information to determine if the client
|
which queries the network for additional information to determine if the client
|
||||||
has the credentials to connect.
|
has the credentials to connect.
|
||||||
|
|
||||||
|
@ -56,7 +56,7 @@ Methods array(on) GetPeers()
|
|||||||
between requested threshold values is a compromise
|
between requested threshold values is a compromise
|
||||||
between resolution and the frequency of system
|
between resolution and the frequency of system
|
||||||
wakeups and context-switches that are going to be
|
wakeups and context-switches that are going to be
|
||||||
occuring to update the client's signal meter. Only
|
occurring to update the client's signal meter. Only
|
||||||
one agent can be registered at any time.
|
one agent can be registered at any time.
|
||||||
|
|
||||||
Possible errors: [service].Error.InvalidArguments
|
Possible errors: [service].Error.InvalidArguments
|
||||||
|
@ -166,7 +166,7 @@ Properties string State [readonly]
|
|||||||
|
|
||||||
object ConnectedAccessPoint [readonly, optional]
|
object ConnectedAccessPoint [readonly, optional]
|
||||||
|
|
||||||
net.connman.iwd.BasicServiceSet object represeting the
|
net.connman.iwd.BasicServiceSet object representing the
|
||||||
BSS the device is currently connected to or to which
|
BSS the device is currently connected to or to which
|
||||||
a connection is in progress.
|
a connection is in progress.
|
||||||
|
|
||||||
|
@ -218,7 +218,7 @@ supplicant running IWD:
|
|||||||
#~~~~~~~~~~~~~~~~~~~~~~~~~ hw.conf ~~~~~~~~~~~~~~~~~~~~~~~~~
|
#~~~~~~~~~~~~~~~~~~~~~~~~~ hw.conf ~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
# Lines starting with # are ignored
|
# Lines starting with # are ignored
|
||||||
|
|
||||||
# 'SETUP' is a manditory configuration group.
|
# 'SETUP' is a mandatory configuration group.
|
||||||
[SETUP]
|
[SETUP]
|
||||||
#
|
#
|
||||||
# Total number of radios requested per network setup. This includes
|
# Total number of radios requested per network setup. This includes
|
||||||
|
@ -578,7 +578,7 @@ static int analyze_pcap(const char *pathname)
|
|||||||
printf("\n");
|
printf("\n");
|
||||||
printf(" Number of packets: %lu\n", pkt_count);
|
printf(" Number of packets: %lu\n", pkt_count);
|
||||||
printf(" Short packets: %lu\n", pkt_short);
|
printf(" Short packets: %lu\n", pkt_short);
|
||||||
printf(" Tuncated packets: %lu\n", pkt_trunc);
|
printf(" Truncated packets: %lu\n", pkt_trunc);
|
||||||
printf("\n");
|
printf("\n");
|
||||||
printf(" Ethernet packets: %lu\n", pkt_ether);
|
printf(" Ethernet packets: %lu\n", pkt_ether);
|
||||||
printf(" PAE packets: %lu\n", pkt_pae);
|
printf(" PAE packets: %lu\n", pkt_pae);
|
||||||
|
@ -1658,7 +1658,7 @@ static void print_ie_vht_capabilities(unsigned int level,
|
|||||||
[21] = "TXOP PS",
|
[21] = "TXOP PS",
|
||||||
[22] = "+HTC-VHT Capable",
|
[22] = "+HTC-VHT Capable",
|
||||||
[23 ... 25] = "Maximum A-MPDU Length Exponent",
|
[23 ... 25] = "Maximum A-MPDU Length Exponent",
|
||||||
[26 ... 27] = "VHT Link Adapation Capable",
|
[26 ... 27] = "VHT Link Adaptation Capable",
|
||||||
[28] = "RX Antenna Pattern Consistency",
|
[28] = "RX Antenna Pattern Consistency",
|
||||||
[29] = "TX Antenna Pattern Consistency",
|
[29] = "TX Antenna Pattern Consistency",
|
||||||
[30 ... 31] = "Extended NSS BW Support",
|
[30 ... 31] = "Extended NSS BW Support",
|
||||||
|
@ -234,7 +234,7 @@ uint32_t anqp_request(uint64_t wdev_id, const uint8_t *addr,
|
|||||||
request->anqp_cb = cb;
|
request->anqp_cb = cb;
|
||||||
request->anqp_destroy = destroy;
|
request->anqp_destroy = destroy;
|
||||||
/*
|
/*
|
||||||
* WPA3 Specificiation version 3, Section 9.4:
|
* WPA3 Specification version 3, Section 9.4:
|
||||||
* "A STA shall use a randomized dialog token for every new GAS
|
* "A STA shall use a randomized dialog token for every new GAS
|
||||||
* exchange."
|
* exchange."
|
||||||
*/
|
*/
|
||||||
|
2
src/ap.h
2
src/ap.h
@ -79,7 +79,7 @@ struct ap_ops {
|
|||||||
void *user_data);
|
void *user_data);
|
||||||
/*
|
/*
|
||||||
* If not null, writes extra IEs to be added to the outgoing frame of
|
* If not null, writes extra IEs to be added to the outgoing frame of
|
||||||
* given type and, if it's not a beacon frame, in reponse to a given
|
* given type and, if it's not a beacon frame, in response to a given
|
||||||
* client frame. May also react to the extra IEs in that frame.
|
* client frame. May also react to the extra IEs in that frame.
|
||||||
* Returns the number of bytes written which must be less than or
|
* Returns the number of bytes written which must be less than or
|
||||||
* equal to the number returned by .get_extra_ies_len when called
|
* equal to the number returned by .get_extra_ies_len when called
|
||||||
|
@ -2001,7 +2001,7 @@ static void dpp_offchannel_timeout(int error, void *user_data)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* We have a pending agent request but it did not arrive in
|
* We have a pending agent request but it did not arrive in
|
||||||
* time, we cant assume the enrollee will be waiting around
|
* time, we can't assume the enrollee will be waiting around
|
||||||
* for our response so cancel the request and continue waiting
|
* for our response so cancel the request and continue waiting
|
||||||
* for another request
|
* for another request
|
||||||
*/
|
*/
|
||||||
@ -2722,7 +2722,7 @@ static void dpp_handle_pkex_exchange_response(struct dpp_sm *dpp,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (version && version != dpp->pkex_version) {
|
if (version && version != dpp->pkex_version) {
|
||||||
l_debug("PKEX version does not match, igoring");
|
l_debug("PKEX version does not match, ignoring");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3438,7 +3438,7 @@ static void dpp_handle_pkex_commit_reveal_request(struct dpp_sm *dpp,
|
|||||||
dpp->peer_boot_public = l_ecc_point_from_data(dpp->curve,
|
dpp->peer_boot_public = l_ecc_point_from_data(dpp->curve,
|
||||||
L_ECC_POINT_TYPE_FULL, key, key_len);
|
L_ECC_POINT_TYPE_FULL, key, key_len);
|
||||||
if (!dpp->peer_boot_public) {
|
if (!dpp->peer_boot_public) {
|
||||||
l_debug("peers boostrapping key did not validate");
|
l_debug("peers bootstrapping key did not validate");
|
||||||
goto failed;
|
goto failed;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3598,7 +3598,7 @@ static void dpp_mlme_notify(struct l_genl_msg *msg, void *user_data)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Only want to handle the no-ACK case. Re-transmitting an ACKed
|
* Only want to handle the no-ACK case. Re-transmitting an ACKed
|
||||||
* frame likely wont do any good, at least in the case of DPP.
|
* frame likely won't do any good, at least in the case of DPP.
|
||||||
*/
|
*/
|
||||||
if (!ack)
|
if (!ack)
|
||||||
goto retransmit;
|
goto retransmit;
|
||||||
|
@ -165,7 +165,7 @@ static void __eap_tls_common_state_reset(struct eap_state *eap)
|
|||||||
*
|
*
|
||||||
* Drop the cache even if we have no indication that the
|
* Drop the cache even if we have no indication that the
|
||||||
* method failed but it just didn't succeed, to handle cases like
|
* method failed but it just didn't succeed, to handle cases like
|
||||||
* the server getting stuck and a timout occuring at a higher
|
* the server getting stuck and a timeout occurring at a higher
|
||||||
* layer. The risk is that we may occasionally flush the session
|
* layer. The risk is that we may occasionally flush the session
|
||||||
* data when there was only a momentary radio issue, invalid
|
* data when there was only a momentary radio issue, invalid
|
||||||
* phase2 credentials or decision to abort. Those are not hot
|
* phase2 credentials or decision to abort. Those are not hot
|
||||||
|
@ -209,7 +209,7 @@ connect to that network.
|
|||||||
* - PasswordIdentifier
|
* - PasswordIdentifier
|
||||||
- string
|
- string
|
||||||
|
|
||||||
An identifer string to be used with the passphrase. This is used for
|
An identifier string to be used with the passphrase. This is used for
|
||||||
WPA3-Personal (SAE) networks if the security has enabled password
|
WPA3-Personal (SAE) networks if the security has enabled password
|
||||||
identifiers for clients.
|
identifiers for clients.
|
||||||
* - PreSharedKey
|
* - PreSharedKey
|
||||||
|
@ -82,7 +82,7 @@ bool mschap_challenge_response(const uint8_t *challenge,
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Hash the utf8 encoded nt password.
|
* Hash the utf8 encoded nt password.
|
||||||
* It is asumed, that the password is valid utf8!
|
* It is assumed, that the password is valid utf8!
|
||||||
* The rfc says "unicode-char", but never specifies which encoding.
|
* The rfc says "unicode-char", but never specifies which encoding.
|
||||||
* This function converts the password to ucs-2.
|
* This function converts the password to ucs-2.
|
||||||
* The example in the code uses LE for the unicode chars, so it is forced here.
|
* The example in the code uses LE for the unicode chars, so it is forced here.
|
||||||
|
@ -622,7 +622,7 @@ bool netconfig_get_fils_ip_req(struct netconfig *netconfig,
|
|||||||
struct ie_fils_ip_addr_request_info *info)
|
struct ie_fils_ip_addr_request_info *info)
|
||||||
{
|
{
|
||||||
/*
|
/*
|
||||||
* Fill in the fields used for building the FILS IP Address Assigment
|
* Fill in the fields used for building the FILS IP Address Assignment
|
||||||
* IE during connection if we're configured to do automatic network
|
* IE during connection if we're configured to do automatic network
|
||||||
* configuration (usually DHCP). If we're configured with static
|
* configuration (usually DHCP). If we're configured with static
|
||||||
* values return false to mean the IE should not be sent.
|
* values return false to mean the IE should not be sent.
|
||||||
|
@ -2169,7 +2169,7 @@ static void netdev_set_pmk(struct handshake_state *hs, const uint8_t *pmk,
|
|||||||
struct netdev_handshake_state, super);
|
struct netdev_handshake_state, super);
|
||||||
struct netdev *netdev = nhs->netdev;
|
struct netdev *netdev = nhs->netdev;
|
||||||
|
|
||||||
/* Only relevent for 8021x offload */
|
/* Only relevant for 8021x offload */
|
||||||
if (nhs->type != CONNECTION_TYPE_8021X_OFFLOAD)
|
if (nhs->type != CONNECTION_TYPE_8021X_OFFLOAD)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
@ -2281,7 +2281,7 @@ static void netdev_qos_map_cb(struct l_genl_msg *msg, void *user_data)
|
|||||||
return;
|
return;
|
||||||
|
|
||||||
ext_error = l_genl_msg_get_extended_error(msg);
|
ext_error = l_genl_msg_get_extended_error(msg);
|
||||||
l_error("Couuld not set QoS Map in kernel: %s",
|
l_error("Could not set QoS Map in kernel: %s",
|
||||||
ext_error ? ext_error : strerror(-err));
|
ext_error ? ext_error : strerror(-err));
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2354,7 +2354,7 @@ static void netdev_get_oci_cb(struct l_genl_msg *msg, void *user_data)
|
|||||||
done:
|
done:
|
||||||
if (netdev->ap) {
|
if (netdev->ap) {
|
||||||
/*
|
/*
|
||||||
* Cant do much here. IWD assumes every kernel/driver supports
|
* Can't do much here. IWD assumes every kernel/driver supports
|
||||||
* this. There is no way of detecting support either.
|
* this. There is no way of detecting support either.
|
||||||
*/
|
*/
|
||||||
if (L_WARN_ON(err < 0))
|
if (L_WARN_ON(err < 0))
|
||||||
|
@ -293,7 +293,7 @@ static void offchannel_mlme_notify(struct l_genl_msg *msg, void *user_data)
|
|||||||
* - an event coming from an external ROC request (we just
|
* - an event coming from an external ROC request (we just
|
||||||
* happened to have also sent an ROC request).
|
* happened to have also sent an ROC request).
|
||||||
*
|
*
|
||||||
* We can't tell where the event originated until we recieve our
|
* We can't tell where the event originated until we receive our
|
||||||
* ACK so set early_cookie to track it.
|
* ACK so set early_cookie to track it.
|
||||||
*/
|
*/
|
||||||
if (i->roc_cmd_id != 0 && l_genl_family_request_sent(nl80211,
|
if (i->roc_cmd_id != 0 && l_genl_family_request_sent(nl80211,
|
||||||
|
@ -2217,7 +2217,7 @@ static bool p2p_go_negotiation_confirm_cb(const struct mmpdu_header *mpdu,
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Start setting the group up right away and we'll add the
|
* Start setting the group up right away and we'll add the
|
||||||
* client's Configuation Timeout to the WSC start timeout's
|
* client's Configuration Timeout to the WSC start timeout's
|
||||||
* value.
|
* value.
|
||||||
*/
|
*/
|
||||||
p2p_device_interface_create(dev);
|
p2p_device_interface_create(dev);
|
||||||
@ -2549,7 +2549,7 @@ static void p2p_go_negotiation_confirm_done(int error, void *user_data)
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Frame was ACKed. On the GO start setting the group up right
|
* Frame was ACKed. On the GO start setting the group up right
|
||||||
* away and we'll add the client's Configuation Timeout to the
|
* away and we'll add the client's Configuration Timeout to the
|
||||||
* WSC start timeout's value. On the client wait idly the
|
* WSC start timeout's value. On the client wait idly the
|
||||||
* maximum amount of time indicated by the peer in the GO
|
* maximum amount of time indicated by the peer in the GO
|
||||||
* Negotiation Response's Configuration Timeout attribute and
|
* Negotiation Response's Configuration Timeout attribute and
|
||||||
@ -2951,7 +2951,7 @@ static bool p2p_provision_disc_resp_cb(const struct mmpdu_header *mpdu,
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Indended P2P Interface address is optional, we don't have the
|
* Intended P2P Interface address is optional, we don't have the
|
||||||
* BSSID of the group here.
|
* BSSID of the group here.
|
||||||
*
|
*
|
||||||
* We might want to make sure that Group Formation is false but the
|
* We might want to make sure that Group Formation is false but the
|
||||||
|
@ -258,7 +258,7 @@ static struct l_ecc_scalar *sae_pwd_value(const struct l_ecc_curve *curve,
|
|||||||
is_in_range = util_secure_fill_with_msb(is_in_range);
|
is_in_range = util_secure_fill_with_msb(is_in_range);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* libell has public Legendre symbol only for l_ecc_scalar, but they
|
* ELL has public Legendre symbol only for l_ecc_scalar, but they
|
||||||
* cannot be created if the coordinate is greater than the p. Hence,
|
* cannot be created if the coordinate is greater than the p. Hence,
|
||||||
* to avoid control flow dependencies, we replace pwd_value by a dummy
|
* to avoid control flow dependencies, we replace pwd_value by a dummy
|
||||||
* quadratic non residue if we generate a value >= prime.
|
* quadratic non residue if we generate a value >= prime.
|
||||||
|
@ -1381,7 +1381,7 @@ static struct handshake_state *station_handshake_setup(struct station *station,
|
|||||||
handshake_state_set_vendor_ies(hs, vendor_ies, iov_elems);
|
handshake_state_set_vendor_ies(hs, vendor_ies, iov_elems);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* It can't hurt to try the FILS IP Address Assigment independent of
|
* It can't hurt to try the FILS IP Address Assignment independent of
|
||||||
* which auth-proto is actually used.
|
* which auth-proto is actually used.
|
||||||
*/
|
*/
|
||||||
if (station->netconfig && netconfig_get_fils_ip_req(station->netconfig,
|
if (station->netconfig && netconfig_get_fils_ip_req(station->netconfig,
|
||||||
@ -1915,7 +1915,7 @@ static void station_reset_connection_state(struct station *station)
|
|||||||
/*
|
/*
|
||||||
* Perform this step last since calling network_disconnected() might
|
* Perform this step last since calling network_disconnected() might
|
||||||
* result in the removal of the network (for example if provisioning
|
* result in the removal of the network (for example if provisioning
|
||||||
* a new hidden network fails with an incorrect pasword).
|
* a new hidden network fails with an incorrect password).
|
||||||
*/
|
*/
|
||||||
if (station->state == STATION_STATE_CONNECTED ||
|
if (station->state == STATION_STATE_CONNECTED ||
|
||||||
station->state == STATION_STATE_CONNECTING ||
|
station->state == STATION_STATE_CONNECTING ||
|
||||||
@ -3095,7 +3095,7 @@ static void station_roam_timeout_rearm(struct station *station, int seconds)
|
|||||||
if (!station->roam_trigger_timeout)
|
if (!station->roam_trigger_timeout)
|
||||||
goto new_timeout;
|
goto new_timeout;
|
||||||
|
|
||||||
/* If we cant get the remaining time just create a new timer */
|
/* If we can't get the remaining time just create a new timer */
|
||||||
if (L_WARN_ON(!l_timeout_remaining(station->roam_trigger_timeout,
|
if (L_WARN_ON(!l_timeout_remaining(station->roam_trigger_timeout,
|
||||||
&remaining))) {
|
&remaining))) {
|
||||||
l_timeout_remove(station->roam_trigger_timeout);
|
l_timeout_remove(station->roam_trigger_timeout);
|
||||||
|
@ -535,7 +535,7 @@ int __storage_decrypt(struct l_settings *settings, const char *ssid,
|
|||||||
|
|
||||||
/*
|
/*
|
||||||
* Load decrypted data into existing settings. This is not how the API
|
* Load decrypted data into existing settings. This is not how the API
|
||||||
* is indended to be used (since this could result in duplicate groups)
|
* is intended to be used (since this could result in duplicate groups)
|
||||||
* but since the Security group was just removed and EncryptedSecurity
|
* but since the Security group was just removed and EncryptedSecurity
|
||||||
* should only contain a Security group its safe to use it this way.
|
* should only contain a Security group its safe to use it this way.
|
||||||
*/
|
*/
|
||||||
|
@ -276,7 +276,7 @@ bool util_ip_prefix_tohl(const char *ip, uint8_t *prefix_out,
|
|||||||
/* 'i' will be at most INET_ADDRSTRLEN - 1 */
|
/* 'i' will be at most INET_ADDRSTRLEN - 1 */
|
||||||
l_strlcpy(no_prefix, ip, i + 1);
|
l_strlcpy(no_prefix, ip, i + 1);
|
||||||
|
|
||||||
/* Check if IP preceeding prefix is valid */
|
/* Check if IP preceding prefix is valid */
|
||||||
if (inet_pton(AF_INET, no_prefix, &ia) != 1 || ia.s_addr == 0)
|
if (inet_pton(AF_INET, no_prefix, &ia) != 1 || ia.s_addr == 0)
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
|
@ -2286,7 +2286,7 @@ static void wiphy_dump_after_regdom(struct wiphy *wiphy)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Another update while dumping wiphy. This next dump should supercede
|
* Another update while dumping wiphy. This next dump should supersede
|
||||||
* the first and not result in a DONE event until this new dump is
|
* the first and not result in a DONE event until this new dump is
|
||||||
* finished. This is because the disabled frequencies are in an unknown
|
* finished. This is because the disabled frequencies are in an unknown
|
||||||
* state and could cause incorrect behavior by any watchers.
|
* state and could cause incorrect behavior by any watchers.
|
||||||
|
@ -75,7 +75,7 @@ static bool secret_from_file(const char *file)
|
|||||||
|
|
||||||
fd = open(file, O_RDONLY, 0);
|
fd = open(file, O_RDONLY, 0);
|
||||||
if (fd < 0) {
|
if (fd < 0) {
|
||||||
printf("Cant open %s (%d)\n", file, fd);
|
printf("Can't open %s (%d)\n", file, fd);
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -119,7 +119,7 @@ class VirtualRadio(Radio):
|
|||||||
'''
|
'''
|
||||||
A subclass of 'Radio' specific to mac80211_hwsim radios.
|
A subclass of 'Radio' specific to mac80211_hwsim radios.
|
||||||
|
|
||||||
TODO: Using D-Bus to create and destroy radios is more desireable
|
TODO: Using D-Bus to create and destroy radios is more desirable
|
||||||
than the command line.
|
than the command line.
|
||||||
'''
|
'''
|
||||||
|
|
||||||
@ -400,7 +400,7 @@ class TestContext(Namespace):
|
|||||||
# just given to hostapd/IWD as they appear during
|
# just given to hostapd/IWD as they appear during
|
||||||
# discovery.
|
# discovery.
|
||||||
#
|
#
|
||||||
# TODO: It may be desireable to map PCI/USB adapters to
|
# TODO: It may be desirable to map PCI/USB adapters to
|
||||||
# specific radX radios specified in the config but
|
# specific radX radios specified in the config but
|
||||||
# there are really 2 separate use cases here.
|
# there are really 2 separate use cases here.
|
||||||
# 1. You want to test a *specific* radio with IWD
|
# 1. You want to test a *specific* radio with IWD
|
||||||
@ -482,7 +482,7 @@ class TestContext(Namespace):
|
|||||||
def start_ofono(self):
|
def start_ofono(self):
|
||||||
sim_keys = self.hw_config['SETUP'].get('sim_keys', None)
|
sim_keys = self.hw_config['SETUP'].get('sim_keys', None)
|
||||||
if not sim_keys:
|
if not sim_keys:
|
||||||
print("Ofono not requred")
|
print("Ofono not required")
|
||||||
return
|
return
|
||||||
elif sim_keys != 'ofono':
|
elif sim_keys != 'ofono':
|
||||||
os.environ['IWD_SIM_KEYS'] = sim_keys
|
os.environ['IWD_SIM_KEYS'] = sim_keys
|
||||||
@ -731,7 +731,7 @@ def start_test(ctx, subtests, rqueue):
|
|||||||
func, file = str(t).split(' ')
|
func, file = str(t).split(' ')
|
||||||
#
|
#
|
||||||
# TODO: There may be a better way of doing this
|
# TODO: There may be a better way of doing this
|
||||||
# but strigifying the test class gives us a string:
|
# but stringifying the test class gives us a string:
|
||||||
# <function> (<file>.<class>)
|
# <function> (<file>.<class>)
|
||||||
#
|
#
|
||||||
file = file.strip('()').split('.')[0] + '.py'
|
file = file.strip('()').split('.')[0] + '.py'
|
||||||
@ -981,7 +981,7 @@ def run_auto_tests(ctx, args):
|
|||||||
p = multiprocessing.Process(target=start_test, args=(ctx, subtests, rqueue))
|
p = multiprocessing.Process(target=start_test, args=(ctx, subtests, rqueue))
|
||||||
p.start()
|
p.start()
|
||||||
# Rather than time each subtest we just time the total but
|
# Rather than time each subtest we just time the total but
|
||||||
# mutiply the default time by the number of tests being run.
|
# multiply the default time by the number of tests being run.
|
||||||
p.join(int(args.timeout) * len(subtests))
|
p.join(int(args.timeout) * len(subtests))
|
||||||
|
|
||||||
if p.is_alive():
|
if p.is_alive():
|
||||||
|
@ -133,7 +133,7 @@ class Process(subprocess.Popen):
|
|||||||
f.write(stamp + ': ')
|
f.write(stamp + ': ')
|
||||||
|
|
||||||
# Write out a separator so multiple process calls per
|
# Write out a separator so multiple process calls per
|
||||||
# test are easer to read.
|
# test are easier to read.
|
||||||
if instance.hup:
|
if instance.hup:
|
||||||
f.write("Terminated: {}\n\n".format(instance.args))
|
f.write("Terminated: {}\n\n".format(instance.args))
|
||||||
|
|
||||||
|
@ -51,7 +51,7 @@ static void cmac_test(const void *data)
|
|||||||
for (i = 0; i < test->tag_len; i++)
|
for (i = 0; i < test->tag_len; i++)
|
||||||
sprintf(tag_str + (i * 2), "%02x", test->tag[i]);
|
sprintf(tag_str + (i * 2), "%02x", test->tag[i]);
|
||||||
|
|
||||||
printf("Tag = %s (%zu octects)\n", tag_str, test->tag_len);
|
printf("Tag = %s (%zu octets)\n", tag_str, test->tag_len);
|
||||||
|
|
||||||
result = cmac_aes(test->key, test->key_len,
|
result = cmac_aes(test->key, test->key_len,
|
||||||
test->msg, test->msg_len, tag, test->tag_len);
|
test->msg, test->msg_len, tag, test->tag_len);
|
||||||
|
@ -50,7 +50,7 @@ static void hmac_test(const void *data)
|
|||||||
|
|
||||||
hmac_len = strlen(test->hmac) / 2;
|
hmac_len = strlen(test->hmac) / 2;
|
||||||
|
|
||||||
printf("HMAC = %s (%d octects)\n", test->hmac, hmac_len);
|
printf("HMAC = %s (%d octets)\n", test->hmac, hmac_len);
|
||||||
|
|
||||||
result = hmac_md5(test->key, test->key_len,
|
result = hmac_md5(test->key, test->key_len,
|
||||||
test->data, test->data_len, output, hmac_len);
|
test->data, test->data_len, output, hmac_len);
|
||||||
|
@ -50,7 +50,7 @@ static void hmac_test(const void *data)
|
|||||||
|
|
||||||
hmac_len = strlen(test->hmac) / 2;
|
hmac_len = strlen(test->hmac) / 2;
|
||||||
|
|
||||||
printf("HMAC = %s (%d octects)\n", test->hmac, hmac_len);
|
printf("HMAC = %s (%d octets)\n", test->hmac, hmac_len);
|
||||||
|
|
||||||
result = hmac_sha1(test->key, test->key_len,
|
result = hmac_sha1(test->key, test->key_len,
|
||||||
test->data, test->data_len, output, hmac_len);
|
test->data, test->data_len, output, hmac_len);
|
||||||
|
@ -50,7 +50,7 @@ static void hmac_test(const void *data)
|
|||||||
|
|
||||||
hmac_len = strlen(test->hmac) / 2;
|
hmac_len = strlen(test->hmac) / 2;
|
||||||
|
|
||||||
printf("HMAC = %s (%d octects)\n", test->hmac, hmac_len);
|
printf("HMAC = %s (%d octets)\n", test->hmac, hmac_len);
|
||||||
|
|
||||||
result = hmac_sha256(test->key, test->key_len,
|
result = hmac_sha256(test->key, test->key_len,
|
||||||
test->data, test->data_len, output, hmac_len);
|
test->data, test->data_len, output, hmac_len);
|
||||||
|
@ -52,7 +52,7 @@ static void kdf_test(const void *data)
|
|||||||
|
|
||||||
kdf_len = strlen(test->kdf) / 2;
|
kdf_len = strlen(test->kdf) / 2;
|
||||||
|
|
||||||
printf("PRF = %s (%d octects)\n", test->kdf, kdf_len);
|
printf("PRF = %s (%d octets)\n", test->kdf, kdf_len);
|
||||||
|
|
||||||
result = kdf_sha256(test->key, test->key_len, test->prefix,
|
result = kdf_sha256(test->key, test->key_len, test->prefix,
|
||||||
test->prefix_len, test->data, test->data_len,
|
test->prefix_len, test->data, test->data_len,
|
||||||
|
@ -52,7 +52,7 @@ static void prf_test(const void *data)
|
|||||||
|
|
||||||
prf_len = strlen(test->prf) / 2;
|
prf_len = strlen(test->prf) / 2;
|
||||||
|
|
||||||
printf("PRF = %s (%d octects)\n", test->prf, prf_len);
|
printf("PRF = %s (%d octets)\n", test->prf, prf_len);
|
||||||
|
|
||||||
result = prf_sha1(test->key, test->key_len, test->prefix,
|
result = prf_sha1(test->key, test->key_len, test->prefix,
|
||||||
test->prefix_len, test->data, test->data_len,
|
test->prefix_len, test->data, test->data_len,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user