aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2022-01-17 15:48:49 +0000
committerCy Schubert <cy@FreeBSD.org>2022-01-17 15:48:49 +0000
commit03f33dd0772867358dffaf3a8b5ddf42842aaf55 (patch)
treec9ae839eab1522fe3ea6145ea085ab3f58049441
parent7b54fad80747371c628e848d3cc53ea9a5e21c14 (diff)
downloadsrc-vendor/wpa/2.10.tar.gz
src-vendor/wpa/2.10.zip
wpa: Import wpa 2.10vendor/wpa/2.10
The long awaited wpa 2.10 is finally here.
-rw-r--r--.gitignore8
-rw-r--r--Android.mk10
-rw-r--r--CONTRIBUTIONS2
-rw-r--r--COPYING2
-rw-r--r--README2
-rwxr-xr-xbuild_release47
-rw-r--r--doc/.gitignore14
-rw-r--r--doc/Makefile42
-rw-r--r--doc/code_structure.doxygen315
-rw-r--r--doc/ctrl_iface.doxygen1054
-rw-r--r--doc/dbus.doxygen2428
-rw-r--r--doc/directories.doxygen90
-rw-r--r--doc/doxygen.conf1547
-rw-r--r--doc/driver_wrapper.doxygen180
-rw-r--r--doc/eap.doxygen87
-rw-r--r--doc/eap_server.doxygen56
-rw-r--r--doc/hostapd.fig264
-rw-r--r--doc/hostapd_ctrl_iface.doxygen66
-rw-r--r--doc/mainpage.doxygen95
-rw-r--r--doc/p2p.doxygen471
-rw-r--r--doc/p2p_arch.dot85
-rw-r--r--doc/p2p_arch2.dot85
-rw-r--r--doc/p2p_sm.dot62
-rw-r--r--doc/porting.doxygen209
-rw-r--r--doc/testing_tools.doxygen201
-rw-r--r--doc/wpa_supplicant.fig247
-rw-r--r--eap_example/.gitignore4
-rw-r--r--eap_example/Makefile119
-rw-r--r--eap_example/README42
-rw-r--r--eap_example/ca.pem55
-rw-r--r--eap_example/dh.conf5
-rw-r--r--eap_example/eap_example.c47
-rw-r--r--eap_example/eap_example_peer.c377
-rw-r--r--eap_example/eap_example_server.c300
-rw-r--r--eap_example/server-key.pem15
-rw-r--r--eap_example/server.key16
-rw-r--r--eap_example/server.pem64
-rw-r--r--hostapd/ChangeLog43
-rw-r--r--hostapd/README2
-rw-r--r--hostapd/hostapd_cli.c4
-rw-r--r--hostapd/main.c4
-rw-r--r--hs20/client/.gitignore4
-rw-r--r--hs20/client/Android.mk81
-rw-r--r--hs20/client/Makefile81
-rw-r--r--hs20/client/devdetail.xml47
-rw-r--r--hs20/client/devinfo.xml7
-rw-r--r--hs20/client/est.c769
-rw-r--r--hs20/client/oma_dm_client.c1398
-rw-r--r--hs20/client/osu_client.c3431
-rw-r--r--hs20/client/osu_client.h121
-rw-r--r--hs20/client/spp_client.c1004
-rw-r--r--hs20/server/.gitignore1
-rw-r--r--hs20/server/Makefile42
-rwxr-xr-xhs20/server/ca/clean.sh13
-rw-r--r--hs20/server/ca/est-csrattrs.cnf17
-rwxr-xr-xhs20/server/ca/est-csrattrs.sh4
-rw-r--r--hs20/server/ca/hs20.oid7
-rwxr-xr-xhs20/server/ca/ocsp-req.sh11
-rwxr-xr-xhs20/server/ca/ocsp-responder-ica.sh3
-rwxr-xr-xhs20/server/ca/ocsp-responder.sh3
-rwxr-xr-xhs20/server/ca/ocsp-update-cache.sh11
-rw-r--r--hs20/server/ca/openssl-root.cnf125
-rw-r--r--hs20/server/ca/openssl.cnf200
-rwxr-xr-xhs20/server/ca/setup.sh209
-rw-r--r--hs20/server/ca/w1fi_logo.pngbin7549 -> 0 bytes
-rw-r--r--hs20/server/hs20-osu-server.txt262
-rw-r--r--hs20/server/hs20_spp_server.c207
-rw-r--r--hs20/server/spp_server.c2933
-rw-r--r--hs20/server/spp_server.h36
-rw-r--r--hs20/server/sql-example.txt17
-rw-r--r--hs20/server/sql.txt108
-rw-r--r--hs20/server/www/add-free.php50
-rw-r--r--hs20/server/www/add-mo.php56
-rw-r--r--hs20/server/www/cert-enroll.php39
-rw-r--r--hs20/server/www/config.php7
-rw-r--r--hs20/server/www/est.php232
-rw-r--r--hs20/server/www/free-remediation.php19
-rw-r--r--hs20/server/www/free.php23
-rw-r--r--hs20/server/www/redirect.php32
-rw-r--r--hs20/server/www/remediation-pw.php41
-rw-r--r--hs20/server/www/remediation.php55
-rw-r--r--hs20/server/www/signup.php59
-rw-r--r--hs20/server/www/spp.php168
-rw-r--r--hs20/server/www/terms.php87
-rw-r--r--hs20/server/www/users.php377
-rw-r--r--radius_example/.gitignore2
-rw-r--r--radius_example/Makefile28
-rw-r--r--radius_example/README35
-rw-r--r--radius_example/radius_example.c153
-rw-r--r--src/common/dragonfly.c34
-rw-r--r--src/common/dragonfly.h2
-rw-r--r--src/common/qca-vendor.h43
-rw-r--r--src/common/sae.c61
-rw-r--r--src/common/version.h2
-rw-r--r--src/crypto/crypto.h12
-rw-r--r--src/crypto/crypto_openssl.c99
-rw-r--r--src/crypto/crypto_wolfssl.c24
-rw-r--r--src/crypto/tls_openssl.c28
-rw-r--r--src/eap_common/eap_pwd_common.c46
-rw-r--r--tests/.gitignore3
-rw-r--r--tests/Makefile99
-rw-r--r--tests/README123
-rw-r--r--tests/cipher-and-key-mgmt-testing.txt377
-rw-r--r--tests/fuzzing/README23
-rw-r--r--tests/fuzzing/ap-mgmt/.gitignore1
-rw-r--r--tests/fuzzing/ap-mgmt/Makefile44
-rw-r--r--tests/fuzzing/ap-mgmt/ap-mgmt.c167
-rw-r--r--tests/fuzzing/ap-mgmt/corpus/multi-sae-ffc.datbin506 -> 0 bytes
-rw-r--r--tests/fuzzing/ap-mgmt/corpus/multi-sae.datbin346 -> 0 bytes
-rw-r--r--tests/fuzzing/ap-mgmt/corpus/multi.datbin246 -> 0 bytes
-rw-r--r--tests/fuzzing/asn1/.gitignore1
-rw-r--r--tests/fuzzing/asn1/Makefile23
-rw-r--r--tests/fuzzing/asn1/asn1.c184
-rw-r--r--tests/fuzzing/asn1/corpus/ca.derbin560 -> 0 bytes
-rw-r--r--tests/fuzzing/asn1/corpus/ocsp-multi-server-cache.derbin346 -> 0 bytes
-rw-r--r--tests/fuzzing/asn1/corpus/ocsp-req.derbin76 -> 0 bytes
-rwxr-xr-xtests/fuzzing/build-test.sh19
-rw-r--r--tests/fuzzing/dpp-uri/.gitignore1
-rw-r--r--tests/fuzzing/dpp-uri/Makefile43
-rw-r--r--tests/fuzzing/dpp-uri/corpus/1.dat1
-rw-r--r--tests/fuzzing/dpp-uri/corpus/2.dat1
-rw-r--r--tests/fuzzing/dpp-uri/corpus/3.dat1
-rw-r--r--tests/fuzzing/dpp-uri/dpp-uri.c51
-rw-r--r--tests/fuzzing/eap-aka-peer/.gitignore1
-rw-r--r--tests/fuzzing/eap-aka-peer/Makefile26
-rw-r--r--tests/fuzzing/eap-aka-peer/corpus/server.msgbin520 -> 0 bytes
-rw-r--r--tests/fuzzing/eap-aka-peer/eap-aka-peer.c133
-rw-r--r--tests/fuzzing/eap-mschapv2-peer/.gitignore1
-rw-r--r--tests/fuzzing/eap-mschapv2-peer/Makefile25
-rw-r--r--tests/fuzzing/eap-mschapv2-peer/corpus/server.msgbin304 -> 0 bytes
-rw-r--r--tests/fuzzing/eap-mschapv2-peer/eap-mschapv2-peer.c152
-rw-r--r--tests/fuzzing/eap-sim-peer/.gitignore1
-rw-r--r--tests/fuzzing/eap-sim-peer/Makefile26
-rw-r--r--tests/fuzzing/eap-sim-peer/corpus/server.msgbin340 -> 0 bytes
-rw-r--r--tests/fuzzing/eap-sim-peer/eap-sim-peer.c127
-rw-r--r--tests/fuzzing/eapol-key-auth/.gitignore1
-rw-r--r--tests/fuzzing/eapol-key-auth/Makefile34
-rw-r--r--tests/fuzzing/eapol-key-auth/corpus/supp.msgbin549 -> 0 bytes
-rw-r--r--tests/fuzzing/eapol-key-auth/eapol-key-auth.c328
-rw-r--r--tests/fuzzing/eapol-key-supp/.gitignore1
-rw-r--r--tests/fuzzing/eapol-key-supp/Makefile30
-rw-r--r--tests/fuzzing/eapol-key-supp/corpus/auth.msgbin580 -> 0 bytes
-rw-r--r--tests/fuzzing/eapol-key-supp/eapol-key-supp.c331
-rw-r--r--tests/fuzzing/eapol-supp/.gitignore1
-rw-r--r--tests/fuzzing/eapol-supp/Makefile28
-rw-r--r--tests/fuzzing/eapol-supp/corpus/eap-req-identity.datbin9 -> 0 bytes
-rw-r--r--tests/fuzzing/eapol-supp/corpus/eap-req-sim.datbin24 -> 0 bytes
-rw-r--r--tests/fuzzing/eapol-supp/corpus/eapol-key-m1.datbin99 -> 0 bytes
-rw-r--r--tests/fuzzing/eapol-supp/eapol-supp.c198
-rw-r--r--tests/fuzzing/fuzzer-common.c56
-rw-r--r--tests/fuzzing/fuzzer-common.h14
-rw-r--r--tests/fuzzing/json/.gitignore1
-rw-r--r--tests/fuzzing/json/Makefile23
-rw-r--r--tests/fuzzing/json/corpus/1.json1
-rw-r--r--tests/fuzzing/json/corpus/2.json1
-rw-r--r--tests/fuzzing/json/corpus/3.json1
-rw-r--r--tests/fuzzing/json/json.c38
-rw-r--r--tests/fuzzing/p2p/.gitignore1
-rw-r--r--tests/fuzzing/p2p/Makefile23
-rw-r--r--tests/fuzzing/p2p/corpus/go-neg-req.datbin155 -> 0 bytes
-rw-r--r--tests/fuzzing/p2p/corpus/invitation-req.datbin123 -> 0 bytes
-rw-r--r--tests/fuzzing/p2p/corpus/p2ps-pd-req.datbin189 -> 0 bytes
-rw-r--r--tests/fuzzing/p2p/corpus/proberesp-go.datbin306 -> 0 bytes
-rw-r--r--tests/fuzzing/p2p/corpus/proberesp.datbin209 -> 0 bytes
-rw-r--r--tests/fuzzing/p2p/p2p.c178
-rw-r--r--tests/fuzzing/rules.include31
-rw-r--r--tests/fuzzing/sae/.gitignore1
-rw-r--r--tests/fuzzing/sae/Makefile28
-rw-r--r--tests/fuzzing/sae/corpus/sae-commit-h2e-rejected-groups.datbin102 -> 0 bytes
-rw-r--r--tests/fuzzing/sae/corpus/sae-commit-h2e-token.datbin101 -> 0 bytes
-rw-r--r--tests/fuzzing/sae/corpus/sae-commit-pw-id.datbin101 -> 0 bytes
-rw-r--r--tests/fuzzing/sae/corpus/sae-commit-token.datbin130 -> 0 bytes
-rw-r--r--tests/fuzzing/sae/corpus/sae-commit-valid.datbin98 -> 0 bytes
-rw-r--r--tests/fuzzing/sae/sae.c39
-rw-r--r--tests/fuzzing/tls-client/.gitignore1
-rw-r--r--tests/fuzzing/tls-client/Makefile32
-rw-r--r--tests/fuzzing/tls-client/corpus/server.msgbin1902 -> 0 bytes
-rw-r--r--tests/fuzzing/tls-client/tls-client.c154
-rw-r--r--tests/fuzzing/tls-server/.gitignore1
-rw-r--r--tests/fuzzing/tls-server/Makefile32
-rw-r--r--tests/fuzzing/tls-server/corpus/client.msgbin391 -> 0 bytes
-rw-r--r--tests/fuzzing/tls-server/tls-server.c157
-rw-r--r--tests/fuzzing/wnm/.gitignore1
-rw-r--r--tests/fuzzing/wnm/Makefile60
-rw-r--r--tests/fuzzing/wnm/corpus/bss-tm-req.datbin31 -> 0 bytes
-rw-r--r--tests/fuzzing/wnm/corpus/oss-fuzz-0001.datbin64 -> 0 bytes
-rw-r--r--tests/fuzzing/wnm/corpus/oss-fuzz-0002.datbin104 -> 0 bytes
-rw-r--r--tests/fuzzing/wnm/corpus/wnm-notif.datbin56 -> 0 bytes
-rw-r--r--tests/fuzzing/wnm/wnm.c99
-rw-r--r--tests/fuzzing/x509/.gitignore1
-rw-r--r--tests/fuzzing/x509/Makefile27
-rw-r--r--tests/fuzzing/x509/corpus/ca.derbin560 -> 0 bytes
-rw-r--r--tests/fuzzing/x509/corpus/oss-fuzz-154081
-rw-r--r--tests/fuzzing/x509/x509.c25
-rw-r--r--tests/hwsim/.gitignore1
-rw-r--r--tests/hwsim/README220
-rw-r--r--tests/hwsim/auth_serv/as.conf27
-rw-r--r--tests/hwsim/auth_serv/as2.conf24
-rw-r--r--tests/hwsim/auth_serv/ca-and-crl-expired.pem90
-rw-r--r--tests/hwsim/auth_serv/ca-and-crl.pem90
-rw-r--r--tests/hwsim/auth_serv/ca-incorrect-key.pem28
-rw-r--r--tests/hwsim/auth_serv/ca-incorrect.derbin902 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/ca-incorrect.pem79
-rw-r--r--tests/hwsim/auth_serv/ca-key.pem28
-rw-r--r--tests/hwsim/auth_serv/ca.derbin868 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/ca.pem79
-rw-r--r--tests/hwsim/auth_serv/dh.conf8
-rw-r--r--tests/hwsim/auth_serv/dh2.conf8
-rw-r--r--tests/hwsim/auth_serv/dh_param_3072.pem11
-rw-r--r--tests/hwsim/auth_serv/dsaparam.pem14
-rw-r--r--tests/hwsim/auth_serv/eap_user.conf167
-rw-r--r--tests/hwsim/auth_serv/eap_user_vlan.conf7
-rw-r--r--tests/hwsim/auth_serv/ec-ca-openssl.cnf111
-rw-r--r--tests/hwsim/auth_serv/ec-ca.key8
-rw-r--r--tests/hwsim/auth_serv/ec-ca.pem13
-rwxr-xr-xtests/hwsim/auth_serv/ec-generate.sh53
-rw-r--r--tests/hwsim/auth_serv/ec-server.key8
-rw-r--r--tests/hwsim/auth_serv/ec-server.pem53
-rw-r--r--tests/hwsim/auth_serv/ec-user.key8
-rw-r--r--tests/hwsim/auth_serv/ec-user.pem52
-rw-r--r--tests/hwsim/auth_serv/ec2-ca.key9
-rw-r--r--tests/hwsim/auth_serv/ec2-ca.pem15
-rwxr-xr-xtests/hwsim/auth_serv/ec2-generate.sh67
-rw-r--r--tests/hwsim/auth_serv/ec2-server.key9
-rw-r--r--tests/hwsim/auth_serv/ec2-server.pem58
-rw-r--r--tests/hwsim/auth_serv/ec2-user-p256.key8
-rw-r--r--tests/hwsim/auth_serv/ec2-user-p256.pem56
-rw-r--r--tests/hwsim/auth_serv/ec2-user.key9
-rw-r--r--tests/hwsim/auth_serv/ec2-user.pem57
-rw-r--r--tests/hwsim/auth_serv/hlr_auc_gw.gsm17
-rw-r--r--tests/hwsim/auth_serv/hlr_auc_gw.milenage_db16
-rw-r--r--tests/hwsim/auth_serv/iCA-server/ca-and-root.pem160
-rw-r--r--tests/hwsim/auth_serv/iCA-server/cacert.pem81
-rw-r--r--tests/hwsim/auth_serv/iCA-server/careq.pem16
-rw-r--r--tests/hwsim/auth_serv/iCA-server/index.txt2
-rw-r--r--tests/hwsim/auth_serv/iCA-server/index.txt.attr1
-rw-r--r--tests/hwsim/auth_serv/iCA-server/private/cakey.pem28
-rw-r--r--tests/hwsim/auth_serv/iCA-server/serial1
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server-revoked.key28
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server-revoked.pem86
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server-revoked.req16
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server-revoked_and_ica.pem167
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server.key28
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server.pem86
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server.req16
-rw-r--r--tests/hwsim/auth_serv/iCA-server/server_and_ica.pem167
-rw-r--r--tests/hwsim/auth_serv/iCA-user/ca-and-root.pem160
-rw-r--r--tests/hwsim/auth_serv/iCA-user/cacert.pem81
-rw-r--r--tests/hwsim/auth_serv/iCA-user/careq.pem16
-rw-r--r--tests/hwsim/auth_serv/iCA-user/index.txt1
-rw-r--r--tests/hwsim/auth_serv/iCA-user/index.txt.attr1
-rw-r--r--tests/hwsim/auth_serv/iCA-user/private/cakey.pem28
-rw-r--r--tests/hwsim/auth_serv/iCA-user/serial1
-rw-r--r--tests/hwsim/auth_serv/iCA-user/user.key28
-rw-r--r--tests/hwsim/auth_serv/iCA-user/user.pem85
-rw-r--r--tests/hwsim/auth_serv/iCA-user/user.req16
-rw-r--r--tests/hwsim/auth_serv/iCA-user/user_and_ica.pem166
-rwxr-xr-xtests/hwsim/auth_serv/ica-generate.sh87
-rw-r--r--tests/hwsim/auth_serv/index-revoked.txt8
-rw-r--r--tests/hwsim/auth_serv/index-unknown.txt1
-rw-r--r--tests/hwsim/auth_serv/index.txt8
-rw-r--r--tests/hwsim/auth_serv/ocsp-multi-server-cache.derbin493 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/ocsp-req.derbin76 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/ocsp-responder.csr16
-rw-r--r--tests/hwsim/auth_serv/ocsp-responder.key28
-rw-r--r--tests/hwsim/auth_serv/ocsp-responder.pem76
-rw-r--r--tests/hwsim/auth_serv/ocsp-server-cache.derbin490 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/ocsp-server-cache.der-invalidbin343 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/openssl2.cnf147
-rw-r--r--tests/hwsim/auth_serv/radius_clients.conf1
-rw-r--r--tests/hwsim/auth_serv/radius_clients_ipv6.conf1
-rw-r--r--tests/hwsim/auth_serv/radius_clients_none.conf4
-rw-r--r--tests/hwsim/auth_serv/rootCA/index.txt6
-rw-r--r--tests/hwsim/auth_serv/rootCA/index.txt.attr1
-rw-r--r--tests/hwsim/auth_serv/rootCA/serial1
-rw-r--r--tests/hwsim/auth_serv/rsa3072-ca.key40
-rw-r--r--tests/hwsim/auth_serv/rsa3072-ca.pem27
-rwxr-xr-xtests/hwsim/auth_serv/rsa3072-generate.sh83
-rw-r--r--tests/hwsim/auth_serv/rsa3072-server.key40
-rw-r--r--tests/hwsim/auth_serv/rsa3072-server.pem106
-rw-r--r--tests/hwsim/auth_serv/rsa3072-server.req22
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user-rsa2048.key28
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user-rsa2048.pem96
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user-rsa2048.req16
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user.key40
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user.pem106
-rw-r--r--tests/hwsim/auth_serv/rsa3072-user.req21
-rw-r--r--tests/hwsim/auth_serv/server-certpol.csr22
-rw-r--r--tests/hwsim/auth_serv/server-certpol.key40
-rw-r--r--tests/hwsim/auth_serv/server-certpol.pem102
-rw-r--r--tests/hwsim/auth_serv/server-certpol2.csr22
-rw-r--r--tests/hwsim/auth_serv/server-certpol2.key40
-rw-r--r--tests/hwsim/auth_serv/server-certpol2.pem102
-rw-r--r--tests/hwsim/auth_serv/server-eku-client-server.csr16
-rw-r--r--tests/hwsim/auth_serv/server-eku-client-server.key28
-rw-r--r--tests/hwsim/auth_serv/server-eku-client-server.pem85
-rw-r--r--tests/hwsim/auth_serv/server-eku-client.csr16
-rw-r--r--tests/hwsim/auth_serv/server-eku-client.key28
-rw-r--r--tests/hwsim/auth_serv/server-eku-client.pem85
-rw-r--r--tests/hwsim/auth_serv/server-expired.csr16
-rw-r--r--tests/hwsim/auth_serv/server-expired.key28
-rw-r--r--tests/hwsim/auth_serv/server-expired.pem85
-rw-r--r--tests/hwsim/auth_serv/server-extra.pkcs12bin3562 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/server-long-duration.csr27
-rw-r--r--tests/hwsim/auth_serv/server-long-duration.key52
-rw-r--r--tests/hwsim/auth_serv/server-long-duration.pem107
-rw-r--r--tests/hwsim/auth_serv/server-no-dnsname.csr16
-rw-r--r--tests/hwsim/auth_serv/server-no-dnsname.key28
-rw-r--r--tests/hwsim/auth_serv/server-no-dnsname.pem85
-rw-r--r--tests/hwsim/auth_serv/server.csr16
-rw-r--r--tests/hwsim/auth_serv/server.key28
-rw-r--r--tests/hwsim/auth_serv/server.pem87
-rw-r--r--tests/hwsim/auth_serv/server.pkcs12bin2549 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/sha384-server.key40
-rw-r--r--tests/hwsim/auth_serv/sha384-server.pem115
-rw-r--r--tests/hwsim/auth_serv/sha384-user.key38
-rw-r--r--tests/hwsim/auth_serv/sha384-user.pem113
-rw-r--r--tests/hwsim/auth_serv/sha512-ca.key52
-rw-r--r--tests/hwsim/auth_serv/sha512-ca.pem32
-rwxr-xr-xtests/hwsim/auth_serv/sha512-generate.sh75
-rw-r--r--tests/hwsim/auth_serv/sha512-server.key45
-rw-r--r--tests/hwsim/auth_serv/sha512-server.pem120
-rw-r--r--tests/hwsim/auth_serv/sha512-user.key44
-rw-r--r--tests/hwsim/auth_serv/sha512-user.pem119
-rwxr-xr-xtests/hwsim/auth_serv/update.sh181
-rw-r--r--tests/hwsim/auth_serv/user.csr16
-rw-r--r--tests/hwsim/auth_serv/user.key28
-rw-r--r--tests/hwsim/auth_serv/user.key.pkcs830
-rw-r--r--tests/hwsim/auth_serv/user.key.pkcs8.pkcs5v1529
-rw-r--r--tests/hwsim/auth_serv/user.pem85
-rw-r--r--tests/hwsim/auth_serv/user.pkcs12bin2517 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/user.rsa-key27
-rw-r--r--tests/hwsim/auth_serv/user2.pkcs12bin3558 -> 0 bytes
-rw-r--r--tests/hwsim/auth_serv/user3.pkcs12bin3524 -> 0 bytes
-rwxr-xr-xtests/hwsim/build.sh83
-rw-r--r--tests/hwsim/check_kernel.py31
-rw-r--r--tests/hwsim/devdetail.xml47
-rw-r--r--tests/hwsim/devinfo.xml7
-rw-r--r--tests/hwsim/dictionary.radius20
-rw-r--r--tests/hwsim/example-hostapd.config116
-rw-r--r--tests/hwsim/example-setup.txt191
-rw-r--r--tests/hwsim/example-wpa_supplicant.config160
-rw-r--r--tests/hwsim/fst_module_aux.py832
-rw-r--r--tests/hwsim/fst_test_common.py92
-rw-r--r--tests/hwsim/hostapd.py885
-rw-r--r--tests/hwsim/hostapd.vlan2
-rw-r--r--tests/hwsim/hostapd.vlan23
-rw-r--r--tests/hwsim/hostapd.wlan3.vlan2
-rw-r--r--tests/hwsim/hostapd.wlan4.vlan2
-rw-r--r--tests/hwsim/hostapd.wpa_psk5
-rw-r--r--tests/hwsim/hwsim.py114
-rw-r--r--tests/hwsim/hwsim_utils.py246
-rw-r--r--tests/hwsim/multi-bss-acs.conf28
-rw-r--r--tests/hwsim/multi-bss-iface-per_sta_vif.conf42
-rw-r--r--tests/hwsim/multi-bss-iface.conf40
-rw-r--r--tests/hwsim/multi-bss.conf21
-rw-r--r--tests/hwsim/netlink.py237
-rw-r--r--tests/hwsim/nl80211.py357
-rw-r--r--tests/hwsim/owe-bss-1.conf12
-rw-r--r--tests/hwsim/owe-bss-2.conf16
-rw-r--r--tests/hwsim/p2p0.conf3
-rw-r--r--tests/hwsim/p2p1.conf3
-rw-r--r--tests/hwsim/p2p2.conf3
-rw-r--r--tests/hwsim/p2p_utils.py394
-rw-r--r--tests/hwsim/pps-mo-1.xml62
-rw-r--r--tests/hwsim/radius_das.py47
-rw-r--r--tests/hwsim/remotehost.py259
-rwxr-xr-xtests/hwsim/rfkill.py152
-rwxr-xr-xtests/hwsim/run-all.sh162
-rwxr-xr-xtests/hwsim/run-tests.py692
-rwxr-xr-xtests/hwsim/start.sh213
-rwxr-xr-xtests/hwsim/stop.sh80
-rw-r--r--tests/hwsim/test_ap_acs.py688
-rw-r--r--tests/hwsim/test_ap_ciphers.py1200
-rw-r--r--tests/hwsim/test_ap_config.py581
-rw-r--r--tests/hwsim/test_ap_csa.py189
-rw-r--r--tests/hwsim/test_ap_dynamic.py586
-rw-r--r--tests/hwsim/test_ap_eap.py7516
-rw-r--r--tests/hwsim/test_ap_ft.py3461
-rw-r--r--tests/hwsim/test_ap_hs20.py6496
-rw-r--r--tests/hwsim/test_ap_ht.py1644
-rw-r--r--tests/hwsim/test_ap_mixed.py101
-rw-r--r--tests/hwsim/test_ap_open.py1017
-rw-r--r--tests/hwsim/test_ap_params.py972
-rw-r--r--tests/hwsim/test_ap_pmf.py1204
-rw-r--r--tests/hwsim/test_ap_psk.py3573
-rw-r--r--tests/hwsim/test_ap_qosmap.py169
-rw-r--r--tests/hwsim/test_ap_roam.py395
-rw-r--r--tests/hwsim/test_ap_tdls.py652
-rw-r--r--tests/hwsim/test_ap_track.py437
-rw-r--r--tests/hwsim/test_ap_vht.py1338
-rw-r--r--tests/hwsim/test_ap_vlan.py807
-rw-r--r--tests/hwsim/test_ap_wps.py10608
-rw-r--r--tests/hwsim/test_authsrv.py262
-rw-r--r--tests/hwsim/test_autoscan.py81
-rw-r--r--tests/hwsim/test_bgscan.py315
-rw-r--r--tests/hwsim/test_cert_check.py312
-rw-r--r--tests/hwsim/test_cfg80211.py150
-rw-r--r--tests/hwsim/test_connect_cmd.py254
-rw-r--r--tests/hwsim/test_dbus.py6204
-rw-r--r--tests/hwsim/test_dfs.py767
-rw-r--r--tests/hwsim/test_dpp.py7010
-rw-r--r--tests/hwsim/test_dpp3.py49
-rw-r--r--tests/hwsim/test_dscp.py407
-rw-r--r--tests/hwsim/test_eap.py602
-rw-r--r--tests/hwsim/test_eap_proto.py10377
-rw-r--r--tests/hwsim/test_erp.py741
-rw-r--r--tests/hwsim/test_ext_password.py112
-rw-r--r--tests/hwsim/test_fils.py2460
-rw-r--r--tests/hwsim/test_fst_config.py552
-rw-r--r--tests/hwsim/test_fst_module.py2825
-rw-r--r--tests/hwsim/test_gas.py2053
-rw-r--r--tests/hwsim/test_hapd_ctrl.py1077
-rw-r--r--tests/hwsim/test_he.py1221
-rw-r--r--tests/hwsim/test_hostapd_oom.py173
-rw-r--r--tests/hwsim/test_hs20_filter.py205
-rw-r--r--tests/hwsim/test_hs20_pps_mo.py43
-rw-r--r--tests/hwsim/test_ibss.py601
-rw-r--r--tests/hwsim/test_ieee8021x.py531
-rw-r--r--tests/hwsim/test_kernel.py128
-rw-r--r--tests/hwsim/test_macsec.py890
-rw-r--r--tests/hwsim/test_mbo.py613
-rw-r--r--tests/hwsim/test_module_tests.py28
-rw-r--r--tests/hwsim/test_monitor_interface.py94
-rw-r--r--tests/hwsim/test_mscs.py231
-rw-r--r--tests/hwsim/test_multi_ap.py368
-rw-r--r--tests/hwsim/test_nfc_p2p.py848
-rw-r--r--tests/hwsim/test_nfc_wps.py709
-rw-r--r--tests/hwsim/test_oce.py185
-rw-r--r--tests/hwsim/test_ocv.py1247
-rw-r--r--tests/hwsim/test_offchannel_tx.py50
-rw-r--r--tests/hwsim/test_owe.py953
-rw-r--r--tests/hwsim/test_p2p_autogo.py936
-rw-r--r--tests/hwsim/test_p2p_channel.py1384
-rw-r--r--tests/hwsim/test_p2p_concurrency.py286
-rw-r--r--tests/hwsim/test_p2p_device.py552
-rw-r--r--tests/hwsim/test_p2p_discovery.py871
-rw-r--r--tests/hwsim/test_p2p_ext.py384
-rw-r--r--tests/hwsim/test_p2p_grpform.py1185
-rw-r--r--tests/hwsim/test_p2p_invitation.py195
-rw-r--r--tests/hwsim/test_p2p_messages.py2143
-rw-r--r--tests/hwsim/test_p2p_persistent.py676
-rw-r--r--tests/hwsim/test_p2p_service.py586
-rw-r--r--tests/hwsim/test_p2p_set.py128
-rw-r--r--tests/hwsim/test_p2p_wifi_display.py475
-rw-r--r--tests/hwsim/test_p2ps.py1689
-rw-r--r--tests/hwsim/test_pasn.py854
-rw-r--r--tests/hwsim/test_pmksa_cache.py1267
-rw-r--r--tests/hwsim/test_radio_work.py133
-rw-r--r--tests/hwsim/test_radius.py1710
-rw-r--r--tests/hwsim/test_rfkill.py242
-rw-r--r--tests/hwsim/test_rrm.py2147
-rw-r--r--tests/hwsim/test_sae.py2782
-rw-r--r--tests/hwsim/test_sae_pk.py462
-rw-r--r--tests/hwsim/test_scan.py2025
-rw-r--r--tests/hwsim/test_scs.py196
-rw-r--r--tests/hwsim/test_sigma_dut.py5264
-rw-r--r--tests/hwsim/test_ssid.py127
-rw-r--r--tests/hwsim/test_sta_dynamic.py329
-rw-r--r--tests/hwsim/test_suite_b.py739
-rw-r--r--tests/hwsim/test_tnc.py194
-rw-r--r--tests/hwsim/test_wep.py172
-rw-r--r--tests/hwsim/test_wext.py254
-rw-r--r--tests/hwsim/test_wmediumd.py480
-rw-r--r--tests/hwsim/test_wnm.py1984
-rw-r--r--tests/hwsim/test_wpas_ap.py927
-rw-r--r--tests/hwsim/test_wpas_config.py663
-rw-r--r--tests/hwsim/test_wpas_ctrl.py2159
-rw-r--r--tests/hwsim/test_wpas_mesh.py2546
-rw-r--r--tests/hwsim/test_wpas_wmm_ac.py400
-rw-r--r--tests/hwsim/tnc/.gitignore4
-rw-r--r--tests/hwsim/tnc/Makefile23
-rw-r--r--tests/hwsim/tnc/hostap2_imc.c183
-rw-r--r--tests/hwsim/tnc/hostap2_imv.c203
-rw-r--r--tests/hwsim/tnc/hostap_imc.c72
-rw-r--r--tests/hwsim/tnc/hostap_imv.c66
-rw-r--r--tests/hwsim/tnc/tnc_config4
-rw-r--r--tests/hwsim/tshark.py124
-rw-r--r--tests/hwsim/utils.py314
-rw-r--r--tests/hwsim/vm/.gitignore1
-rw-r--r--tests/hwsim/vm/README80
-rwxr-xr-xtests/hwsim/vm/bisect-run.sh43
-rwxr-xr-xtests/hwsim/vm/build-codecov.sh57
-rwxr-xr-xtests/hwsim/vm/combine-codecov.sh39
-rw-r--r--tests/hwsim/vm/dbus.conf34
-rw-r--r--tests/hwsim/vm/example-vm-setup.txt95
-rwxr-xr-xtests/hwsim/vm/inside.sh171
-rw-r--r--tests/hwsim/vm/kernel-config175
-rw-r--r--tests/hwsim/vm/kernel-config.uml131
-rwxr-xr-xtests/hwsim/vm/parallel-vm.py669
-rwxr-xr-xtests/hwsim/vm/process-codecov.sh36
-rw-r--r--tests/hwsim/vm/regdb/regulatory.dbbin4036 -> 0 bytes
-rw-r--r--tests/hwsim/vm/regdb/regulatory.db.p7sbin1182 -> 0 bytes
-rwxr-xr-xtests/hwsim/vm/uevent.sh9
-rwxr-xr-xtests/hwsim/vm/vm-run.sh202
-rw-r--r--tests/hwsim/w1fi_logo.pngbin7549 -> 0 bytes
-rw-r--r--tests/hwsim/wlantest.py277
-rw-r--r--tests/hwsim/wpasupplicant.py1652
-rw-r--r--tests/hwsim/wps-ctrl-credbin67 -> 0 bytes
-rw-r--r--tests/hwsim/wps-ctrl-cred2bin59 -> 0 bytes
-rw-r--r--tests/hwsim/wps-mixed-credbin112 -> 0 bytes
-rw-r--r--tests/hwsim/wps-wep-credbin53 -> 0 bytes
-rw-r--r--tests/remote/config.py87
-rw-r--r--tests/remote/hwsim_wrapper.py126
-rw-r--r--tests/remote/monitor.py193
-rwxr-xr-xtests/remote/run-tests.py408
-rw-r--r--tests/remote/rutils.py567
-rw-r--r--tests/remote/test_devices.py124
-rw-r--r--tests/remote/test_example.py141
-rw-r--r--tests/remote/test_monitor.py52
-rw-r--r--tests/test-aes.c624
-rw-r--r--tests/test-base64.c42
-rw-r--r--tests/test-https.c225
-rw-r--r--tests/test-https_server.c275
-rw-r--r--tests/test-list.c72
-rw-r--r--tests/test-md4.c93
-rw-r--r--tests/test-milenage.c814
-rw-r--r--tests/test-rc4.c250
-rw-r--r--tests/test-rsa-sig-ver.c206
-rw-r--r--tests/test-sha1.c119
-rw-r--r--tests/test-sha256.c119
-rw-r--r--tests/test-x509v3.c62
-rwxr-xr-xtests/test_x509v3_nist.sh144
-rwxr-xr-xtests/test_x509v3_nist2.sh177
-rw-r--r--wlantest/.gitignore4
-rw-r--r--wlantest/Makefile88
-rw-r--r--wlantest/bip.c133
-rw-r--r--wlantest/bss.c374
-rw-r--r--wlantest/ccmp.c367
-rw-r--r--wlantest/ctrl.c1471
-rw-r--r--wlantest/gcmp.c160
-rw-r--r--wlantest/inject.c341
-rw-r--r--wlantest/monitor.c172
-rw-r--r--wlantest/process.c409
-rw-r--r--wlantest/readpcap.c190
-rw-r--r--wlantest/rx_data.c927
-rw-r--r--wlantest/rx_eapol.c1317
-rw-r--r--wlantest/rx_ip.c184
-rw-r--r--wlantest/rx_mgmt.c2642
-rw-r--r--wlantest/rx_tdls.c618
-rw-r--r--wlantest/sta.c232
-rw-r--r--wlantest/test_vectors.c937
-rw-r--r--wlantest/tkip.c490
-rw-r--r--wlantest/wep.c104
-rw-r--r--wlantest/wired.c295
-rw-r--r--wlantest/wlantest.c520
-rw-r--r--wlantest/wlantest.h352
-rw-r--r--wlantest/wlantest_cli.c1876
-rw-r--r--wlantest/wlantest_ctrl.h171
-rw-r--r--wlantest/writepcap.c373
-rw-r--r--wpa_supplicant/.gitignore15
-rw-r--r--wpa_supplicant/Android.mk1827
-rw-r--r--wpa_supplicant/ChangeLog2447
-rw-r--r--wpa_supplicant/Makefile2074
-rw-r--r--wpa_supplicant/README1163
-rw-r--r--wpa_supplicant/README-DPP204
-rw-r--r--wpa_supplicant/README-HS20654
-rw-r--r--wpa_supplicant/README-P2P856
-rw-r--r--wpa_supplicant/README-WPS399
-rw-r--r--wpa_supplicant/README-Windows.txt299
-rw-r--r--wpa_supplicant/android.config545
-rw-r--r--wpa_supplicant/ap.c1945
-rw-r--r--wpa_supplicant/ap.h106
-rw-r--r--wpa_supplicant/autoscan.c162
-rw-r--r--wpa_supplicant/autoscan.h59
-rw-r--r--wpa_supplicant/autoscan_exponential.c104
-rw-r--r--wpa_supplicant/autoscan_periodic.c85
-rw-r--r--wpa_supplicant/bgscan.c109
-rw-r--r--wpa_supplicant/bgscan.h82
-rw-r--r--wpa_supplicant/bgscan_learn.c614
-rw-r--r--wpa_supplicant/bgscan_simple.c275
-rw-r--r--wpa_supplicant/binder/.clang-format9
-rw-r--r--wpa_supplicant/binder/binder.cpp104
-rw-r--r--wpa_supplicant/binder/binder.h46
-rw-r--r--wpa_supplicant/binder/binder_constants.cpp18
-rw-r--r--wpa_supplicant/binder/binder_constants.h21
-rw-r--r--wpa_supplicant/binder/binder_i.h28
-rw-r--r--wpa_supplicant/binder/binder_manager.cpp100
-rw-r--r--wpa_supplicant/binder/binder_manager.h58
-rw-r--r--wpa_supplicant/binder/fi/w1/wpa_supplicant/IIface.aidl16
-rw-r--r--wpa_supplicant/binder/fi/w1/wpa_supplicant/ISupplicant.aidl59
-rw-r--r--wpa_supplicant/binder/fi/w1/wpa_supplicant/ISupplicantCallbacks.aidl20
-rw-r--r--wpa_supplicant/binder/iface.cpp16
-rw-r--r--wpa_supplicant/binder/iface.h42
-rw-r--r--wpa_supplicant/binder/supplicant.cpp127
-rw-r--r--wpa_supplicant/binder/supplicant.h55
-rw-r--r--wpa_supplicant/bss.c1385
-rw-r--r--wpa_supplicant/bss.h200
-rw-r--r--wpa_supplicant/bssid_ignore.c221
-rw-r--r--wpa_supplicant/bssid_ignore.h33
-rw-r--r--wpa_supplicant/config.c5429
-rw-r--r--wpa_supplicant/config.h1797
-rw-r--r--wpa_supplicant/config_file.c1656
-rw-r--r--wpa_supplicant/config_none.c56
-rw-r--r--wpa_supplicant/config_ssid.h1182
-rw-r--r--wpa_supplicant/config_winreg.c1061
-rw-r--r--wpa_supplicant/ctrl_iface.c13103
-rw-r--r--wpa_supplicant/ctrl_iface.h167
-rw-r--r--wpa_supplicant/ctrl_iface_named_pipe.c831
-rw-r--r--wpa_supplicant/ctrl_iface_udp.c831
-rw-r--r--wpa_supplicant/ctrl_iface_unix.c1431
-rw-r--r--wpa_supplicant/dbus/.gitignore1
-rw-r--r--wpa_supplicant/dbus/Makefile69
-rw-r--r--wpa_supplicant/dbus/dbus-wpa_supplicant.conf17
-rw-r--r--wpa_supplicant/dbus/dbus_common.c373
-rw-r--r--wpa_supplicant/dbus/dbus_common.h20
-rw-r--r--wpa_supplicant/dbus/dbus_common_i.h34
-rw-r--r--wpa_supplicant/dbus/dbus_dict_helpers.c1061
-rw-r--r--wpa_supplicant/dbus/dbus_dict_helpers.h152
-rw-r--r--wpa_supplicant/dbus/dbus_new.c5105
-rw-r--r--wpa_supplicant/dbus/dbus_new.h648
-rw-r--r--wpa_supplicant/dbus/dbus_new_handlers.c5926
-rw-r--r--wpa_supplicant/dbus/dbus_new_handlers.h285
-rw-r--r--wpa_supplicant/dbus/dbus_new_handlers_p2p.c3107
-rw-r--r--wpa_supplicant/dbus/dbus_new_handlers_p2p.h152
-rw-r--r--wpa_supplicant/dbus/dbus_new_handlers_wps.c804
-rw-r--r--wpa_supplicant/dbus/dbus_new_helpers.c1025
-rw-r--r--wpa_supplicant/dbus/dbus_new_helpers.h154
-rw-r--r--wpa_supplicant/dbus/dbus_new_introspect.c286
-rw-r--r--wpa_supplicant/dbus/fi.w1.wpa_supplicant1.service.in5
-rw-r--r--wpa_supplicant/defconfig635
-rw-r--r--wpa_supplicant/doc/docbook/.gitignore7
-rw-r--r--wpa_supplicant/doc/docbook/Makefile28
-rw-r--r--wpa_supplicant/doc/docbook/eapol_test.sgml209
-rw-r--r--wpa_supplicant/doc/docbook/wpa_background.sgml105
-rw-r--r--wpa_supplicant/doc/docbook/wpa_cli.sgml360
-rw-r--r--wpa_supplicant/doc/docbook/wpa_gui.sgml106
-rw-r--r--wpa_supplicant/doc/docbook/wpa_passphrase.sgml77
-rw-r--r--wpa_supplicant/doc/docbook/wpa_priv.sgml152
-rw-r--r--wpa_supplicant/doc/docbook/wpa_supplicant.conf.sgml243
-rw-r--r--wpa_supplicant/doc/docbook/wpa_supplicant.sgml764
-rw-r--r--wpa_supplicant/dpp_supplicant.c3995
-rw-r--r--wpa_supplicant/dpp_supplicant.h45
-rw-r--r--wpa_supplicant/driver_i.h1120
-rw-r--r--wpa_supplicant/eap_proxy_dummy.mak0
-rw-r--r--wpa_supplicant/eap_proxy_dummy.mk0
-rw-r--r--wpa_supplicant/eap_register.c271
-rw-r--r--wpa_supplicant/eap_testing.txt392
-rw-r--r--wpa_supplicant/eapol_test.c1555
-rwxr-xr-xwpa_supplicant/eapol_test.py159
-rw-r--r--wpa_supplicant/events.c5783
-rwxr-xr-xwpa_supplicant/examples/60_wpa_supplicant19
-rwxr-xr-xwpa_supplicant/examples/dbus-listen-preq.py66
-rwxr-xr-xwpa_supplicant/examples/dpp-nfc.py1186
-rwxr-xr-xwpa_supplicant/examples/dpp-qrcode.py130
-rw-r--r--wpa_supplicant/examples/ieee8021x.conf13
-rw-r--r--wpa_supplicant/examples/openCryptoki.conf41
-rwxr-xr-xwpa_supplicant/examples/p2p-action-udhcp.sh69
-rwxr-xr-xwpa_supplicant/examples/p2p-action.sh96
-rwxr-xr-xwpa_supplicant/examples/p2p-nfc.py654
-rw-r--r--wpa_supplicant/examples/p2p/p2p_connect.py299
-rw-r--r--wpa_supplicant/examples/p2p/p2p_disconnect.py169
-rw-r--r--wpa_supplicant/examples/p2p/p2p_find.py192
-rw-r--r--wpa_supplicant/examples/p2p/p2p_flush.py168
-rw-r--r--wpa_supplicant/examples/p2p/p2p_group_add.py222
-rw-r--r--wpa_supplicant/examples/p2p/p2p_invite.py201
-rw-r--r--wpa_supplicant/examples/p2p/p2p_listen.py182
-rw-r--r--wpa_supplicant/examples/p2p/p2p_stop_find.py174
-rw-r--r--wpa_supplicant/examples/plaintext.conf8
-rw-r--r--wpa_supplicant/examples/udhcpd-p2p.conf118
-rw-r--r--wpa_supplicant/examples/wep.conf11
-rw-r--r--wpa_supplicant/examples/wpa-psk-tkip.conf12
-rw-r--r--wpa_supplicant/examples/wpa2-eap-ccmp.conf15
-rwxr-xr-xwpa_supplicant/examples/wpas-dbus-new-getall.py58
-rwxr-xr-xwpa_supplicant/examples/wpas-dbus-new-signals.py203
-rwxr-xr-xwpa_supplicant/examples/wpas-dbus-new-wps.py80
-rwxr-xr-xwpa_supplicant/examples/wpas-dbus-new.py149
-rwxr-xr-xwpa_supplicant/examples/wps-ap-cli81
-rwxr-xr-xwpa_supplicant/examples/wps-nfc.py525
-rw-r--r--wpa_supplicant/gas_query.c897
-rw-r--r--wpa_supplicant/gas_query.h59
-rw-r--r--wpa_supplicant/hs20_supplicant.c1357
-rw-r--r--wpa_supplicant/hs20_supplicant.h51
-rw-r--r--wpa_supplicant/ibss_rsn.c954
-rw-r--r--wpa_supplicant/ibss_rsn.h65
-rw-r--r--wpa_supplicant/interworking.c3293
-rw-r--r--wpa_supplicant/interworking.h37
-rw-r--r--wpa_supplicant/libwpa_test.c32
-rw-r--r--wpa_supplicant/main.c409
-rw-r--r--wpa_supplicant/main_none.c40
-rw-r--r--wpa_supplicant/main_winmain.c78
-rw-r--r--wpa_supplicant/main_winsvc.c458
-rw-r--r--wpa_supplicant/mbo.c665
-rw-r--r--wpa_supplicant/mesh.c892
-rw-r--r--wpa_supplicant/mesh.h49
-rw-r--r--wpa_supplicant/mesh_mpm.c1403
-rw-r--r--wpa_supplicant/mesh_mpm.h46
-rw-r--r--wpa_supplicant/mesh_rsn.c795
-rw-r--r--wpa_supplicant/mesh_rsn.h45
-rw-r--r--wpa_supplicant/nfc_pw_token.c83
-rw-r--r--wpa_supplicant/nmake.mak240
-rw-r--r--wpa_supplicant/notify.c975
-rw-r--r--wpa_supplicant/notify.h167
-rw-r--r--wpa_supplicant/offchannel.c488
-rw-r--r--wpa_supplicant/offchannel.h35
-rw-r--r--wpa_supplicant/op_classes.c534
-rw-r--r--wpa_supplicant/p2p_supplicant.c10107
-rw-r--r--wpa_supplicant/p2p_supplicant.h357
-rw-r--r--wpa_supplicant/p2p_supplicant_sd.c1273
-rw-r--r--wpa_supplicant/pasn_supplicant.c1710
-rw-r--r--wpa_supplicant/preauth_test.c371
-rw-r--r--wpa_supplicant/robust_av.c1487
-rw-r--r--wpa_supplicant/rrm.c1594
-rw-r--r--wpa_supplicant/scan.c3360
-rw-r--r--wpa_supplicant/scan.h96
-rw-r--r--wpa_supplicant/sme.c2945
-rw-r--r--wpa_supplicant/sme.h137
-rw-r--r--wpa_supplicant/systemd/wpa_supplicant-nl80211.service.arg.in15
-rw-r--r--wpa_supplicant/systemd/wpa_supplicant-wired.service.arg.in15
-rw-r--r--wpa_supplicant/systemd/wpa_supplicant.service.arg.in15
-rw-r--r--wpa_supplicant/systemd/wpa_supplicant.service.in14
-rw-r--r--wpa_supplicant/todo.txt78
-rw-r--r--wpa_supplicant/twt.c142
-rwxr-xr-xwpa_supplicant/utils/log2pcap.py54
-rwxr-xr-xwpa_supplicant/vs2005/eapol_test/eapol_test.vcproj477
-rwxr-xr-xwpa_supplicant/vs2005/win_if_list/win_if_list.vcproj203
-rwxr-xr-xwpa_supplicant/vs2005/wpa_cli/wpa_cli.vcproj215
-rwxr-xr-xwpa_supplicant/vs2005/wpa_passphrase/wpa_passphrase.vcproj236
-rwxr-xr-xwpa_supplicant/vs2005/wpa_supplicant.sln52
-rwxr-xr-xwpa_supplicant/vs2005/wpa_supplicant/wpa_supplicant.vcproj465
-rwxr-xr-xwpa_supplicant/vs2005/wpasvc/wpasvc.vcproj465
-rw-r--r--wpa_supplicant/wifi_display.c431
-rw-r--r--wpa_supplicant/wifi_display.h24
-rwxr-xr-xwpa_supplicant/win_example.reg42
-rw-r--r--wpa_supplicant/win_if_list.c173
-rw-r--r--wpa_supplicant/wmm_ac.c987
-rw-r--r--wpa_supplicant/wmm_ac.h176
-rw-r--r--wpa_supplicant/wnm_sta.c1970
-rw-r--r--wpa_supplicant/wnm_sta.h93
-rw-r--r--wpa_supplicant/wpa_cli.c5083
-rw-r--r--wpa_supplicant/wpa_gui-qt4/.gitignore4
-rw-r--r--wpa_supplicant/wpa_gui-qt4/addinterface.cpp239
-rw-r--r--wpa_supplicant/wpa_gui-qt4/addinterface.h39
-rw-r--r--wpa_supplicant/wpa_gui-qt4/eventhistory.cpp124
-rw-r--r--wpa_supplicant/wpa_gui-qt4/eventhistory.h57
-rw-r--r--wpa_supplicant/wpa_gui-qt4/eventhistory.ui61
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons.qrc9
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/.gitignore2
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/Makefile37
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/README74
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/ap.svg832
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/group.svg616
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/invitation.svg374
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/laptop.svg1568
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons/wpa_gui.svg256
-rw-r--r--wpa_supplicant/wpa_gui-qt4/icons_png.qrc9
-rw-r--r--wpa_supplicant/wpa_gui-qt4/lang/.gitignore1
-rw-r--r--wpa_supplicant/wpa_gui-qt4/lang/wpa_gui_de.ts1262
-rw-r--r--wpa_supplicant/wpa_gui-qt4/main.cpp67
-rw-r--r--wpa_supplicant/wpa_gui-qt4/networkconfig.cpp853
-rw-r--r--wpa_supplicant/wpa_gui-qt4/networkconfig.h55
-rw-r--r--wpa_supplicant/wpa_gui-qt4/networkconfig.ui435
-rw-r--r--wpa_supplicant/wpa_gui-qt4/peers.cpp1885
-rw-r--r--wpa_supplicant/wpa_gui-qt4/peers.h90
-rw-r--r--wpa_supplicant/wpa_gui-qt4/peers.ui40
-rw-r--r--wpa_supplicant/wpa_gui-qt4/scanresults.cpp141
-rw-r--r--wpa_supplicant/wpa_gui-qt4/scanresults.h40
-rw-r--r--wpa_supplicant/wpa_gui-qt4/scanresults.ui94
-rw-r--r--wpa_supplicant/wpa_gui-qt4/scanresultsitem.cpp18
-rw-r--r--wpa_supplicant/wpa_gui-qt4/scanresultsitem.h21
-rw-r--r--wpa_supplicant/wpa_gui-qt4/signalbar.cpp58
-rw-r--r--wpa_supplicant/wpa_gui-qt4/signalbar.h28
-rw-r--r--wpa_supplicant/wpa_gui-qt4/stringquery.cpp31
-rw-r--r--wpa_supplicant/wpa_gui-qt4/stringquery.h28
-rw-r--r--wpa_supplicant/wpa_gui-qt4/userdatarequest.cpp94
-rw-r--r--wpa_supplicant/wpa_gui-qt4/userdatarequest.h40
-rw-r--r--wpa_supplicant/wpa_gui-qt4/userdatarequest.ui109
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpa_gui.desktop10
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpa_gui.pro73
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpagui.cpp1913
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpagui.h180
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpagui.ui524
-rw-r--r--wpa_supplicant/wpa_gui-qt4/wpamsg.h35
-rw-r--r--wpa_supplicant/wpa_passphrase.c73
-rw-r--r--wpa_supplicant/wpa_priv.c1292
-rw-r--r--wpa_supplicant/wpa_supplicant.c8658
-rw-r--r--wpa_supplicant/wpa_supplicant.conf2071
-rw-r--r--wpa_supplicant/wpa_supplicant_conf.mk34
-rwxr-xr-xwpa_supplicant/wpa_supplicant_conf.sh16
-rw-r--r--wpa_supplicant/wpa_supplicant_i.h1889
-rw-r--r--wpa_supplicant/wpa_supplicant_template.conf7
-rw-r--r--wpa_supplicant/wpas_glue.c1494
-rw-r--r--wpa_supplicant/wpas_glue.h30
-rw-r--r--wpa_supplicant/wpas_kay.c440
-rw-r--r--wpa_supplicant/wpas_kay.h51
-rw-r--r--wpa_supplicant/wpas_module_tests.c114
-rw-r--r--wpa_supplicant/wps_supplicant.c3013
-rw-r--r--wpa_supplicant/wps_supplicant.h164
-rw-r--r--wpadebug/.gitignore4
-rw-r--r--wpadebug/AndroidManifest.xml86
-rw-r--r--wpadebug/README78
-rw-r--r--wpadebug/build.xml17
-rw-r--r--wpadebug/project.properties2
-rw-r--r--wpadebug/res/layout/cred_edit.xml117
-rw-r--r--wpadebug/res/layout/input_uri.xml26
-rw-r--r--wpadebug/res/layout/main.xml160
-rw-r--r--wpadebug/res/layout/qrcode.xml13
-rw-r--r--wpadebug/res/raw/shell_commands.txt2
-rw-r--r--wpadebug/res/raw/wpa_commands.txt9
-rw-r--r--wpadebug/src/w1/fi/wpadebug/CommandListActivity.java130
-rw-r--r--wpadebug/src/w1/fi/wpadebug/DisplayMessageActivity.java49
-rw-r--r--wpadebug/src/w1/fi/wpadebug/InputUri.java108
-rw-r--r--wpadebug/src/w1/fi/wpadebug/MainActivity.java209
-rw-r--r--wpadebug/src/w1/fi/wpadebug/QrCodeDisplayActivity.java109
-rw-r--r--wpadebug/src/w1/fi/wpadebug/QrCodeReadActivity.java40
-rw-r--r--wpadebug/src/w1/fi/wpadebug/QrCodeScannerActivity.java82
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WifiReceiver.java95
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WpaCommandListActivity.java112
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WpaCredActivity.java263
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WpaCredEditActivity.java55
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WpaNfcActivity.java131
-rw-r--r--wpadebug/src/w1/fi/wpadebug/WpaWebViewActivity.java146
-rw-r--r--wpaspy/Makefile15
-rw-r--r--wpaspy/setup.py22
-rwxr-xr-xwpaspy/test.py82
-rw-r--r--wpaspy/wpaspy.c245
-rw-r--r--wpaspy/wpaspy.py149
817 files changed, 279 insertions, 358154 deletions
diff --git a/.gitignore b/.gitignore
deleted file mode 100644
index b064303ced30..000000000000
--- a/.gitignore
+++ /dev/null
@@ -1,8 +0,0 @@
-*.pyc
-*~
-tests/hwsim/logs
-tests/remote/logs
-wpaspy/build
-**/parallel-vm.log
-tags
-build/
diff --git a/Android.mk b/Android.mk
deleted file mode 100644
index bd7a4097444b..000000000000
--- a/Android.mk
+++ /dev/null
@@ -1,10 +0,0 @@
-LOCAL_PATH:= $(call my-dir)
-
-ifneq ($(filter VER_0_8_X VER_2_1_DEVEL,$(WPA_SUPPLICANT_VERSION)),)
-# The order of the 2 Android.mks does matter!
-# TODO: Clean up the Android.mks, reset all the temporary variables at the
-# end of each Android.mk, so that one Android.mk doesn't depend on variables
-# set up in the other Android.mk.
-include $(LOCAL_PATH)/hostapd/Android.mk \
- $(LOCAL_PATH)/wpa_supplicant/Android.mk
-endif
diff --git a/CONTRIBUTIONS b/CONTRIBUTIONS
index 1b4caf7ac811..b2064dc83443 100644
--- a/CONTRIBUTIONS
+++ b/CONTRIBUTIONS
@@ -143,7 +143,7 @@ The license terms used for hostap.git files
Modified BSD license (no advertisement clause):
-Copyright (c) 2002-2021, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
Redistribution and use in source and binary forms, with or without
diff --git a/COPYING b/COPYING
index 5d0115c9ca6f..7ca30301e28b 100644
--- a/COPYING
+++ b/COPYING
@@ -1,7 +1,7 @@
wpa_supplicant and hostapd
--------------------------
-Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
diff --git a/README b/README
index a9f806967bf9..1470c4f23582 100644
--- a/README
+++ b/README
@@ -1,7 +1,7 @@
wpa_supplicant and hostapd
--------------------------
-Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
These programs are licensed under the BSD license (the one with
diff --git a/build_release b/build_release
deleted file mode 100755
index 3aa9bf31963a..000000000000
--- a/build_release
+++ /dev/null
@@ -1,47 +0,0 @@
-#!/bin/sh
-
-set -e
-
-if [ -z "$1" ]; then
- echo "build_release <version>"
- exit 1
-fi
-
-TMP=tmp.build_release
-RELDIR=`pwd`/Release
-VER=$1
-NOW=`date +%Y-%m-%d`
-
-echo "Version: $VER - $NOW"
-
-DATEw=`head -n 3 wpa_supplicant/ChangeLog | tail -n 1 | sed "s/ .*//"`
-DATEh=`head -n 3 hostapd/ChangeLog | tail -n 1 | sed "s/ .*//"`
-
-if [ "$DATEw" != "$NOW" -o "$DATEh" != "$NOW" ]; then
- echo "NOTE! Date mismatch in ChangeLog: wpa_supplicant $DATEw hostapd $DATEh != $NOW"
-fi
-
-if [ -r $TMP ]; then
- echo "Temporary directory '$TMP' exists. Remove it before running this."
- exit 1
-fi
-
-mkdir $TMP
-mkdir -p $RELDIR
-
-git archive --format=tar --prefix=wpa-$VER/ HEAD \
- README COPYING CONTRIBUTIONS src wpa_supplicant hostapd hs20 |
- gzip > $RELDIR/wpa-$VER.tar.gz
-git archive --format=tar --prefix=hostapd-$VER/ HEAD \
- README COPYING CONTRIBUTIONS src hostapd |
- gzip > $RELDIR/hostapd-$VER.tar.gz
-git archive --format=tar --prefix=wpa_supplicant-$VER/ HEAD \
- README COPYING CONTRIBUTIONS src wpa_supplicant hs20/client |
- tar --directory=$TMP -xf -
-
-cd $TMP
-make -C wpa_supplicant-$VER/wpa_supplicant/doc/docbook man
-rm -f wpa_supplicant-$VER/wpa_supplicant/doc/docbook/manpage.{links,refs}
-tar czf $RELDIR/wpa_supplicant-$VER.tar.gz wpa_supplicant-$VER
-cd ..
-rm -r $TMP
diff --git a/doc/.gitignore b/doc/.gitignore
deleted file mode 100644
index 28c3fe4e99c3..000000000000
--- a/doc/.gitignore
+++ /dev/null
@@ -1,14 +0,0 @@
-doxygen.warnings
-hostapd.eps
-hostapd.png
-html
-latex
-p2p_arch.eps
-p2p_arch.png
-p2p_arch2.eps
-p2p_arch2.png
-p2p_sm.eps
-p2p_sm.png
-wpa_supplicant.eps
-wpa_supplicant.png
-wpa_supplicant-devel.pdf
diff --git a/doc/Makefile b/doc/Makefile
deleted file mode 100644
index 62af04a74f1f..000000000000
--- a/doc/Makefile
+++ /dev/null
@@ -1,42 +0,0 @@
-all: docs
-
-%.eps: %.fig
- fig2dev -L eps $*.fig $*.eps
-
-%.png: %.fig
- fig2dev -L png -m 3 $*.fig | pngtopnm | pnmscale 0.4 | pnmtopng \
- > $*.png
-
-%.png: %.dot
- dot $*.dot -Tpng -o $*.png
-
-%.eps: %.dot
- dot $*.dot -Tps -o $*.eps
-
-_wpa_supplicant.png: wpa_supplicant.png
- cp $< $@
-
-_wpa_supplicant.eps: wpa_supplicant.eps
- cp $< $@
-
-docs-pics: wpa_supplicant.png wpa_supplicant.eps hostapd.png hostapd.eps p2p_sm.png p2p_sm.eps p2p_arch.png p2p_arch.eps p2p_arch2.png p2p_arch2.eps _wpa_supplicant.png _wpa_supplicant.eps
-
-docs: docs-pics
- (cd ..; doxygen doc/doxygen.conf; cd doc)
- $(MAKE) -C latex
- cp latex/refman.pdf wpa_supplicant-devel.pdf
-
-html: docs-pics
- (cd ..; doxygen doc/doxygen.conf; cd doc)
-
-clean:
- rm -f *~
- rm -f wpa_supplicant.eps wpa_supplicant.png
- rm -f _wpa_supplicant.png _wpa_supplicant.eps
- rm -f hostapd.eps hostapd.png
- rm -f p2p_sm.eps p2p_sm.png
- rm -f p2p_arch.eps p2p_arch.png
- rm -f p2p_arch2.eps p2p_arch2.png
- rm -f doxygen.warnings
- rm -rf html latex
- rm -f wpa_supplicant-devel.pdf
diff --git a/doc/code_structure.doxygen b/doc/code_structure.doxygen
deleted file mode 100644
index 927ea4e85d7a..000000000000
--- a/doc/code_structure.doxygen
+++ /dev/null
@@ -1,315 +0,0 @@
-/**
-\page code_structure Structure of the source code
-
-[ \ref _wpa_supplicant_core "wpa_supplicant core functionality" |
-\ref generic_helper_func "Generic helper functions" |
-\ref crypto_func "Cryptographic functions" |
-\ref tls_func "TLS library" |
-\ref configuration "Configuration" |
-\ref ctrl_iface "Control interface" |
-\ref wpa_code "WPA supplicant" |
-\ref eap_peer "EAP peer" |
-\ref eapol_supp "EAPOL supplicant" |
-\ref win_port "Windows port" |
-\ref test_programs "Test programs" ]
-
-wpa_supplicant implementation is divided into number of independent
-modules. Core code includes functionality for controlling the network
-selection, association, and configuration. Independent modules include
-WPA code (key handshake, PMKSA caching, pre-authentication), EAPOL
-state machine, and EAP state machine and methods. In addition, there
-are number of separate files for generic helper functions.
-
-Both WPA and EAPOL/EAP state machines can be used separately in other
-programs than wpa_supplicant. As an example, the included test
-programs eapol_test and preauth_test are using these modules.
-
-\ref driver_wrapper "Driver interface API" is defined in \ref driver.h and
-all hardware/driver dependent functionality is implemented in
-driver_*.c.
-
-
-\section _wpa_supplicant_core wpa_supplicant core functionality
-
-\ref wpa_supplicant.c
- Program initialization, main control loop
-
-\ref wpa_supplicant/main.c
- main() for UNIX-like operating systems and MinGW (Windows); this
- uses command line arguments to configure wpa_supplicant
-
-\ref events.c
- Driver event processing; \ref wpa_supplicant_event() and related functions
-
-\ref wpa_supplicant_i.h
- Internal definitions for wpa_supplicant core; should not be
- included into independent modules
-
-
-\section generic_helper_func Generic helper functions
-
-wpa_supplicant uses generic helper functions some of which are shared
-with with hostapd. The following C files are currently used:
-
-\ref eloop.c and \ref eloop.h
- Event loop (select() loop with registerable timeouts, socket read
- callbacks, and signal callbacks)
-
-\ref common.c and \ref common.h
- Common helper functions
-
-\ref defs.h
- Definitions shared by multiple files
-
-\ref l2_packet.h, \ref l2_packet_linux.c, and \ref l2_packet_pcap.c
- Layer 2 (link) access wrapper (includes Linux packet socket
- and wrappers for libdnet/libpcap). A new l2_packet implementation
- may need to be added when porting to new operating systems that are
- not supported by libdnet/libpcap. Makefile can be used to select which
- l2_packet implementation is included. \ref l2_packet_linux.c uses Linux
- packet sockets and \ref l2_packet_pcap.c has a more portable version using
- libpcap and libdnet.
-
-\ref pcsc_funcs.c and \ref pcsc_funcs.h
- Wrapper for PC/SC lite SIM and smart card readers
-
-\ref priv_netlink.h
- Private version of netlink definitions from Linux kernel header files;
- this could be replaced with C library header file once suitable
- version becomes commonly available
-
-\ref version.h
- Version number definitions
-
-
-\section crypto_func Cryptographic functions
-
-\ref md5.c and \ref md5.h
- MD5 (replaced with a crypto library if TLS support is included)
- HMAC-MD5 (keyed checksum for message authenticity validation)
-
-\ref rc4.c and \ref rc4.h
- RC4 (broadcast/default key encryption)
-
-\ref sha1.c and \ref sha1.h
- SHA-1 (replaced with a crypto library if TLS support is included)
- HMAC-SHA-1 (keyed checksum for message authenticity validation)
- PRF-SHA-1 (pseudorandom (key/nonce generation) function)
- PBKDF2-SHA-1 (ASCII passphrase to shared secret)
- T-PRF (for EAP-FAST)
- TLS-PRF (RFC 2246)
-
-\ref sha256.c and \ref sha256.h
- SHA-256 (replaced with a crypto library if TLS support is included)
-
-\ref aes-wrap.c, \ref aes_wrap.h, \ref aes.c
- AES (replaced with a crypto library if TLS support is included),
- AES Key Wrap Algorithm with 128-bit KEK, RFC3394 (broadcast/default
- key encryption),
- One-Key CBC MAC (OMAC1) hash with AES-128,
- AES-128 CTR mode encryption,
- AES-128 EAX mode encryption/decryption,
- AES-128 CBC
-
-\ref crypto.h
- Definition of crypto library wrapper
-
-\ref crypto_openssl.c
- Wrapper functions for libcrypto (OpenSSL)
-
-\ref crypto_internal.c
- Wrapper functions for internal crypto implementation
-
-\ref crypto_gnutls.c
- Wrapper functions for libgcrypt (used by GnuTLS)
-
-\ref ms_funcs.c and \ref ms_funcs.h
- Helper functions for MSCHAPV2 and LEAP
-
-\ref tls.h
- Definition of TLS library wrapper
-
-\ref tls_none.c
- Stub implementation of TLS library wrapper for cases where TLS
- functionality is not included.
-
-\ref tls_openssl.c
- TLS library wrapper for openssl
-
-\ref tls_internal.c
- TLS library for internal TLS implementation
-
-\ref tls_gnutls.c
- TLS library wrapper for GnuTLS
-
-
-\section tls_func TLS library
-
-\ref asn1.c and \ref asn1.h
- ASN.1 DER parsing
-
-\ref bignum.c and \ref bignum.h
- Big number math
-
-\ref rsa.c and \ref rsa.h
- RSA
-
-\ref x509v3.c and \ref x509v3.h
- X.509v3 certificate parsing and processing
-
-\ref tlsv1_client.c, \ref tlsv1_client.h
- TLSv1 client (RFC 2246)
-
-\ref tlsv1_client_i.h
- Internal structures for TLSv1 client
-
-\ref tlsv1_client_read.c
- TLSv1 client: read handshake messages
-
-\ref tlsv1_client_write.c
- TLSv1 client: write handshake messages
-
-\ref tlsv1_common.c and \ref tlsv1_common.h
- Common TLSv1 routines and definitions
-
-\ref tlsv1_cred.c and \ref tlsv1_cred.h
- TLSv1 credentials
-
-\ref tlsv1_record.c and \ref tlsv1_record.h
- TLSv1 record protocol
-
-
-\section configuration Configuration
-
-\ref config_ssid.h
- Definition of per network configuration items
-
-\ref config.h
- Definition of the wpa_supplicant configuration
-
-\ref config.c
- Configuration parser and common functions
-
-\ref wpa_supplicant/config_file.c
- Configuration backend for text files (e.g., wpa_supplicant.conf)
-
-\ref config_winreg.c
- Configuration backend for Windows registry
-
-
-\section ctrl_iface Control interface
-
-wpa_supplicant has a \ref ctrl_iface_page "control interface"
-that can be used to get status
-information and manage operations from external programs. An example
-command line interface (wpa_cli) and GUI (wpa_gui) for this interface
-are included in the wpa_supplicant distribution.
-
-\ref wpa_supplicant/ctrl_iface.c and \ref wpa_supplicant/ctrl_iface.h
- wpa_supplicant-side of the control interface
-
-\ref ctrl_iface_unix.c
- UNIX domain sockets -based control interface backend
-
-\ref ctrl_iface_udp.c
- UDP sockets -based control interface backend
-
-\ref ctrl_iface_named_pipe.c
- Windows named pipes -based control interface backend
-
-\ref wpa_ctrl.c and \ref wpa_ctrl.h
- Library functions for external programs to provide access to the
- wpa_supplicant control interface
-
-\ref wpa_cli.c
- Example program for using wpa_supplicant control interface
-
-
-\section wpa_code WPA supplicant
-
-\ref wpa.c and \ref wpa.h
- WPA state machine and 4-Way/Group Key Handshake processing
-
-\ref preauth.c and \ref preauth.h
- PMKSA caching and pre-authentication (RSN/WPA2)
-
-\ref wpa_i.h
- Internal definitions for WPA code; not to be included to other modules.
-
-\section eap_peer EAP peer
-
-\ref eap_peer_module "EAP peer implementation" is a separate module that
-can be used by other programs than just wpa_supplicant.
-
-\ref eap.c and \ref eap.h
- EAP state machine and method interface
-
-\ref eap_defs.h
- Common EAP definitions
-
-\ref eap_i.h
- Internal definitions for EAP state machine and EAP methods; not to be
- included in other modules
-
-\ref eap_sim_common.c and \ref eap_sim_common.h
- Common code for EAP-SIM and EAP-AKA
-
-\ref eap_tls_common.c and \ref eap_tls_common.h
- Common code for EAP-PEAP, EAP-TTLS, and EAP-FAST
-
-\ref eap_ttls.c and \ref eap_ttls.h
- EAP-TTLS
-
-\ref eap_pax.c, \ref eap_pax_common.h, \ref eap_pax_common.c
- EAP-PAX
-
-\ref eap_psk.c, \ref eap_psk_common.h, \ref eap_psk_common.c
- EAP-PSK (note: this is not needed for WPA-PSK)
-
-\ref eap_sake.c, \ref eap_sake_common.h, \ref eap_sake_common.c
- EAP-SAKE
-
-\ref eap_gpsk.c, \ref eap_gpsk_common.h, \ref eap_gpsk_common.c
- EAP-GPSK
-
-\ref eap_aka.c, \ref eap_fast.c, \ref eap_gtc.c, \ref eap_leap.c,
-\ref eap_md5.c, \ref eap_mschapv2.c, \ref eap_otp.c, \ref eap_peap.c,
-\ref eap_sim.c, \ref eap_tls.c
- Other EAP method implementations
-
-
-\section eapol_supp EAPOL supplicant
-
-\ref eapol_supp_sm.c and \ref eapol_supp_sm.h
- EAPOL supplicant state machine and IEEE 802.1X processing
-
-
-\section win_port Windows port
-
-\ref ndis_events.c
- Code for receiving NdisMIndicateStatus() events and delivering them to
- wpa_supplicant \ref driver_ndis.c in more easier to use form
-
-\ref win_if_list.c
- External program for listing current network interface
-
-
-\section test_programs Test programs
-
-\ref radius_client.c and \ref radius_client.h
- RADIUS authentication client implementation for eapol_test
-
-\ref radius.c and \ref radius.h
- RADIUS message processing for eapol_test
-
-\ref eapol_test.c
- Standalone EAP testing tool with integrated RADIUS authentication
- client
-
-\ref preauth_test.c
- Standalone RSN pre-authentication tool
-
-\ref wpa_passphrase.c
- WPA ASCII passphrase to PSK conversion
-
-*/
diff --git a/doc/ctrl_iface.doxygen b/doc/ctrl_iface.doxygen
deleted file mode 100644
index 7dccdc797ef3..000000000000
--- a/doc/ctrl_iface.doxygen
+++ /dev/null
@@ -1,1054 +0,0 @@
-/**
-\page ctrl_iface_page wpa_supplicant control interface
-
-wpa_supplicant implements a control interface that can be used by
-external programs to control the operations of the wpa_supplicant
-daemon and to get status information and event notifications. There is
-a small C library, in a form of a single C file, \ref wpa_ctrl.c, that
-provides helper functions to facilitate the use of the control
-interface. External programs can link this file into them and then use
-the library functions documented in \ref wpa_ctrl.h to interact with
-wpa_supplicant. This library can also be used with C++. \ref wpa_cli.c and
-wpa_gui are example programs using this library.
-
-There are multiple mechanisms for inter-process communication. For
-example, Linux version of wpa_supplicant is using UNIX domain sockets
-for the control interface and Windows version UDP sockets. The use of
-the functions defined in \ref wpa_ctrl.h can be used to hide the details of
-the used IPC from external programs.
-
-
-\section using_ctrl_iface Using the control interface
-
-External programs, e.g., a GUI or a configuration utility, that need to
-communicate with wpa_supplicant should link in \ref wpa_ctrl.c. This
-allows them to use helper functions to open connection to the control
-interface with \ref wpa_ctrl_open() and to send commands with
-\ref wpa_ctrl_request().
-
-wpa_supplicant uses the control interface for two types of communication:
-commands and unsolicited event messages. Commands are a pair of
-messages, a request from the external program and a response from
-wpa_supplicant. These can be executed using \ref wpa_ctrl_request().
-Unsolicited event messages are sent by wpa_supplicant to the control
-interface connection without specific request from the external program
-for receiving each message. However, the external program needs to
-attach to the control interface with \ref wpa_ctrl_attach() to receive these
-unsolicited messages.
-
-If the control interface connection is used both for commands and
-unsolicited event messages, there is potential for receiving an
-unsolicited message between the command request and response.
-\ref wpa_ctrl_request() caller will need to supply a callback, msg_cb,
-for processing these messages. Often it is easier to open two
-control interface connections by calling \ref wpa_ctrl_open() twice and
-then use one of the connections for commands and the other one for
-unsolicited messages. This way command request/response pairs will
-not be broken by unsolicited messages. wpa_cli is an example of how
-to use only one connection for both purposes and wpa_gui demonstrates
-how to use two separate connections.
-
-Once the control interface connection is not needed anymore, it should
-be closed by calling \ref wpa_ctrl_close(). If the connection was used for
-unsolicited event messages, it should be first detached by calling
-\ref wpa_ctrl_detach().
-
-
-\section ctrl_iface_cmds Control interface commands
-
-Following commands can be used with \ref wpa_ctrl_request():
-
-\subsection ctrl_iface_PING PING
-
-This command can be used to test whether wpa_supplicant is replying
-to the control interface commands. The expected reply is \c PONG if the
-connection is open and wpa_supplicant is processing commands.
-
-
-\subsection ctrl_iface_MIB MIB
-
-Request a list of MIB variables (dot1x, dot11). The output is a text
-block with each line in \c variable=value format. For example:
-
-\verbatim
-dot11RSNAOptionImplemented=TRUE
-dot11RSNAPreauthenticationImplemented=TRUE
-dot11RSNAEnabled=FALSE
-dot11RSNAPreauthenticationEnabled=FALSE
-dot11RSNAConfigVersion=1
-dot11RSNAConfigPairwiseKeysSupported=5
-dot11RSNAConfigGroupCipherSize=128
-dot11RSNAConfigPMKLifetime=43200
-dot11RSNAConfigPMKReauthThreshold=70
-dot11RSNAConfigNumberOfPTKSAReplayCounters=1
-dot11RSNAConfigSATimeout=60
-dot11RSNAAuthenticationSuiteSelected=00-50-f2-2
-dot11RSNAPairwiseCipherSelected=00-50-f2-4
-dot11RSNAGroupCipherSelected=00-50-f2-4
-dot11RSNAPMKIDUsed=
-dot11RSNAAuthenticationSuiteRequested=00-50-f2-2
-dot11RSNAPairwiseCipherRequested=00-50-f2-4
-dot11RSNAGroupCipherRequested=00-50-f2-4
-dot11RSNAConfigNumberOfGTKSAReplayCounters=0
-dot11RSNA4WayHandshakeFailures=0
-dot1xSuppPaeState=5
-dot1xSuppHeldPeriod=60
-dot1xSuppAuthPeriod=30
-dot1xSuppStartPeriod=30
-dot1xSuppMaxStart=3
-dot1xSuppSuppControlledPortStatus=Authorized
-dot1xSuppBackendPaeState=2
-dot1xSuppEapolFramesRx=0
-dot1xSuppEapolFramesTx=440
-dot1xSuppEapolStartFramesTx=2
-dot1xSuppEapolLogoffFramesTx=0
-dot1xSuppEapolRespFramesTx=0
-dot1xSuppEapolReqIdFramesRx=0
-dot1xSuppEapolReqFramesRx=0
-dot1xSuppInvalidEapolFramesRx=0
-dot1xSuppEapLengthErrorFramesRx=0
-dot1xSuppLastEapolFrameVersion=0
-dot1xSuppLastEapolFrameSource=00:00:00:00:00:00
-\endverbatim
-
-
-\subsection ctrl_iface_STATUS STATUS
-
-Request current WPA/EAPOL/EAP status information. The output is a text
-block with each line in \c variable=value format. For example:
-
-\verbatim
-bssid=02:00:01:02:03:04
-ssid=test network
-pairwise_cipher=CCMP
-group_cipher=CCMP
-key_mgmt=WPA-PSK
-wpa_state=COMPLETED
-ip_address=192.168.1.21
-Supplicant PAE state=AUTHENTICATED
-suppPortStatus=Authorized
-EAP state=SUCCESS
-\endverbatim
-
-
-\subsection ctrl_iface_STATUS-VERBOSE STATUS-VERBOSE
-
-Same as STATUS, but with more verbosity (i.e., more \c variable=value pairs).
-
-\verbatim
-bssid=02:00:01:02:03:04
-ssid=test network
-id=0
-pairwise_cipher=CCMP
-group_cipher=CCMP
-key_mgmt=WPA-PSK
-wpa_state=COMPLETED
-ip_address=192.168.1.21
-Supplicant PAE state=AUTHENTICATED
-suppPortStatus=Authorized
-heldPeriod=60
-authPeriod=30
-startPeriod=30
-maxStart=3
-portControl=Auto
-Supplicant Backend state=IDLE
-EAP state=SUCCESS
-reqMethod=0
-methodState=NONE
-decision=COND_SUCC
-ClientTimeout=60
-\endverbatim
-
-
-\subsection ctrl_iface_PMKSA PMKSA
-
-Show PMKSA cache
-
-\verbatim
-Index / AA / PMKID / expiration (in seconds) / opportunistic
-1 / 02:00:01:02:03:04 / 000102030405060708090a0b0c0d0e0f / 41362 / 0
-2 / 02:00:01:33:55:77 / 928389281928383b34afb34ba4212345 / 362 / 1
-\endverbatim
-
-
-\subsection ctrl_iface_SET SET <variable> <value>
-
-Set variables:
-- EAPOL::heldPeriod
-- EAPOL::authPeriod
-- EAPOL::startPeriod
-- EAPOL::maxStart
-- dot11RSNAConfigPMKLifetime
-- dot11RSNAConfigPMKReauthThreshold
-- dot11RSNAConfigSATimeout
-
-Example command:
-\verbatim
-SET EAPOL::heldPeriod 45
-\endverbatim
-
-
-\subsection ctrl_iface_LOGON LOGON
-
-IEEE 802.1X EAPOL state machine logon.
-
-
-\subsection ctrl_iface_LOGOFF LOGOFF
-
-IEEE 802.1X EAPOL state machine logoff.
-
-
-\subsection ctrl_iface_REASSOCIATE REASSOCIATE
-
-Force reassociation.
-
-
-\subsection ctrl_iface_RECONNECT RECONNECT
-
-Connect if disconnected (i.e., like \c REASSOCIATE, but only connect
-if in disconnected state).
-
-
-\subsection ctrl_iface_PREAUTH PREAUTH <BSSID>
-
-Start pre-authentication with the given BSSID.
-
-
-\subsection ctrl_iface_ATTACH ATTACH
-
-Attach the connection as a monitor for unsolicited events. This can
-be done with \ref wpa_ctrl_attach().
-
-
-\subsection ctrl_iface_DETACH DETACH
-
-Detach the connection as a monitor for unsolicited events. This can
-be done with \ref wpa_ctrl_detach().
-
-
-\subsection ctrl_iface_LEVEL LEVEL <debug level>
-
-Change debug level.
-
-
-\subsection ctrl_iface_RECONFIGURE RECONFIGURE
-
-Force wpa_supplicant to re-read its configuration data.
-
-
-\subsection ctrl_iface_TERMINATE TERMINATE
-
-Terminate wpa_supplicant process.
-
-
-\subsection ctrl_iface_BSSID BSSID <network id> <BSSID>
-
-Set preferred BSSID for a network. Network id can be received from the
-\c LIST_NETWORKS command output.
-
-
-\subsection ctrl_iface_LIST_NETWORKS LIST_NETWORKS
-
-List configured networks.
-
-\verbatim
-network id / ssid / bssid / flags
-0 example network any [CURRENT]
-\endverbatim
-
-(note: fields are separated with tabs)
-
-
-\subsection ctrl_iface_DISCONNECT DISCONNECT
-
-Disconnect and wait for \c REASSOCIATE or \c RECONNECT command before
-connecting.
-
-
-\subsection ctrl_iface_SCAN SCAN
-
-Request a new BSS scan.
-
-
-\subsection ctrl_iface_SCAN_RESULTS SCAN_RESULTS
-
-Get the latest scan results.
-
-\verbatim
-bssid / frequency / signal level / flags / ssid
-00:09:5b:95:e0:4e 2412 208 [WPA-PSK-CCMP] jkm private
-02:55:24:33:77:a3 2462 187 [WPA-PSK-TKIP] testing
-00:09:5b:95:e0:4f 2412 209 jkm guest
-\endverbatim
-
-(note: fields are separated with tabs)
-
-
-\subsection ctrl_iface_BSS BSS
-
-Get detailed per-BSS scan results. \c BSS command can be used to
-iterate through scan results one BSS at a time and to fetch all
-information from the found BSSes. This provides access to the same
-data that is available through \c SCAN_RESULTS but in a way that
-avoids problems with large number of scan results not fitting in the
-ctrl_iface messages.
-
-There are two options for selecting the BSS with the \c BSS command:
-"BSS <idx>" requests information for the BSS identified by the index
-(0 .. size-1) in the scan results table and "BSS <BSSID>" requests
-information for the given BSS (based on BSSID in 00:01:02:03:04:05
-format).
-
-BSS information is presented in following format. Please note that new
-fields may be added to this field=value data, so the ctrl_iface user
-should be prepared to ignore values it does not understand.
-
-\verbatim
-bssid=00:09:5b:95:e0:4e
-freq=2412
-beacon_int=0
-capabilities=0x0011
-qual=51
-noise=161
-level=212
-tsf=0000000000000000
-ie=000b6a6b6d2070726976617465010180dd180050f20101000050f20401000050f20401000050f2020000
-ssid=jkm private
-\endverbatim
-
-
-
-\subsection ctrl_iface_SELECT_NETWORK SELECT_NETWORK <network id>
-
-Select a network (disable others). Network id can be received from the
-\c LIST_NETWORKS command output.
-
-
-\subsection ctrl_iface_ENABLE_NETWORK ENABLE_NETWORK <network id>
-
-Enable a network. Network id can be received from the
-\c LIST_NETWORKS command output. Special network id \c all can be
-used to enable all network.
-
-
-\subsection ctrl_iface_DISABLE_NETWORK DISABLE_NETWORK <network id>
-
-Disable a network. Network id can be received from the
-\c LIST_NETWORKS command output. Special network id \c all can be
-used to disable all network.
-
-
-\subsection ctrl_iface_ADD_NETWORK ADD_NETWORK
-
-Add a new network. This command creates a new network with empty
-configuration. The new network is disabled and once it has been
-configured it can be enabled with \c ENABLE_NETWORK command. \c ADD_NETWORK
-returns the network id of the new network or FAIL on failure.
-
-
-\subsection ctrl_iface_REMOVE_NETWORK REMOVE_NETWORK <network id>
-
-Remove a network. Network id can be received from the
-\c LIST_NETWORKS command output. Special network id \c all can be
-used to remove all network.
-
-
-\subsection ctrl_iface_SET_NETWORK SET_NETWORK <network id> <variable> <value>
-
-Set network variables. Network id can be received from the
-\c LIST_NETWORKS command output.
-
-This command uses the same variables and data formats as the
-configuration file. See example wpa_supplicant.conf for more details.
-
-- ssid (network name, SSID)
-- psk (WPA passphrase or pre-shared key)
-- key_mgmt (key management protocol)
-- identity (EAP identity)
-- password (EAP password)
-- ...
-
-
-\subsection ctrl_iface_GET_NETWORK GET_NETWORK <network id> <variable>
-
-Get network variables. Network id can be received from the
-\c LIST_NETWORKS command output.
-
-
-\subsection ctrl_iface_SAVE_CONFIG SAVE_CONFIG
-
-Save the current configuration.
-
-
-\subsection ctrl_iface_P2P_FIND P2P_FIND
-
-Start P2P device discovery. Optional parameter can be used to specify
-the duration for the discovery in seconds (e.g., "P2P_FIND 5"). If the
-duration is not specified, discovery will be started for indefinite
-time, i.e., until it is terminated by P2P_STOP_FIND or P2P_CONNECT (to
-start group formation with a discovered peer).
-
-The default search type is to first run a full scan of all channels
-and then continue scanning only social channels (1, 6, 11). This
-behavior can be changed by specifying a different search type: social
-(e.g., "P2P_FIND 5 type=social") will skip the initial full scan and
-only search social channels; progressive (e.g., "P2P_FIND
-type=progressive") starts with a full scan and then searches
-progressively through all channels one channel at the time with the
-social channel scans. Progressive device discovery can be used to find
-new groups (and groups that were not found during the initial scan,
-e.g., due to the GO being asleep) over time without adding
-considerable extra delay for every Search state round.
-
-
-\subsection ctrl_iface_P2P_STOP_FIND P2P_STOP_FIND
-
-Stop ongoing P2P device discovery or other operation (connect, listen
-mode).
-
-
-\subsection ctrl_iface_P2P_CONNECT P2P_CONNECT
-
-Start P2P group formation with a discovered P2P peer. This includes
-group owner negotiation, group interface setup, provisioning, and
-establishing data connection.
-
-P2P_CONNECT <peer device address> <pbc|pin|PIN#>
-[label|display|keypad] [persistent] [join|auth] [go_intent=<0..15>]
-
-Start P2P group formation with a discovered P2P peer. This includes
-optional group owner negotiation, group interface setup, provisioning,
-and establishing data connection.
-
-The <pbc|pin|PIN#> parameter specifies the WPS provisioning
-method. "pbc" string starts pushbutton method, "pin" string start PIN
-method using an automatically generated PIN (which will be returned as
-the command return code), PIN# means that a pre-selected PIN can be
-used (e.g., 12345670). [label|display|keypad] is used with PIN method
-to specify which PIN is used (label=PIN from local label,
-display=dynamically generated random PIN from local display,
-keypad=PIN entered from peer device label or display). "persistent"
-parameter can be used to request a persistent group to be formed.
-
-"join" indicates that this is a command to join an existing group as a
-client. It skips the GO Negotiation part.
-
-"auth" indicates that the WPS parameters are authorized for the peer
-device without actually starting GO Negotiation (i.e., the peer is
-expected to initiate GO Negotiation). This is mainly for testing
-purposes.
-
-The optional "go_intent" parameter can be used to override the default
-GO Intent value.
-
-
-\subsection ctrl_iface_P2P_LISTEN P2P_LISTEN
-
-Start Listen-only state. Optional parameter can be used to specify the
-duration for the Listen operation in seconds. This command may not
-be of that much use during normal operations and is mainly designed
-for testing. It can also be used to keep the device discoverable
-without having to maintain a group.
-
-
-\subsection ctrl_iface_P2P_GROUP_REMOVE P2P_GROUP_REMOVE
-
-Terminate a P2P group. If a new virtual network interface was used for
-the group, it will also be removed. The network interface name of the
-group interface is used as a parameter for this command.
-
-
-\subsection ctrl_iface_P2P_GROUP_ADD P2P_GROUP_ADD
-
-Set up a P2P group owner manually (i.e., without group owner
-negotiation with a specific peer). This is also known as autonomous
-GO. Optional persistent=<network id> can be used to specify restart of
-a persistent group.
-
-
-\subsection ctrl_iface_P2P_PROV_DISC P2P_PROV_DISC
-
-Send P2P provision discovery request to the specified peer. The
-parameters for this command are the P2P device address of the peer and
-the desired configuration method. For example, "P2P_PROV_DISC
-02:01:02:03:04:05 display" would request the peer to display a PIN for
-us and "P2P_PROV_DISC 02:01:02:03:04:05 keypad" would request the peer
-to enter a PIN that we display.
-
-
-\subsection ctrl_iface_P2P_GET_PASSPHRASE P2P_GET_PASSPHRASE
-
-Get the passphrase for a group (only available when acting as a GO).
-
-
-\subsection ctrl_iface_P2P_SERV_DISC_REQ P2P_SERV_DISC_REQ
-
-Schedule a P2P service discovery request. The parameters for this
-command are the device address of the peer device (or 00:00:00:00:00:00
-for wildcard query that is sent to every discovered P2P peer that
-supports service discovery) and P2P Service Query TLV(s) as hexdump.
-For example, "P2P_SERV_DISC_REQ 00:00:00:00:00:00 02000001" schedules
-a request for listing all supported service discovery protocols and
-requests this to be sent to all discovered peers. The pending requests
-are sent during device discovery (see \ref ctrl_iface_P2P_FIND).
-
-This command returns an identifier for the pending query (e.g.,
-"1f77628") that can be used to cancel the request. Directed requests
-will be automatically removed when the specified peer has replied to
-it.
-
-
-\subsection ctrl_iface_P2P_SERV_DISC_CANCEL_REQ P2P_SERV_DISC_CANCEL_REQ
-
-Cancel a pending P2P service discovery request. This command takes a
-single parameter: identifier for the pending query (the value returned
-by \ref ctrl_iface_P2P_SERV_DISC_REQ), e.g.,
-"P2P_SERV_DISC_CANCEL_REQ 1f77628".
-
-
-\subsection ctrl_iface_P2P_SERV_DISC_RESP P2P_SERV_DISC_RESP
-
-Reply to a service discovery query. This command takes following
-parameters: frequency in MHz, destination address, dialog token,
-response TLV(s). The first three parameters are copied from the
-request event. For example,
-"P2P_SERV_DISC_RESP 2437 02:40:61:c2:f3:b7 1 0300000101".
-
-
-\subsection ctrl_iface_P2P_SERVICE_UPDATE P2P_SERVICE_UPDATE
-
-Indicate that local services have changed. This is used to increment
-the P2P service indicator value so that peers know when previously
-cached information may have changed.
-
-
-\subsection ctrl_iface_P2P_SERV_DISC_EXTERNAL P2P_SERV_DISC_EXTERNAL
-
-Configure external processing of P2P service requests: 0 (default) =
-no external processing of requests (i.e., internal code will reject
-each request), 1 = external processing of requests (external program
-is responsible for replying to service discovery requests with
-\ref ctrl_iface_P2P_SERV_DISC_RESP).
-
-
-\subsection ctrl_iface_P2P_REJECT P2P_REJECT
-
-Reject connection attempt from a peer (specified with a device
-address). This is a mechanism to reject a pending GO Negotiation with
-a peer and request to automatically block any further connection or
-discovery of the peer.
-
-
-\subsection ctrl_iface_P2P_INVITE P2P_INVITE
-
-Invite a peer to join a group or to (re)start a persistent group.
-
-
-\subsection ctrl_iface_P2P_PEER P2P_PEER
-
-Fetch information about a discovered peer. This command takes in an
-argument specifying which peer to select: P2P Device Address of the
-peer, "FIRST" to indicate the first peer in the list, or "NEXT-<P2P
-Device Address>" to indicate the entry following the specified peer
-(to allow for iterating through the list).
-
-
-\subsection ctrl_iface_P2P_EXT_LISTEN P2P_EXT_LISTEN
-
-Enable/disable extended listen timing. Without parameters, this
-command disables extended listen timing. When enabling the feature,
-two parameters are used: availability period and availability interval
-(both in milliseconds and with range of 1-65535).
-
-
-\section ctrl_iface_interactive Interactive requests
-
-If wpa_supplicant needs additional information during authentication
-(e.g., password), it will use a specific prefix, \c CTRL-REQ-
-(\a WPA_CTRL_REQ macro) in an unsolicited event message. An external
-program, e.g., a GUI, can provide such information by using
-\c CTRL-RSP- (\a WPA_CTRL_RSP macro) prefix in a command with matching
-field name.
-
-The following fields can be requested in this way from the user:
-- IDENTITY (EAP identity/user name)
-- PASSWORD (EAP password)
-- NEW_PASSWORD (New password if the server is requesting password change)
-- PIN (PIN code for accessing a SIM or smartcard)
-- OTP (one-time password; like password, but the value is used only once)
-- PASSPHRASE (passphrase for a private key file)
-
-\verbatim
-CTRL-REQ-<field name>-<network id>-<human readable text>
-CTRL-RSP-<field name>-<network id>-<value>
-\endverbatim
-
-For example, request from wpa_supplicant:
-\verbatim
-CTRL-REQ-PASSWORD-1-Password needed for SSID test-network
-\endverbatim
-
-And a matching reply from the GUI:
-\verbatim
-CTRL-RSP-PASSWORD-1-secret
-\endverbatim
-
-
-\subsection ctrl_iface_GET_CAPABILITY GET_CAPABILITY <option> [strict]
-
-Get list of supported functionality (eap, pairwise, group,
-proto). Supported functionality is shown as space separate lists of
-values used in the same format as in wpa_supplicant configuration.
-If optional argument, 'strict', is added, only the values that the
-driver claims to explicitly support are included. Without this, all
-available capabilities are included if the driver does not provide
-a mechanism for querying capabilities.
-
-Example request/reply pairs:
-
-\verbatim
-GET_CAPABILITY eap
-AKA FAST GTC LEAP MD5 MSCHAPV2 OTP PAX PEAP PSK SIM TLS TTLS
-\endverbatim
-
-\verbatim
-GET_CAPABILITY pairwise
-CCMP TKIP NONE
-\endverbatim
-
-\verbatim
-GET_CAPABILITY pairwise strict
-\endverbatim
-
-\verbatim
-GET_CAPABILITY group
-CCMP TKIP WEP104 WEP40
-\endverbatim
-
-\verbatim
-GET_CAPABILITY key_mgmt
-WPA-PSK WPA-EAP IEEE8021X NONE
-\endverbatim
-
-\verbatim
-GET_CAPABILITY proto
-RSN WPA
-\endverbatim
-
-\verbatim
-GET_CAPABILITY auth_alg
-OPEN SHARED LEAP
-\endverbatim
-
-
-\subsection ctrl_iface_AP_SCAN AP_SCAN <ap_scan value>
-
-Change ap_scan value:
-0 = no scanning,
-1 = wpa_supplicant requests scans and uses scan results to select the AP,
-2 = wpa_supplicant does not use scanning and just requests driver to
-associate and take care of AP selection
-
-
-\subsection ctrl_iface_INTERFACES INTERFACES
-
-List configured interfaces.
-
-\verbatim
-wlan0
-eth0
-\endverbatim
-
-
-\section ctrl_iface_events Control interface events
-
-wpa_supplicant generates number messages based on events like
-connection or a completion of a task. These are available to external
-programs that attach to receive unsolicited messages over the control
-interface with \ref wpa_ctrl_attach().
-
-The event messages will be delivered over the attach control interface
-as text strings that start with the priority level of the message and
-a fixed prefix text as defined in \ref wpa_ctrl.h. After this, optional
-additional information may be included depending on the event
-message. For example, following event message is delivered when new
-scan results are available:
-
-\verbatim
-<2>CTRL-EVENT-SCAN-RESULTS
-\endverbatim
-
-Following priority levels are used:
-- 0 = MSGDUMP
-- 1 = DEBUG
-- 2 = INFO
-- 3 = WARNING
-- 4 = ERROR
-
-By default, any priority level greater than equal to 2 (INFO) are
-delivered over the attached control interface. LEVEL command can be
-used to set the level of messages which will be delivered. It should
-be noted that there are many debug messages that do not include any
-particulat prefix and are subject to change. They may be used for
-debug information, but can usually be ignored by external programs.
-
-In most cases, the external program can skip over the priority field
-in the beginning of the event message and then compare the following
-text to the event strings from \ref wpa_ctrl.h that the program is
-interested in processing.
-
-Following subsections describe the most common event notifications
-generated by wpa_supplicant.
-
-\subsection ctrl_iface_event_CTRL_REQ CTRL-REQ-
-
-WPA_CTRL_REQ: Request information from a user. See
-\ref ctrl_iface_interactive "Interactive requests" sections for more
-details.
-
-\subsection ctrl_iface_event_CONNECTED CTRL-EVENT-CONNECTED
-
-WPA_EVENT_CONNECTED: Indicate successfully completed authentication
-and that the data connection is now enabled.
-
-\subsection ctrl_iface_event_DISCONNECTED CTRL-EVENT-DISCONNECTED
-
-WPA_EVENT_DISCONNECTED: Disconnected, data connection is not available
-
-\subsection ctrl_iface_event_TERMINATING CTRL-EVENT-TERMINATING
-
-WPA_EVENT_TERMINATING: wpa_supplicant is exiting
-
-\subsection ctrl_iface_event_PASSWORD_CHANGED CTRL-EVENT-PASSWORD-CHANGED
-
-WPA_EVENT_PASSWORD_CHANGED: Password change was completed successfully
-
-\subsection ctrl_iface_event_EAP_NOTIFICATION CTRL-EVENT-EAP-NOTIFICATION
-
-WPA_EVENT_EAP_NOTIFICATION: EAP-Request/Notification received
-
-\subsection ctrl_iface_event_EAP_STARTED CTRL-EVENT-EAP-STARTED
-
-WPA_EVENT_EAP_STARTED: EAP authentication started (EAP-Request/Identity
-received)
-
-\subsection ctrl_iface_event_EAP_METHOD CTRL-EVENT-EAP-METHOD
-
-WPA_EVENT_EAP_METHOD: EAP method selected
-
-\subsection ctrl_iface_event_EAP_SUCCESS CTRL-EVENT-EAP-SUCCESS
-
-WPA_EVENT_EAP_SUCCESS: EAP authentication completed successfully
-
-\subsection ctrl_iface_event_EAP_FAILURE CTRL-EVENT-EAP-FAILURE
-
-WPA_EVENT_EAP_FAILURE: EAP authentication failed (EAP-Failure received)
-
-\subsection ctrl_iface_event_SCAN_RESULTS CTRL-EVENT-SCAN-RESULTS
-
-WPA_EVENT_SCAN_RESULTS: New scan results available
-
-\subsection ctrl_iface_event_BSS_ADDED CTRL-EVENT-BSS-ADDED
-
-WPA_EVENT_BSS_ADDED: A new BSS entry was added. The event prefix is
-followed by the BSS entry id and BSSID.
-
-\verbatim
-CTRL-EVENT-BSS-ADDED 34 00:11:22:33:44:55
-\endverbatim
-
-\subsection ctrl_iface_event_BSS_REMOVED CTRL-EVENT-BSS-REMOVED
-
-WPA_EVENT_BSS_REMOVED: A BSS entry was removed. The event prefix is
-followed by BSS entry id and BSSID.
-
-\verbatim
-CTRL-EVENT-BSS-REMOVED 34 00:11:22:33:44:55
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_OVERLAP_DETECTED WPS-OVERLAP-DETECTED
-
-WPS_EVENT_OVERLAP: WPS overlap detected in PBC mode
-
-\subsection ctrl_iface_event_WPS_AP_AVAILABLE_PBC WPS-AP-AVAILABLE-PBC
-
-WPS_EVENT_AP_AVAILABLE_PBC: Available WPS AP with active PBC found in
-scan results.
-
-\subsection ctrl_iface_event_WPS_AP_AVAILABLE_PIN WPS-AP-AVAILABLE-PIN
-
-WPS_EVENT_AP_AVAILABLE_PIN: Available WPS AP with recently selected PIN
-registrar found in scan results.
-
-\subsection ctrl_iface_event_WPS_AP_AVAILABLE WPS-AP-AVAILABLE
-
-WPS_EVENT_AP_AVAILABLE: Available WPS AP found in scan results
-
-\subsection ctrl_iface_event_WPS_CRED_RECEIVED WPS-CRED-RECEIVED
-
-WPS_EVENT_CRED_RECEIVED: A new credential received
-
-\subsection ctrl_iface_event_WPS_M2D WPS-M2D
-
-WPS_EVENT_M2D: M2D received
-
-\subsection ctrl_iface_event_WPS_FAIL
-
-WPS_EVENT_FAIL: WPS registration failed after M2/M2D
-
-\subsection ctrl_iface_event_WPS_SUCCESS WPS-SUCCESS
-
-WPS_EVENT_SUCCESS: WPS registration completed successfully
-
-\subsection ctrl_iface_event_WPS_TIMEOUT WPS-TIMEOUT
-
-WPS_EVENT_TIMEOUT: WPS enrollment attempt timed out and was terminated
-
-\subsection ctrl_iface_event_WPS_ENROLLEE_SEEN WPS-ENROLLEE-SEEN
-
-WPS_EVENT_ENROLLEE_SEEN: WPS Enrollee was detected (used in AP mode).
-The event prefix is followed by MAC addr, UUID-E, pri dev type,
-config methods, dev passwd id, request type, [dev name].
-
-\verbatim
-WPS-ENROLLEE-SEEN 02:00:00:00:01:00
-572cf82f-c957-5653-9b16-b5cfb298abf1 1-0050F204-1 0x80 4 1
-[Wireless Client]
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_ER_AP_ADD WPS-ER-AP-ADD
-
-WPS_EVENT_ER_AP_ADD: WPS ER discovered an AP
-
-\verbatim
-WPS-ER-AP-ADD 87654321-9abc-def0-1234-56789abc0002 02:11:22:33:44:55
-pri_dev_type=6-0050F204-1 wps_state=1 |Very friendly name|Company|
-Long description of the model|WAP|http://w1.fi/|http://w1.fi/hostapd/
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_ER_AP_REMOVE WPS-ER-AP-REMOVE
-
-WPS_EVENT_ER_AP_REMOVE: WPS ER removed an AP entry
-
-\verbatim
-WPS-ER-AP-REMOVE 87654321-9abc-def0-1234-56789abc0002
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_ER_ENROLLEE_ADD WPS-ER-ENROLLEE-ADD
-
-WPS_EVENT_ER_ENROLLEE_ADD: WPS ER discovered a new Enrollee
-
-\verbatim
-WPS-ER-ENROLLEE-ADD 2b7093f1-d6fb-5108-adbb-bea66bb87333
-02:66:a0:ee:17:27 M1=1 config_methods=0x14d dev_passwd_id=0
-pri_dev_type=1-0050F204-1
-|Wireless Client|Company|cmodel|123|12345|
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_ER_ENROLLEE_REMOVE WPS-ER-ENROLLEE-REMOVE
-
-WPS_EVENT_ER_ENROLLEE_REMOVE: WPS ER removed an Enrollee entry
-
-\verbatim
-WPS-ER-ENROLLEE-REMOVE 2b7093f1-d6fb-5108-adbb-bea66bb87333
-02:66:a0:ee:17:27
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_PIN_NEEDED WPS-PIN-NEEDED
-
-WPS_EVENT_PIN_NEEDED: PIN is needed to complete provisioning with an
-Enrollee. This is followed by information about the Enrollee (UUID,
-MAC address, device name, manufacturer, model name, model number,
-serial number, primary device type).
-\verbatim
-WPS-PIN-NEEDED 5a02a5fa-9199-5e7c-bc46-e183d3cb32f7 02:2a:c4:18:5b:f3
-[Wireless Client|Company|cmodel|123|12345|1-0050F204-1]
-\endverbatim
-
-\subsection ctrl_iface_event_WPS_NEW_AP_SETTINGS WPS-NEW-AP-SETTINGS
-
-WPS_EVENT_NEW_AP_SETTINGS: New AP settings were received
-
-\subsection ctrl_iface_event_WPS_REG_SUCCESS WPS-REG-SUCCESS
-
-WPS_EVENT_REG_SUCCESS: WPS provisioning was completed successfully
-(AP/Registrar)
-
-\subsection ctrl_iface_event_WPS_AP_SETUP_LOCKED WPS-AP-SETUP-LOCKED
-
-WPS_EVENT_AP_SETUP_LOCKED: AP changed into setup locked state due to
-multiple failed configuration attempts using the AP PIN.
-
-\subsection ctrl_iface_event_AP_STA_CONNECTED AP-STA-CONNECTED
-
-AP_STA_CONNECTED: A station associated with us (AP mode event). The
-event prefix is followed by the MAC address of the station.
-
-\verbatim
-AP-STA-CONNECTED 02:2a:c4:18:5b:f3
-\endverbatim
-
-\subsection ctrl_iface_event_AP_STA_DISCONNECTED AP-STA-DISCONNECTED
-
-AP_STA_DISCONNECTED: A station disassociated (AP mode event)
-
-\verbatim
-AP-STA-DISCONNECTED 02:2a:c4:18:5b:f3
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_DEVICE_FOUND P2P-DEVICE-FOUND
-
-P2P_EVENT_DEVICE_FOUND: Indication of a discovered P2P device with
-information about that device.
-
-\verbatim
-P2P-DEVICE-FOUND 02:b5:64:63:30:63 p2p_dev_addr=02:b5:64:63:30:63
-pri_dev_type=1-0050f204-1 name='Wireless Client' config_methods=0x84
-dev_capab=0x21 group_capab=0x0
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_GO_NEG_REQUEST P2P-GO-NEG-REQUEST
-
-P2P_EVENT_GO_NEG_REQUEST: A P2P device requested GO negotiation, but we
-were not ready to start the negotiation.
-
-\verbatim
-P2P-GO-NEG-REQUEST 02:40:61:c2:f3:b7 dev_passwd_id=4
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_GO_NEG_SUCCESS P2P-GO-NEG-SUCCESS
-
-P2P_EVENT_GO_NEG_SUCCESS: Indication of successfully complete group
-owner negotiation.
-
-\subsection ctrl_iface_event_P2P_EVENT_GO_NEG_FAILURE P2P-GO-NEG-FAILURE
-
-P2P_EVENT_GO_NEG_FAILURE: Indication of failed group owner negotiation.
-
-\subsection ctrl_iface_event_P2P_EVENT_GROUP_FORMATION_SUCCESS P2P-GROUP-FORMATION-SUCCESS
-
-P2P_EVENT_GROUP_FORMATION_SUCCESS: Indication that P2P group formation
-has been completed successfully.
-
-\subsection ctrl_iface_event_P2P_EVENT_GROUP_FORMATION_FAILURE P2P-GROUP-FORMATION-FAILURE
-
-P2P_EVENT_GROUP_FORMATION_FAILURE: Indication that P2P group formation
-failed (e.g., due to provisioning failure or timeout).
-
-\subsection ctrl_iface_event_P2P_EVENT_GROUP_STARTED P2P-GROUP-STARTED
-
-P2P_EVENT_GROUP_STARTED: Indication of a new P2P group having been
-started. Additional parameters: network interface name for the group,
-role (GO/client), SSID. The passphrase used in the group is also
-indicated here if known (on GO) or PSK (on client). If the group is a
-persistent one, a flag indicating that is included.
-
-\verbatim
-P2P-GROUP-STARTED wlan0-p2p-0 GO ssid="DIRECT-3F Testing"
-passphrase="12345678" go_dev_addr=02:40:61:c2:f3:b7 [PERSISTENT]
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_GROUP_REMOVED P2P-GROUP-REMOVED
-
-P2P_EVENT_GROUP_REMOVED: Indication of a P2P group having been removed.
-Additional parameters: network interface name for the group, role
-(GO/client).
-
-\verbatim
-P2P-GROUP-REMOVED wlan0-p2p-0 GO
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_PROV_DISC_SHOW_PIN P2P-PROV-DISC-SHOW-PIN
-
-P2P_EVENT_PROV_DISC_SHOW_PIN: Request from the peer for us to display
-a PIN that will be entered on the peer. The following parameters are
-included after the event prefix: peer_address PIN. The PIN is a
-random PIN generated for this connection. P2P_CONNECT command can be
-used to accept the request with the same PIN configured for the
-connection.
-
-\verbatim
-P2P-PROV-DISC-SHOW-PIN 02:40:61:c2:f3:b7 12345670
-p2p_dev_addr=02:40:61:c2:f3:b7 pri_dev_type=1-0050F204-1 name='Test'
-config_methods=0x188 dev_capab=0x21 group_capab=0x0
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_PROV_DISC_ENTER_PIN P2P-PROV-DISC-ENTER-PIN
-
-P2P_EVENT_PROV_DISC_ENTER_PIN: Request from the peer for us to enter a
-PIN displayed on the peer. The following parameter is included after
-the event prefix: peer address.
-
-\verbatim
-P2P-PROV-DISC-ENTER-PIN 02:40:61:c2:f3:b7 p2p_dev_addr=02:40:61:c2:f3:b7
-pri_dev_type=1-0050F204-1 name='Test' config_methods=0x188
-dev_capab=0x21 group_capab=0x0
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_PROV_DISC_PBC_REQ P2P-PROV-DISC-PBC-REQ
-
-P2P_EVENT_PROV_DISC_PBC_REQ: Request from the peer for us to connect
-using PBC. The following parameters are included after the event prefix:
-peer_address. P2P_CONNECT command can be used to accept the request.
-
-\verbatim
-P2P-PROV-DISC-PBC-REQ 02:40:61:c2:f3:b7 p2p_dev_addr=02:40:61:c2:f3:b7
-pri_dev_type=1-0050F204-1 name='Test' config_methods=0x188
-dev_capab=0x21 group_capab=0x0
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_PROV_DISC_PBC_RESP P2P-PROV-DISC-PBC-RESP
-
-P2P_EVENT_PROV_DISC_PBC_RESP: The peer accepted our provision discovery
-request to connect using PBC. The following parameters are included
-after the event prefix: peer_address. P2P_CONNECT command can be used to
-start GO Negotiation after this.
-
-\verbatim
-P2P-PROV-DISC-PBC-RESP 02:40:61:c2:f3:b7
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_SERV_DISC_REQ P2P-SERV-DISC-REQ
-
-P2P-SERV-DISC-REQ: Indicate reception of a P2P service discovery
-request. The following parameters are included after the event prefix:
-frequency in MHz, source address, dialog token, Service Update
-Indicator, Service Query TLV(s) as hexdump.
-
-\verbatim
-P2P-SERV-DISC-REQ 2412 02:40:61:c2:f3:b7 0 0 02000001
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_SERV_DISC_RESP P2P-SERV-DISC-RESP
-
-P2P-SERV-DISC-RESP: Indicate reception of a P2P service discovery
-response. The following parameters are included after the event prefix:
-source address, Service Update Indicator, Service Response TLV(s) as
-hexdump.
-
-\verbatim
-P2P-SERV-DISC-RESP 02:40:61:c2:f3:b7 0 0300000101
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_INVITATION_RECEIVED P2P-INVITATION-RECEIVED
-
-P2P-INVITATION-RECEIVED: Indicate reception of a P2P Invitation
-Request. For persistent groups, the parameter after the event prefix
-indicates which network block includes the persistent group data.
-
-\verbatim
-P2P-INVITATION-RECEIVED sa=02:40:61:c2:f3:b7 persistent=0
-\endverbatim
-
-\subsection ctrl_iface_event_P2P_EVENT_INVITATION_RESULT P2P-INVITATION-RESULT
-
-P2P-INVITATION-RESULT: Indicate result of a P2P invitation that was
-requested with \ref ctrl_iface_P2P_INVITE. The parameter
-status=<value> shows the status code returned by the peer (or -1 on
-local failure or timeout).
-
-\verbatim
-P2P-INVITATION-RESULT status=1
-\endverbatim
-
-*/
diff --git a/doc/dbus.doxygen b/doc/dbus.doxygen
deleted file mode 100644
index f6ab82000108..000000000000
--- a/doc/dbus.doxygen
+++ /dev/null
@@ -1,2428 +0,0 @@
-/**
-\page dbus wpa_supplicant D-Bus API
-
-This section documents the wpa_supplicant D-Bus API. Every D-Bus
-interface implemented by wpa_supplicant is described here including
-their methods, signals, and properties with arguments, returned
-values, and possible errors.
-
-Interfaces:
-- \ref dbus_main
-- \ref dbus_interface
-- \ref dbus_wps
-- \ref dbus_p2pdevice
-- \ref dbus_bss
-- \ref dbus_network
-- \ref dbus_peer
-- \ref dbus_group
-- \ref dbus_persistent_group
-- \ref dbus_mesh
-
-
-\section dbus_main fi.w1.wpa_supplicant1
-
-Interface implemented by the main wpa_supplicant D-Bus object
-registered in the bus with fi.w1.wpa_supplicant1 name.
-
-\subsection dbus_main_methods Methods
-
-<ul>
- <li>
- <h3>CreateInterface ( a{sv} : args ) --> o : interface</h3>
- <p>Registers a wireless interface in wpa_supplicant.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with arguments used to add the interface to wpa_supplicant. The dictionary may contain the following entries:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
- <tr><td>Ifname</td><td>s</td><td>Name of the network interface to control, e.g., wlan0</td><td>Yes</td>
- <tr><td>BridgeIfname</td><td>s</td><td>Name of the bridge interface to control, e.g., br0</td><td>No</td>
- <tr><td>Driver</td><td>s</td><td>Driver name which the interface uses, e.g., nl80211</td><td>No</td>
- <tr><td>ConfigFile</td><td>s</td><td>Configuration file path</td><td>No</td>
- </table>
- </dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>o : interface</dt>
- <dd>A D-Bus path to object representing created interface</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InterfaceExists</dt>
- <dd>wpa_supplicant already controls this interface.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Creating interface failed for an unknown reason.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid entries were found in the passed argument.</dd>
- </dl>
- </li>
-
- <li>
- <h3>RemoveInterface ( o : interface ) --> nothing</h3>
- <p>Deregisters a wireless interface from wpa_supplicant.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : interface</dt>
- <dd>A D-Bus path to an object representing an interface to remove returned by CreateInterface</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InterfaceUnknown</dt>
- <dd>Object pointed by the path doesn't exist or doesn't represent an interface.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Removing interface failed for an unknown reason.</dd>
- </dl>
- </li>
-
- <li>
- <h3>GetInterface ( s : ifname ) --> o : interface</h3>
- <p>Returns a D-Bus path to an object related to an interface which wpa_supplicant already controls.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : ifname</dt>
- <dd>Name of the network interface, e.g., wlan0</dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>o : interface</dt>
- <dd>A D-Bus path to an object representing an interface</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InterfaceUnknown</dt>
- <dd>An interface with the passed name in not controlled by wpa_supplicant.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Getting an interface object path failed for an unknown reason.</dd>
- </dl>
- </li>
-
- <li>
- <h3>ExpectDisconnect ( ) --> nothing</h3>
- <p>Notify wpa_supplicant of an externally triggered disconnection, e.g., due to system suspend.</p>
- </li>
- </ul>
-
-\subsection dbus_main_properties Properties
-
-<ul>
- <li>
- <h3>DebugLevel - s - (read/write)</h3>
- <p>Global wpa_supplicant debugging level. Possible values are
- "msgdump" (verbose debugging), "debug" (debugging),
- "info" (informative), "warning" (warnings), and "error" (errors).</p>
- </li>
-
- <li>
- <h3>DebugTimestamp - b - (read/write)</h3>
- <p>Global wpa_supplicant debugging parameter. Determines if timestamps are shown in debug logs.</p>
- </li>
-
- <li>
- <h3>DebugShowKeys - b - (read/write)</h3>
- <p>Global wpa_supplicant debugging parameter. Determines if secrets are shown in debug logs.</p>
- </li>
-
- <li>
- <h3>Interfaces - ao - (read)</h3>
- <p>An array with paths to D-Bus objects representing controlled interfaces each.</p>
- </li>
-
- <li>
- <h3>EapMethods - as - (read)</h3>
- <p>An array with supported EAP methods names.</p>
- </li>
-
- <li>
- <h3>Capabilities - as - (read)</h3>
- <p>An array with supported capabilities (e.g., "ap", "ibss-rsn", "p2p", "interworking").</p>
- </li>
-
- <li>
- <h3>WFDIEs - ay - (read/write)</h3>
- <p>Wi-Fi Display subelements.</p>
- </li>
- </ul>
-
-\subsection dbus_main_signals Signals
-
-<ul>
- <li>
- <h3>InterfaceAdded ( o : interface, a{sv} : properties )</h3>
- <p>A new interface was added to wpa_supplicant.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : interface</dt>
- <dd>A D-Bus path to an object representing the added interface</dd>
- </dl>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary containing properties of added interface.</dd>
- </dl>
- </li>
-
- <li>
- <h3>InterfaceRemoved ( o : interface )</h3>
- <p>An interface was removed from wpa_supplicant.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : interface</dt>
- <dd>A D-Bus path to an object representing the removed interface</dd>
- </dl>
- </li>
-
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and theirs new values. Possible dictionary keys are: "DebugParams"</dd>
- </dl>
- </li>
- </ul>
-
-
-\section dbus_interface fi.w1.wpa_supplicant1.Interface
-
-Interface implemented by objects related to network interface added to
-wpa_supplicant, i.e., returned by
-fi.w1.wpa_supplicant1.CreateInterface.
-
-\subsection dbus_interface_methods Methods
-
-<ul>
- <li>
- <h3>Scan ( a{sv} : args ) --> nothing</h3>
- <p>Triggers a scan.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with arguments describing scan type:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
- <tr><td>Type</td><td>s</td><td>Type of the scan. Possible values: "active", "passive"</td><td>Yes</td>
- <tr><td>SSIDs</td><td>aay</td><td>Array of SSIDs to scan for (applies only if scan type is active)</td><td>No</td>
- <tr><td>IEs</td><td>aay</td><td>Information elements to used in active scan (applies only if scan type is active)</td><td>No</td>
- <tr><td>Channels</td><td>a(uu)</td><td>Array of frequencies to scan in form of (center, width) in MHz.</td><td>No</td>
- <tr><td>AllowRoam</td><td>b</td><td>TRUE (or absent) to allow a roaming decision based on the results of this scan, FALSE to prevent a roaming decision.</td><td>No</td>
- </table>
- </dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid entries were found in the passed argument.</dd>
- </dl>
- </li>
-
- <li>
- <h3>Disconnect ( ) --> nothing</h3>
- <p>Disassociates the interface from current network.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NotConnected</dt>
- <dd>Interface is not connected to any network.</dd>
- </dl>
- </li>
-
- <li>
- <h3>AddNetwork ( a{sv} : args ) --> o : network</h3>
- <p>Adds a new network to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary with network configuration. Dictionary entries are equivalent to entries in the "network" block in wpa_supplicant configuration file. Entry values should be appropriate type to the entry, e.g., an entry with key "frequency" should have value type int.</dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing a configured network</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid entries were found in the passed argument.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Adding network failed for an unknown reason.</dd>
- </dl>
- </li>
-
- <li>
- <h3>RemoveNetwork ( o : network ) --> nothing</h3>
- <p>Removes a configured network from the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing a configured network returned by fi.w1.wpa_supplicant1.Interface.AddNetwork</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NetworkUnknown</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Removing network failed for an unknown reason.</dd>
- </dl>
- </li>
-
- <li>
- <h3>RemoveAllNetworks ( ) --> nothing</h3>
- <p>Remove all configured networks from the interface.</p>
- </li>
-
- <li>
- <h3>SelectNetwork ( o : network ) --> nothing</h3>
- <p>Attempt association with a configured network.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing a configured network returned by fi.w1.wpa_supplicant1.Interface.AddNetwork</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NetworkUnknown</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- </dl>
- </li>
-
- <li>
- <h3>Reassociate ( ) --> nothing</h3>
- <p>Attempt reassociation.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InterfaceDisabled</dt>
- <dd>The interface is disabled.</dd>
- </dl>
- </li>
-
- <li>
- <h3>Reattach ( ) --> nothing</h3>
- <p>Attempt reassociation back to the current BSS.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NotConnected</dt>
- <dd>Interface is not connected to any network.</dd>
- </dl>
- </li>
-
- <li>
- <h3>Reconnect ( ) --> nothing</h3>
- <p>Attempt reconnection and connect if in disconnected state.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InterfaceDisabled</dt>
- <dd>The interface is disabled.</dd>
- </dl>
- </li>
-
- <li>
- <h3>Roam ( s : addr ) --> nothing</h3>
- <p>Initiate a roam to another BSS within the current ESS.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Missing address argument.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid hardware address format.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Target BSS not found.</dd>
- <dt>fi.w1.wpa_supplicant1.NotConnected</dt>
- <dd>Interface is not connected to any network.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Scan processing was not included in the build.</dd>
- </dl>
- </li>
-
- <li>
- <h3>AddBlob ( s : name, ay : data ) --> nothing</h3>
- <p>Adds a blob to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : name</dt>
- <dd>A name of a blob</dd>
- <dt>ay : data</dt>
- <dd>A blob data</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.BlobExists</dt>
- <dd>A blob with the specified name already exists.</dd>
- </dl>
- </li>
-
- <li>
- <h3>RemoveBlob ( s : name ) --> nothing</h3>
- <p>Removes the blob from the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : name</dt>
- <dd>A name of the blob to remove</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.BlobUnknown</dt>
- <dd>A blob with the specified name doesn't exist.</dd>
- </dl>
- </li>
-
- <li>
- <h3>GetBlob ( s : name ) --> ay : data</h3>
- <p>Returns the blob data of a previously added blob.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : name</dt>
- <dd>A name of the blob</dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>ay : data</dt>
- <dd>A blob data</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.BlobUnknown</dt>
- <dd>A blob with the specified name doesn't exist.</dd>
- </dl>
- </li>
- <li>
- <h3>AutoScan ( s : arg ) --> nothing</h3>
- <p>Set autoscan parameters for the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : arg</dt>
- <dd>Autoscan parameter line or empty to unset autoscan.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NoMemory</dt>
- <dd>Needed memory was not possible to get allocated.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid entries were found in the passed argument.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSDiscover ( s : peer_address ) --> nothing</h3>
- <p>Initiate a TDLS discovery for a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : peer_address</dt>
- <dd>MAC address for the peer to perform TDLS discovery.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "peer_address" argument is not a properly formatted MAC.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Initiating the TDLS operation failed for an unknown reason.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSSetup ( s : peer_address ) --> nothing</h3>
- <p>Setup a TDLS session for a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : peer_address</dt>
- <dd>MAC address for the peer to perform TDLS setup.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "peer_address" argument is not a properly formatted MAC.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Initiating the TDLS operation failed for an unknown reason.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSStatus ( s : peer_address ) --> s</h3>
- <p>Return TDLS status with respect to a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : peer_address</dt>
- <dd>MAC address for the peer for which status is requested.</dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>s : status</dt>
- <dd>Current status of the TDLS link with the selected peer.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "peer_address" argument is not a properly formatted MAC.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSTeardown ( s : peer_address ) --> nothing</h3>
- <p>Tear down a TDLS session with a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : peer_address</dt>
- <dd>MAC address for the peer to tear down TDLS connectivity with.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "peer_address" argument is not a properly formatted MAC.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Initiating the TDLS operation failed for an unknown reason.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSChannelSwitch ( a{sv} : args ) --> nothing</h3>
- <p>Configure TDLS channel switching behavior with a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary with arguments identifying the peer and channel switching behavior.</dd>
- </dl>
- </li>
- <li>
- <h3>TDLSCancelChannelSwitch ( s : peer_address ) --> nothing</h3>
- <p>Disable channel switching for a TDLS session with a peer.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : peer_address</dt>
- <dd>MAC address for the peer.</dd>
- </dl>
- </li>
- <li>
- <h3>VendorElemAdd ( i: frame_id, ay: ielems ) --> nothing</h3>
- <p>Add Vendor Elements to corresponding frame ID.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>i : frame_id</dt>
- <dd>Frame ID for which Vendor specific IE is to be added.</dd>
- <dt>ay : ielems</dt>
- <dd>Information Element(s).</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "ielems" argument is not a properly formatted or size mismatch.</dd>
- <dt>fi.w1.wpa_supplicant1.NoMemory</dt>
- <dd>Needed memory was not possible to get allocated.</dd>
- </dl>
- </li>
- <li>
- <h3>VendorElemGet ( i: frame_id ) --> ay: ielems</h3>
- <p>Get Vendor Elements of corresponding frame ID.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>i : frame_id</dt>
- <dd>Frame ID for which Vendor specific IE is being queried.</dd>
- <dt>ay : ielems</dt>
- <dd>Information Element(s).</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "frame_id" argument is not valid.</dd>
- </dl>
- </li>
- <li>
- <h3>VendorElemRem ( i: frame_id, ay: ielems ) --> nothing</h3>
- <p>Remove Vendor Elements of corresponding frame ID.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>i : frame_id</dt>
- <dd>Frame ID for which Vendor specific IE is to be removed.</dd>
- <dt>ay : ielems</dt>
- <dd>Information Element(s) OR * to remove all.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>The "ielems" argument is not a properly formatted or size mismatch.</dd>
- <dt>fi.w1.wpa_supplicant1.NoMemory</dt>
- <dd>Needed memory was not possible to get allocated.</dd>
- </dl>
- </li>
- <li>
- <h3>SaveConfig ( ) --> nothing</h3>
- <p>Save configuration to the configuration file.</p>
- </li>
- <li>
- <h3>AbortScan ( ) --> nothing</h3>
- <p>Abort ongoing scan operation.</p>
- </li>
- <li>
- <h3>AddCred ( a{sv} : args ) --> o : path</h3>
- <p>Add an Interworking/Hotspot 2.0 credential.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary with credential configuration. Dictionary entries are equivalent to entries in the "cred" block in wpa_supplicant configuration file.</dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>o : path</dt>
- <dd>A D-Bus path to an object representing the added credential</dd>
- </dl>
- </li>
- <li>
- <h3>RemoveCred ( o : path ) --> nothing</h3>
- <p>Remove the specified Interworking/Hotspot 2.0 credential.</p>
- </li>
- <li>
- <h3>RemoveAllCreds ( ) --> nothing</h3>
- <p>Remove all configured Interworking/Hotspot 2.0 credentials.</p>
- </li>
- <li>
- <h3>InterworkingSelect ( ) --> nothing</h3>
- <p>Perform Interworking (Hotspot 2.0) network selection.</p>
- </li>
- <li>
- <h3>EAPLogoff ( ) --> nothing</h3>
- <p>IEEE 802.1X EAPOL state machine logoff.</p>
- </li>
- <li>
- <h3>EAPLogon ( ) --> nothing</h3>
- <p>IEEE 802.1X EAPOL state machine logon.</p>
- </li>
-
- <li>
- <h3>NetworkReply ( o : network, s : field, s : value ) --> nothing</h3>
- <p>Provide parameter requested by NetworkRequest().</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing the network (copied from NetworkRequest()).</dd>
- <dt>s : field</dt>
- <dd>Requested information (copied from NetworkRequest()).</dd>
- <dt>s : value</dt>
- <dd>The requested information (e.g., password for EAP authentication).</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NetworkUnknown</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>A passed path doesn't point to any network object.</dd>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>IEEE 802.1X support was not included in the build.</dd>
- </dl>
- </li>
-
- <li>
- <h3>SetPKCS11EngineAndModulePath ( s : pkcs11_engine_path, s : pkcs11_module_path ) --> nothing</h3>
- <p>Set PKCS #11 engine and module path.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : pkcs11_engine_path</dt>
- <dd>PKCS #11 engine path.</dd>
- <dt>s : pkcs11_module_path</dt>
- <dd>PKCS #11 module path.</dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>org.freedesktop.DBus.Error.Failed.InvalidArgs</dt>
- <dd>Invalid PKCS #11 engine or module path.</dd>
- <dt>org.freedesktop.DBus.Error.Failed</dt>
- <dd>Reinit of the EAPOL state machine with the new PKCS #11 engine and module path failed.</dd>
- </dl>
- </li>
- <li>
- <h3>SignalPoll ( ) --> a{sv} : properties</h3>
- <p>Fetch signal properties for the current connection.</p>
- <h4>Returns</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
- <tr><td>linkspeed</td><td>i</td><td>Link speed (Mbps)</td><td>No</td>
- <tr><td>noise</td><td>i</td><td>Noise (dBm)</td><td>No</td>
- <tr><td>width</td><td>s</td><td>Channel width</td><td>No</td>
- <tr><td>frequency</td><td>u</td><td>Frequency (MHz)</td><td>No</td>
- <tr><td>rssi</td><td>i</td><td>RSSI (dBm)</td><td>No</td>
- <tr><td>avg-rssi</td><td>i</td><td>Average RSSI (dBm)</td><td>No</td>
- <tr><td>center-frq1</td><td>i</td><td>VHT segment 1 frequency (MHz)</td><td>No</td>
- <tr><td>center-frq2</td><td>i</td><td>VHT segment 2 frequency (MHz)</td><td>No</td>
- </table>
- </dd>
- </dl>
- </li>
- <li>
- <h3>FlushBSS ( u : age ) --> nothing</h3>
- <p>Flush BSS entries from the cache.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>u : age</dt>
- <dd>Maximum age in seconds for BSS entries to keep in cache (0 = remove all entries).</dd>
- </dl>
- </li>
-
- <li>
- <h3>SubscribeProbeReq ( ) --> nothing</h3>
- <p>Subscribe to receive Probe Request events. This is needed in addition to registering a signal handler for the ProbeRequest signal to avoid flooding D-Bus with all Probe Request indications when no application is interested in them.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.SubscriptionInUse</dt>
- <dd>Another application is already subscribed.</dd>
- <dt>fi.w1.wpa_supplicant1.NoMemory</dt>
- <dd>Needed memory was not possible to get allocated.</dd>
- </dl>
- </li>
-
- <li>
- <h3>UnsubscribeProbeReq ( ) --> nothing</h3>
- <p>Unsubscribe from receiving Probe Request events.</p>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.NoSubscription</dt>
- <dd>No subscription in place.</dd>
- <dt>fi.w1.wpa_supplicant1.SubscriptionNotYou</dt>
- <dd>Subscription in place, but for another process.</dd>
- </dl>
- </li>
- </ul>
-
-\subsection dbus_interface_properties Properties
-
-<ul>
- <li>
- <h3>Capabilities - a{sv} - (read)</h3>
- <p>Capabilities of the interface. Dictionary contains following entries:</p>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th>
- <tr><td>Pairwise</td><td>as</td><td>Possible array elements: "ccmp-256", "gcmp-256", "ccmp", "gcmp", "tkip", "none"</td>
- <tr><td>Group</td><td>as</td><td>Possible array elements: "ccmp-256", "gcmp-256", "ccmp", "gcmp", "tkip", "wep104", "wep40"</td>
- <tr><td>GroupMgmt</td><td>as</td><td>Possible array elements: "aes-128-cmac", "bip-gmac-128", "bip-gmac-256", "bip-cmac-256"</td>
- <tr><td>KeyMgmt</td><td>as</td><td>Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap", "wpa-eap-sha256", "sae", "owe", "ieee8021x", "wpa-none", "wps", "none"</td>
- <tr><td>Protocol</td><td>as</td><td>Possible array elements: "rsn", "wpa"</td>
- <tr><td>AuthAlg</td><td>as</td><td>Possible array elements: "open", "shared", "leap"</td>
- <tr><td>Scan</td><td>as</td><td>Possible array elements: "active", "passive", "ssid"</td>
- <tr><td>Modes</td><td>as</td><td>Possible array elements: "infrastructure", "ad-hoc", "ap"</td>
- </table>
- </li>
-
- <li>
- <h3>State - s - (read)</h3>
- <p>A state of the interface. Possible values are: return "disconnected", "inactive", "scanning", "authenticating", "associating", "associated", "4way_handshake", "group_handshake", "completed","unknown".</p>
- </li>
-
- <li>
- <h3>Scanning - b - (read)</h3>
- <p>Determines if the interface is already scanning or not</p>
- </li>
-
- <li>
- <h3>ApScan - u - (read/write)</h3>
- <p>Identical to ap_scan entry in wpa_supplicant configuration file. Possible values are 0, 1 or 2.</p>
- </li>
-
- <li>
- <h3>BSSExpireAge - u - (read/write)</h3>
- <p>Identical to bss_expiration_age entry in wpa_supplicant configuration file.</p>
- </li>
-
- <li>
- <h3>BSSExpireCount - u - (read/write)</h3>
- <p>Identical to bss_expiration_scan_count entry in wpa_supplicant configuration file.</p>
- </li>
-
- <li>
- <h3>Country - s - (read/write)</h3>
- <p>Identical to country entry in wpa_supplicant configuration file.</p>
- </li>
-
- <li>
- <h3>Ifname - s - (read)</h3>
- <p>Name of network interface controlled by the interface, e.g., wlan0.</p>
- </li>
-
- <li>
- <h3>BridgeIfname - s - (read)</h3>
- <p>Name of bridge network interface controlled by the interface, e.g., br0.</p>
- </li>
-
- <li>
- <h3>Driver - s - (read)</h3>
- <p>Name of driver used by the interface, e.g., nl80211.</p>
- </li>
-
- <li>
- <h3>ConfigFile - s - (read)</h3>
- <p>Configuration file path. Returns an empty string if no configuration file is in use.</p>
- </li>
-
- <li>
- <h3>CurrentBSS - o - (read)</h3>
- <p>Path to D-Bus object representing BSS which wpa_supplicant is associated with, or "/" if is not associated at all.</p>
- </li>
-
- <li>
- <h3>CurrentNetwork - o - (read)</h3>
- <p>Path to D-Bus object representing configured network which wpa_supplicant uses at the moment, or "/" if doesn't use any.</p>
- </li>
-
- <li>
- <h3>CurrentAuthMode - s - (read)</h3>
- <p>Current authentication type.</p>
- </li>
-
- <li>
- <h3>Blobs - as - (read)</h3>
- <p>List of blobs names added to the Interface.</p>
- </li>
-
- <li>
- <h3>BSSs - ao - (read)</h3>
- <p>List of D-Bus objects paths representing BSSs known to the interface, i.e., scan results.</p>
- </li>
-
- <li>
- <h3>Stations - ao - (read)</h3>
- <p>List of D-Bus objects paths representing connected stations in AP mode.</p>
- </li>
-
- <li>
- <h3>Networks - ao - (read)</h3>
- <p>List of D-Bus objects paths representing configured networks.</p>
- </li>
-
- <li>
- <h3>FastReauth - b - (read/write)</h3>
- <p>Identical to fast_reauth entry in wpa_supplicant configuration file.</p>
- </li>
-
- <li>
- <h3>ScanInterval - i - (read/write)</h3>
- <p>Time (in seconds) between scans for a suitable AP. Must be >= 0.</p>
- </li>
-
- <li>
- <h3>PKCS11EnginePath - s - (read)</h3>
- <p>PKCS #11 engine path.</p>
- </li>
-
- <li>
- <h3>PKCS11ModulePath - s - (read)</h3>
- <p>PKCS #11 module path.</p>
- </li>
-
- <li>
- <h3>DisconnectReason - i - (read)</h3>
- <p>The most recent IEEE 802.11 reason code for disconnect. Negative value indicates locally generated disconnection.</p>
- </li>
-
- <li>
- <h3>AuthStatusCode - i - (read)</h3>
- <p>The most recent IEEE 802.11 status code for authentication.</p>
- </li>
-
- <li>
- <h3>AssocStatusCode - i - (read)</h3>
- <p>The most recent IEEE 802.11 status code for association rejection.</p>
- </li>
-
- <li>
- <h3>RoamTime - u - (read)</h3>
- <p>The most recent roam time in milliseconds.</p>
- </li>
-
- <li>
- <h3>RoamComplete - b - (read)</h3>
- <p>The most recent roam success or failure.</p>
- </li>
-
- <li>
- <h3>SessionLength - u - (read)</h3>
- <p>The most recent BSS session length in milliseconds.</p>
- </li>
-
- <li>
- <h3>BSSTMStatus - u - (read)</h3>
- <p>The most recent BSS Transition Management status code.</p>
- </li>
-
- <li>
- <h3>EapolVersion - s - (read/write)</h3>
- <p>IEEE 802.1X/EAPOL version number</p>
- </li>
-
- <li>
- <h3>Bgscan - s - (read/write)</h3>
- <p>Background scan and roaming parameters or an empty string if none</p>
- </li>
-
- <li>
- <h3>DisableScanOffload - s - (read/write)</h3>
- <p>Disable automatic offloading of scan requests</p>
- </li>
-
- <li>
- <h3>OpenscEnginePath - s - (read/write)</h3>
- <p>Path to the OpenSSL engine for opensc</p>
- </li>
-
- <li>
- <h3>OpensslCiphers - s - (read/write)</h3>
- <p>OpenSSL cipher string</p>
- </li>
-
- <li>
- <h3>PcscReader - s - (read/write)</h3>
- <p>PC/SC reader name prefix</p>
- </li>
-
- <li>
- <h3>PcscPin - s - (read/write)</h3>
- <p>PIN for USIM, GSM SIM, and smartcards</p>
- </li>
-
- <li>
- <h3>ExternalSim - s - (read/write)</h3>
- <p>Use external processing for SIM/USIM operations</p>
- </li>
-
- <li>
- <h3>DriverParam - s - (read/write)</h3>
- <p>Driver interface parameters</p>
- </li>
-
- <li>
- <h3>Dot11RSNAConfigPMKLifetime - s - (read/write)</h3>
- <p>Maximum lifetime of a PMK</p>
- </li>
-
- <li>
- <h3>Dot11RSNAConfigPMKReauthThreshold - s - (read/write)</h3>
- <p>PMK re-authentication threshold</p>
- </li>
-
- <li>
- <h3>Dot11RSNAConfigSATimeout - s - (read/write)</h3>
- <p>Security association timeout</p>
- </li>
-
- <li>
- <h3>BssMaxCount - s - (read/write)</h3>
- <p>Maximum number of BSS entries to keep in memory</p>
- </li>
-
- <li>
- <h3>FilterSsids - s - (read/write)</h3>
- <p>SSID-based scan result filtering</p>
- </li>
-
- <li>
- <h3>FilterRssi - s - (read/write)</h3>
- <p>RSSI-based scan result filtering</p>
- </li>
-
- <li>
- <h3>MaxNumSta - s - (read/write)</h3>
- <p>Maximum number of STAs in an AP/P2P GO</p>
- </li>
-
- <li>
- <h3>DisassocLowAck - s - (read/write)</h3>
- <p>Disassocicate stations with massive packet loss</p>
- </li>
-
- <li>
- <h3>Interworking - s - (read/write)</h3>
- <p>Whether Interworking (IEEE 802.11u) is enabled</p>
- </li>
-
- <li>
- <h3>Hessid - s - (read/write)</h3>
- <p>Homogeneous ESS identifier</p>
- </li>
-
- <li>
- <h3>AccessNetworkType - s - (read/write)</h3>
- <p>Access Network Type</p>
- </li>
-
- <li>
- <h3>PbcInM1 - s - (read/write)</h3>
- <p>AP mode WPS probing workaround for PBC with Windows 7</p>
- </li>
-
- <li>
- <h3>Autoscan - s - (read/write)</h3>
- <p>Automatic scan parameters or an empty string if none</p>
- </li>
-
- <li>
- <h3>WpsNfcDevPwId - s - (read/write)</h3>
- <p>NFC Device Password ID for password token</p>
- </li>
-
- <li>
- <h3>WpsNfcDhPubkey - s - (read/write)</h3>
- <p>NFC DH Public Key for password token</p>
- </li>
-
- <li>
- <h3>WpsNfcDhPrivkey - s - (read/write)</h3>
- <p>NFC DH Private Key for password token</p>
- </li>
-
- <li>
- <h3>WpsNfcDevPw - s - (read/write)</h3>
- <p>NFC Device Password for password token</p>
- </li>
-
- <li>
- <h3>ExtPasswordBackend - s - (read/write)</h3>
- <p>External password backend or an empty string if none</p>
- </li>
-
- <li>
- <h3>P2pGoMaxInactivity - s - (read/write)</h3>
- <p>Timeout in seconds to detect STA inactivity</p>
- </li>
-
- <li>
- <h3>AutoInterworking - s - (read/write)</h3>
- <p>Whether to use network selection automatically</p>
- </li>
-
- <li>
- <h3>Okc - s - (read/write)</h3>
- <p>Whether to enable opportunistic key caching by default</p>
- </li>
-
- <li>
- <h3>Pmf - s - (read/write)</h3>
- <p>Whether to enable/require PMF by default</p>
- </li>
-
- <li>
- <h3>SaeGroups - s - (read/write)</h3>
- <p>Preference list of enabled groups for SAE</p>
- </li>
-
- <li>
- <h3>DtimPeriod - s - (read/write)</h3>
- <p>Default DTIM period in Beacon intervals</p>
- </li>
-
- <li>
- <h3>BeaconInt - s - (read/write)</h3>
- <p>Default Beacon interval in TU</p>
- </li>
-
- <li>
- <h3>IgnoreOldScanRes - s - (read/write)</h3>
- <p>Ignore scan results older than request</p>
- </li>
-
- <li>
- <h3>FreqList - s - (read/write)</h3>
- <p>Array of allowed scan frequencies or an empty string for all</p>
- </li>
-
- <li>
- <h3>ScanCurFreq - s - (read/write)</h3>
- <p>Whether to scan only the current channel</p>
- </li>
-
- <li>
- <h3>SchedScanInterval - s - (read/write)</h3>
- <p>schedule scan interval</p>
- </li>
-
- <li>
- <h3>TdlsExternalControl - s - (read/write)</h3>
- <p>External control for TDLS setup requests</p>
- </li>
-
- <li>
- <h3>OsuDir - s - (read/write)</h3>
- <p>OSU provider information directory</p>
- </li>
-
- <li>
- <h3>WowlanTriggers - s - (read/write)</h3>
- <p>Wake-on-WLAN triggers</p>
- </li>
-
- <li>
- <h3>P2pSearchDelay - s - (read/write)</h3>
- <p>Extra delay between concurrent search iterations</p>
- </li>
-
- <li>
- <h3>MacAddr - s - (read/write)</h3>
- <p>MAC address policy default</p>
- </li>
-
- <li>
- <h3>RandAddrLifetime - s - (read/write)</h3>
- <p>Lifetime of random MAC address in seconds</p>
- </li>
-
- <li>
- <h3>PreassocMacAddr - s - (read/write)</h3>
- <p>Pre-association MAC address policy</p>
- </li>
-
- <li>
- <h3>KeyMgmtOffload - s - (read/write)</h3>
- <p>Use key management offload</p>
- </li>
-
- <li>
- <h3>PassiveScan - s - (read/write)</h3>
- <p>Whether to force passive scan for network connection</p>
- </li>
-
- <li>
- <h3>ReassocSameBssOptim - s - (read/write)</h3>
- <p>Whether to optimize reassoc-to-same-BSS</p>
- </li>
-
- <li>
- <h3>WpsPriority - s - (read/write)</h3>
- <p>Priority for the networks added through WPS</p>
- </li>
-
- <li>
- <h3>MACAddressRandomizationMask - a{say} - (read/write)</h3>
- <p>Masks to show which bits not to randomize with MAC address randomization. Possible keys are "scan", "sched_scan", and "pno". Values must be an array of 6 bytes.</p>
- <p>When this property is set, the new dictionary replaces the old value, rather than merging them together. Leaving a key out of the dictionary will turn off MAC address randomization for that scan type.</p>
- </li>
- </ul>
-
-\subsection dbus_interface_signals Signals
-
-<ul>
- <li>
- <h3>ScanDone ( b : success )</h3>
- <p>Scanning finished. </p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : success</dt>
- <dd>Determines if scanning was successful. If so, results are available.</dd>
- </dl>
- </li>
-
- <li>
- <h3>BSSAdded ( o : BSS, a{sv} : properties )</h3>
- <p>Interface became aware of a new BSS.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : BSS</dt>
- <dd>A D-Bus path to an object representing the new BSS.</dd>
- </dl>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary containing properties of added BSS.</dd>
- </dl>
- </li>
-
- <li>
- <h3>BSSRemoved ( o : BSS )</h3>
- <p>BSS disappeared.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : BSS</dt>
- <dd>A D-Bus path to an object representing the BSS.</dd>
- </dl>
- </li>
-
- <li>
- <h3>BlobAdded ( s : blobName )</h3>
- <p>A new blob has been added to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : blobName</dt>
- <dd>A name of the added blob.</dd>
- </dl>
- </li>
-
- <li>
- <h3>BlobRemoved ( s : blobName )</h3>
- <p>A blob has been removed from the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : blobName</dt>
- <dd>A name of the removed blob.</dd>
- </dl>
- </li>
-
- <li>
- <h3>NetworkAdded ( o : network, a{sv} : properties )</h3>
- <p>A new network has been added to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing the added network.</dd>
- </dl>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary containing properties of added network.</dd>
- </dl>
- </li>
-
- <li>
- <h3>NetworkRemoved ( o : network )</h3>
- <p>The network has been removed from the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing the removed network.</dd>
- </dl>
- </li>
-
- <li>
- <h3>NetworkSelected ( o : network )</h3>
- <p>The network has been selected.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>A D-Bus path to an object representing the selected network.</dd>
- </dl>
- </li>
-
- <li>
- <h3>StaAuthorized ( s : mac )</h3>
- <p>A new station has been authorized to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : mac</dt>
- <dd>A mac address which has been authorized.</dd>
- </dl>
- </li>
-
- <li>
- <h3>StaDeauthorized ( s : mac )</h3>
- <p>A station has been deauthorized to the interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : mac</dt>
- <dd>A mac address which has been deauthorized.</dd>
- </dl>
- </li>
-
- <li>
- <h3>StationAdded ( o : Station, a{sv} : properties )</h3>
- <p>A new station has been added to the interface.</p>
- <p>This signal complements StaAuthorized, passing the Station object and its properties.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : Station</dt>
- <dd>A D-Bus path to an object representing the new Station.</dd>
- </dl>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary containing properties of added Station.</dd>
- </dl>
- </li>
-
- <li>
- <h3>StationRemoved ( o : Station )</h3>
- <p>The station has been removed from the interface.</p>
- <p>This signal complements StaDeauthorized, passing the Station object.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : Station</dt>
- <dd>A D-Bus path to an object representing the Station.</dd>
- </dl>
- </li>
-
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and theirs new values. Possible dictionary keys are: "ApScan", "Scanning", "State", "CurrentBSS", "CurrentNetwork"</dd>
- </dl>
- </li>
-
- <li>
- <h3>Certification ( a{sv} : parameters )</h3>
- <p>Information about server TLS certificates.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : parameters</dt>
- <dd>A dictionary with pairs of field names and their values. Possible dictionary keys are: "depth", "subject", "altsubject", "cert_hash", "cert".</dd>
- </dl>
- </li>
-
- <li>
- <h3>EAP ( s : status, s : parameter )</h3>
- <p>Information about EAP peer status.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : status</dt>
- <dd>Operation, e.g., "started", "accept proposed method", "remote certificate verification", "eap parameter needed", "completion".</dd>
- <dt>s : parameter</dt>
- <dd>Information about the operation, e.g., EAP method name, "success".</dd>
- </dl>
- </li>
-
- <li>
- <h3>NetworkRequest ( o : network, s : field, s : txt )</h3>
- <p>Request for network parameter. NetworkResponse() is used to provide the requested parameter.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : network</dt>
- <dd>D-Bus path to an object representing the network.</dd>
- <dt>s : field</dt>
- <dd>Requested information, e.g., "PASSWORD".</dd>
- <dt>txt : field</dt>
- <dd>Human readable information about the requested information.</dd>
- </dl>
- </li>
-
- <li>
- <h3>ProbeRequest ( a{sv} : args )</h3>
- <p>Information about a received Probe Request frame. This signal is delivered only to a single application that has subscribed to received the events with SubscribeProbeReq().</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary with pairs of field names and their values. Possible dictionary keys are: "addr", "dst", "bssid", "ies", "signal".</dd>
- </dl>
- </li>
-
- <li>
- <h3>InterworkingAPAdded ( o : bss, o : cred, a{sv} : args )</h3>
- </li>
-
- <li>
- <h3>InterworkingSelectDone ( )</h3>
- </li>
- </ul>
-
-
-\section dbus_wps fi.w1.wpa_supplicant1.Interface.WPS
-
-Interface for performing WPS (Wi-Fi Simple Config) operations.
-
-\subsection dbus_wps_methods Methods
-
-<ul>
- <li>
- <h3>Start ( a{sv} : args ) --> a{sv} : output</h3>
- <p>Starts WPS configuration. Note: When used with P2P groups, this needs to be issued on the GO group interface.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with arguments used to start WPS configuration. The dictionary may contain the following entries:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
- <tr><td>Role</td><td>s</td><td>The device's role. Possible values are "enrollee" and "registrar".</td><td>Yes</td>
- <tr><td>Type</td><td>s</td><td>WPS authentication type. Applies only for enrollee role. Possible values are "pin" and "pbc".</td><td>Yes, for enrollee role; otherwise no</td>
- <tr><td>Pin</td><td>s</td><td>WPS Pin.</td><td>Yes, for registrar role; otherwise optional</td>
- <tr><td>Bssid</td><td>ay</td><td>Note: This is used to specify the peer MAC address when authorizing WPS connection in AP or P2P GO role.</td><td>No</td>
- <tr><td>P2PDeviceAddress</td><td>ay</td><td>P2P Device Address of a peer to authorize for PBC connection. Used only in P2P GO role.</td><td>No</td>
- </table>
- </dd>
- </dl>
- <h4>Returns</h4>
- <dl>
- <dt>a{sv} : output</dt>
- <dd>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th>
- <tr><td>Pin</td><td>s</td><td>Newly generated PIN, if not specified for enrollee role and pin authentication type.</td><td>No</td>
- </table>
- </dd>
- </dl>
- <h4>Possible errors</h4>
- <dl>
- <dt>fi.w1.wpa_supplicant1.UnknownError</dt>
- <dd>Starting WPS configuration failed for an unknown reason.</dd>
- <dt>fi.w1.wpa_supplicant1.InvalidArgs</dt>
- <dd>Invalid entries were found in the passed argument.</dd>
- </dl>
- </li>
- <li>
- <h3>Cancel ( nothing ) --> nothing</h3>
- <p>Cancel ongoing WPS operation.</p>
- </li>
- </ul>
-
-\subsection dbus_wps_properties Properties
-
-<ul>
- <li>
- <h3>ProcessCredentials - b - (read/write)</h3>
- <p>Determines if the interface will process the credentials (credentials_processed configuration file parameter).</p>
- </li>
- <li>
- <h3>ConfigMethods - s - (read/write)</h3>
- <p>The currently advertised WPS configuration methods. Available methods: usba ethernet label display ext_nfc_token int_nfc_token nfc_interface push_button keypad virtual_display physical_display virtual_push_button physical_push_button.</p>
- </li>
- <li>
- <h3>DeviceName - s - (read/write)</h3>
- <p>User-friendly description of device; up to 32 octets encoded in UTF-8.</p>
- </li>
- <li>
- <h3>Manufacturer - s - (read/write)</h3>
- <p>The manufacturer of the device (up to 64 ASCII characters).</p>
- </li>
- <li>
- <h3>ModelName - s - (read/write)</h3>
- <p>Model of the device (up to 32 ASCII characters).</p>
- </li>
- <li>
- <h3>ModelNumber - s - (read/write)</h3>
- <p>Additional device description (up to 32 ASCII characters).</p>
- </li>
- <li>
- <h3>SerialNumber - s - (read/write)</h3>
- <p>Serial number of the device (up to 32 characters).</p>
- </li>
- <li>
- <h3>DeviceType - ay - (read/write)</h3>
- <p>Device Type (8 octet value with 2 octet category, 4 octet OUI, 2 octet subcategory.</p>
- </li>
- </ul>
-
-\subsection dbus_wps_signals Signals
-
-<ul>
- <li>
- <h3>Event ( s : name, a{sv} : args )</h3>
- <p>WPS event occurred.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : event</dt>
- <dd>Event type. Possible values are: "success, "fail", "m2d", and
- "pbc-overlap".</dd>
- <dt>a{sv} : args</dt>
- <dd>
- Event arguments. Empty for success and pbc-overlap events, error information ( "msg" : i, "config_error" : i, "error_indication" : i ) for fail event and following entries for m2d event:
- <table>
- <tr><th>config_methods</th><th>Value type</th>
- <tr><td>manufacturer</td><td>q</td>
- <tr><td>model_name</td><td>ay</td>
- <tr><td>model_number</td><td>ay</td>
- <tr><td>serial_number</td><td>ay</td>
- <tr><td>dev_name</td><td>ay</td>
- <tr><td>primary_dev_type</td><td>ay</td>
- <tr><td>config_error</td><td>q</td>
- <tr><td>dev_password_id</td><td>q</td>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>Credentials ( a{sv} : credentials )</h3>
- <p>WPS credentials. Dictionary contains:</p>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th>
- <tr><td>BSSID</td><td>ay</td><td></td>
- <tr><td>SSID</td><td>s</td><td></td>
- <tr><td>AuthType</td><td>as</td><td>Possible array elements: "open", "shared", "wpa-psk", "wpa-eap", "wpa2-eap", "wpa2-psk"</td>
- <tr><td>EncrType</td><td>as</td><td>Possible array elements: "none", "wep", "tkip", "aes"</td>
- <tr><td>Key</td><td>ay</td><td>Key data</td>
- <tr><td>KeyIndex</td><td>u</td><td>Key index</td>
- </table>
- </li>
-
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and theirs new values. Possible dictionary keys are: "ProcessCredentials"</dd>
- </dl>
- </li>
- </ul>
-
-
-\section dbus_p2pdevice fi.w1.wpa_supplicant1.Interface.P2PDevice
-
-Interface for performing P2P (Wi-Fi Peer-to-Peer) P2P Device operations.
-
-\subsection dbus_p2pdevice_methods Methods
-
-<ul>
- <li>
- <h3>Find ( a{sv} : args ) --> nothing</h3>
- <p>Start P2P find operation (i.e., alternating P2P Search and Listen states to discover peers and be discoverable).</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the P2P find operation:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>Timeout</td><td>i</td><td>Timeout for operating in seconds</td><td>no</td></tr>
- <tr><td>RequestedDeviceTypes</td><td>aay</td><td>WPS Device Types to search for</td><td>no</td></tr>
- <tr><td>DiscoveryType</td><td>s</td><td>"start_with_full" (default, if not specified), "social", "progressive"</td><td>no</td></tr>
- <tr><td>freq</td><td>i</td><td>Initial scan channel (frequency in MHz) for the start_with_full case to limit the initial scan to the specified channel</td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>StopFind ( nothing ) --> nothing</h3>
- <p>Stop P2P find operation.</p>
- </li>
-
- <li>
- <h3>Listen ( i : timeout ) --> nothing</h3>
- <p>Start P2P listen operation (i.e., be discoverable).</p>
- <h4>Arguments</h4>
- <dl>
- <dt>i : timeout</dt>
- <dd>Timeout in seconds for stopping the listen operation.</dd>
- </dl>
- </li>
-
- <li>
- <h3>ExtendedListen ( a{sv} : args ) --> nothing</h3>
- <p>Configure Extended Listen Timing. If the parameters are omitted, this feature is disabled. If the parameters are included, Listen State will be entered every interval msec for at least period msec. Both values have acceptable range of 1-65535 (with interval obviously having to be larger than or equal to duration). If the P2P module is not idle at the time the Extended Listen Timing timeout occurs, the Listen State operation will be skipped.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for extended listen. Leave out all items to disable extended listen.
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>period</td><td>i</td><td>Extended listen period in milliseconds; 1-65535.</td><td>no</td></tr>
- <tr><td>interval</td><td>i</td><td>Extended listen interval in milliseconds; 1-65535.</td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>PresenceRequest ( a{sv} : args ) --> nothing</h3>
- <p>Request a specific GO presence in a P2P group where the local device is a P2P Client. Send a P2P Presence Request to the GO (this is only available when acting as a P2P client). If no duration/interval pairs are given, the request indicates that this client has no special needs for GO presence. The first parameter pair gives the preferred duration and interval values in microseconds. If the second pair is included, that indicates which value would be acceptable.
- \note This needs to be issued on a P2P group interface if separate group interfaces are used.
- \bug It would be cleaner to not require .P2PDevice methods to be issued on a group interface. In other words, args['group_object'] could be used to specify the group or this method could be moved to be a .Group PresenceRequest() method.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the presence request.
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>duration1</td><td>i</td><td>Duration in microseconds.</td><td>no</td></tr>
- <tr><td>interval1</td><td>i</td><td>Interval in microseconds.</td><td>no</td></tr>
- <tr><td>duration2</td><td>i</td><td>Duration in microseconds.</td><td>no</td></tr>
- <tr><td>interval2</td><td>i</td><td>Interval in microseconds.</td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryRequest ( o : peer, s : config_method ) --> nothing</h3>
- </li>
-
- <li>
- <h3>Connect ( a{sv} : args ) --> s : generated_pin</h3>
- <p>Request a P2P group to be started through GO Negotiation or by joining an already operating group.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the requested connection:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>peer</td><td>o</td><td></td><td>yes</td></tr>
- <tr><td>persistent</td><td>b</td><td>Whether to form a persistent group.</td><td>no</td></tr>
- <tr><td>join</td><td>b</td><td>Whether to join an already operating group instead of forming a new group.</td><td>no</td></tr>
- <tr><td>authorize_only</td><td>b</td><td>Whether to authorize a peer to initiate GO Negotiation instead of initiating immediately.</td><td>no</td></tr>
- <tr><td>frequency</td><td>i</td><td>Operating frequency in MHz</td><td>no</td></tr>
- <tr><td>go_intent</td><td>i</td><td>GO intent 0-15</td><td>no</td></tr>
- <tr><td>wps_method</td><td>s</td><td>"pbc", "display", "keypad", "pin" (alias for "display")</td><td>yes</td></tr>
- <tr><td>pin</td><td>s</td><td></td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GroupAdd ( a{sv} : args ) --> nothing</h3>
- <p>Request a P2P group to be started without GO Negotiation.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the requested group:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>persistent</td><td>b</td><td>Whether to form a persistent group.</td><td>no</td></tr>
- <tr><td>persistent_group_object</td><td>o</td><td></td><td>no</td></tr>
- <tr><td>frequency</td><td>i</td><td>Operating frequency in MHz</td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>Cancel ( nothing ) --> nothing</h3>
- <p>Stop ongoing P2P group formation operation.</p>
- </li>
-
- <li>
- <h3>Invite ( a{sv} : args ) --> nothing</h3>
- <p>Invite a peer to join an already operating group or to re-invoke a persistent group.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the invitation:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>peer</td><td>o</td><td></td><td>yes</td></tr>
- <tr><td>persistent_group_object</td><td>o</td><td></td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>Disconnect ( nothing ) --> nothing</h3>
- <p>Terminate a P2P group.
- \note This needs to be issued on a P2P group interface if separate group interfaces are used.
- \bug It would be cleaner to not require .P2PDevice methods to be issued on a group interface. In other words, this would either need to be Disconnect(group_object) or moved to be a .Group Disconnect() method.</p>
- </li>
-
- <li>
- <h3>RejectPeer ( o : peer ) --> nothing</h3>
- <p>Reject connection attempt from a peer (specified with a device address). This is a mechanism to reject a pending GO Negotiation with a peer and request to automatically block any further connection or discovery of the peer.</p>
- </li>
-
- <li>
- <h3>RemoveClient ( a{sv} : args ) --> nothing</h3>
- <p>Remove the client from all groups (operating and persistent) from the local GO.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for removing a client:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>peer</td><td>o</td><td>Object path for peer's P2P Device Address</td><td>yes</td></tr>
- <tr><td>iface</td><td>s</td><td>Interface address[MAC Address format] of the peer to be disconnected. Required if object path is not provided.</td><td>no</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>Flush ( nothing ) --> nothing</h3>
- <p>Flush P2P peer table and state.</p>
- </li>
-
- <li>
- <h3>AddService ( a{sv} : args ) --> nothing</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the service:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>service_type</td><td>s</td><td>"upnp", "bonjour"</td><td>yes</td></tr>
- <tr><td>version</td><td>u</td><td>Required for UPnP services.</td><td>no</td></tr>
- <tr><td>service</td><td>s</td><td></td><td></td></tr>
- <tr><td>query</td><td>ay</td><td></td><td></td></tr>
- <tr><td>response</td><td>ay</td><td></td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>DeleteService ( a{sv} : args ) --> nothing</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with parameters for the service:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>service_type</td><td>s</td><td>"upnp", "bonjour"</td><td>yes</td></tr>
- <tr><td>version</td><td>u</td><td>Required for UPnP services.</td><td>no</td></tr>
- <tr><td>service</td><td>s</td><td></td><td></td></tr>
- <tr><td>query</td><td>ay</td><td></td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>FlushService ( nothing ) --> nothing</h3>
- </li>
-
- <li>
- <h3>ServiceDiscoveryRequest ( a{sv} : args ) --> t : ref</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with following parameters:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>peer_object</td><td>o</td><td></td><td>no</td></tr>
- <tr><td>service_type</td><td>s</td><td>"upnp"</td><td>no</td></tr>
- <tr><td>version</td><td>u</td><td>Required for UPnP services.</td><td>no</td></tr>
- <tr><td>service</td><td>s</td><td></td><td></td></tr>
- <tr><td>tlv</td><td>ay</td><td></td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>ServiceDiscoveryResponse ( a{sv} : args ) --> nothing : ref</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with following parameters:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>peer_object</td><td>o</td><td></td><td>yes</td></tr>
- <tr><td>frequency</td><td>i</td><td></td><td>yes</td></tr>
- <tr><td>dialog_token</td><td>i</td><td></td><td>yes</td></tr>
- <tr><td>tlvs</td><td>ay</td><td></td><td>yes</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>ServiceDiscoveryCancelRequest ( t : args ) --> nothing : ref</h3>
- </li>
-
- <li>
- <h3>ServiceUpdate ( nothing ) --> nothing</h3>
- </li>
-
- <li>
- <h3>ServiceDiscoveryExternal ( i : arg ) --> nothing</h3>
- </li>
-
- <li>
- <h3>AddPersistentGroup ( a{sv} : args ) --> o : path</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>
- A dictionary with following parameters:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th><th>Required</th></tr>
- <tr><td>bssid</td><td>s</td><td>P2P Device Address of the GO in the persistent group.</td><td>yes</td></tr>
- <tr><td>ssid</td><td>s</td><td>SSID of the group</td><td>yes</td></tr>
- <tr><td>psk</td><td>s</td><td>Passphrase (on the GO and optionally on P2P Client) or PSK (on P2P Client if passphrase ise not known)</td><td>yes</td></tr>
- <tr><td>mode</td><td>s</td><td>"3" on GO or "0" on P2P Client</td><td>yes</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>RemovePersistentGroup ( o : path ) --> nothing</h3>
- </li>
-
- <li>
- <h3>RemoveAllPersistentGroups ( nothing ) --> nothing</h3>
- </li>
-</ul>
-
-\subsection dbus_p2pdevice_properties Properties
-
-<ul>
- <li>
- <h3>P2PDeviceConfig - a{sv} - (read/write)</h3>
- <p>Dictionary with following entries. On write, only the included values are changed.</p>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>DeviceName</td><td>s</td><td></td></tr>
- <tr><td>PrimaryDeviceType</td><td>ay</td><td></td></tr>
- <tr><td>SecondaryDeviceTypes</td><td>aay</td><td></td></tr>
- <tr><td>VendorExtension</td><td>aay</td><td></td></tr>
- <tr><td>GOIntent</td><td>u</td><td></td></tr>
- <tr><td>PersistentReconnect</td><td>b</td><td></td></tr>
- <tr><td>ListenRegClass</td><td>u</td><td></td></tr>
- <tr><td>ListenChannel</td><td>u</td><td></td></tr>
- <tr><td>OperRegClass</td><td>u</td><td></td></tr>
- <tr><td>OperChannel</td><td>u</td><td></td></tr>
- <tr><td>SsidPostfix</td><td>s</td><td></td></tr>
- <tr><td>IntraBss</td><td>b</td><td></td></tr>
- <tr><td>GroupIdle</td><td>u</td><td></td></tr>
- <tr><td>disassoc_low_ack</td><td>u</td><td></td></tr>
- <tr><td>NoGroupIface</td><td>b</td><td></td></tr>
- <tr><td>p2p_search_delay</td><td>u</td><td></td></tr>
- </table>
- </li>
-
- <li>
- <h3>Peers - ao - (read)</h3>
- </li>
-
- <li>
- <h3>Role - s - (read)</h3>
- <p>\bug What is this trying to indicate? It does not make much sense to have a P2PDevice property role since there can be multiple concurrent groups and the P2P Device role is always active anyway.</p>
- </li>
-
- <li>
- <h3>Group - o - (read)</h3>
- <p>\bug What is this trying to indicate? It does not make much sense to have a P2PDevice property Group since there can be multiple concurrent groups.</p>
- </li>
-
- <li>
- <h3>PeerGO - o - (read)</h3>
- <p>\bug What is this trying to indicate? It does not make much sense to have a P2PDevice property PeerGO since there can be multiple concurrent groups.</p>
- </li>
-
- <li>
- <h3>PersistentGroups - ao - (read)</h3>
- </li>
-</ul>
-
-\subsection dbus_p2pdevice_signals Signals
-
-<ul>
- <li>
- <h3>DeviceFound ( o : path )</h3>
- </li>
-
- <li>
- <h3>DeviceFoundProperties ( o : path, a{sv} : properties )</h3>
- <p>A new peer device has been found.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : path</dt>
- <dd>A D-Bus path to an object representing the found peer device.</dd>
- </dl>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary containing properties of the found peer device.</dd>
- </dl>
- </li>
-
- <li>
- <h3>DeviceLost ( o : path )</h3>
- </li>
-
- <li>
- <h3>FindStopped ( )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryRequestDisplayPin ( o : peer_object, s : pin )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryResponseDisplayPin ( o : peer_object, s : pin )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryRequestEnterPin ( o : peer_object )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryResponseEnterPin ( o : peer_object )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryPBCRequest ( o : peer_object )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryPBCResponse ( o : peer_object )</h3>
- </li>
-
- <li>
- <h3>ProvisionDiscoveryFailure ( o : peer_object, i : status )</h3>
- </li>
-
- <li>
- <h3>GroupStarted ( a{sv} : properties )</h3>
- <p>A new P2P group was started or joined.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information on the added group:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>interface_object</td><td>o</td><td>D-Bus path of the interface on which this group is operating on. See \ref dbus_interface.</td></tr>
- <tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></tr>
- <tr><td>group_object</td><td>o</td><td>D-Bus path of the group. See \ref dbus_group.</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GONegotiationSuccess ( a{sv} : properties )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>peer_object</td><td>o</td><td>D-Bus path of the peer. See \ref dbus_peer.</td></tr>
- <tr><td>status</td><td>i</td><td></td></tr>
- <tr><td>passphrase</td><td>s</td><td>Passphrase for the group. Included only if this device becomes the GO of the group.</td></tr>
- <tr><td>role_go</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></tr>
- <tr><td>ssid</td><td>ay</td><td></td></tr>
- <tr><td>peer_device_addr</td><td>ay</td><td></td></tr>
- <tr><td>peer_interface_addr</td><td>ay</td><td></td></tr>
- <tr><td>wps_method</td><td>s</td><td></td></tr>
- <tr><td>frequency_list</td><td>ai</td><td></td></tr>
- <tr><td>persistent_group</td><td>i</td><td></td></tr>
- <tr><td>peer_config_timeout</td><td>u</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GONegotiationFailure ( a{sv} : properties )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>peer_object</td><td>o</td><td>D-Bus path of the peer. See \ref dbus_peer.</td></tr>
- <tr><td>status</td><td>i</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GONegotiationRequest ( o : path, q : dev_passwd_id, y : device_go_intent )</h3>
- </li>
-
- <li>
- <h3>InvitationResult ( a{sv} : invite_result )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : invite_result</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>status</td><td>i</td><td></td></tr>
- <tr><td>BSSID</td><td>ay</td><td>Optionally present</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GroupFinished ( a{sv} : properties )</h3>
- <p>A P2P group was removed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information of the removed group:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>interface_object</td><td>o</td><td>D-Bus path of the interface on which this group is operating on. See \ref dbus_interface.</td></tr>
- <tr><td>role</td><td>s</td><td>The role of the local device in the group: "GO" or "client".</td></tr>
- <tr><td>group_object</td><td>o</td><td>D-Bus path of the group. See \ref dbus_group.</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>ServiceDiscoveryRequest ( a{sv} : sd_request )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : sd_request</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><td>peer_object</td><td>o</td><td></td></tr>
- <tr><td>frequency</td><td>i</td><td></td></tr>
- <tr><td>dialog_token</td><td>i</td><td></td></tr>
- <tr><td>update_indicator</td><td>q</td><td></td></tr>
- <tr><td>tlvs</td><td>ay</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>ServiceDiscoveryResponse ( a{sv} : sd_response )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : sd_response</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><td>peer_object</td><td>o</td><td></td></tr>
- <tr><td>update_indicator</td><td>q</td><td></td></tr>
- <tr><td>tlvs</td><td>ay</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>PersistentGroupAdded ( o : path, a{sv} : properties )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : path</dt>
- <dd>D-Bus object path for the persistent group. See \ref dbus_persistent_group.</dd>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>bssid</td><td>s</td><td>P2P Device Address of the GO in the persistent group.</td></tr>
- <tr><td>ssid</td><td>s</td><td>SSID of the group</td></tr>
- <tr><td>psk</td><td>s</td><td>Passphrase (on the GO and optionally on P2P Client) or PSK (on P2P Client if passphrase ise not known)</td></tr>
- <tr><td>disabled</td><td>s</td><td>Set to "2" to indicate special network block use as a P2P persistent group information</td></tr>
- <tr><td>mode</td><td>s</td><td>"3" on GO or "0" on P2P Client</td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>PersistentGroupRemoved ( o : path )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : path</dt>
- <dd>D-Bus object path for the persistent group. See \ref dbus_persistent_group.</dd>
- </dl>
- </li>
-
- <li>
- <h3>WpsFailed ( s : name, a{sv} : args )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : name</dt>
- <dd>"fail"</dd>
- <dt>a{sv} : args</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>msg</td><td>i</td><td></td></tr>
- <tr><td>config_error</td><td>n</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>InvitationReceived ( a{sv} : properties )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with following information:
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>sa</td><td>ay</td><td>Optionally present</td></tr>
- <tr><td>go_dev_addr</td><td>ay</td><td>Optionally present</td></tr>
- <tr><td>bssid</td><td>ay</td><td>Optionally present</td></tr>
- <tr><td>persistent_id</td><td>i</td><td>Optionally present</td></tr>
- <tr><td>op_freq</td><td>i</td><td></td></tr>
- </table>
- </dd>
- </dl>
- </li>
-
- <li>
- <h3>GroupFormationFailure ( s : reason )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>s : reason</dt>
- <dd>Reason for failure or empty string if not known.</dd>
- </dl>
- </li>
-</ul>
-
-\section dbus_bss fi.w1.wpa_supplicant1.BSS
-
-Interface implemented by objects representing a scanned BSSs, i.e.,
-scan results.
-
-\subsection dbus_bss_properties Properties
-
-<ul>
- <li>
- <h3>BSSID - ay - (read)</h3>
- <p>BSSID of the BSS.</p>
- </li>
- <li>
- <h3>SSID - ay - (read)</h3>
- <p>SSID of the BSS.</p>
- </li>
- <li>
- <h3>WPA - a{sv} - (read)</h3>
- <p>WPA information of the BSS. Empty dictionary indicates no WPA support. Dictionary entries are:</p>
- <table>
- <tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-eap", "wpa-none"</td>
- <tr><td>Pairwise</td><td>as</td><td>Pairwise cipher suites. Possible array elements: "ccmp", "tkip"</td>
- <tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104", "wep40"</td>
- </table>
- </li>
- <li>
- <h3>RSN - a{sv} - (read)</h3>
- <p>RSN information of the BSS. Empty dictionary indicates no RSN support. Dictionary entries are:</p>
- <table>
- <tr><td>KeyMgmt</td><td>as</td><td>Key management suite. Possible array elements: "wpa-psk", "wpa-ft-psk", "wpa-psk-sha256", "wpa-eap", "wpa-ft-eap", "wpa-eap-sha256", "wpa-eap-suite-b", "wpa-eap-suite-b-192", "wpa-fils-sha256", "wpa-fils-sha384", "wpa-ft-fils-sha256", "wpa-ft-fils-sha384", "sae", "ft-sae", "wpa-none"</td>
- <tr><td>Pairwise</td><td>as</td><td>Pairwise cipher suites. Possible array elements: "ccmp", "tkip"</td>
- <tr><td>Group</td><td>s</td><td>Group cipher suite. Possible values are: "ccmp", "tkip", "wep104", "wep40"</td>
- <tr><td>MgmtGroup</td><td>s</td><td>Management frames cipher suite. Possible values are: "aes128cmac"</td>
- </table>
- </li>
- <li>
- <h3>WPS - a{sv} - (read)</h3>
- <p>WPS information of the BSS. Empty dictionary indicates no WPS support. Dictionary entries are:</p>
- <table>
- <tr><td>Type</td><td>s</td><td>"pbc", "pin", ""</td>
- </table>
- </li>
- <li>
- <h3>IEs - ay - (read)</h3>
- <p>All IEs of the BSS as a chain of TLVs</p>
- </li>
- <li>
- <h3>Privacy - b - (read)</h3>
- <p>Indicates if BSS supports privacy.</p>
- </li>
- <li>
- <h3>Mode - s - (read)</h3>
- <p>Describes mode of the BSS. Possible values are: "ad-hoc" and "infrastructure".</p>
- </li>
- <li>
- <h3>Frequency - q - (read)</h3>
- <p>Frequency of the BSS in MHz.</p>
- </li>
- <li>
- <h3>Rates - au - (read)</h3>
- <p>Descending ordered array of rates supported by the BSS in bits per second.</p>
- </li>
- <li>
- <h3>Signal - n - (read)</h3>
- <p>Signal strength of the BSS.</p>
- </li>
- <li>
- <h3>Age - u - (read)</h3>
- <p>Number of seconds since the BSS was last seen.</p>
- </li>
- </ul>
-
-\subsection dbus_bss_signals Signals
-
-<ul>
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and theirs new values.</dd>
- </dl>
- </li>
- </ul>
-
-
-\section dbus_network fi.w1.wpa_supplicant1.Network
-
-Interface implemented by objects representing configured networks,
-i.e., returned by fi.w1.wpa_supplicant1.Interface.AddNetwork.
-
-\subsection dbus_network_properties Properties
-
-<ul>
- <li>
- <h3>Enabled - b - (read/write)</h3>
- <p>Determines if the configured network is enabled or not.</p>
- </li>
-
- <li>
- <h3>Properties - a{sv} - (read/write)</h3>
- <p>Properties of the configured network. Dictionary contains entries from "network" block of wpa_supplicant configuration file. All values are string type, e.g., frequency is "2437", not 2437. When setting the properties, use the same format as for the AddNetwork() function.</p>
- </li>
- </ul>
-
-\subsection dbus_network_signals Signals
-
-<ul>
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and theirs new values. Possible dictionary keys are: "Enabled"</dd>
- </dl>
- </li>
- </ul>
-
-\section dbus_peer fi.w1.wpa_supplicant1.Peer
-
-Interface implemented by objects representing P2P peer devices.
-
-\subsection dbus_peer_properties Properties
-
-<ul>
- <li>
- <h3>DeviceName - s - (read)</h3>
- </li>
-
- <li>
- <h3>Manufacturer - s - (read)</h3>
- </li>
-
- <li>
- <h3>ModelName - s - (read)</h3>
- </li>
-
- <li>
- <h3>ModelNumber - s - (read)</h3>
- </li>
-
- <li>
- <h3>SerialNumber - s - (read)</h3>
- </li>
-
- <li>
- <h3>PrimaryDeviceType - ay - (read)</h3>
- </li>
-
- <li>
- <h3>config_method - q - (read)</h3>
- </li>
-
- <li>
- <h3>level - i - (read)</h3>
- </li>
-
- <li>
- <h3>devicecapability - y - (read)</h3>
- </li>
-
- <li>
- <h3>groupcapability - y - (read)</h3>
- <p>Group Capability field from the last frame from which this peer information was updated.
- \note This field is only for debugging purposes and must not be used to determine whether the peer happens to be operating a group as a GO at the moment.
- </p>
- </li>
-
- <li>
- <h3>SecondaryDeviceTypes - aay - (read)</h3>
- </li>
-
- <li>
- <h3>VendorExtension - aay - (read)</h3>
- </li>
-
- <li>
- <h3>IEs - ay - (read)</h3>
- <p>This is a confusingly named property that includes Wi-Fi Display subelements from the peer.
- \bug This should really be renamed since "IEs" means something completely different..
- </p>
- </li>
-
- <li>
- <h3>DeviceAddress - ay - (read)</h3>
- <p>The P2P Device Address of the peer.</p>
- </li>
-
- <li>
- <h3>Groups - ao - (read)</h3>
- <p>The current groups in which this peer is connected.</p>
- </li>
-</ul>
-
-\subsection dbus_peer_signals Signals
-
-<ul>
- <li>
- <h3>PropertiesChanged ( a{sv} : properties )</h3>
- <p>Some properties have changed.
- \deprecated Use org.freedesktop.DBus.Properties.PropertiesChanged instead.</p>
- \todo Explain how ProertiesChanged signals are supposed to be of any real use with Peer objects (i.e., one signal for multiple peers).
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : properties</dt>
- <dd>A dictionary with pairs of properties names which have changed and their new values.</dd>
- </dl>
- </li>
- </ul>
-
-\section dbus_group fi.w1.wpa_supplicant1.Group
-
-Interface implemented by objects representing active P2P groups.
-
-\subsection dbus_group_properties Properties
-
-<ul>
- <li>
- <h3>Members - ao - (read)</h3>
- <p>Array of D-Bus object paths for the peer devices that are currently connected to the group. This is valid only on the GO device. An empty array is returned in P2P Client role.
- </li>
-
- <li>
- <h3>Group - o - (read)</h3>
- <p>\todo Why is this here? This D-Bus object path is to this specific group and one needs to know it to fetching this information in the first place..
- </p>
- </li>
-
- <li>
- <h3>Role - s - (read)</h3>
- <p>The role of this device in the group: "GO", "client".</p>
- </li>
-
- <li>
- <h3>SSID - ay - (read)</h3>
- <p>P2P Group SSID.</p>
- </li>
-
- <li>
- <h3>BSSID - ay - (read)</h3>
- <p>P2P Group BSSID (the P2P Interface Address of the GO).</p>
- </li>
-
- <li>
- <h3>Frequency - q - (read)</h3>
- <p>The frequency (in MHz) of the group operating channel.</p>
- </li>
-
- <li>
- <h3>Passphrase - s - (read)</h3>
- <p>Passphrase used in the group. This is always available on the GO. For P2P Client role, this may be available depending on whether the peer GO provided the passphrase during the WPS provisioning step. If not available, an empty string is returned.</p>
- </li>
-
- <li>
- <h3>PSK - ay - (read)</h3>
- <p>PSK used in the group.</p>
- </li>
-
- <li>
- <h3>WPSVendorExtensions - aay - (read/write)</h3>
- <p>WPS vendor extension attributes used on the GO. This is valid only the in the GO role. An empty array is returned in P2P Client role. At maximum, 10 separate vendor extension byte arrays can be configured. The GO device will include the configured attributes in WPS exchanges.</p>
- </li>
-</ul>
-
-\subsection dbus_group_signals Signals
-
-<ul>
- <li>
- <h3>PeerJoined ( o : peer )</h3>
- <p>A peer device has joined the group. This is indicated only on the GO device.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : peer</dt>
- <dd>A D-Bus path to the object representing the peer. See \ref dbus_peer.</dd>
- </dl>
- </li>
-
- <li>
- <h3>PeerDisconnected ( o : peer )</h3>
- <p>A peer device has left the group. This is indicated only on the GO device.</p>
- <h4>Arguments</h4>
- <dl>
- <dt>o : peer</dt>
- <dd>A D-Bus path to the object representing the peer. See \ref dbus_peer.</dd>
- </dl>
- </li>
-</ul>
-
-\section dbus_persistent_group fi.w1.wpa_supplicant1.PersistentGroup
-
-Interface implemented by objects representing persistent P2P groups.
-
-\subsection dbus_persistent_group_properties Properties
-
-<ul>
- <li>
- <h3>Properties - a{sv} - (read/write)</h3>
- <p>Properties of the persistent group. These are same properties as in the \ref dbus_network. When writing this, only the entries to be modified are included, i.e., any item that is not included will be left at its existing value. The following entries are used for persistent groups:</p>
- <table>
- <tr><th>Key</th><th>Value type</th><th>Description</th></tr>
- <tr><td>bssid</td><td>s</td><td>P2P Device Address of the GO in the persistent group.</td></tr>
- <tr><td>ssid</td><td>s</td><td>SSID of the group</td></tr>
- <tr><td>psk</td><td>s</td><td>Passphrase (on the GO and optionally on P2P Client) or PSK (on P2P Client if passphrase ise not known)</td></tr>
- <tr><td>disabled</td><td>s</td><td>Set to "2" to indicate special network block use as a P2P persistent group information</td></tr>
- <tr><td>mode</td><td>s</td><td>"3" on GO or "0" on P2P Client</td></tr>
- </table>
- </li>
-</ul>
-
-\section dbus_mesh fi.w1.wpa_supplicant1.Interface.Mesh
-
-Interface for performing mesh operations.
-
-\subsection dbus_mesh_properties Properties
-
-<ul>
- <li>
- <h3>MeshPeers - aay - (read)</h3>
- </li>
-
- <li>
- <h3>MeshGroup - ay - (read)</h3>
- </li>
-</ul>
-
-\subsection dbus_mesh_signals Signals
-
-<ul>
- <li>
- <h3>MeshGroupStarted ( a{sv} : args )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary containing information of the started mesh group.</dd>
- </dl>
- </li>
- <li>
- <h3>MeshGroupRemoved ( a{sv} : args )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary containing information of the removed mesh group.</dd>
- </dl>
- </li>
- <li>
- <h3>MeshPeerConnected ( a{sv} : args )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary containing information of the connected mesh peer.</dd>
- </dl>
- </li>
- <li>
- <h3>MeshPeerDisconnected ( a{sv} : args )</h3>
- <p></p>
- <h4>Arguments</h4>
- <dl>
- <dt>a{sv} : args</dt>
- <dd>A dictionary containing information of the disconnected mesh peer.</dd>
- </dl>
- </li>
-</ul>
-
-*/
diff --git a/doc/directories.doxygen b/doc/directories.doxygen
deleted file mode 100644
index 15e5bdae463c..000000000000
--- a/doc/directories.doxygen
+++ /dev/null
@@ -1,90 +0,0 @@
-/**
-
-\dir hostapd hostapd
-
-hostapd-specific code for configuration, control interface, and AP
-management.
-
-
-\dir src/common Common functionality
-
-This module includes IEEE 802.11, IEEE 802.1X, and WPA related
-functionality that is shared between AP and station modes.
-
-
-\dir src/crypto Cryptographical functionality and wrappers
-
-This module defines crypto and tls interfaces to provide portability
-layer for different crypto/TLS libraries. Wrappers for number of
-libraries are also included here. In addition, internal implementation
-of various crypto functions are provided as an alternative for an
-external library and to extend some algorithms.
-
-
-\dir src/drivers Driver wrappers
-
-This directory includes the driver interface definition and all the
-driver wrappers that can be used to interact with different drivers
-without making rest of the software dependent on which particular
-driver is used.
-
-
-\dir src/eap_common Common EAP functionality for server and peer
-
-
-\dir src/eap_peer EAP peer
-
-
-\dir src/eap_server EAP server
-
-
-\dir src/eapol_auth EAPOL authenticator
-
-
-\dir src/eapol_supp EAPOL supplicant
-
-
-\dir src/l2_packet Layer 2 packet interface
-
-This module defines an interface for layer 2 (link layer) packet
-sendinf and receiving. All the wrappers for supported mechanisms are
-also included here. This is used to port packet access for new
-operating systems without having to make rest of the source code
-depend on which OS network stack is used.
-
-
-\dir src/radius RADIUS
-
-RADIUS module includes RADIUS message building and parsing
-functionality and separate RADIUS client and server functions.
-
-
-\dir src/rsn_supp IEEE 802.11 RSN and WPA supplicant
-
-
-\dir src/tls Internal TLS server and client implementation
-
-This module can be used as an alternative to using an external TLS
-library.
-
-
-\dir src/utils Utility functions
-
-Independent set of helper functions that most other components
-use. This includes portability wrappers and helpers for common tasks.
-
-
-\dir src/wps Wi-Fi Protected Setup
-
-This directory includes Wi-Fi Protected Setup functions for Registrar
-(both internal in an AP and an External Registrar and
-Enrollee. Minimal UPnP and HTTP functionality is also provided for the
-functionality needed to implement Wi-Fi Protected Setup.
-
-
-\dir wpa_supplicant wpa_supplicant
-
-wpa_supplicant-specific code for configuration, control interface, and
-client management.
-
-*/
diff --git a/doc/doxygen.conf b/doc/doxygen.conf
deleted file mode 100644
index 3f01173930c4..000000000000
--- a/doc/doxygen.conf
+++ /dev/null
@@ -1,1547 +0,0 @@
-# Doxyfile 1.6.1
-
-# This file describes the settings to be used by the documentation system
-# doxygen (www.doxygen.org) for a project
-#
-# All text after a hash (#) is considered a comment and will be ignored
-# The format is:
-# TAG = value [value, ...]
-# For lists items can also be appended using:
-# TAG += value [value, ...]
-# Values that contain spaces should be placed between quotes (" ")
-
-#---------------------------------------------------------------------------
-# Project related configuration options
-#---------------------------------------------------------------------------
-
-# This tag specifies the encoding used for all characters in the config file
-# that follow. The default is UTF-8 which is also the encoding used for all
-# text before the first occurrence of this tag. Doxygen uses libiconv (or the
-# iconv built into libc) for the transcoding. See
-# http://www.gnu.org/software/libiconv for the list of possible encodings.
-
-DOXYFILE_ENCODING = UTF-8
-
-# The PROJECT_NAME tag is a single word (or a sequence of words surrounded
-# by quotes) that should identify the project.
-
-PROJECT_NAME = "wpa_supplicant / hostapd"
-
-# The PROJECT_NUMBER tag can be used to enter a project or revision number.
-# This could be handy for archiving the generated documentation or
-# if some version control system is used.
-
-PROJECT_NUMBER = 2.9
-
-# The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute)
-# base path where the generated documentation will be put.
-# If a relative path is entered, it will be relative to the location
-# where doxygen was started. If left blank the current directory will be used.
-
-OUTPUT_DIRECTORY = doc
-
-# If the CREATE_SUBDIRS tag is set to YES, then doxygen will create
-# 4096 sub-directories (in 2 levels) under the output directory of each output
-# format and will distribute the generated files over these directories.
-# Enabling this option can be useful when feeding doxygen a huge amount of
-# source files, where putting all generated files in the same directory would
-# otherwise cause performance problems for the file system.
-
-CREATE_SUBDIRS = NO
-
-# The OUTPUT_LANGUAGE tag is used to specify the language in which all
-# documentation generated by doxygen is written. Doxygen will use this
-# information to generate all constant output in the proper language.
-# The default language is English, other supported languages are:
-# Afrikaans, Arabic, Brazilian, Catalan, Chinese, Chinese-Traditional,
-# Croatian, Czech, Danish, Dutch, Esperanto, Farsi, Finnish, French, German,
-# Greek, Hungarian, Italian, Japanese, Japanese-en (Japanese with English
-# messages), Korean, Korean-en, Lithuanian, Norwegian, Macedonian, Persian,
-# Polish, Portuguese, Romanian, Russian, Serbian, Serbian-Cyrilic, Slovak,
-# Slovene, Spanish, Swedish, Ukrainian, and Vietnamese.
-
-OUTPUT_LANGUAGE = English
-
-# If the BRIEF_MEMBER_DESC tag is set to YES (the default) Doxygen will
-# include brief member descriptions after the members that are listed in
-# the file and class documentation (similar to JavaDoc).
-# Set to NO to disable this.
-
-BRIEF_MEMBER_DESC = YES
-
-# If the REPEAT_BRIEF tag is set to YES (the default) Doxygen will prepend
-# the brief description of a member or function before the detailed description.
-# Note: if both HIDE_UNDOC_MEMBERS and BRIEF_MEMBER_DESC are set to NO, the
-# brief descriptions will be completely suppressed.
-
-REPEAT_BRIEF = YES
-
-# This tag implements a quasi-intelligent brief description abbreviator
-# that is used to form the text in various listings. Each string
-# in this list, if found as the leading text of the brief description, will be
-# stripped from the text and the result after processing the whole list, is
-# used as the annotated text. Otherwise, the brief description is used as-is.
-# If left blank, the following values are used ("$name" is automatically
-# replaced with the name of the entity): "The $name class" "The $name widget"
-# "The $name file" "is" "provides" "specifies" "contains"
-# "represents" "a" "an" "the"
-
-ABBREVIATE_BRIEF =
-
-# If the ALWAYS_DETAILED_SEC and REPEAT_BRIEF tags are both set to YES then
-# Doxygen will generate a detailed section even if there is only a brief
-# description.
-
-ALWAYS_DETAILED_SEC = NO
-
-# If the INLINE_INHERITED_MEMB tag is set to YES, doxygen will show all
-# inherited members of a class in the documentation of that class as if those
-# members were ordinary class members. Constructors, destructors and assignment
-# operators of the base classes will not be shown.
-
-INLINE_INHERITED_MEMB = NO
-
-# If the FULL_PATH_NAMES tag is set to YES then Doxygen will prepend the full
-# path before files name in the file list and in the header files. If set
-# to NO the shortest path that makes the file name unique will be used.
-
-FULL_PATH_NAMES = YES
-
-# If the FULL_PATH_NAMES tag is set to YES then the STRIP_FROM_PATH tag
-# can be used to strip a user-defined part of the path. Stripping is
-# only done if one of the specified strings matches the left-hand part of
-# the path. The tag can be used to show relative paths in the file list.
-# If left blank the directory from which doxygen is run is used as the
-# path to strip.
-
-STRIP_FROM_PATH =
-
-# The STRIP_FROM_INC_PATH tag can be used to strip a user-defined part of
-# the path mentioned in the documentation of a class, which tells
-# the reader which header file to include in order to use a class.
-# If left blank only the name of the header file containing the class
-# definition is used. Otherwise one should specify the include paths that
-# are normally passed to the compiler using the -I flag.
-
-STRIP_FROM_INC_PATH =
-
-# If the SHORT_NAMES tag is set to YES, doxygen will generate much shorter
-# (but less readable) file names. This can be useful is your file systems
-# doesn't support long names like on DOS, Mac, or CD-ROM.
-
-SHORT_NAMES = NO
-
-# If the JAVADOC_AUTOBRIEF tag is set to YES then Doxygen
-# will interpret the first line (until the first dot) of a JavaDoc-style
-# comment as the brief description. If set to NO, the JavaDoc
-# comments will behave just like regular Qt-style comments
-# (thus requiring an explicit @brief command for a brief description.)
-
-JAVADOC_AUTOBRIEF = NO
-
-# If the QT_AUTOBRIEF tag is set to YES then Doxygen will
-# interpret the first line (until the first dot) of a Qt-style
-# comment as the brief description. If set to NO, the comments
-# will behave just like regular Qt-style comments (thus requiring
-# an explicit \brief command for a brief description.)
-
-QT_AUTOBRIEF = NO
-
-# The MULTILINE_CPP_IS_BRIEF tag can be set to YES to make Doxygen
-# treat a multi-line C++ special comment block (i.e. a block of //! or ///
-# comments) as a brief description. This used to be the default behaviour.
-# The new default is to treat a multi-line C++ comment block as a detailed
-# description. Set this tag to YES if you prefer the old behaviour instead.
-
-MULTILINE_CPP_IS_BRIEF = NO
-
-# If the INHERIT_DOCS tag is set to YES (the default) then an undocumented
-# member inherits the documentation from any documented member that it
-# re-implements.
-
-INHERIT_DOCS = YES
-
-# If the SEPARATE_MEMBER_PAGES tag is set to YES, then doxygen will produce
-# a new page for each member. If set to NO, the documentation of a member will
-# be part of the file/class/namespace that contains it.
-
-SEPARATE_MEMBER_PAGES = NO
-
-# The TAB_SIZE tag can be used to set the number of spaces in a tab.
-# Doxygen uses this value to replace tabs by spaces in code fragments.
-
-TAB_SIZE = 8
-
-# This tag can be used to specify a number of aliases that acts
-# as commands in the documentation. An alias has the form "name=value".
-# For example adding "sideeffect=\par Side Effects:\n" will allow you to
-# put the command \sideeffect (or @sideeffect) in the documentation, which
-# will result in a user-defined paragraph with heading "Side Effects:".
-# You can put \n's in the value part of an alias to insert newlines.
-
-ALIASES =
-
-# Set the OPTIMIZE_OUTPUT_FOR_C tag to YES if your project consists of C
-# sources only. Doxygen will then generate output that is more tailored for C.
-# For instance, some of the names that are used will be different. The list
-# of all members will be omitted, etc.
-
-OPTIMIZE_OUTPUT_FOR_C = YES
-
-# Set the OPTIMIZE_OUTPUT_JAVA tag to YES if your project consists of Java
-# sources only. Doxygen will then generate output that is more tailored for
-# Java. For instance, namespaces will be presented as packages, qualified
-# scopes will look different, etc.
-
-OPTIMIZE_OUTPUT_JAVA = NO
-
-# Set the OPTIMIZE_FOR_FORTRAN tag to YES if your project consists of Fortran
-# sources only. Doxygen will then generate output that is more tailored for
-# Fortran.
-
-OPTIMIZE_FOR_FORTRAN = NO
-
-# Set the OPTIMIZE_OUTPUT_VHDL tag to YES if your project consists of VHDL
-# sources. Doxygen will then generate output that is tailored for
-# VHDL.
-
-OPTIMIZE_OUTPUT_VHDL = NO
-
-# Doxygen selects the parser to use depending on the extension of the files it parses.
-# With this tag you can assign which parser to use for a given extension.
-# Doxygen has a built-in mapping, but you can override or extend it using this tag.
-# The format is ext=language, where ext is a file extension, and language is one of
-# the parsers supported by doxygen: IDL, Java, Javascript, C#, C, C++, D, PHP,
-# Objective-C, Python, Fortran, VHDL, C, C++. For instance to make doxygen treat
-# .inc files as Fortran files (default is PHP), and .f files as C (default is Fortran),
-# use: inc=Fortran f=C. Note that for custom extensions you also need to set FILE_PATTERNS otherwise the files are not read by doxygen.
-
-EXTENSION_MAPPING =
-
-# If you use STL classes (i.e. std::string, std::vector, etc.) but do not want
-# to include (a tag file for) the STL sources as input, then you should
-# set this tag to YES in order to let doxygen match functions declarations and
-# definitions whose arguments contain STL classes (e.g. func(std::string); v.s.
-# func(std::string) {}). This also make the inheritance and collaboration
-# diagrams that involve STL classes more complete and accurate.
-
-BUILTIN_STL_SUPPORT = NO
-
-# If you use Microsoft's C++/CLI language, you should set this option to YES to
-# enable parsing support.
-
-CPP_CLI_SUPPORT = NO
-
-# Set the SIP_SUPPORT tag to YES if your project consists of sip sources only.
-# Doxygen will parse them like normal C++ but will assume all classes use public
-# instead of private inheritance when no explicit protection keyword is present.
-
-SIP_SUPPORT = NO
-
-# For Microsoft's IDL there are propget and propput attributes to indicate getter
-# and setter methods for a property. Setting this option to YES (the default)
-# will make doxygen to replace the get and set methods by a property in the
-# documentation. This will only work if the methods are indeed getting or
-# setting a simple type. If this is not the case, or you want to show the
-# methods anyway, you should set this option to NO.
-
-IDL_PROPERTY_SUPPORT = YES
-
-# If member grouping is used in the documentation and the DISTRIBUTE_GROUP_DOC
-# tag is set to YES, then doxygen will reuse the documentation of the first
-# member in the group (if any) for the other members of the group. By default
-# all members of a group must be documented explicitly.
-
-DISTRIBUTE_GROUP_DOC = NO
-
-# Set the SUBGROUPING tag to YES (the default) to allow class member groups of
-# the same type (for instance a group of public functions) to be put as a
-# subgroup of that type (e.g. under the Public Functions section). Set it to
-# NO to prevent subgrouping. Alternatively, this can be done per class using
-# the \nosubgrouping command.
-
-SUBGROUPING = YES
-
-# When TYPEDEF_HIDES_STRUCT is enabled, a typedef of a struct, union, or enum
-# is documented as struct, union, or enum with the name of the typedef. So
-# typedef struct TypeS {} TypeT, will appear in the documentation as a struct
-# with name TypeT. When disabled the typedef will appear as a member of a file,
-# namespace, or class. And the struct will be named TypeS. This can typically
-# be useful for C code in case the coding convention dictates that all compound
-# types are typedef'ed and only the typedef is referenced, never the tag name.
-
-TYPEDEF_HIDES_STRUCT = NO
-
-# The SYMBOL_CACHE_SIZE determines the size of the internal cache use to
-# determine which symbols to keep in memory and which to flush to disk.
-# When the cache is full, less often used symbols will be written to disk.
-# For small to medium size projects (<1000 input files) the default value is
-# probably good enough. For larger projects a too small cache size can cause
-# doxygen to be busy swapping symbols to and from disk most of the time
-# causing a significant performance penalty.
-# If the system has enough physical memory increasing the cache will improve the
-# performance by keeping more symbols in memory. Note that the value works on
-# a logarithmic scale so increasing the size by one will roughly double the
-# memory usage. The cache size is given by this formula:
-# 2^(16+SYMBOL_CACHE_SIZE). The valid range is 0..9, the default is 0,
-# corresponding to a cache size of 2^16 = 65536 symbols
-
-SYMBOL_CACHE_SIZE = 0
-
-#---------------------------------------------------------------------------
-# Build related configuration options
-#---------------------------------------------------------------------------
-
-# If the EXTRACT_ALL tag is set to YES doxygen will assume all entities in
-# documentation are documented, even if no documentation was available.
-# Private class members and static file members will be hidden unless
-# the EXTRACT_PRIVATE and EXTRACT_STATIC tags are set to YES
-
-EXTRACT_ALL = NO
-
-# If the EXTRACT_PRIVATE tag is set to YES all private members of a class
-# will be included in the documentation.
-
-EXTRACT_PRIVATE = NO
-
-# If the EXTRACT_STATIC tag is set to YES all static members of a file
-# will be included in the documentation.
-
-EXTRACT_STATIC = NO
-
-# If the EXTRACT_LOCAL_CLASSES tag is set to YES classes (and structs)
-# defined locally in source files will be included in the documentation.
-# If set to NO only classes defined in header files are included.
-
-EXTRACT_LOCAL_CLASSES = YES
-
-# This flag is only useful for Objective-C code. When set to YES local
-# methods, which are defined in the implementation section but not in
-# the interface are included in the documentation.
-# If set to NO (the default) only methods in the interface are included.
-
-EXTRACT_LOCAL_METHODS = NO
-
-# If this flag is set to YES, the members of anonymous namespaces will be
-# extracted and appear in the documentation as a namespace called
-# 'anonymous_namespace{file}', where file will be replaced with the base
-# name of the file that contains the anonymous namespace. By default
-# anonymous namespace are hidden.
-
-EXTRACT_ANON_NSPACES = NO
-
-# If the HIDE_UNDOC_MEMBERS tag is set to YES, Doxygen will hide all
-# undocumented members of documented classes, files or namespaces.
-# If set to NO (the default) these members will be included in the
-# various overviews, but no documentation section is generated.
-# This option has no effect if EXTRACT_ALL is enabled.
-
-HIDE_UNDOC_MEMBERS = NO
-
-# If the HIDE_UNDOC_CLASSES tag is set to YES, Doxygen will hide all
-# undocumented classes that are normally visible in the class hierarchy.
-# If set to NO (the default) these classes will be included in the various
-# overviews. This option has no effect if EXTRACT_ALL is enabled.
-
-HIDE_UNDOC_CLASSES = NO
-
-# If the HIDE_FRIEND_COMPOUNDS tag is set to YES, Doxygen will hide all
-# friend (class|struct|union) declarations.
-# If set to NO (the default) these declarations will be included in the
-# documentation.
-
-HIDE_FRIEND_COMPOUNDS = NO
-
-# If the HIDE_IN_BODY_DOCS tag is set to YES, Doxygen will hide any
-# documentation blocks found inside the body of a function.
-# If set to NO (the default) these blocks will be appended to the
-# function's detailed documentation block.
-
-HIDE_IN_BODY_DOCS = NO
-
-# The INTERNAL_DOCS tag determines if documentation
-# that is typed after a \internal command is included. If the tag is set
-# to NO (the default) then the documentation will be excluded.
-# Set it to YES to include the internal documentation.
-
-INTERNAL_DOCS = NO
-
-# If the CASE_SENSE_NAMES tag is set to NO then Doxygen will only generate
-# file names in lower-case letters. If set to YES upper-case letters are also
-# allowed. This is useful if you have classes or files whose names only differ
-# in case and if your file system supports case sensitive file names. Windows
-# and Mac users are advised to set this option to NO.
-
-CASE_SENSE_NAMES = YES
-
-# If the HIDE_SCOPE_NAMES tag is set to NO (the default) then Doxygen
-# will show members with their full class and namespace scopes in the
-# documentation. If set to YES the scope will be hidden.
-
-HIDE_SCOPE_NAMES = NO
-
-# If the SHOW_INCLUDE_FILES tag is set to YES (the default) then Doxygen
-# will put a list of the files that are included by a file in the documentation
-# of that file.
-
-SHOW_INCLUDE_FILES = YES
-
-# If the INLINE_INFO tag is set to YES (the default) then a tag [inline]
-# is inserted in the documentation for inline members.
-
-INLINE_INFO = YES
-
-# If the SORT_MEMBER_DOCS tag is set to YES (the default) then doxygen
-# will sort the (detailed) documentation of file and class members
-# alphabetically by member name. If set to NO the members will appear in
-# declaration order.
-
-SORT_MEMBER_DOCS = YES
-
-# If the SORT_BRIEF_DOCS tag is set to YES then doxygen will sort the
-# brief documentation of file, namespace and class members alphabetically
-# by member name. If set to NO (the default) the members will appear in
-# declaration order.
-
-SORT_BRIEF_DOCS = NO
-
-# If the SORT_MEMBERS_CTORS_1ST tag is set to YES then doxygen will sort the (brief and detailed) documentation of class members so that constructors and destructors are listed first. If set to NO (the default) the constructors will appear in the respective orders defined by SORT_MEMBER_DOCS and SORT_BRIEF_DOCS. This tag will be ignored for brief docs if SORT_BRIEF_DOCS is set to NO and ignored for detailed docs if SORT_MEMBER_DOCS is set to NO.
-
-SORT_MEMBERS_CTORS_1ST = NO
-
-# If the SORT_GROUP_NAMES tag is set to YES then doxygen will sort the
-# hierarchy of group names into alphabetical order. If set to NO (the default)
-# the group names will appear in their defined order.
-
-SORT_GROUP_NAMES = NO
-
-# If the SORT_BY_SCOPE_NAME tag is set to YES, the class list will be
-# sorted by fully-qualified names, including namespaces. If set to
-# NO (the default), the class list will be sorted only by class name,
-# not including the namespace part.
-# Note: This option is not very useful if HIDE_SCOPE_NAMES is set to YES.
-# Note: This option applies only to the class list, not to the
-# alphabetical list.
-
-SORT_BY_SCOPE_NAME = NO
-
-# The GENERATE_TODOLIST tag can be used to enable (YES) or
-# disable (NO) the todo list. This list is created by putting \todo
-# commands in the documentation.
-
-GENERATE_TODOLIST = YES
-
-# The GENERATE_TESTLIST tag can be used to enable (YES) or
-# disable (NO) the test list. This list is created by putting \test
-# commands in the documentation.
-
-GENERATE_TESTLIST = YES
-
-# The GENERATE_BUGLIST tag can be used to enable (YES) or
-# disable (NO) the bug list. This list is created by putting \bug
-# commands in the documentation.
-
-GENERATE_BUGLIST = YES
-
-# The GENERATE_DEPRECATEDLIST tag can be used to enable (YES) or
-# disable (NO) the deprecated list. This list is created by putting
-# \deprecated commands in the documentation.
-
-GENERATE_DEPRECATEDLIST= YES
-
-# The ENABLED_SECTIONS tag can be used to enable conditional
-# documentation sections, marked by \if sectionname ... \endif.
-
-ENABLED_SECTIONS =
-
-# The MAX_INITIALIZER_LINES tag determines the maximum number of lines
-# the initial value of a variable or define consists of for it to appear in
-# the documentation. If the initializer consists of more lines than specified
-# here it will be hidden. Use a value of 0 to hide initializers completely.
-# The appearance of the initializer of individual variables and defines in the
-# documentation can be controlled using \showinitializer or \hideinitializer
-# command in the documentation regardless of this setting.
-
-MAX_INITIALIZER_LINES = 30
-
-# Set the SHOW_USED_FILES tag to NO to disable the list of files generated
-# at the bottom of the documentation of classes and structs. If set to YES the
-# list will mention the files that were used to generate the documentation.
-
-SHOW_USED_FILES = YES
-
-# If the sources in your project are distributed over multiple directories
-# then setting the SHOW_DIRECTORIES tag to YES will show the directory hierarchy
-# in the documentation. The default is NO.
-
-SHOW_DIRECTORIES = YES
-
-# Set the SHOW_FILES tag to NO to disable the generation of the Files page.
-# This will remove the Files entry from the Quick Index and from the
-# Folder Tree View (if specified). The default is YES.
-
-SHOW_FILES = YES
-
-# Set the SHOW_NAMESPACES tag to NO to disable the generation of the
-# Namespaces page.
-# This will remove the Namespaces entry from the Quick Index
-# and from the Folder Tree View (if specified). The default is YES.
-
-SHOW_NAMESPACES = YES
-
-# The FILE_VERSION_FILTER tag can be used to specify a program or script that
-# doxygen should invoke to get the current version for each file (typically from
-# the version control system). Doxygen will invoke the program by executing (via
-# popen()) the command <command> <input-file>, where <command> is the value of
-# the FILE_VERSION_FILTER tag, and <input-file> is the name of an input file
-# provided by doxygen. Whatever the program writes to standard output
-# is used as the file version. See the manual for examples.
-
-FILE_VERSION_FILTER =
-
-# The LAYOUT_FILE tag can be used to specify a layout file which will be parsed by
-# doxygen. The layout file controls the global structure of the generated output files
-# in an output format independent way. The create the layout file that represents
-# doxygen's defaults, run doxygen with the -l option. You can optionally specify a
-# file name after the option, if omitted DoxygenLayout.xml will be used as the name
-# of the layout file.
-
-LAYOUT_FILE =
-
-#---------------------------------------------------------------------------
-# configuration options related to warning and progress messages
-#---------------------------------------------------------------------------
-
-# The QUIET tag can be used to turn on/off the messages that are generated
-# by doxygen. Possible values are YES and NO. If left blank NO is used.
-
-QUIET = NO
-
-# The WARNINGS tag can be used to turn on/off the warning messages that are
-# generated by doxygen. Possible values are YES and NO. If left blank
-# NO is used.
-
-WARNINGS = YES
-
-# If WARN_IF_UNDOCUMENTED is set to YES, then doxygen will generate warnings
-# for undocumented members. If EXTRACT_ALL is set to YES then this flag will
-# automatically be disabled.
-
-WARN_IF_UNDOCUMENTED = YES
-
-# If WARN_IF_DOC_ERROR is set to YES, doxygen will generate warnings for
-# potential errors in the documentation, such as not documenting some
-# parameters in a documented function, or documenting parameters that
-# don't exist or using markup commands wrongly.
-
-WARN_IF_DOC_ERROR = YES
-
-# This WARN_NO_PARAMDOC option can be abled to get warnings for
-# functions that are documented, but have no documentation for their parameters
-# or return value. If set to NO (the default) doxygen will only warn about
-# wrong or incomplete parameter documentation, but not about the absence of
-# documentation.
-
-WARN_NO_PARAMDOC = YES
-
-# The WARN_FORMAT tag determines the format of the warning messages that
-# doxygen can produce. The string should contain the $file, $line, and $text
-# tags, which will be replaced by the file and line number from which the
-# warning originated and the warning text. Optionally the format may contain
-# $version, which will be replaced by the version of the file (if it could
-# be obtained via FILE_VERSION_FILTER)
-
-WARN_FORMAT = "$file:$line: $text"
-
-# The WARN_LOGFILE tag can be used to specify a file to which warning
-# and error messages should be written. If left blank the output is written
-# to stderr.
-
-WARN_LOGFILE = doc/doxygen.warnings
-
-#---------------------------------------------------------------------------
-# configuration options related to the input files
-#---------------------------------------------------------------------------
-
-# The INPUT tag can be used to specify the files and/or directories that contain
-# documented source files. You may enter file names like "myfile.cpp" or
-# directories like "/usr/src/myproject". Separate the files or directories
-# with spaces.
-
-INPUT = \
- doc \
- hostapd \
- wpa_supplicant \
- wpa_supplicant/dbus \
- eap_example \
- src/ap \
- src/common \
- src/crypto \
- src/drivers \
- src/eap_common \
- src/eapol_auth \
- src/eapol_supp \
- src/eap_peer \
- src/eap_server \
- src/l2_packet \
- src/p2p \
- src/pae \
- src/radius \
- src/rsn_supp \
- src/tls \
- src/utils \
- src/wps
-
-# This tag can be used to specify the character encoding of the source files
-# that doxygen parses. Internally doxygen uses the UTF-8 encoding, which is
-# also the default input encoding. Doxygen uses libiconv (or the iconv built
-# into libc) for the transcoding. See http://www.gnu.org/software/libiconv for
-# the list of possible encodings.
-
-INPUT_ENCODING = UTF-8
-
-# If the value of the INPUT tag contains directories, you can use the
-# FILE_PATTERNS tag to specify one or more wildcard pattern (like *.cpp
-# and *.h) to filter out the source-files in the directories. If left
-# blank the following patterns are tested:
-# *.c *.cc *.cxx *.cpp *.c++ *.java *.ii *.ixx *.ipp *.i++ *.inl *.h *.hh *.hxx
-# *.hpp *.h++ *.idl *.odl *.cs *.php *.php3 *.inc *.m *.mm *.py *.f90
-
-FILE_PATTERNS = *.c *.h *.cpp *.m *.doxygen
-
-# The RECURSIVE tag can be used to turn specify whether or not subdirectories
-# should be searched for input files as well. Possible values are YES and NO.
-# If left blank NO is used.
-
-RECURSIVE = NO
-
-# The EXCLUDE tag can be used to specify files and/or directories that should
-# excluded from the INPUT source files. This way you can easily exclude a
-# subdirectory from a directory tree whose root is specified with the INPUT tag.
-
-EXCLUDE =
-
-# The EXCLUDE_SYMLINKS tag can be used select whether or not files or
-# directories that are symbolic links (a Unix filesystem feature) are excluded
-# from the input.
-
-EXCLUDE_SYMLINKS = NO
-
-# If the value of the INPUT tag contains directories, you can use the
-# EXCLUDE_PATTERNS tag to specify one or more wildcard patterns to exclude
-# certain files from those directories. Note that the wildcards are matched
-# against the file with absolute path, so to exclude all test directories
-# for example use the pattern */test/*
-
-EXCLUDE_PATTERNS =
-
-# The EXCLUDE_SYMBOLS tag can be used to specify one or more symbol names
-# (namespaces, classes, functions, etc.) that should be excluded from the
-# output. The symbol name can be a fully qualified name, a word, or if the
-# wildcard * is used, a substring. Examples: ANamespace, AClass,
-# AClass::ANamespace, ANamespace::*Test
-
-EXCLUDE_SYMBOLS =
-
-# The EXAMPLE_PATH tag can be used to specify one or more files or
-# directories that contain example code fragments that are included (see
-# the \include command).
-
-EXAMPLE_PATH =
-
-# If the value of the EXAMPLE_PATH tag contains directories, you can use the
-# EXAMPLE_PATTERNS tag to specify one or more wildcard pattern (like *.cpp
-# and *.h) to filter out the source-files in the directories. If left
-# blank all files are included.
-
-EXAMPLE_PATTERNS =
-
-# If the EXAMPLE_RECURSIVE tag is set to YES then subdirectories will be
-# searched for input files to be used with the \include or \dontinclude
-# commands irrespective of the value of the RECURSIVE tag.
-# Possible values are YES and NO. If left blank NO is used.
-
-EXAMPLE_RECURSIVE = NO
-
-# The IMAGE_PATH tag can be used to specify one or more files or
-# directories that contain image that are included in the documentation (see
-# the \image command).
-
-IMAGE_PATH = doc
-
-# The INPUT_FILTER tag can be used to specify a program that doxygen should
-# invoke to filter for each input file. Doxygen will invoke the filter program
-# by executing (via popen()) the command <filter> <input-file>, where <filter>
-# is the value of the INPUT_FILTER tag, and <input-file> is the name of an
-# input file. Doxygen will then use the output that the filter program writes
-# to standard output.
-# If FILTER_PATTERNS is specified, this tag will be
-# ignored.
-
-# You can download the filter tool from
-# http://w1.fi/tools/kerneldoc2doxygen-hostap.pl
-INPUT_FILTER = kerneldoc2doxygen-hostap.pl
-
-# The FILTER_PATTERNS tag can be used to specify filters on a per file pattern
-# basis.
-# Doxygen will compare the file name with each pattern and apply the
-# filter if there is a match.
-# The filters are a list of the form:
-# pattern=filter (like *.cpp=my_cpp_filter). See INPUT_FILTER for further
-# info on how filters are used. If FILTER_PATTERNS is empty, INPUT_FILTER
-# is applied to all files.
-
-FILTER_PATTERNS =
-
-# If the FILTER_SOURCE_FILES tag is set to YES, the input filter (if set using
-# INPUT_FILTER) will be used to filter the input files when producing source
-# files to browse (i.e. when SOURCE_BROWSER is set to YES).
-
-FILTER_SOURCE_FILES = YES
-
-#---------------------------------------------------------------------------
-# configuration options related to source browsing
-#---------------------------------------------------------------------------
-
-# If the SOURCE_BROWSER tag is set to YES then a list of source files will
-# be generated. Documented entities will be cross-referenced with these sources.
-# Note: To get rid of all source code in the generated output, make sure also
-# VERBATIM_HEADERS is set to NO.
-
-SOURCE_BROWSER = NO
-
-# Setting the INLINE_SOURCES tag to YES will include the body
-# of functions and classes directly in the documentation.
-
-INLINE_SOURCES = NO
-
-# Setting the STRIP_CODE_COMMENTS tag to YES (the default) will instruct
-# doxygen to hide any special comment blocks from generated source code
-# fragments. Normal C and C++ comments will always remain visible.
-
-STRIP_CODE_COMMENTS = YES
-
-# If the REFERENCED_BY_RELATION tag is set to YES
-# then for each documented function all documented
-# functions referencing it will be listed.
-
-REFERENCED_BY_RELATION = NO
-
-# If the REFERENCES_RELATION tag is set to YES
-# then for each documented function all documented entities
-# called/used by that function will be listed.
-
-REFERENCES_RELATION = NO
-
-# If the REFERENCES_LINK_SOURCE tag is set to YES (the default)
-# and SOURCE_BROWSER tag is set to YES, then the hyperlinks from
-# functions in REFERENCES_RELATION and REFERENCED_BY_RELATION lists will
-# link to the source code.
-# Otherwise they will link to the documentation.
-
-REFERENCES_LINK_SOURCE = YES
-
-# If the USE_HTAGS tag is set to YES then the references to source code
-# will point to the HTML generated by the htags(1) tool instead of doxygen
-# built-in source browser. The htags tool is part of GNU's global source
-# tagging system (see http://www.gnu.org/software/global/global.html). You
-# will need version 4.8.6 or higher.
-
-USE_HTAGS = NO
-
-# If the VERBATIM_HEADERS tag is set to YES (the default) then Doxygen
-# will generate a verbatim copy of the header file for each class for
-# which an include is specified. Set to NO to disable this.
-
-VERBATIM_HEADERS = YES
-
-#---------------------------------------------------------------------------
-# configuration options related to the alphabetical class index
-#---------------------------------------------------------------------------
-
-# If the ALPHABETICAL_INDEX tag is set to YES, an alphabetical index
-# of all compounds will be generated. Enable this if the project
-# contains a lot of classes, structs, unions or interfaces.
-
-ALPHABETICAL_INDEX = YES
-
-# If the alphabetical index is enabled (see ALPHABETICAL_INDEX) then
-# the COLS_IN_ALPHA_INDEX tag can be used to specify the number of columns
-# in which this list will be split (can be a number in the range [1..20])
-
-COLS_IN_ALPHA_INDEX = 3
-
-# In case all classes in a project start with a common prefix, all
-# classes will be put under the same header in the alphabetical index.
-# The IGNORE_PREFIX tag can be used to specify one or more prefixes that
-# should be ignored while generating the index headers.
-
-IGNORE_PREFIX =
-
-#---------------------------------------------------------------------------
-# configuration options related to the HTML output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_HTML tag is set to YES (the default) Doxygen will
-# generate HTML output.
-
-GENERATE_HTML = YES
-
-# The HTML_OUTPUT tag is used to specify where the HTML docs will be put.
-# If a relative path is entered the value of OUTPUT_DIRECTORY will be
-# put in front of it. If left blank `html' will be used as the default path.
-
-HTML_OUTPUT = html
-
-# The HTML_FILE_EXTENSION tag can be used to specify the file extension for
-# each generated HTML page (for example: .htm,.php,.asp). If it is left blank
-# doxygen will generate files with .html extension.
-
-HTML_FILE_EXTENSION = .html
-
-# The HTML_HEADER tag can be used to specify a personal HTML header for
-# each generated HTML page. If it is left blank doxygen will generate a
-# standard header.
-
-HTML_HEADER =
-
-# The HTML_FOOTER tag can be used to specify a personal HTML footer for
-# each generated HTML page. If it is left blank doxygen will generate a
-# standard footer.
-
-HTML_FOOTER =
-
-# The HTML_STYLESHEET tag can be used to specify a user-defined cascading
-# style sheet that is used by each HTML page. It can be used to
-# fine-tune the look of the HTML output. If the tag is left blank doxygen
-# will generate a default style sheet. Note that doxygen will try to copy
-# the style sheet file to the HTML output directory, so don't put your own
-# stylesheet in the HTML output directory as well, or it will be erased!
-
-HTML_STYLESHEET =
-
-# If the HTML_ALIGN_MEMBERS tag is set to YES, the members of classes,
-# files or namespaces will be aligned in HTML using tables. If set to
-# NO a bullet list will be used.
-
-HTML_ALIGN_MEMBERS = YES
-
-# If the HTML_DYNAMIC_SECTIONS tag is set to YES then the generated HTML
-# documentation will contain sections that can be hidden and shown after the
-# page has loaded. For this to work a browser that supports
-# JavaScript and DHTML is required (for instance Mozilla 1.0+, Firefox
-# Netscape 6.0+, Internet explorer 5.0+, Konqueror, or Safari).
-
-HTML_DYNAMIC_SECTIONS = NO
-
-# If the GENERATE_DOCSET tag is set to YES, additional index files
-# will be generated that can be used as input for Apple's Xcode 3
-# integrated development environment, introduced with OSX 10.5 (Leopard).
-# To create a documentation set, doxygen will generate a Makefile in the
-# HTML output directory. Running make will produce the docset in that
-# directory and running "make install" will install the docset in
-# ~/Library/Developer/Shared/Documentation/DocSets so that Xcode will find
-# it at startup.
-# See http://developer.apple.com/tools/creatingdocsetswithdoxygen.html for more information.
-
-GENERATE_DOCSET = NO
-
-# When GENERATE_DOCSET tag is set to YES, this tag determines the name of the
-# feed. A documentation feed provides an umbrella under which multiple
-# documentation sets from a single provider (such as a company or product suite)
-# can be grouped.
-
-DOCSET_FEEDNAME = "Doxygen generated docs"
-
-# When GENERATE_DOCSET tag is set to YES, this tag specifies a string that
-# should uniquely identify the documentation set bundle. This should be a
-# reverse domain-name style string, e.g. com.mycompany.MyDocSet. Doxygen
-# will append .docset to the name.
-
-DOCSET_BUNDLE_ID = org.doxygen.Project
-
-# If the GENERATE_HTMLHELP tag is set to YES, additional index files
-# will be generated that can be used as input for tools like the
-# Microsoft HTML help workshop to generate a compiled HTML help file (.chm)
-# of the generated HTML documentation.
-
-GENERATE_HTMLHELP = NO
-
-# If the GENERATE_HTMLHELP tag is set to YES, the CHM_FILE tag can
-# be used to specify the file name of the resulting .chm file. You
-# can add a path in front of the file if the result should not be
-# written to the html output directory.
-
-CHM_FILE =
-
-# If the GENERATE_HTMLHELP tag is set to YES, the HHC_LOCATION tag can
-# be used to specify the location (absolute path including file name) of
-# the HTML help compiler (hhc.exe). If non-empty doxygen will try to run
-# the HTML help compiler on the generated index.hhp.
-
-HHC_LOCATION =
-
-# If the GENERATE_HTMLHELP tag is set to YES, the GENERATE_CHI flag
-# controls if a separate .chi index file is generated (YES) or that
-# it should be included in the master .chm file (NO).
-
-GENERATE_CHI = NO
-
-# If the GENERATE_HTMLHELP tag is set to YES, the CHM_INDEX_ENCODING
-# is used to encode HtmlHelp index (hhk), content (hhc) and project file
-# content.
-
-CHM_INDEX_ENCODING =
-
-# If the GENERATE_HTMLHELP tag is set to YES, the BINARY_TOC flag
-# controls whether a binary table of contents is generated (YES) or a
-# normal table of contents (NO) in the .chm file.
-
-BINARY_TOC = NO
-
-# The TOC_EXPAND flag can be set to YES to add extra items for group members
-# to the contents of the HTML help documentation and to the tree view.
-
-TOC_EXPAND = NO
-
-# If the GENERATE_QHP tag is set to YES and both QHP_NAMESPACE and QHP_VIRTUAL_FOLDER
-# are set, an additional index file will be generated that can be used as input for
-# Qt's qhelpgenerator to generate a Qt Compressed Help (.qch) of the generated
-# HTML documentation.
-
-GENERATE_QHP = NO
-
-# If the QHG_LOCATION tag is specified, the QCH_FILE tag can
-# be used to specify the file name of the resulting .qch file.
-# The path specified is relative to the HTML output folder.
-
-QCH_FILE =
-
-# The QHP_NAMESPACE tag specifies the namespace to use when generating
-# Qt Help Project output. For more information please see
-# http://doc.trolltech.com/qthelpproject.html#namespace
-
-QHP_NAMESPACE =
-
-# The QHP_VIRTUAL_FOLDER tag specifies the namespace to use when generating
-# Qt Help Project output. For more information please see
-# http://doc.trolltech.com/qthelpproject.html#virtual-folders
-
-QHP_VIRTUAL_FOLDER = doc
-
-# If QHP_CUST_FILTER_NAME is set, it specifies the name of a custom filter to add.
-# For more information please see
-# http://doc.trolltech.com/qthelpproject.html#custom-filters
-
-QHP_CUST_FILTER_NAME =
-
-# The QHP_CUST_FILT_ATTRS tag specifies the list of the attributes of the custom filter to add.For more information please see
-# <a href="http://doc.trolltech.com/qthelpproject.html#custom-filters">Qt Help Project / Custom Filters</a>.
-
-QHP_CUST_FILTER_ATTRS =
-
-# The QHP_SECT_FILTER_ATTRS tag specifies the list of the attributes this project's
-# filter section matches.
-# <a href="http://doc.trolltech.com/qthelpproject.html#filter-attributes">Qt Help Project / Filter Attributes</a>.
-
-QHP_SECT_FILTER_ATTRS =
-
-# If the GENERATE_QHP tag is set to YES, the QHG_LOCATION tag can
-# be used to specify the location of Qt's qhelpgenerator.
-# If non-empty doxygen will try to run qhelpgenerator on the generated
-# .qhp file.
-
-QHG_LOCATION =
-
-# The DISABLE_INDEX tag can be used to turn on/off the condensed index at
-# top of each HTML page. The value NO (the default) enables the index and
-# the value YES disables it.
-
-DISABLE_INDEX = NO
-
-# This tag can be used to set the number of enum values (range [1..20])
-# that doxygen will group on one line in the generated HTML documentation.
-
-ENUM_VALUES_PER_LINE = 4
-
-# The GENERATE_TREEVIEW tag is used to specify whether a tree-like index
-# structure should be generated to display hierarchical information.
-# If the tag value is set to YES, a side panel will be generated
-# containing a tree-like index structure (just like the one that
-# is generated for HTML Help). For this to work a browser that supports
-# JavaScript, DHTML, CSS and frames is required (i.e. any modern browser).
-# Windows users are probably better off using the HTML help feature.
-
-GENERATE_TREEVIEW = NO
-
-# By enabling USE_INLINE_TREES, doxygen will generate the Groups, Directories,
-# and Class Hierarchy pages using a tree view instead of an ordered list.
-
-USE_INLINE_TREES = NO
-
-# If the treeview is enabled (see GENERATE_TREEVIEW) then this tag can be
-# used to set the initial width (in pixels) of the frame in which the tree
-# is shown.
-
-TREEVIEW_WIDTH = 250
-
-# Use this tag to change the font size of Latex formulas included
-# as images in the HTML documentation. The default is 10. Note that
-# when you change the font size after a successful doxygen run you need
-# to manually remove any form_*.png images from the HTML output directory
-# to force them to be regenerated.
-
-FORMULA_FONTSIZE = 10
-
-# When the SEARCHENGINE tag is enable doxygen will generate a search box for the HTML output. The underlying search engine uses javascript
-# and DHTML and should work on any modern browser. Note that when using HTML help (GENERATE_HTMLHELP) or Qt help (GENERATE_QHP)
-# there is already a search function so this one should typically
-# be disabled.
-
-SEARCHENGINE = YES
-
-#---------------------------------------------------------------------------
-# configuration options related to the LaTeX output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_LATEX tag is set to YES (the default) Doxygen will
-# generate Latex output.
-
-GENERATE_LATEX = YES
-
-# The LATEX_OUTPUT tag is used to specify where the LaTeX docs will be put.
-# If a relative path is entered the value of OUTPUT_DIRECTORY will be
-# put in front of it. If left blank `latex' will be used as the default path.
-
-LATEX_OUTPUT = latex
-
-# The LATEX_CMD_NAME tag can be used to specify the LaTeX command name to be
-# invoked. If left blank `latex' will be used as the default command name.
-
-LATEX_CMD_NAME = latex
-
-# The MAKEINDEX_CMD_NAME tag can be used to specify the command name to
-# generate index for LaTeX. If left blank `makeindex' will be used as the
-# default command name.
-
-MAKEINDEX_CMD_NAME = makeindex
-
-# If the COMPACT_LATEX tag is set to YES Doxygen generates more compact
-# LaTeX documents. This may be useful for small projects and may help to
-# save some trees in general.
-
-COMPACT_LATEX = NO
-
-# The PAPER_TYPE tag can be used to set the paper type that is used
-# by the printer. Possible values are: a4, a4wide, letter, legal and
-# executive. If left blank a4wide will be used.
-
-PAPER_TYPE = a4wide
-
-# The EXTRA_PACKAGES tag can be to specify one or more names of LaTeX
-# packages that should be included in the LaTeX output.
-
-EXTRA_PACKAGES =
-
-# The LATEX_HEADER tag can be used to specify a personal LaTeX header for
-# the generated latex document. The header should contain everything until
-# the first chapter. If it is left blank doxygen will generate a
-# standard header. Notice: only use this tag if you know what you are doing!
-
-LATEX_HEADER =
-
-# If the PDF_HYPERLINKS tag is set to YES, the LaTeX that is generated
-# is prepared for conversion to pdf (using ps2pdf). The pdf file will
-# contain links (just like the HTML output) instead of page references
-# This makes the output suitable for online browsing using a pdf viewer.
-
-PDF_HYPERLINKS = YES
-
-# If the USE_PDFLATEX tag is set to YES, pdflatex will be used instead of
-# plain latex in the generated Makefile. Set this option to YES to get a
-# higher quality PDF documentation.
-
-USE_PDFLATEX = YES
-
-# If the LATEX_BATCHMODE tag is set to YES, doxygen will add the \\batchmode.
-# command to the generated LaTeX files. This will instruct LaTeX to keep
-# running if errors occur, instead of asking the user for help.
-# This option is also used when generating formulas in HTML.
-
-LATEX_BATCHMODE = NO
-
-# If LATEX_HIDE_INDICES is set to YES then doxygen will not
-# include the index chapters (such as File Index, Compound Index, etc.)
-# in the output.
-
-LATEX_HIDE_INDICES = NO
-
-# If LATEX_SOURCE_CODE is set to YES then doxygen will include source code with syntax highlighting in the LaTeX output. Note that which sources are shown also depends on other settings such as SOURCE_BROWSER.
-
-LATEX_SOURCE_CODE = NO
-
-#---------------------------------------------------------------------------
-# configuration options related to the RTF output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_RTF tag is set to YES Doxygen will generate RTF output
-# The RTF output is optimized for Word 97 and may not look very pretty with
-# other RTF readers or editors.
-
-GENERATE_RTF = NO
-
-# The RTF_OUTPUT tag is used to specify where the RTF docs will be put.
-# If a relative path is entered the value of OUTPUT_DIRECTORY will be
-# put in front of it. If left blank `rtf' will be used as the default path.
-
-RTF_OUTPUT = rtf
-
-# If the COMPACT_RTF tag is set to YES Doxygen generates more compact
-# RTF documents. This may be useful for small projects and may help to
-# save some trees in general.
-
-COMPACT_RTF = NO
-
-# If the RTF_HYPERLINKS tag is set to YES, the RTF that is generated
-# will contain hyperlink fields. The RTF file will
-# contain links (just like the HTML output) instead of page references.
-# This makes the output suitable for online browsing using WORD or other
-# programs which support those fields.
-# Note: wordpad (write) and others do not support links.
-
-RTF_HYPERLINKS = NO
-
-# Load stylesheet definitions from file. Syntax is similar to doxygen's
-# config file, i.e. a series of assignments. You only have to provide
-# replacements, missing definitions are set to their default value.
-
-RTF_STYLESHEET_FILE =
-
-# Set optional variables used in the generation of an rtf document.
-# Syntax is similar to doxygen's config file.
-
-RTF_EXTENSIONS_FILE =
-
-#---------------------------------------------------------------------------
-# configuration options related to the man page output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_MAN tag is set to YES (the default) Doxygen will
-# generate man pages
-
-GENERATE_MAN = NO
-
-# The MAN_OUTPUT tag is used to specify where the man pages will be put.
-# If a relative path is entered the value of OUTPUT_DIRECTORY will be
-# put in front of it. If left blank `man' will be used as the default path.
-
-MAN_OUTPUT = man
-
-# The MAN_EXTENSION tag determines the extension that is added to
-# the generated man pages (default is the subroutine's section .3)
-
-MAN_EXTENSION = .3
-
-# If the MAN_LINKS tag is set to YES and Doxygen generates man output,
-# then it will generate one additional man file for each entity
-# documented in the real man page(s). These additional files
-# only source the real man page, but without them the man command
-# would be unable to find the correct page. The default is NO.
-
-MAN_LINKS = NO
-
-#---------------------------------------------------------------------------
-# configuration options related to the XML output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_XML tag is set to YES Doxygen will
-# generate an XML file that captures the structure of
-# the code including all documentation.
-
-GENERATE_XML = NO
-
-# The XML_OUTPUT tag is used to specify where the XML pages will be put.
-# If a relative path is entered the value of OUTPUT_DIRECTORY will be
-# put in front of it. If left blank `xml' will be used as the default path.
-
-XML_OUTPUT = xml
-
-# The XML_SCHEMA tag can be used to specify an XML schema,
-# which can be used by a validating XML parser to check the
-# syntax of the XML files.
-
-XML_SCHEMA =
-
-# The XML_DTD tag can be used to specify an XML DTD,
-# which can be used by a validating XML parser to check the
-# syntax of the XML files.
-
-XML_DTD =
-
-# If the XML_PROGRAMLISTING tag is set to YES Doxygen will
-# dump the program listings (including syntax highlighting
-# and cross-referencing information) to the XML output. Note that
-# enabling this will significantly increase the size of the XML output.
-
-XML_PROGRAMLISTING = YES
-
-#---------------------------------------------------------------------------
-# configuration options for the AutoGen Definitions output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_AUTOGEN_DEF tag is set to YES Doxygen will
-# generate an AutoGen Definitions (see autogen.sf.net) file
-# that captures the structure of the code including all
-# documentation. Note that this feature is still experimental
-# and incomplete at the moment.
-
-GENERATE_AUTOGEN_DEF = NO
-
-#---------------------------------------------------------------------------
-# configuration options related to the Perl module output
-#---------------------------------------------------------------------------
-
-# If the GENERATE_PERLMOD tag is set to YES Doxygen will
-# generate a Perl module file that captures the structure of
-# the code including all documentation. Note that this
-# feature is still experimental and incomplete at the
-# moment.
-
-GENERATE_PERLMOD = NO
-
-# If the PERLMOD_LATEX tag is set to YES Doxygen will generate
-# the necessary Makefile rules, Perl scripts and LaTeX code to be able
-# to generate PDF and DVI output from the Perl module output.
-
-PERLMOD_LATEX = NO
-
-# If the PERLMOD_PRETTY tag is set to YES the Perl module output will be
-# nicely formatted so it can be parsed by a human reader.
-# This is useful
-# if you want to understand what is going on.
-# On the other hand, if this
-# tag is set to NO the size of the Perl module output will be much smaller
-# and Perl will parse it just the same.
-
-PERLMOD_PRETTY = YES
-
-# The names of the make variables in the generated doxyrules.make file
-# are prefixed with the string contained in PERLMOD_MAKEVAR_PREFIX.
-# This is useful so different doxyrules.make files included by the same
-# Makefile don't overwrite each other's variables.
-
-PERLMOD_MAKEVAR_PREFIX =
-
-#---------------------------------------------------------------------------
-# Configuration options related to the preprocessor
-#---------------------------------------------------------------------------
-
-# If the ENABLE_PREPROCESSING tag is set to YES (the default) Doxygen will
-# evaluate all C-preprocessor directives found in the sources and include
-# files.
-
-ENABLE_PREPROCESSING = YES
-
-# If the MACRO_EXPANSION tag is set to YES Doxygen will expand all macro
-# names in the source code. If set to NO (the default) only conditional
-# compilation will be performed. Macro expansion can be done in a controlled
-# way by setting EXPAND_ONLY_PREDEF to YES.
-
-MACRO_EXPANSION = NO
-
-# If the EXPAND_ONLY_PREDEF and MACRO_EXPANSION tags are both set to YES
-# then the macro expansion is limited to the macros specified with the
-# PREDEFINED and EXPAND_AS_DEFINED tags.
-
-EXPAND_ONLY_PREDEF = NO
-
-# If the SEARCH_INCLUDES tag is set to YES (the default) the includes files
-# in the INCLUDE_PATH (see below) will be search if a #include is found.
-
-SEARCH_INCLUDES = YES
-
-# The INCLUDE_PATH tag can be used to specify one or more directories that
-# contain include files that are not input files but should be processed by
-# the preprocessor.
-
-INCLUDE_PATH =
-
-# You can use the INCLUDE_FILE_PATTERNS tag to specify one or more wildcard
-# patterns (like *.h and *.hpp) to filter out the header-files in the
-# directories. If left blank, the patterns specified with FILE_PATTERNS will
-# be used.
-
-INCLUDE_FILE_PATTERNS =
-
-# The PREDEFINED tag can be used to specify one or more macro names that
-# are defined before the preprocessor is started (similar to the -D option of
-# gcc). The argument of the tag is a list of macros of the form: name
-# or name=definition (no spaces). If the definition and the = are
-# omitted =1 is assumed. To prevent a macro definition from being
-# undefined via #undef or recursively expanded use the := operator
-# instead of the = operator.
-
-PREDEFINED = IEEE8021X_EAPOL CONFIG_CTRL_IFACE CONFIG_P2P
-
-# If the MACRO_EXPANSION and EXPAND_ONLY_PREDEF tags are set to YES then
-# this tag can be used to specify a list of macro names that should be expanded.
-# The macro definition that is found in the sources will be used.
-# Use the PREDEFINED tag if you want to use a different macro definition.
-
-EXPAND_AS_DEFINED =
-
-# If the SKIP_FUNCTION_MACROS tag is set to YES (the default) then
-# doxygen's preprocessor will remove all function-like macros that are alone
-# on a line, have an all uppercase name, and do not end with a semicolon. Such
-# function macros are typically used for boiler-plate code, and will confuse
-# the parser if not removed.
-
-SKIP_FUNCTION_MACROS = YES
-
-#---------------------------------------------------------------------------
-# Configuration::additions related to external references
-#---------------------------------------------------------------------------
-
-# The TAGFILES option can be used to specify one or more tagfiles.
-# Optionally an initial location of the external documentation
-# can be added for each tagfile. The format of a tag file without
-# this location is as follows:
-#
-# TAGFILES = file1 file2 ...
-# Adding location for the tag files is done as follows:
-#
-# TAGFILES = file1=loc1 "file2 = loc2" ...
-# where "loc1" and "loc2" can be relative or absolute paths or
-# URLs. If a location is present for each tag, the installdox tool
-# does not have to be run to correct the links.
-# Note that each tag file must have a unique name
-# (where the name does NOT include the path)
-# If a tag file is not located in the directory in which doxygen
-# is run, you must also specify the path to the tagfile here.
-
-TAGFILES =
-
-# When a file name is specified after GENERATE_TAGFILE, doxygen will create
-# a tag file that is based on the input files it reads.
-
-GENERATE_TAGFILE =
-
-# If the ALLEXTERNALS tag is set to YES all external classes will be listed
-# in the class index. If set to NO only the inherited external classes
-# will be listed.
-
-ALLEXTERNALS = NO
-
-# If the EXTERNAL_GROUPS tag is set to YES all external groups will be listed
-# in the modules index. If set to NO, only the current project's groups will
-# be listed.
-
-EXTERNAL_GROUPS = YES
-
-# The PERL_PATH should be the absolute path and name of the perl script
-# interpreter (i.e. the result of `which perl').
-
-PERL_PATH = /usr/bin/perl
-
-#---------------------------------------------------------------------------
-# Configuration options related to the dot tool
-#---------------------------------------------------------------------------
-
-# If the CLASS_DIAGRAMS tag is set to YES (the default) Doxygen will
-# generate a inheritance diagram (in HTML, RTF and LaTeX) for classes with base
-# or super classes. Setting the tag to NO turns the diagrams off. Note that
-# this option is superseded by the HAVE_DOT option below. This is only a
-# fallback. It is recommended to install and use dot, since it yields more
-# powerful graphs.
-
-CLASS_DIAGRAMS = NO
-
-# You can define message sequence charts within doxygen comments using the \msc
-# command. Doxygen will then run the mscgen tool (see
-# http://www.mcternan.me.uk/mscgen/) to produce the chart and insert it in the
-# documentation. The MSCGEN_PATH tag allows you to specify the directory where
-# the mscgen tool resides. If left empty the tool is assumed to be found in the
-# default search path.
-
-MSCGEN_PATH =
-
-# If set to YES, the inheritance and collaboration graphs will hide
-# inheritance and usage relations if the target is undocumented
-# or is not a class.
-
-HIDE_UNDOC_RELATIONS = YES
-
-# If you set the HAVE_DOT tag to YES then doxygen will assume the dot tool is
-# available from the path. This tool is part of Graphviz, a graph visualization
-# toolkit from AT&T and Lucent Bell Labs. The other options in this section
-# have no effect if this option is set to NO (the default)
-
-HAVE_DOT = YES
-
-# By default doxygen will write a font called FreeSans.ttf to the output
-# directory and reference it in all dot files that doxygen generates. This
-# font does not include all possible unicode characters however, so when you need
-# these (or just want a differently looking font) you can specify the font name
-# using DOT_FONTNAME. You need need to make sure dot is able to find the font,
-# which can be done by putting it in a standard location or by setting the
-# DOTFONTPATH environment variable or by setting DOT_FONTPATH to the directory
-# containing the font.
-
-DOT_FONTNAME = FreeSans
-
-# The DOT_FONTSIZE tag can be used to set the size of the font of dot graphs.
-# The default size is 10pt.
-
-DOT_FONTSIZE = 10
-
-# By default doxygen will tell dot to use the output directory to look for the
-# FreeSans.ttf font (which doxygen will put there itself). If you specify a
-# different font using DOT_FONTNAME you can set the path where dot
-# can find it using this tag.
-
-DOT_FONTPATH =
-
-# If the CLASS_GRAPH and HAVE_DOT tags are set to YES then doxygen
-# will generate a graph for each documented class showing the direct and
-# indirect inheritance relations. Setting this tag to YES will force the
-# the CLASS_DIAGRAMS tag to NO.
-
-CLASS_GRAPH = NO
-
-# If the COLLABORATION_GRAPH and HAVE_DOT tags are set to YES then doxygen
-# will generate a graph for each documented class showing the direct and
-# indirect implementation dependencies (inheritance, containment, and
-# class references variables) of the class with other documented classes.
-
-COLLABORATION_GRAPH = NO
-
-# If the GROUP_GRAPHS and HAVE_DOT tags are set to YES then doxygen
-# will generate a graph for groups, showing the direct groups dependencies
-
-GROUP_GRAPHS = NO
-
-# If the UML_LOOK tag is set to YES doxygen will generate inheritance and
-# collaboration diagrams in a style similar to the OMG's Unified Modeling
-# Language.
-
-UML_LOOK = NO
-
-# If set to YES, the inheritance and collaboration graphs will show the
-# relations between templates and their instances.
-
-TEMPLATE_RELATIONS = NO
-
-# If the ENABLE_PREPROCESSING, SEARCH_INCLUDES, INCLUDE_GRAPH, and HAVE_DOT
-# tags are set to YES then doxygen will generate a graph for each documented
-# file showing the direct and indirect include dependencies of the file with
-# other documented files.
-
-INCLUDE_GRAPH = NO
-
-# If the ENABLE_PREPROCESSING, SEARCH_INCLUDES, INCLUDED_BY_GRAPH, and
-# HAVE_DOT tags are set to YES then doxygen will generate a graph for each
-# documented header file showing the documented files that directly or
-# indirectly include this file.
-
-INCLUDED_BY_GRAPH = NO
-
-# If the CALL_GRAPH and HAVE_DOT options are set to YES then
-# doxygen will generate a call dependency graph for every global function
-# or class method. Note that enabling this option will significantly increase
-# the time of a run. So in most cases it will be better to enable call graphs
-# for selected functions only using the \callgraph command.
-
-CALL_GRAPH = NO
-
-# If the CALLER_GRAPH and HAVE_DOT tags are set to YES then
-# doxygen will generate a caller dependency graph for every global function
-# or class method. Note that enabling this option will significantly increase
-# the time of a run. So in most cases it will be better to enable caller
-# graphs for selected functions only using the \callergraph command.
-
-CALLER_GRAPH = NO
-
-# If the GRAPHICAL_HIERARCHY and HAVE_DOT tags are set to YES then doxygen
-# will graphical hierarchy of all classes instead of a textual one.
-
-GRAPHICAL_HIERARCHY = NO
-
-# If the DIRECTORY_GRAPH, SHOW_DIRECTORIES and HAVE_DOT tags are set to YES
-# then doxygen will show the dependencies a directory has on other directories
-# in a graphical way. The dependency relations are determined by the #include
-# relations between the files in the directories.
-
-DIRECTORY_GRAPH = YES
-
-# The DOT_IMAGE_FORMAT tag can be used to set the image format of the images
-# generated by dot. Possible values are png, jpg, or gif
-# If left blank png will be used.
-
-DOT_IMAGE_FORMAT = png
-
-# The tag DOT_PATH can be used to specify the path where the dot tool can be
-# found. If left blank, it is assumed the dot tool can be found in the path.
-
-DOT_PATH =
-
-# The DOTFILE_DIRS tag can be used to specify one or more directories that
-# contain dot files that are included in the documentation (see the
-# \dotfile command).
-
-DOTFILE_DIRS =
-
-# The DOT_GRAPH_MAX_NODES tag can be used to set the maximum number of
-# nodes that will be shown in the graph. If the number of nodes in a graph
-# becomes larger than this value, doxygen will truncate the graph, which is
-# visualized by representing a node as a red box. Note that doxygen if the
-# number of direct children of the root node in a graph is already larger than
-# DOT_GRAPH_MAX_NODES then the graph will not be shown at all. Also note
-# that the size of a graph can be further restricted by MAX_DOT_GRAPH_DEPTH.
-
-DOT_GRAPH_MAX_NODES = 50
-
-# The MAX_DOT_GRAPH_DEPTH tag can be used to set the maximum depth of the
-# graphs generated by dot. A depth value of 3 means that only nodes reachable
-# from the root by following a path via at most 3 edges will be shown. Nodes
-# that lay further from the root node will be omitted. Note that setting this
-# option to 1 or 2 may greatly reduce the computation time needed for large
-# code bases. Also note that the size of a graph can be further restricted by
-# DOT_GRAPH_MAX_NODES. Using a depth of 0 means no depth restriction.
-
-MAX_DOT_GRAPH_DEPTH = 0
-
-# Set the DOT_TRANSPARENT tag to YES to generate images with a transparent
-# background. This is disabled by default, because dot on Windows does not
-# seem to support this out of the box. Warning: Depending on the platform used,
-# enabling this option may lead to badly anti-aliased labels on the edges of
-# a graph (i.e. they become hard to read).
-
-DOT_TRANSPARENT = NO
-
-# Set the DOT_MULTI_TARGETS tag to YES allow dot to generate multiple output
-# files in one run (i.e. multiple -o and -T options on the command line). This
-# makes dot run faster, but since only newer versions of dot (>1.8.10)
-# support this, this feature is disabled by default.
-
-DOT_MULTI_TARGETS = YES
-
-# If the GENERATE_LEGEND tag is set to YES (the default) Doxygen will
-# generate a legend page explaining the meaning of the various boxes and
-# arrows in the dot generated graphs.
-
-GENERATE_LEGEND = YES
-
-# If the DOT_CLEANUP tag is set to YES (the default) Doxygen will
-# remove the intermediate dot files that are used to generate
-# the various graphs.
-
-DOT_CLEANUP = YES
-
-
-#---------------------------------------------------------------------------
-# Project additions
-#---------------------------------------------------------------------------
-
-# Disable autolink support due to wpa_supplicant getting unfortunately
-# auto-linked to struct wpa_supplicant due to having an underscore in the name.
-AUTOLINK_SUPPORT = FALSE
diff --git a/doc/driver_wrapper.doxygen b/doc/driver_wrapper.doxygen
deleted file mode 100644
index 66211b3abdfb..000000000000
--- a/doc/driver_wrapper.doxygen
+++ /dev/null
@@ -1,180 +0,0 @@
-/**
-\page driver_wrapper Driver wrapper implementation (driver.h, drivers.c)
-
-All hardware and driver dependent functionality is in separate C files
-that implement defined wrapper functions. Other parts
-of the wpa_supplicant are designed to be hardware, driver, and operating
-system independent.
-
-Driver wrappers need to implement whatever calls are used in the
-target operating system/driver for controlling wireless LAN
-devices. As an example, in case of Linux, these are mostly some glue
-code and ioctl() calls and netlink message parsing for Linux Wireless
-Extensions (WE). Since features required for WPA were added only recently to
-Linux Wireless Extensions (in version 18), some driver specific code is used
-in number of driver interface implementations. These driver dependent parts
-can be replaced with generic code in \ref driver_wext.c once the target driver
-includes full support for WE-18. After that, all Linux drivers, at
-least in theory, could use the same driver wrapper code.
-
-A driver wrapper needs to implement some or all of the functions
-defined in \ref driver.h. These functions are registered by filling struct
-\ref wpa_driver_ops with function pointers. Hardware independent parts of
-wpa_supplicant will call these functions to control the driver/wlan
-card. In addition, support for driver events is required. The event
-callback function, \ref wpa_supplicant_event(), and its parameters are
-documented in \ref driver.h. In addition, a pointer to the 'struct
-\ref wpa_driver_ops' needs to be registered in \ref drivers.c file.
-
-When porting to other operating systems, the driver wrapper should be
-modified to use the native interface of the target OS. It is possible
-that some extra requirements for the interface between the driver
-wrapper and generic wpa_supplicant code are discovered during porting
-to a new operating system. These will be addressed on case by case
-basis by modifying the interface and updating the other driver
-wrappers for this. The goal is to avoid changing this interface
-without very good reasons in order to limit the number of changes
-needed to other wrappers and hardware independent parts of
-wpa_supplicant. When changes are required, recommended way is to
-make them in backwards compatible way that allows existing driver
-interface implementations to be compiled without any modification.
-
-Generic Linux Wireless Extensions functions are implemented in
-\ref driver_wext.c. All Linux driver wrappers can use these when the kernel
-driver supports the generic ioctl()s and wireless events. Driver
-specific functions are implemented in separate C files, e.g.,
-\ref driver_hostap.c. These files need to define struct \ref wpa_driver_ops
-entry that will be used in \ref wpa_supplicant.c when calling driver
-functions. struct \ref wpa_driver_ops entries are registered in \ref drivers.c.
-
-In general, it is likely to be useful to first take a look at couple
-of driver interface examples before starting on implementing a new
-one. \ref driver_hostap.c and \ref driver_wext.c include a complete
-implementation for Linux drivers that use wpa_supplicant-based control
-of WPA IE and roaming. \ref driver_ndis.c (with help from \ref driver_ndis_.c)
-is an example of a complete interface for Windows NDIS interface for
-drivers that generate WPA IE themselves and decide when to roam. These
-example implementations include full support for all security modes.
-
-
-\section driver_req Driver requirements for WPA
-
-WPA introduces new requirements for the device driver. At least some
-of these need to be implemented in order to provide enough support for
-wpa_supplicant.
-
-\subsection driver_tkip_ccmp TKIP/CCMP
-
-WPA requires that the pairwise cipher suite (encryption algorithm for
-unicast data packets) is TKIP or CCMP. These are new encryption
-protocols and thus, the driver will need to be modified to support
-them. Depending on the used wlan hardware, some parts of these may be
-implemented by the hardware/firmware.
-
-Specification for both TKIP and CCMP is available from IEEE (IEEE
-802.11i amendment). Fully functional, hardware independent
-implementation of both encryption protocols is also available in Host
-AP driver (driver/modules/hostap_{tkip,ccmp}.c). In addition, Linux 2.6
-kernel tree has generic implementations for WEP, TKIP, and CCMP that can
-be used in Linux drivers.
-
-The driver will also need to provide configuration mechanism to allow
-user space programs to configure TKIP and CCMP. Linux Wireless Extensions
-v18 added support for configuring these algorithms and
-individual/non-default keys. If the target kernel does not include WE-18,
-private ioctls can be used to provide similar functionality.
-
-\subsection driver_roaming Roaming control and scanning support
-
-wpa_supplicant can optionally control AP selection based on the
-information received from Beacon and/or Probe Response frames
-(ap_scan=1 mode in configuration). This means that the driver should
-support external control for scan process. In case of Linux, use of
-new Wireless Extensions scan support (i.e., 'iwlist wlan0 scan') is
-recommended. The current driver wrapper (\ref driver_wext.c) uses this for
-scan results.
-
-Scan results must also include the WPA information element. Support for
-this was added in WE-18. With older versions, a custom event can be used
-to provide the full WPA IE (including element id and length) as a hex
-string that is included in the scan results.
-
-wpa_supplicant needs to also be able to request the driver to
-associate with a specific BSS. Current Host AP driver and matching
-\ref driver_hostap.c wrapper uses following sequence for this
-request. Similar/identical mechanism should be usable also with other
-drivers.
-
-- set WPA IE for AssocReq with private ioctl
-- set SSID with SIOCSIWESSID
-- set channel/frequency with SIOCSIWFREQ
-- set BSSID with SIOCSIWAP
- (this last ioctl will trigger the driver to request association)
-
-\subsection driver_wpa_ie WPA IE generation
-
-wpa_supplicant selects which cipher suites and key management suites
-are used. Based on this information, it generates a WPA IE. This is
-provided to the driver interface in the associate call. This does not
-match with Windows NDIS drivers which generate the WPA IE
-themselves.
-
-wpa_supplicant allows Windows NDIS-like behavior by providing the
-selected cipher and key management suites in the associate call. If
-the driver generates its own WPA IE and that differs from the one
-generated by wpa_supplicant, the driver has to inform wpa_supplicant
-about the used WPA IE (i.e., the one it used in (Re)Associate
-Request). This notification is done using EVENT_ASSOCINFO event (see
-\ref driver.h). wpa_supplicant is normally configured to use
-ap_scan=2 mode with drivers that control WPA IE generation and roaming.
-
-\subsection driver_events Driver events
-
-wpa_supplicant needs to receive event callbacks when certain events
-occur (association, disassociation, Michael MIC failure, scan results
-available, PMKSA caching candidate). These events and the callback
-details are defined in \ref driver.h (\ref wpa_supplicant_event() function
-and enum \ref wpa_event_type).
-
-On Linux, association and disassociation can use existing Wireless
-Extensions event that is reporting new AP with SIOCGIWAP
-event. Similarly, completion of a scan can be reported with SIOCGIWSCAN
-event.
-
-Michael MIC failure event was added in WE-18. Older versions of Wireless
-Extensions will need to use a custom event. Host AP driver used a custom
-event with following contents: MLME-MICHAELMICFAILURE.indication(keyid=#
-broadcast/unicast addr=addr2). This is the recommended format until
-the driver can be moved to use WE-18 mechanism.
-
-\subsection driver_wext_summary Summary of Linux Wireless Extensions use
-
-AP selection depends on ap_scan configuration:
-
-ap_scan=1:
-
-- wpa_supplicant requests scan with SIOCSIWSCAN
-- driver reports scan complete with wireless event SIOCGIWSCAN
-- wpa_supplicant reads scan results with SIOCGIWSCAN (multiple call if
- a larger buffer is needed)
-- wpa_supplicant decides which AP to use based on scan results
-- wpa_supplicant configures driver to associate with the selected BSS
- (SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWFREQ,
- SIOCSIWESSID, SIOCSIWAP)
-
-ap_scan=2:
-
-- wpa_supplicant configures driver to associate with an SSID
- (SIOCSIWMODE, SIOCSIWGENIE, SIOCSIWAUTH, SIOCSIWESSID)
-
-
-After this, both modes use similar steps:
-
-- optionally (or required for drivers that generate WPA/RSN IE for
- (Re)AssocReq), driver reports association parameters (AssocReq IEs)
- with wireless event IWEVASSOCREQIE (and optionally IWEVASSOCRESPIE)
-- driver reports association with wireless event SIOCGIWAP
-- wpa_supplicant takes care of EAPOL frame handling (validating
- information from associnfo and if needed, from scan results if WPA/RSN
- IE from the Beacon frame is not reported through associnfo)
-*/
diff --git a/doc/eap.doxygen b/doc/eap.doxygen
deleted file mode 100644
index 472e882004d3..000000000000
--- a/doc/eap.doxygen
+++ /dev/null
@@ -1,87 +0,0 @@
-/**
-\page eap_peer_module EAP peer implementation
-
-Extensible Authentication Protocol (EAP) is an authentication framework
-defined in RFC 3748. wpa_supplicant uses a separate code module for EAP
-peer implementation. This module was designed to use only a minimal set
-of direct function calls (mainly, to debug/event functions) in order for
-it to be usable in other programs. The design of the EAP
-implementation is based loosely on RFC 4137. The state machine is
-defined in this RFC and so is the interface between the peer state
-machine and methods. As such, this RFC provides useful information for
-understanding the EAP peer implementation in wpa_supplicant.
-
-Some of the terminology used in EAP state machine is referring to
-EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
-layer being IEEE 802.1X if EAP module is built for other programs than
-wpa_supplicant. These terms should be understood to refer to the
-lower layer as defined in RFC 4137.
-
-
-\section adding_eap_methods Adding EAP methods
-
-Each EAP method is implemented as a separate module, usually as one C
-file named eap_<name of the method>.c, e.g., \ref eap_md5.c. All EAP
-methods use the same interface between the peer state machine and
-method specific functions. This allows new EAP methods to be added
-without modifying the core EAP state machine implementation.
-
-New EAP methods need to be registered by adding them into the build
-(Makefile) and the EAP method registration list in the
-\ref eap_peer_register_methods() function of \ref eap_methods.c. Each EAP
-method should use a build-time configuration option, e.g., EAP_TLS, in
-order to make it possible to select which of the methods are included
-in the build.
-
-EAP methods must implement the interface defined in \ref eap_i.h. struct
-\ref eap_method defines the needed function pointers that each EAP method
-must provide. In addition, the EAP type and name are registered using
-this structure. This interface is based on section 4.4 of RFC 4137.
-
-It is recommended that the EAP methods would use generic helper
-functions, \ref eap_msg_alloc() and \ref eap_hdr_validate() when processing
-messages. This allows code sharing and can avoid missing some of the
-needed validation steps for received packets. In addition, these
-functions make it easier to change between expanded and legacy EAP
-header, if needed.
-
-When adding an EAP method that uses a vendor specific EAP type
-(Expanded Type as defined in RFC 3748, Chapter 5.7), the new method
-must be registered by passing vendor id instead of EAP_VENDOR_IETF to
-\ref eap_peer_method_alloc(). These methods must not try to emulate
-expanded types by registering a legacy EAP method for type 254. See
-\ref eap_vendor_test.c for an example of an EAP method implementation that
-is implemented as an expanded type.
-
-
-\section used_eap_library Using EAP implementation as a library
-
-The Git repository has an eap_example directory that contains an
-example showing how EAP peer and server code from wpa_supplicant and
-hostapd can be used as a library. The example program initializes both
-an EAP server and an EAP peer entities and then runs through an
-EAP-PEAP/MSCHAPv2 authentication.
-
-\ref eap_example_peer.c shows the initialization and glue code needed to
-control the EAP peer implementation. \ref eap_example_server.c does the
-same for EAP server. \ref eap_example.c is an example that ties in both the
-EAP server and client parts to allow an EAP authentication to be
-shown.
-
-In this example, the EAP messages are passed between the server and
-the peer are passed by direct function calls within the same process.
-In practice, server and peer functionalities would likely reside in
-separate devices and the EAP messages would be transmitted between the
-devices based on an external protocol. For example, in IEEE 802.11
-uses IEEE 802.1X EAPOL state machines to control the transmission of
-EAP messages and WiMax supports optional PMK EAP authentication
-mechanism that transmits EAP messages as defined in IEEE 802.16e.
-
-The EAP library links in number of helper functions from \ref src/utils and
-\ref src/crypto directories. Most of these are suitable as-is, but it may
-be desirable to replace the debug output code in \ref src/utils/wpa_debug.c
-by dropping this file from the library and re-implementing the
-functions there in a way that better fits in with the main
-application.
-
-*/
diff --git a/doc/eap_server.doxygen b/doc/eap_server.doxygen
deleted file mode 100644
index f60ac79b1e01..000000000000
--- a/doc/eap_server.doxygen
+++ /dev/null
@@ -1,56 +0,0 @@
-/**
-\page eap_server_module EAP server implementation
-
-Extensible Authentication Protocol (EAP) is an authentication framework
-defined in RFC 3748. hostapd uses a separate code module for EAP server
-implementation. This module was designed to use only a minimal set of
-direct function calls (mainly, to debug/event functions) in order for
-it to be usable in other programs. The design of the EAP
-implementation is based loosely on RFC 4137. The state machine is
-defined in this RFC and so is the interface between the server state
-machine and methods. As such, this RFC provides useful information for
-understanding the EAP server implementation in hostapd.
-
-Some of the terminology used in EAP state machine is referring to
-EAPOL (IEEE 802.1X), but there is no strict requirement on the lower
-layer being IEEE 802.1X if EAP module is built for other programs than
-wpa_supplicant. These terms should be understood to refer to the
-lower layer as defined in RFC 4137.
-
-
-\section adding_eap_methods Adding EAP methods
-
-Each EAP method is implemented as a separate module, usually as one C
-file named eap_server_<name of the method>.c, e.g., \ref eap_server_md5.c. All EAP
-methods use the same interface between the server state machine and
-method specific functions. This allows new EAP methods to be added
-without modifying the core EAP state machine implementation.
-
-New EAP methods need to be registered by adding them into the build
-(Makefile) and the EAP method registration list in the
-\ref eap_server_register_methods() function of \ref eap_server_methods.c. Each EAP
-method should use a build-time configuration option, e.g., EAP_TLS, in
-order to make it possible to select which of the methods are included
-in the build.
-
-EAP methods must implement the interface defined in \ref eap_i.h. struct
-\ref eap_method defines the needed function pointers that each EAP method
-must provide. In addition, the EAP type and name are registered using
-this structure. This interface is based on section 4.4 of RFC 4137.
-
-It is recommended that the EAP methods would use generic helper
-functions, \ref eap_msg_alloc() and \ref eap_hdr_validate() when processing
-messages. This allows code sharing and can avoid missing some of the
-needed validation steps for received packets. In addition, these
-functions make it easier to change between expanded and legacy EAP
-header, if needed.
-
-When adding an EAP method that uses a vendor specific EAP type
-(Expanded Type as defined in RFC 3748, Chapter 5.7), the new method
-must be registered by passing vendor id instead of EAP_VENDOR_IETF to
-\ref eap_server_method_alloc(). These methods must not try to emulate
-expanded types by registering a legacy EAP method for type 254. See
-\ref eap_server_vendor_test.c for an example of an EAP method implementation that
-is implemented as an expanded type.
-
-*/
diff --git a/doc/hostapd.fig b/doc/hostapd.fig
deleted file mode 100644
index ea4ab3a2894e..000000000000
--- a/doc/hostapd.fig
+++ /dev/null
@@ -1,264 +0,0 @@
-#FIG 3.2
-Landscape
-Center
-Inches
-Letter
-100.00
-Single
--2
-1200 2
-6 1875 4050 2925 4350
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1875 4050 2925 4050 2925 4350 1875 4350 1875 4050
-4 0 0 50 -1 0 12 0.0000 4 180 735 2025 4275 l2_packet\001
--6
-6 4725 1200 5925 1500
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4725 1200 5925 1200 5925 1500 4725 1500 4725 1200
-4 0 0 50 -1 0 12 0.0000 4 135 1005 4800 1425 GUI frontend\001
--6
-6 6000 2700 7200 3225
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 2700 7200 2700 7200 3225 6000 3225 6000 2700
-4 0 0 50 -1 0 12 0.0000 4 135 975 6075 2925 WPA/WPA2\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 3150 state machine\001
--6
-6 6000 4950 7200 5475
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 4950 7200 4950 7200 5475 6000 5475 6000 4950
-4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 5400 state machine\001
--6
-6 4350 3900 5025 4425
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4350 3900 5025 3900 5025 4425 4350 4425 4350 3900
-4 0 0 50 -1 0 12 0.0000 4 105 420 4500 4125 event\001
-4 0 0 50 -1 0 12 0.0000 4 180 315 4500 4350 loop\001
--6
-6 4275 2550 5100 2850
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4275 2550 5100 2550 5100 2850 4275 2850 4275 2550
-4 0 0 50 -1 0 12 0.0000 4 135 450 4425 2775 ctrl i/f\001
--6
-6 6000 3900 7200 4425
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 3900 7200 3900 7200 4425 6000 4425 6000 3900
-4 0 0 50 -1 0 12 0.0000 4 135 600 6075 4125 EAPOL\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 4350 state machine\001
--6
-6 2775 3150 4050 3450
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 2775 3150 4050 3150 4050 3450 2775 3450 2775 3150
-4 0 0 50 -1 0 12 0.0000 4 180 990 2925 3375 configuration\001
--6
-6 3450 1200 4575 1500
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3450 1200 4575 1200 4575 1500 3450 1500 3450 1200
-4 0 0 50 -1 0 12 0.0000 4 180 870 3600 1425 hostapd_cli\001
--6
-6 3525 7800 5775 8100
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3525 7800 5775 7800 5775 8100 3525 8100 3525 7800
-4 0 0 50 -1 0 12 0.0000 4 135 2145 3600 8025 kernel network device driver\001
--6
-6 4275 6000 5100 6300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4275 6000 5100 6000 5100 6300 4275 6300 4275 6000
-4 0 0 50 -1 0 12 0.0000 4 135 630 4350 6225 driver i/f\001
--6
-6 8175 4725 9225 5025
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 4725 9225 4725 9225 5025 8175 5025 8175 4725
-4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
--6
-6 9300 4725 10350 5025
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 4725 10350 4725 10350 5025 9300 5025 9300 4725
-4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
--6
-6 8175 5100 9225 5400
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5100 9225 5100 9225 5400 8175 5400 8175 5100
-4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
--6
-6 9300 5100 10350 5400
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5100 10350 5100 10350 5400 9300 5400 9300 5100
-4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
--6
-6 8175 5475 9225 5775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5475 9225 5475 9225 5775 8175 5775 8175 5475
-4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
--6
-6 8175 5850 9225 6150
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5850 9225 5850 9225 6150 8175 6150 8175 5850
-4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
--6
-6 8175 6225 9225 6525
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 6225 9225 6225 9225 6525 8175 6525 8175 6225
-4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
--6
-6 9300 5850 10350 6150
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5850 10350 5850 10350 6150 9300 6150 9300 5850
-4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
--6
-6 9300 5475 10350 5775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5475 10350 5475 10350 5775 9300 5775 9300 5475
-4 0 0 50 -1 0 12 0.0000 4 135 795 9375 5700 EAP-PAX\001
--6
-6 8175 6600 9675 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 6600 9675 6600 9675 6900 8175 6900 8175 6600
-4 0 0 50 -1 0 12 0.0000 4 135 1365 8250 6825 EAP-MSCHAPv2\001
--6
-6 8700 3450 9375 3750
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8700 3450 9375 3450 9375 3750 8700 3750 8700 3450
-4 0 0 50 -1 0 12 0.0000 4 150 480 8775 3675 crypto\001
--6
-6 9600 3450 10275 3750
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9600 3450 10275 3450 10275 3750 9600 3750 9600 3450
-4 0 0 50 -1 0 12 0.0000 4 135 315 9750 3675 TLS\001
--6
-6 6000 5775 7200 6300
-6 6000 5775 7200 6300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 5775 7200 5775 7200 6300 6000 6300 6000 5775
-4 0 0 50 -1 0 12 0.0000 4 135 690 6075 6000 RADIUS\001
--6
-4 0 0 50 -1 0 12 0.0000 4 90 480 6075 6225 server\001
--6
-6 8100 2250 8925 2775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8100 2250 8925 2250 8925 2775 8100 2775 8100 2250
-4 0 0 50 -1 0 12 0.0000 4 135 690 8175 2475 RADIUS\001
-4 0 0 50 -1 0 12 0.0000 4 135 420 8175 2700 client\001
--6
-6 3150 5475 4425 5775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3150 5475 4425 5475 4425 5775 3150 5775 3150 5475
-4 0 0 50 -1 0 12 0.0000 4 135 990 3300 5700 driver events\001
--6
-6 1950 5550 2625 6075
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1950 5550 2625 5550 2625 6075 1950 6075 1950 5550
-4 0 0 50 -1 0 12 0.0000 4 135 540 2025 5775 Station\001
-4 0 0 50 -1 0 12 0.0000 4 135 375 2025 6000 table\001
--6
-6 1875 4725 2925 5250
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1875 4725 2925 4725 2925 5250 1875 5250 1875 4725
-4 0 0 50 -1 0 12 0.0000 4 135 960 1950 4950 IEEE 802.11\001
-4 0 0 50 -1 0 12 0.0000 4 135 555 1950 5175 MLME\001
--6
-2 1 1 1 0 7 50 -1 -1 3.000 0 0 -1 0 0 2
- 1275 4200 1875 4200
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 4500 2550 3900 1500
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 4800 2550 5400 1500
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 2925 4200 4350 4200
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5025 3900 6000 3000
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5025 4200 6000 4200
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 6000 4650 4425
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6600 4425 6600 4950
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6600 3225 6600 3900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 5250 8100 5250
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 9075 4425 9075 3750
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 3000 8700 3525
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 3900 4650 2850
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 4125 8700 3675
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6000 4350 5025 6000
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6000 3150 4875 6000
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1500 2100 10800 2100 10800 7500 1500 7500 1500 2100
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 9900 4425 9900 3750
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 1
- 4350 3900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4350 3900 4050 3450
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4350 4425 4050 5475
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 2250 7200 4200 7800
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 7200 7200 5100 7800
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 2775 6900 3675 6900 3675 7200 2775 7200 2775 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3750 6900 4650 6900 4650 7200 3750 7200 3750 6900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 4
- 2250 6900 2250 6600 7200 6600 7200 6900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 3225 6900 3225 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4200 6900 4200 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5175 6900 5175 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6150 6900 6150 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 6600 4650 6300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1800 6900 2700 6900 2700 7200 1800 7200 1800 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4725 6900 5625 6900 5625 7200 4725 7200 4725 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 5700 6900 6600 6900 6600 7200 5700 7200 5700 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6675 6900 7800 6900 7800 7200 6675 7200 6675 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8100 6975 10425 6975 10425 4425 8100 4425 8100 6975
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6600 5475 6600 5775
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5025 4425 6000 5775
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3
- 4800 3900 5925 2550 8100 2550
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 3900 8475 2775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9450 2250 10425 2250 10425 2775 9450 2775 9450 2250
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 8925 2475 9450 2475
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 2325 5550 2325 5250
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 2925 4950 4350 4275
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 3
- 2850 4725 5775 2400 8100 2400
-4 0 0 50 -1 0 12 0.0000 4 135 915 375 3975 EAPOL and\001
-4 0 0 50 -1 0 12 0.0000 4 180 630 375 4200 pre-auth\001
-4 0 0 50 -1 0 12 0.0000 4 180 810 375 4425 ethertypes\001
-4 0 0 50 -1 0 12 0.0000 4 135 1050 375 4650 from/to kernel\001
-4 0 0 50 -1 0 12 0.0000 4 135 1920 3675 1875 frontend control interface\001
-4 0 0 50 -1 2 14 0.0000 4 195 720 1637 2371 hostapd\001
-4 0 0 50 -1 0 12 0.0000 4 180 600 3825 7125 prism54\001
-4 0 0 50 -1 0 12 0.0000 4 180 510 1875 7125 hostap\001
-4 0 0 50 -1 0 12 0.0000 4 135 600 2850 7125 nl80211\001
-4 0 0 50 -1 0 12 0.0000 4 135 270 4800 7125 bsd\001
-4 0 0 50 -1 0 12 0.0000 4 105 300 6750 7125 test\001
-4 0 0 50 -1 0 12 0.0000 4 135 420 5775 7125 wired\001
-4 0 0 50 -1 0 12 0.0000 4 135 1050 8700 4650 EAP methods\001
-4 0 0 50 -1 0 12 0.0000 4 135 690 9525 2475 RADIUS\001
-4 0 0 50 -1 0 12 0.0000 4 180 825 9525 2700 accounting\001
diff --git a/doc/hostapd_ctrl_iface.doxygen b/doc/hostapd_ctrl_iface.doxygen
deleted file mode 100644
index 4d2bac82c43f..000000000000
--- a/doc/hostapd_ctrl_iface.doxygen
+++ /dev/null
@@ -1,66 +0,0 @@
-/**
-\page hostapd_ctrl_iface_page hostapd control interface
-
-hostapd implements a control interface that can be used by
-external programs to control the operations of the hostapd
-daemon and to get status information and event notifications. There is
-a small C library, in a form of a single C file, \ref wpa_ctrl.c, that
-provides helper functions to facilitate the use of the control
-interface. External programs can link this file into them and then use
-the library functions documented in \ref wpa_ctrl.h to interact with
-wpa_supplicant. This library can also be used with C++. \ref hostapd_cli.c
-is an example program using this library.
-
-There are multiple mechanisms for inter-process communication. For
-example, Linux version of hostapd is using UNIX domain sockets for the
-control interface. The use of the functions defined in \ref wpa_ctrl.h can
-be used to hide the details of the used IPC from external programs.
-
-
-\section using_ctrl_iface Using the control interface
-
-External programs, e.g., a GUI or a configuration utility, that need to
-communicate with hostapd should link in \ref wpa_ctrl.c. This
-allows them to use helper functions to open connection to the control
-interface with \ref wpa_ctrl_open() and to send commands with
-\ref wpa_ctrl_request().
-
-hostapd uses the control interface for two types of communication:
-commands and unsolicited event messages. Commands are a pair of
-messages, a request from the external program and a response from
-hostapd. These can be executed using \ref wpa_ctrl_request().
-Unsolicited event messages are sent by hostapd to the control
-interface connection without specific request from the external program
-for receiving each message. However, the external program needs to
-attach to the control interface with \ref wpa_ctrl_attach() to receive these
-unsolicited messages.
-
-If the control interface connection is used both for commands and
-unsolicited event messages, there is potential for receiving an
-unsolicited message between the command request and response.
-\ref wpa_ctrl_request() caller will need to supply a callback, msg_cb,
-for processing these messages. Often it is easier to open two
-control interface connections by calling \ref wpa_ctrl_open() twice and
-then use one of the connections for commands and the other one for
-unsolicited messages. This way command request/response pairs will
-not be broken by unsolicited messages. \ref wpa_cli.c is an example of how
-to use only one connection for both purposes and wpa_gui demonstrates
-how to use two separate connections.
-
-Once the control interface connection is not needed anymore, it should
-be closed by calling \ref wpa_ctrl_close(). If the connection was used for
-unsolicited event messages, it should be first detached by calling
-\ref wpa_ctrl_detach().
-
-
-\section ctrl_iface_cmds Control interface commands
-
-Following commands can be used with \ref wpa_ctrl_request():
-
-\subsection ctrl_iface_PING PING
-
-This command can be used to test whether hostapd is replying
-to the control interface commands. The expected reply is \c PONG if the
-connection is open and hostapd is processing commands.
-
-*/
diff --git a/doc/mainpage.doxygen b/doc/mainpage.doxygen
deleted file mode 100644
index 329afea3fa6a..000000000000
--- a/doc/mainpage.doxygen
+++ /dev/null
@@ -1,95 +0,0 @@
-/**
-\mainpage Developers' documentation for wpa_supplicant and hostapd
-
-The goal of this documentation and comments in the source code is to
-give enough information for other developers to understand how
-wpa_supplicant and hostapd have been implemented, how they can be
-modified, how new drivers can be supported, and how the source code
-can be ported to other operating systems. If any information is
-missing, feel free to contact Jouni Malinen <j@w1.fi> for more
-information. Contributions as patch files are also very welcome at the
-same address. Please note that this software is licensed under the
-BSD license (the one with advertisement clause removed). All
-contributions to wpa_supplicant and hostapd are expected to use
-compatible licensing terms.
-
-The source code and read-only access to the combined wpa_supplicant
-and hostapd Git repository is available from the project home page at
-http://w1.fi/wpa_supplicant/. This developers' documentation is also
-available as a PDF file from
-http://w1.fi/wpa_supplicant/wpa_supplicant-devel.pdf .
-
-
-\section _wpa_supplicant wpa_supplicant
-
-wpa_supplicant is a WPA Supplicant for Linux, BSD and Windows with
-support for WPA and WPA2 (IEEE 802.11i / RSN). Supplicant is the IEEE
-802.1X/WPA component that is used in the client stations. It
-implements key negotiation with a WPA Authenticator and it can optionally
-control roaming and IEEE 802.11 authentication/association of the wlan
-driver.
-
-The design goal for wpa_supplicant was to use hardware, driver, and
-OS independent, portable C code for all WPA functionality. The source
-code is divided into separate C files as shown on the \ref
-code_structure "code structure page". All hardware/driver specific
-functionality is in separate files that implement a \ref
-driver_wrapper "well-defined driver API". Information about porting
-to different target boards and operating systems is available on
-the \ref porting "porting page".
-
-EAPOL (IEEE 802.1X) state machines are implemented as a separate
-module that interacts with \ref eap_peer_module "EAP peer implementation".
-In addition to programs aimed at normal production use,
-wpa_supplicant source tree includes number of \ref testing_tools
-"testing and development tools" that make it easier to test the
-programs without having to setup a full test setup with wireless
-cards. These tools can also be used to implement automatic test
-suites.
-
-wpa_supplicant implements a
-\ref ctrl_iface_page "control interface" that can be used by
-external programs to control the operations of the wpa_supplicant
-daemon and to get status information and event notifications. There is
-a small C library that provides helper functions to facilitate the use of the
-control interface. This library can also be used with C++.
-
-\image html _wpa_supplicant.png "wpa_supplicant modules"
-\image latex _wpa_supplicant.eps "wpa_supplicant modules" width=15cm
-
-
-\section _hostapd hostapd
-
-hostapd includes IEEE 802.11 access point management (authentication /
-association), IEEE 802.1X/WPA/WPA2 Authenticator, EAP server, and
-RADIUS authentication server functionality. It can be build with
-various configuration option, e.g., a standalone AP management
-solution or a RADIUS authentication server with support for number of
-EAP methods.
-
-The design goal for hostapd was to use hardware, driver, and
-OS independent, portable C code for all WPA functionality. The source
-code is divided into separate C files as shown on the \ref
-code_structure "code structure page". All hardware/driver specific
-functionality is in separate files that implement a \ref
-driver_wrapper "well-defined driver API". Information about porting
-to different target boards and operating systems is available on
-the \ref porting "porting page".
-
-EAPOL (IEEE 802.1X) state machines are implemented as a separate
-module that interacts with \ref eap_server_module "EAP server implementation".
-Similarly, RADIUS authentication server is in its own separate module.
-Both IEEE 802.1X and RADIUS authentication server can use EAP server
-functionality.
-
-hostapd implements a \ref hostapd_ctrl_iface_page "control interface"
-that can be used by external programs to control the operations of the
-hostapdt daemon and to get status information and event notifications.
-There is a small C library that provides helper functions to facilitate
-the use of the control interface. This library can also be used with
-C++.
-
-\image html hostapd.png "hostapd modules"
-\image latex hostapd.eps "hostapd modules" width=15cm
-
-*/
diff --git a/doc/p2p.doxygen b/doc/p2p.doxygen
deleted file mode 100644
index 6ab6e9e05a10..000000000000
--- a/doc/p2p.doxygen
+++ /dev/null
@@ -1,471 +0,0 @@
-/**
-\page p2p Wi-Fi Direct - P2P module
-
-Wi-Fi Direct functionality is implemented any many levels in the WLAN
-stack from low-level driver operations to high-level GUI design. This
-document covers the parts that can be user by wpa_supplicant. However,
-it should be noted that alternative designs are also possible, so some
-of the functionality may reside in other components in the system.
-
-The driver (or WLAN firmware/hardware) is expected to handle low-level
-operations related to P2P Power Management and channel scheduling. In
-addition, support for virtual network interface and data frame
-processing is done inside the driver. Configuration for these
-low-level operations is defined in the driver interface:
-src/drivers/driver.h. This defines both the commands and events used to
-interact with the driver.
-
-P2P module implements higher layer functionality for management P2P
-groups. It takes care of Device Discovery, Service Discovery, Group
-Owner Negotiation, P2P Invitation. In addition, it maintains
-information about neighboring P2P Devices. This module could be used
-in designs that do not use wpa_supplicant and it could also reside
-inside the driver/firmware component. P2P module API is defined in
-\ref src/p2p/p2p.h.
-
-Provisioning step of Group Formation is implemented using WPS
-(\ref src/wps/wps.h).
-
-wpa_supplicant includes code in interact with both the P2P module
-(\ref wpa_supplicant/p2p_supplicant.c) and WPS
-(\ref wpa_supplicant/wps_supplicant.c). The driver operations are passed
-through these files, i.e., core P2P or WPS code does not interact
-directly with the driver interface.
-
-
-\section p2p_arch P2P architecture
-
-P2P functionality affects many areas of the system architecture. This
-section shows couple of examples on the location of main P2P
-components. In the diagrams below, green arrows are used to show
-communication paths from the P2P module to upper layer management
-functionality and all the way to a GUI that user could use to manage
-P2P connections. Blue arrows show the path taken for lower layer
-operations. Glue code is used to bind the P2P module API to the rest
-of the system to provide access both towards upper and lower layer
-functionality.
-
-\subsection p2p_arch_mac80211 P2P architecture with Linux/mac80211/ath9k
-
-An architecture where the P2P module resides inside the
-wpa_supplicant process is used with Linux mac80211-based drivers,
-e.g., ath9k. The following diagram shows the main components related
-to P2P functionality in such an architecture.
-
-\image html p2p_arch.png "P2P module within wpa_supplicant"
-\image latex p2p_arch.eps "P2P module within wpa_supplicant" width=15cm
-
-\subsection p2p_arch_umac P2P architecture with UMAC
-
-The following diagram shows the main components related to P2P
-functionality in an architecture where the P2P module resides inside
-the kernel IEEE 802.11 stack (UMAC in the figure).
-
-\image html p2p_arch2.png "P2P module in kernel
-\image latex p2p_arch2.eps "P2P module in kernel" width=15cm
-
-
-\section p2p_module P2P module
-
-P2P module manages discovery and group formation with a single state
-machine, i.e., only a single operation per device can be in progress
-at any given time. The following diagram describes the P2P state
-machine. For clarity, it does not include state transitions on
-operation timeouts to the IDLE state. The states that are marked with
-dotted ellipse are listed for clarity to describe the protocol
-functionality for Device Discovery phase, but are not used in the
-implementation (the SEARCH state is used to manage the initial Scan
-and the alternating Listen and Search states within Find).
-
-\image html p2p_sm.png "P2P module state machine"
-\image latex p2p_sm.eps "P2P module state machine" width=15cm
-
-\subsection p2p_module_api P2P module API
-
-P2P module API is defined in \ref src/p2p/p2p.h. The API consists of
-functions for requesting operations and for providing event
-notifications. Similar set of callback functions are configured with
-struct p2p_config to provide callback functions that P2P module can
-use to request operations and to provide event notifications. In
-addition, there are number of generic helper functions that can be
-used for P2P related operations.
-
-These are the main functions for an upper layer management entity to
-request P2P operations:
-- \ref p2p_find()
-- \ref p2p_stop_find()
-- \ref p2p_listen()
-- \ref p2p_connect()
-- \ref p2p_reject()
-- \ref p2p_prov_disc_req()
-- \ref p2p_sd_request()
-- \ref p2p_sd_cancel_request()
-- \ref p2p_sd_response()
-- \ref p2p_sd_service_update()
-- \ref p2p_invite()
-
-These are the main callback functions for P2P module to provide event
-notifications to the upper layer management entity:
-
-- \ref p2p_config::dev_found()
-- \ref p2p_config::go_neg_req_rx()
-- \ref p2p_config::go_neg_completed()
-- \ref p2p_config::sd_request()
-- \ref p2p_config::sd_response()
-- \ref p2p_config::prov_disc_req()
-- \ref p2p_config::prov_disc_resp()
-- \ref p2p_config::invitation_process()
-- \ref p2p_config::invitation_received()
-- \ref p2p_config::invitation_result()
-
-The P2P module uses following functions to request lower layer driver
-operations:
-
-- \ref p2p_config::p2p_scan()
-- \ref p2p_config::send_probe_resp()
-- \ref p2p_config::send_action()
-- \ref p2p_config::send_action_done()
-- \ref p2p_config::start_listen()
-- \ref p2p_config::stop_listen()
-
-Events from lower layer driver operations are delivered to the P2P
-module with following functions:
-
-- \ref p2p_probe_req_rx()
-- \ref p2p_rx_action()
-- \ref p2p_scan_res_handler()
-- \ref p2p_scan_res_handled()
-- \ref p2p_send_action_cb()
-- \ref p2p_listen_cb()
-
-In addition to the per-device state, the P2P module maintains
-per-group state for group owners. This is initialized with a call to
-p2p_group_init() when a group is created and deinitialized with
-p2p_group_deinit(). The upper layer GO management entity uses
-following functions to interact with the P2P per-group state:
-
-- \ref p2p_group_notif_assoc()
-- \ref p2p_group_notif_disassoc()
-- \ref p2p_group_notif_formation_done()
-- \ref p2p_group_match_dev_type()
-
-The P2P module will use following callback function to update P2P IE
-for GO Beacon and Probe Response frames:
-
-- \ref p2p_group_config::ie_update()
-
-
-\section p2p_driver P2P driver operations (low-level interface)
-
-The following driver wrapper functions are needed for P2P in addition
-to the standard station/AP mode operations when the P2P module resides
-within wpa_supplicant:
-- \ref wpa_driver_ops::if_add()
-- \ref wpa_driver_ops::if_remove()
-- \ref wpa_driver_ops::remain_on_channel()
-- \ref wpa_driver_ops::cancel_remain_on_channel()
-- \ref wpa_driver_ops::send_action()
-- \ref wpa_driver_ops::probe_req_report()
-
-The following driver wrapper events are needed for P2P in addition to
-the standard station/AP mode events when the P2P module resides within
-wpa_supplicant:
-- \ref wpa_event_type::EVENT_RX_MGMT
-- \ref wpa_event_type::EVENT_REMAIN_ON_CHANNEL
-- \ref wpa_event_type::EVENT_CANCEL_REMAIN_ON_CHANNEL
-- \ref wpa_event_type::EVENT_RX_PROBE_REQ
-
-
-\section p2p_go_neg P2P device discovery and group formation
-
-This section shows an example sequence of operations that can be used
-to implement P2P device discovery and group formation. The function
-calls are described based on the P2P module API. The exact design for
-the glue code outside the P2P module depends on the architecture used
-in the system.
-
-An upper layer management entity starts P2P device discovery by
-calling \ref p2p_find(). The P2P module start the discovery by requesting a
-full scan to be completed by calling \ref p2p_config::p2p_scan(). Results
-from the scan will be reported by calling \ref p2p_scan_res_handler() and
-after last result, the scan result processing is terminated with a
-call to \ref p2p_scan_res_handled(). The P2P peers that are found during
-the full scan are reported with the \ref p2p_config::dev_found() callback.
-
-After the full scan, P2P module start alternating between Listen and
-Search states until the device discovery operation times out or
-terminated, e.g., with a call to \ref p2p_stop_find().
-
-When going into the Listen state, the P2P module requests the driver
-to be configured to be awake on the listen channel with a call to
-\ref p2p_config::start_listen(). The glue code using the P2P module may
-implement this, e.g., by using remain-on-channel low-level driver
-functionality for off-channel operation. Once the driver is available
-on the requested channel, notification of this is delivered by calling
-\ref p2p_listen_cb(). The Probe Request frames that are received during the
-Listen period are delivered to the P2P module by calling
-\ref p2p_config::p2p_probe_req_rx() and P2P module request a response to
-these to be sent by using \ref p2p_config::send_probe_resp() callback
-function. If a group owner negotiation from another P2P device is
-received during the device discovery phase, that is indicated to the
-upper layer code with the \ref p2p_config::go_neg_req_tx() callback.
-
-The Search state is implemented by using the normal scan interface,
-i.e., the P2P module will call \ref p2p_config::p2p_scan() just like in the
-full scan phase described. Similarly, scan results from the search
-operation will be delivered to the P2P module using the
-\ref p2p_scan_res_handler() and \ref p2p_scan_res_handled() functions.
-
-Once the upper layer management entity has found a peer with which it
-wants to connect by forming a new group, it initiates group owner
-negotiation by calling \ref p2p_connect(). Before doing this, the upper
-layer code is responsible for asking the user to provide the PIN to be
-used during the provisioning step with the peer or the push button
-press for PBC mode. The glue code will need to figure out the intended
-interface address for the group before group owner negotiation can be
-started.
-
-Optional Provision Discovery mechanism can be used to request the peer
-to display a PIN for the local device to enter (and vice versa). Upper
-layer management entity can request the specific mechanism by calling
-\ref p2p_prov_disc_req(). The response to this will be reported with the
-\ref p2p_config::prov_disc_resp() callback. If the peer device started
-Provision Discovery, an accepted request will be reported with the
-\ref p2p_config::prov_disc_req() callback. The P2P module will
-automatically accept the Provision Discovery for display and keypad
-methods, but it is up to the upper layer manegement entity to actually
-generate the PIN and to configure it with following \ref p2p_connect() call
-to actually authorize the connection.
-
-The P2P module will use \ref p2p_config::send_action() callback to request
-lower layer code to transmit an Action frame during group owner
-negotiation. \ref p2p_send_action_cb() is used to report the result of
-transmission. If the peer is not reachable, the P2P module will try to
-find it by alternating between Action frame send and Listen
-states. The Listen state for this phase will be used similarly to the
-Listen state during device discovery as described above.
-
-Once the group owner negotiation has been completed, its results will
-be reported with the \ref p2p_config::go_neg_completed() callback. The
-upper layer management code or the glue code using the P2P module API
-is responsible for creating a new group interface and starting
-provisioning step at this point by configuring WPS Registrar or
-Enrollee functionality based on the reported group owner negotiation
-results. The upper layer code is also responsible for timing out WPS
-provisioning if it cannot be completed in 15 seconds.
-
-Successful completion of the WPS provisioning is reported with a call
-to \ref p2p_wps_success_cb(). The P2P module will clear its group formation
-state at this point and allows new group formation attempts to be
-started. The upper layer management code is responsible for configuring
-the GO to accept associations from devices and the client to connect to
-the GO with the provisioned credentials. GO is also responsible for
-calling \ref p2p_group_notif_formation_done() as described below.
-
-If the WPS provisioning step fails or times out, this is reported with
-a call to \ref p2p_group_formation_failed(). The P2P module will clear its
-group formation state at this point and allows new group formation
-attempts to be started. The upper layer management code is responsible
-for removing the group interface for the failed group.
-
-
-\section p2p_sd P2P service discovery
-
-P2P protocol includes service discovery functionality that can be used
-to discover which services are provided by the peers before forming a
-group. This leverages the Generic Advertisement Service (GAS) protocol
-from IEEE 802.11u and P2P vendor-specific contents inside the GAS
-messages.
-
-The P2P module takes care of GAS encapsulation, fragmentation, and
-actual transmission and reception of the Action frames needed for
-service discovery. The user of the P2P module is responsible for
-providing P2P specific Service Request TLV(s) for queries and Service
-Response TLV(s) for responses.
-
-\subsection p2p_sd_query Querying services of peers
-
-Service discovery is implemented by processing pending queries as a
-part of the device discovery phase. \ref p2p_sd_request() function is used
-to schedule service discovery queries to a specific peer or to all
-discovered peers. \ref p2p_sd_cancel_request() can be used to cancel a
-scheduled query. Queries that are specific to a single peer will be
-removed automatically after the response has been received.
-
-After the service discovery queries have been queued, device discovery
-is started with a call to \ref p2p_find(). The pending service discovery
-queries are then sent whenever a peer is discovered during the find
-operation. Responses to the queries will be reported with the
-\ref p2p_config::sd_response() callback.
-
-\subsection p2p_sd_response Replying to service discovery queries from peers
-
-The received service discovery requests will be indicated with the
-\ref p2p_config::sd_request() callback. The response to the query is sent
-by calling \ref p2p_sd_response().
-
-\subsection p2p_sd_indicator Service update indicator
-
-P2P service discovery provides a mechanism to notify peers about
-changes in available services. This works by incrementing Service
-Update Indicator value whenever there is a change in the
-services. This value is included in all SD request and response
-frames. The value received from the peers will be included in the
-\ref p2p_config::sd_request() and \ref p2p_config::sd_response() callbacks. The
-value to be sent to the peers is incremented with a call to
-\ref p2p_sd_service_update() whenever availability of the local services
-changes.
-
-
-\section p2p_go P2P group owner
-
-This section describes how P2P module can be used for managing
-per-group information in a group owner. The function calls are
-described based on the P2P module API. The exact design for the glue
-code outside the P2P module depends on the architecture used in the
-system.
-
-When a P2P group interface is created in group owner role, per-group
-data is initialized with \ref p2p_group_init(). This call provides a
-pointer to the per-device P2P module context and configures the
-per-group operation. The configured \ref p2p_group_config::ie_update()
-callback is used to set the initial P2P IE for Beacon and Probe
-Response frames in the group owner. The AP mode implementation may use
-this information to add IEs into the frames.
-
-Once the group formation has been completed (or if it is skipped in
-case of manual group setup), \ref p2p_group_notif_formation_done() is
-called. This will allow the P2P module to update the P2P IE for
-Beacon and Probe Response frames.
-
-The SME/MLME code that managements IEEE 802.11 association processing
-needs to inform P2P module whenever a P2P client associates or
-disassociates with the group. This is done by calling
-\ref p2p_group_notif_assoc() and \ref p2p_group_notif_disassoc(). The P2P module
-manages a list of group members and updates the P2P Group Information
-subelement in the P2P IE based on the information from the P2P
-clients. The \ref p2p_group_config::ie_update() callback is used whenever
-the P2P IE in Probe Response frames needs to be changed.
-
-The SME/MLME code that takes care of replying to Probe Request frames
-can use \ref p2p_group_match_dev_type() to check whether the Probe Request
-frame request a reply only from groups that include a specific device
-type in one of the clients or GO. A match will be reported if the
-Probe Request does not request a specific device type, so this
-function can be used to filter or received Probe Request frames and
-only the ones that result in non-zero return value need to be replied.
-
-When the P2P group interface for GO role is removed,
-\ref p2p_group_deinit() is used to deinitialize the per-group P2P module
-state.
-
-
-\section p2p_ctrl_iface P2P control interface
-
-wpa_supplicant \ref ctrl_iface_page "control interface" can be used
-to manage P2P functionality from an external program (e.g., a GUI or a
-system configuration manager). This interface can be used directly
-through the control interface backend mechanism (e.g., local domain
-sockets on Linux) or with help of wpa_cli (e.g., from a script).
-
-The following P2P-related commands are available:
-- \ref ctrl_iface_P2P_FIND P2P_FIND
-- \ref ctrl_iface_P2P_STOP_FIND P2P_STOP_FIND
-- \ref ctrl_iface_P2P_CONNECT P2P_CONNECT
-- \ref ctrl_iface_P2P_LISTEN P2P_LISTEN
-- \ref ctrl_iface_P2P_GROUP_REMOVE P2P_GROUP_REMOVE
-- \ref ctrl_iface_P2P_GROUP_ADD P2P_GROUP_ADD
-- \ref ctrl_iface_P2P_PROV_DISC P2P_PROV_DISC
-- \ref ctrl_iface_P2P_SERV_DISC_REQ P2P_SERV_DISC_REQ
-- \ref ctrl_iface_P2P_SERV_DISC_CANCEL_REQ P2P_SERV_DISC_CANCEL_REQ
-- \ref ctrl_iface_P2P_SERV_DISC_RESP P2P_SERV_DISC_RESP
-- \ref ctrl_iface_P2P_SERVICE_UPDATE P2P_SERVICE_UPDATE
-- \ref ctrl_iface_P2P_SERV_DISC_EXTERNAL P2P_SERV_DISC_EXTERNAL
-- \ref ctrl_iface_P2P_REJECT P2P_REJECT
-- \ref ctrl_iface_P2P_INVITE P2P_INVITE
-
-The following P2P-related events are used:
-- \ref ctrl_iface_event_P2P_EVENT_DEVICE_FOUND P2P-DEVICE-FOUND
-- \ref ctrl_iface_event_P2P_EVENT_GO_NEG_REQUEST P2P-GO-NEG-REQUEST
-- \ref ctrl_iface_event_P2P_EVENT_GO_NEG_SUCCESS P2P-GO-NEG-SUCCESS
-- \ref ctrl_iface_event_P2P_EVENT_GO_NEG_FAILURE P2P-GO-NEG-FAILURE
-- \ref ctrl_iface_event_P2P_EVENT_GROUP_FORMATION_SUCCESS P2P-GROUP-FORMATION-SUCCESS
-- \ref ctrl_iface_event_P2P_EVENT_GROUP_FORMATION_FAILURE P2P-GROUP-FORMATION-FAILURE
-- \ref ctrl_iface_event_P2P_EVENT_GROUP_STARTED P2P-GROUP-STARTED
-- \ref ctrl_iface_event_P2P_EVENT_GROUP_REMOVED P2P-GROUP-REMOVED
-- \ref ctrl_iface_event_P2P_EVENT_PROV_DISC_SHOW_PIN P2P-PROV-DISC-SHOW-PIN
-- \ref ctrl_iface_event_P2P_EVENT_PROV_DISC_ENTER_PIN P2P-PROV-DISC-ENTER-PIN
-- \ref ctrl_iface_event_P2P_EVENT_SERV_DISC_REQ P2P-SERV-DISC-REQ
-- \ref ctrl_iface_event_P2P_EVENT_SERV_DISC_RESP P2P-SERV-DISC-RESP
-- \ref ctrl_iface_event_P2P_EVENT_INVITATION_RECEIVED P2P-INVITATION-RECEIVED
-- \ref ctrl_iface_event_P2P_EVENT_INVITATION_RESULT P2P-INVITATION-RESULT
-
-
-\subsection p2p_wpa_gui GUI example (wpa_gui)
-
-wpa_gui has an example implementation of a GUI that could be used to
-manage P2P operations. The P2P related functionality is contained
-mostly in wpa_supplicant/wpa_gui-qt4/peers.cpp and it shows how the
-control interface commands and events can be used.
-
-
-\subsection p2p_wpa_cli wpa_cli example
-
-wpa_cli can be used to control wpa_supplicant in interactive
-mode. The following sessions show examples of commands used for
-device discovery and group formation. The lines starting with "> " are
-commands from the user (followed by command result indication) and
-lines starting with "<2>" are event messages from wpa_supplicant.
-
-P2P device "Wireless Client":
-
-\verbatim
-> p2p_find
-OK
-> <2>P2P-DEVICE-FOUND 02:40:61:c2:f3:b7 p2p_dev_addr=02:40:61:c2:f3:b7
-pri_dev_type=1-0050F204-1 name='Wireless Client 2' config_methods=0x18c
-dev_capab=0x1 group_capab=0x0
-<2>P2P-GO-NEG-REQUEST 02:40:61:c2:f3:b7
-<2>P2P-GO-NEG-REQUEST 02:40:61:c2:f3:b7
-> p2p_connect 02:40:61:c2:f3:b7 pbc
-OK
-<2>P2P-GO-NEG-SUCCESS
-<2>P2P-GROUP-FORMATION-SUCCESS
-<2>P2P-GROUP-STARTED sta0-p2p-0 client DIRECT-vM
-> interface
-Available interfaces:
-sta0-p2p-0
-sta0
-> p2p_group_remove sta0-p2p-0
-<2>P2P-GROUP-REMOVED sta0-p2p-0 client
-OK
-> term
-OK
-\endverbatim
-
-
-P2P device "Wireless Client2" (which ended up operating in GO role):
-
-\verbatim
-> p2p_find
-OK
-<2>P2P-DEVICE-FOUND 02:f0:bc:44:87:62 p2p_dev_addr=02:f0:bc:44:87:62
-pri_dev_type=1-0050F204-1 name='Wireless Client' config_methods=0x18c
-dev_capab=0x1 group_capab=0x0
-> p2p_connect 02:f0:bc:44:87:62 pbc
-OK
-<2>P2P-GO-NEG-SUCCESS
-<2>P2P-GROUP-FORMATION-SUCCESS
-<2>P2P-GROUP-STARTED sta1-p2p-0 GO DIRECT-vM
-> interface
-Available interfaces:
-sta1-p2p-0
-sta1
-> p2p_group_remove sta1-p2p-0
-<2>P2P-GROUP-REMOVED sta1-p2p-0 GO
-OK
-> term
-OK
-\endverbatim
-
-*/
diff --git a/doc/p2p_arch.dot b/doc/p2p_arch.dot
deleted file mode 100644
index 27ae0e2509d4..000000000000
--- a/doc/p2p_arch.dot
+++ /dev/null
@@ -1,85 +0,0 @@
-digraph p2p_arch {
- ranksep=.75;
- size = "7.5,7.5";
-
- edge [dir=none];
-
- subgraph cluster_wpa_gui {
- label = "wpa_gui";
-
- status -> Qt;
- scan -> Qt;
- network -> Qt;
- Qt -> peers;
- Qt -> WPS;
- Qt -> gui_ctrl;
-
- gui_ctrl [label="ctrl i/f"];
- }
-
- subgraph cluster_wpa_supplicant {
- label = "wpa_supplicant"
-
- ctrl_iface [label="ctrl i/f"];
- authenticator [label="Authenticator"];
- supplicant [label="Supplicant"];
- driver_iface [label="driver i/f"];
- p2p_module [label="P2P\nmodule"];
- wps_registrar [label="WPS\nRegistrar"];
- wps_enrollee [label="WPS\nEnrollee"];
- mgmt_entity [label="Management\nentity"];
-
- ctrl_iface -> mgmt_entity;
- p2p_module -> mgmt_entity;
- wps_registrar -> mgmt_entity;
- wps_enrollee -> mgmt_entity;
- mgmt_entity -> authenticator;
- mgmt_entity -> supplicant;
- mgmt_entity -> driver_iface;
-
- { rank = same; mgmt_entity; p2p_module; }
- }
-
- subgraph cluster_wpa_cli {
- label = "wpa_cli -a"
-
- wpa_cli_action;
- }
-
- subgraph cluster_dnsmasq {
- label = "dnsmasq"
-
- dnsmasq;
- }
-
- subgraph cluster_dhclient {
- label = "dhclient"
-
- dhclient;
- }
-
- subgraph cluster_kernel {
- label = "Linux kernel"
-
- cfg80211 -> mac80211;
- netdev -> mac80211;
- mac80211 -> ath9k;
- }
-
- gui_ctrl -> ctrl_iface;
- wpa_cli_action -> ctrl_iface;
-
- driver_iface -> cfg80211;
-
- wpa_cli_action -> dnsmasq;
- wpa_cli_action -> dhclient;
-
- dnsmasq -> netdev;
- dhclient -> netdev;
-
- edge [color=blue,dir=both];
- p2p_module -> mgmt_entity -> driver_iface -> cfg80211 -> mac80211 -> ath9k;
-
- edge [color=green,dir=both];
- peers -> Qt -> gui_ctrl -> ctrl_iface -> mgmt_entity -> p2p_module;
-}
diff --git a/doc/p2p_arch2.dot b/doc/p2p_arch2.dot
deleted file mode 100644
index 9c7b4b57a17f..000000000000
--- a/doc/p2p_arch2.dot
+++ /dev/null
@@ -1,85 +0,0 @@
-digraph p2p_arch2 {
- ranksep=.75;
- size = "7.5,7.5";
-
- edge [dir=none];
-
- subgraph cluster_wpa_gui {
- label = "wpa_gui";
-
- status -> Qt;
- scan -> Qt;
- network -> Qt;
- Qt -> peers;
- Qt -> WPS;
- Qt -> gui_ctrl;
-
- gui_ctrl [label="ctrl i/f"];
- }
-
- subgraph cluster_wpa_supplicant {
- label = "wpa_supplicant"
-
- ctrl_iface [label="ctrl i/f"];
- authenticator [label="Authenticator"];
- supplicant [label="Supplicant"];
- driver_iface [label="driver i/f"];
- wps_registrar [label="WPS\nRegistrar"];
- wps_enrollee [label="WPS\nEnrollee"];
- mgmt_entity [label="Management\nentity"];
-
- ctrl_iface -> mgmt_entity;
- wps_registrar -> mgmt_entity;
- wps_enrollee -> mgmt_entity;
- mgmt_entity -> authenticator;
- mgmt_entity -> supplicant;
- mgmt_entity -> driver_iface;
- }
-
- subgraph cluster_wpa_cli {
- label = "wpa_cli -a"
-
- wpa_cli_action;
- }
-
- subgraph cluster_dnsmasq {
- label = "dnsmasq"
-
- dnsmasq;
- }
-
- subgraph cluster_dhclient {
- label = "dhclient"
-
- dhclient;
- }
-
- subgraph cluster_kernel {
- label = "Kernel"
-
- ioctl -> umac;
- netdev -> umac;
- umac -> p2p_module;
- p2p_module [label="P2P\nmodule"];
- umac -> driver;
-
- { rank = same; umac; p2p_module; }
- }
-
- gui_ctrl -> ctrl_iface;
- wpa_cli_action -> ctrl_iface;
-
- driver_iface -> ioctl;
-
- wpa_cli_action -> dnsmasq;
- wpa_cli_action -> dhclient;
-
- dnsmasq -> netdev;
- dhclient -> netdev;
-
- edge [color=blue,dir=both];
- p2p_module -> umac -> driver;
-
- edge [color=green,dir=both];
- peers -> Qt -> gui_ctrl -> ctrl_iface -> mgmt_entity -> driver_iface -> ioctl -> umac -> p2p_module;
-}
diff --git a/doc/p2p_sm.dot b/doc/p2p_sm.dot
deleted file mode 100644
index 640caefcc6ad..000000000000
--- a/doc/p2p_sm.dot
+++ /dev/null
@@ -1,62 +0,0 @@
-digraph p2p {
- ranksep=.75;
- size = "8.5,7.5";
-
- start -> IDLE;
- start [label="Init",shape=none];
-
- /* Discovery: Scan followed by Find(SEARCH,LISTEN) */
- subgraph cluster_0 {
- label="Discovery";
- color=lightgrey;
- node [color=blue];
- /* SCAN and LISTEN currently not used in the implementation */
- SCAN [style=dotted];
- LISTEN [style=dotted];
-
- SCAN -> LISTEN;
- LISTEN -> SEARCH -> LISTEN [style=dotted];
- SEARCH -> SD_DURING_FIND [label="Peer SD capab\nand no info", weight=100];
- SD_DURING_FIND -> SEARCH [label="RX SD Resp\nor timeout", weight=100];
- SEARCH -> PROV_DISC_DURING_FIND [label="Prov Disc cmd\nand no Resp", weight=100];
- PROV_DISC_DURING_FIND -> SEARCH [label="RX Prov Disc Resp\nor timeout", weight=100];
- }
-
- /* Group Formation */
- subgraph cluster_1 {
- label="Group Formation";
- color=lightgrey;
- node [color=green];
-
- CONNECT -> CONNECT_LISTEN [style=dotted,weight=100];
- CONNECT_LISTEN -> CONNECT [style=dotted,weight=100];
- CONNECT -> WAIT_PEER_IDLE [label="RX GO Neg Resp\n(info unavail)"];
- WAIT_PEER_IDLE -> WAIT_PEER_CONNECT [style=dotted,weight=100];
- WAIT_PEER_CONNECT -> WAIT_PEER_IDLE [style=dotted,weight=100];
-
- CONNECT -> GO_NEG [label="RX GO Neg Resp\n(success)", weight=10];
- CONNECT_LISTEN -> GO_NEG [label="RX GO Neg Req or\nTX GO Neg Resp"];
- WAIT_PEER_CONNECT -> GO_NEG [label="RX GO Neg Req"];
- GO_NEG -> PROVISIONING [label="TX/RX GO Neg Conf"];
- }
-
- PROVISIONING -> IDLE [label="WPS\nsuccess"];
-
- /* External triggers */
- IDLE -> SCAN [label="Find cmd",weight=20];
- IDLE -> CONNECT [label="Connect cmd",weight=20];
- IDLE -> LISTEN_ONLY [label="Listen cmd"];
-
- /* Timeouts */
-/*
- edge [color=red];
- WAIT_PEER_IDLE -> IDLE [label="timeout", weight=0];
- WAIT_PEER_CONNECT -> IDLE [label="timeout", weight=0];
- CONNECT -> IDLE [label="timeout", weight=0];
- CONNECT_LISTEN -> IDLE [label="timeout", weight=0];
- GO_NEG -> IDLE [label="timeout", weight=0];
- PROVISIONING -> IDLE [label="timeout", weight=0];
- LISTEN_ONLY -> IDLE [label="timeout", weight=0];
- SEARCH -> IDLE [label="timeout", weight=0];
-*/
-}
diff --git a/doc/porting.doxygen b/doc/porting.doxygen
deleted file mode 100644
index b4b78ef0504a..000000000000
--- a/doc/porting.doxygen
+++ /dev/null
@@ -1,209 +0,0 @@
-/**
-\page porting Porting to different target boards and operating systems
-
-wpa_supplicant was designed to be easily portable to different
-hardware (board, CPU) and software (OS, drivers) targets. It is
-already used with number of operating systems and numerous wireless
-card models and drivers. The main wpa_supplicant repository includes
-support for Linux, FreeBSD, and Windows. In addition, the code has been
-ported to number of other operating systems like VxWorks, PalmOS,
-Windows CE, and Windows Mobile. On the hardware
-side, wpa_supplicant is used on various systems: desktops, laptops,
-PDAs, and embedded devices with CPUs including x86, PowerPC,
-arm/xscale, and MIPS. Both big and little endian configurations are
-supported.
-
-
-\section ansi_c_extra Extra functions on top of ANSI C
-
-wpa_supplicant is mostly using ANSI C functions that are available on
-most targets. However, couple of additional functions that are common
-on modern UNIX systems are used. Number of these are listed with
-prototypes in \ref common.h (the \verbatim #ifdef CONFIG_ANSI_C_EXTRA \endverbatim
-block). These functions may need to be implemented or at least defined
-as macros to native functions in the target OS or C library.
-
-Many of the common ANSI C functions are used through a wrapper
-definitions in \ref os.h to allow these to be replaced easily with a
-platform specific version in case standard C libraries are not
-available. In addition, \ref os.h defines couple of common platform
-specific functions that are implemented in \ref os_unix.c for UNIX like
-targets and in \ref os_win32.c for Win32 API. If the target platform does
-not support either of these examples, a new os_*.c file may need to be
-added.
-
-Unless OS_NO_C_LIB_DEFINES is defined, the standard ANSI C and POSIX
-functions are used by defining the os_*() wrappers to use them
-directly in order to avoid extra cost in size and speed. If the target
-platform needs different versions of the functions, \ref os.h can be
-modified to define the suitable macros or alternatively,
-OS_NO_C_LIB_DEFINES may be defined for the build and the wrapper
-functions can then be implemented in a new os_*.c wrapper file.
-
-\ref common.h defines number of helper macros for handling integers of
-different size and byte order. Suitable version of these definitions
-may need to be added for the target platform.
-
-
-\section configuration_backend Configuration backend
-
-wpa_supplicant implements a configuration interface that allows the
-backend to be easily replaced in order to read configuration data from
-a suitable source depending on the target platform. \ref config.c
-implements the generic code that can be shared with all configuration
-backends. Each backend is implemented in its own config_*.c file.
-
-The included \ref config_file.c backend uses a text file for configuration
-and \ref config_winreg.c uses Windows registry. These files can be used as
-an example for a new configuration backend if the target platform uses
-different mechanism for configuration parameters. In addition,
-\ref config_none.c can be used as an empty starting point for building a
-new configuration backend.
-
-
-\section driver_iface_porting Driver interface
-
-Unless the target OS and driver is already supported, most porting
-projects have to implement a driver wrapper. This may be done by
-adding a new driver interface module or modifying an existing module
-(driver_*.c) if the new target is similar to one of them. \ref
-driver_wrapper "Driver wrapper implementation" describes the details
-of the driver interface and discusses the tasks involved in porting
-this part of wpa_supplicant.
-
-
-\section l2_packet_porting l2_packet (link layer access)
-
-wpa_supplicant needs to have access to sending and receiving layer 2
-(link layer) packets with two Ethertypes: EAP-over-LAN (EAPOL) 0x888e
-and RSN pre-authentication 0x88c7. \ref l2_packet.h defines the interfaces
-used for this in the core wpa_supplicant implementation.
-
-If the target operating system supports a generic mechanism for link
-layer access, that is likely the best mechanism for providing the
-needed functionality for wpa_supplicant. Linux packet socket is an
-example of such a generic mechanism. If this is not available, a
-separate interface may need to be implemented to the network stack or
-driver. This is usually an intermediate or protocol driver that is
-operating between the device driver and the OS network stack. If such
-a mechanism is not feasible, the interface can also be implemented
-directly in the device driver.
-
-The main wpa_supplicant repository includes l2_packet implementations
-for Linux using packet sockets (\ref l2_packet_linux.c), more portable
-version using libpcap/libdnet libraries (\ref l2_packet_pcap.c; this
-supports WinPcap, too), and FreeBSD specific version of libpcap
-interface (\ref l2_packet_freebsd.c).
-
-If the target operating system is supported by libpcap (receiving) and
-libdnet (sending), \ref l2_packet_pcap.c can likely be used with minimal or
-no changes. If this is not a case or a proprietary interface for link
-layer is required, a new l2_packet module may need to be
-added. Alternatively, for hostapd,
-struct \ref wpa_driver_ops::hapd_send_eapol() handler can
-be used to override the l2_packet library if the link layer access is
-integrated with the driver interface implementation.
-
-
-\section eloop_porting Event loop
-
-wpa_supplicant uses a single process/thread model and an event loop
-to provide callbacks on events (registered timeout, received packet,
-signal). eloop.h defines the event loop interface. \ref eloop.c is an
-implementation of such an event loop using select() and sockets. This
-is suitable for most UNIX/POSIX systems. When porting to other
-operating systems, it may be necessary to replace that implementation
-with OS specific mechanisms that provide similar functionality.
-
-
-\section ctrl_iface_porting Control interface
-
-wpa_supplicant uses a \ref ctrl_iface_page "control interface"
-to allow external processed
-to get status information and to control the operations. Currently,
-this is implemented with socket based communication; both UNIX domain
-sockets and UDP sockets are supported. If the target OS does not
-support sockets, this interface will likely need to be modified to use
-another mechanism like message queues. The control interface is
-optional component, so it is also possible to run wpa_supplicant
-without porting this part.
-
-The wpa_supplicant side of the control interface is implemented in
-\ref wpa_supplicant/ctrl_iface.c. Matching client side is implemented as a control
-interface library in \ref wpa_ctrl.c.
-
-
-\section entry_point Program entry point
-
-wpa_supplicant defines a set of functions that can be used to
-initialize main supplicant processing. Each operating system has a
-mechanism for starting new processing or threads. This is usually a
-function with a specific set of arguments and calling convention. This
-function is responsible on initializing wpa_supplicant.
-
-\ref wpa_supplicant/main.c includes an entry point for UNIX-like
-operating system, i.e., main() function that uses command line arguments
-for setting parameters for wpa_supplicant. When porting to other
-operating systems, similar OS-specific entry point implementation is
-needed. It can be implemented in a new file that is then linked with
-wpa_supplicant instead of main.o. \ref wpa_supplicant/main.c is also a
-good example on how the initialization process should be done.
-
-The supplicant initialization functions are defined in
-\ref wpa_supplicant_i.h. In most cases, the entry point function should
-start by fetching configuration parameters. After this, a global
-wpa_supplicant context is initialized with a call to
-\ref wpa_supplicant_init(). After this, existing network interfaces can be
-added with \ref wpa_supplicant_add_iface(). \ref wpa_supplicant_run() is then
-used to start the main event loop. Once this returns at program
-termination time, \ref wpa_supplicant_deinit() is used to release global
-context data.
-
-\ref wpa_supplicant_add_iface() and \ref wpa_supplicant_remove_iface() can be
-used dynamically to add and remove interfaces based on when
-wpa_supplicant processing is needed for them. This can be done, e.g.,
-when hotplug network adapters are being inserted and ejected. It is
-also possible to do this when a network interface is being
-enabled/disabled if it is desirable that wpa_supplicant processing
-for the interface is fully enabled/disabled at the same time.
-
-
-\section simple_build Simple build example
-
-One way to start a porting project is to begin with a very simple
-build of wpa_supplicant with WPA-PSK support and once that is
-building correctly, start adding features.
-
-Following command can be used to build very simple version of
-wpa_supplicant:
-
-\verbatim
-cc -o wpa_supplicant config.c eloop.c common.c md5.c rc4.c sha1.c \
- config_none.c l2_packet_none.c tls_none.c wpa.c preauth.c \
- aes_wrap.c wpa_supplicant.c events.c main_none.c drivers.c
-\endverbatim
-
-The end result is not really very useful since it uses empty functions
-for configuration parsing and layer 2 packet access and does not
-include a driver interface. However, this is a good starting point
-since the build is complete in the sense that all functions are
-present and this is easy to configure to a build system by just
-including the listed C files.
-
-Once this version can be build successfully, the end result can be
-made functional by adding a proper program entry point (main*.c),
-driver interface (driver_*.c and matching CONFIG_DRIVER_* define for
-registration in \ref drivers.c), configuration parser/writer (config_*.c),
-and layer 2 packet access implementation (l2_packet_*.c). After these
-components have been added, the end result should be a working
-WPA/WPA2-PSK enabled supplicant.
-
-After the basic functionality has been verified to work, more features
-can be added by linking in more files and defining C pre-processor
-defines. Currently, the best source of information for what options
-are available and which files needs to be included is in the Makefile
-used for building the supplicant with make. Similar configuration will
-be needed for build systems that either use different type of make
-tool or a GUI-based project configuration.
-
-*/
diff --git a/doc/testing_tools.doxygen b/doc/testing_tools.doxygen
deleted file mode 100644
index d12652415634..000000000000
--- a/doc/testing_tools.doxygen
+++ /dev/null
@@ -1,201 +0,0 @@
-/**
-\page testing_tools Testing and development tools
-
-[ \ref eapol_test "eapol_test" |
-\ref preauth_test "preauth_test" |
-\ref unit_tests "Unit tests" |
-\ref wpa_trace "Tracing code" ]
-
-wpa_supplicant source tree includes number of testing and development
-tools that make it easier to test the programs without having to setup
-a full test setup with wireless cards. In addition, these tools can be
-used to implement automatic tests suites.
-
-\section eapol_test eapol_test - EAP peer and RADIUS client testing
-
-eapol_test is a program that links together the same EAP peer
-implementation that wpa_supplicant is using and the RADIUS
-authentication client code from hostapd. In addition, it has minimal
-glue code to combine these two components in similar ways to IEEE
-802.1X/EAPOL Authenticator state machines. In other words, it
-integrates IEEE 802.1X Authenticator (normally, an access point) and
-IEEE 802.1X Supplicant (normally, a wireless client) together to
-generate a single program that can be used to test EAP methods without
-having to setup an access point and a wireless client.
-
-The main uses for eapol_test are in interoperability testing of EAP
-methods against RADIUS servers and in development testing for new EAP
-methods. It can be easily used to automate EAP testing for
-interoperability and regression since the program can be run from
-shell scripts without require additional test components apart from a
-RADIUS server. For example, the automated EAP tests described in
-eap_testing.txt are implemented with eapol_test. Similarly, eapol_test
-could be used to implement an automated regression test suite for a
-RADIUS authentication server.
-
-eapol_test uses the same build time configuration file, .config, as
-wpa_supplicant. This file is used to select which EAP methods are
-included in eapol_test. This program is not built with the default
-Makefile target, so a separate make command needs to be used to
-compile the tool:
-
-\verbatim
-make eapol_test
-\endverbatim
-
-The resulting eapol_test binary has following command like options:
-
-\verbatim
-usage:
-eapol_test [-nWS] -c<conf> [-a<AS IP>] [-p<AS port>] [-s<AS secret>] \
- [-r<count>] [-t<timeout>] [-C<Connect-Info>] \
- [-M<client MAC address>]
-eapol_test scard
-eapol_test sim <PIN> <num triplets> [debug]
-
-options:
- -c<conf> = configuration file
- -a<AS IP> = IP address of the authentication server, default 127.0.0.1
- -p<AS port> = UDP port of the authentication server, default 1812
- -s<AS secret> = shared secret with the authentication server, default 'radius'
- -r<count> = number of re-authentications
- -W = wait for a control interface monitor before starting
- -S = save configuration after authentiation
- -n = no MPPE keys expected
- -t<timeout> = sets timeout in seconds (default: 30 s)
- -C<Connect-Info> = RADIUS Connect-Info (default: CONNECT 11Mbps 802.11b)
- -M<client MAC address> = Set own MAC address (Calling-Station-Id,
- default: 02:00:00:00:00:01)
-\endverbatim
-
-
-As an example,
-\verbatim
-eapol_test -ctest.conf -a127.0.0.1 -p1812 -ssecret -r1
-\endverbatim
-tries to complete EAP authentication based on the network
-configuration from test.conf against the RADIUS server running on the
-local host. A re-authentication is triggered to test fast
-re-authentication. The configuration file uses the same format for
-network blocks as wpa_supplicant.
-
-
-\section preauth_test preauth_test - WPA2 pre-authentication and EAP peer testing
-
-preauth_test is similar to eapol_test in the sense that in combines
-EAP peer implementation with something else, in this case, with WPA2
-pre-authentication. This tool can be used to test pre-authentication
-based on the code that wpa_supplicant is using. As such, it tests
-both the wpa_supplicant implementation and the functionality of an
-access point.
-
-preauth_test is built with:
-
-\verbatim
-make preauth_test
-\endverbatim
-
-and it uses following command line arguments:
-
-\verbatim
-usage: preauth_test <conf> <target MAC address> <ifname>
-\endverbatim
-
-For example,
-\verbatim
-preauth_test test.conf 02:11:22:33:44:55 eth0
-\endverbatim
-would use network configuration from test.conf to try to complete
-pre-authentication with AP using BSSID 02:11:22:33:44:55. The
-pre-authentication packets would be sent using the eth0 interface.
-
-
-\section unit_tests Unit tests
-
-Number of the components (.c files) used in wpa_supplicant define
-their own unit tests for automated validation of the basic
-functionality. Most of the tests for cryptographic algorithms are
-using standard test vectors to validate functionality. These tests can
-be useful especially when verifying port to a new CPU target.
-
-The test programs are collected in the tests subdirectory. All
-automated unit tests can be run with
-
-\verbatim
-make run-tests
-\endverbatim
-
-This make target builds and runs each test and terminates with zero
-exit code if all tests were completed successfully.
-
-
-\section wpa_trace Tracing code for developer debuggin
-
-wpa_supplicant and hostapd can be built with tracing code that will
-track and analyze memory allocations and other resource registrations
-and certain API uses. If incorrect use is detected, a backtrace of the
-call location (and/or allocation location) is shown. This can also be
-used to detect certain categories of memory leaks and report them
-automatically when the program is terminated. The report will also
-include information about forgotten eloop events.
-
-The trace code can be enabled with CONFIG_WPA_TRACE=y build
-option. More verbose backtrace information can be generated if libbfd
-is available and the binaries are not stripped of symbol
-information. This is enabled with CONFIG_WPA_TRACE_BFD=y.
-
-For example, a memory leak (forgotten os_free() call) would show up
-like this when the program is terminated:
-
-\verbatim
-MEMLEAK[0x82d200]: len 128
-WPA_TRACE: memleak - START
-[0]: ./wpa_supplicant(os_malloc+0x59) [0x41a5e9]
- os_malloc() ../src/utils/os_unix.c:359
-[1]: ./wpa_supplicant(os_zalloc+0x16) [0x41a676]
- os_zalloc() ../src/utils/os_unix.c:418
-[2]: ./wpa_supplicant(wpa_supplicant_init+0x38) [0x48b508]
- wpa_supplicant_init() wpa_supplicant.c:2315
-[3]: ./wpa_supplicant(main+0x2f3) [0x491073]
- main() main.c:252
-WPA_TRACE: memleak - END
-MEMLEAK: total 128 bytes
-\endverbatim
-
-Another type of error that can be detected is freeing of memory area
-that was registered for some use and is still be referenced:
-
-\verbatim
-WPA_TRACE: Freeing referenced memory - START
-[2]: ./wpa_supplicant(os_free+0x5c) [0x41a53c]
- os_free() ../src/utils/os_unix.c:411
-[3]: ./wpa_supplicant(wpa_supplicant_remove_iface+0x30) [0x48b380]
- wpa_supplicant_remove_iface() wpa_supplicant.c:2259
-[4]: ./wpa_supplicant(wpa_supplicant_deinit+0x20) [0x48b3e0]
- wpa_supplicant_deinit() wpa_supplicant.c:2430
-[5]: ./wpa_supplicant(main+0x357) [0x4910d7]
- main() main.c:276
-WPA_TRACE: Freeing referenced memory - END
-WPA_TRACE: Reference registration - START
-[1]: ./wpa_supplicant [0x41c040]
- eloop_trace_sock_add_ref() ../src/utils/eloop.c:94
-[2]: ./wpa_supplicant(wpa_supplicant_ctrl_iface_deinit+0x17) [0x473247]
- wpa_supplicant_ctrl_iface_deinit() ctrl_iface_unix.c:436
-[3]: ./wpa_supplicant [0x48b21c]
- wpa_supplicant_cleanup() wpa_supplicant.c:378
- wpa_supplicant_deinit_iface() wpa_supplicant.c:2155
-[4]: ./wpa_supplicant(wpa_supplicant_remove_iface+0x30) [0x48b380]
- wpa_supplicant_remove_iface() wpa_supplicant.c:2259
-[5]: ./wpa_supplicant(wpa_supplicant_deinit+0x20) [0x48b3e0]
- wpa_supplicant_deinit() wpa_supplicant.c:2430
-[6]: ./wpa_supplicant(main+0x357) [0x4910d7]
- main() main.c:276
-WPA_TRACE: Reference registration - END
-Aborted
-\endverbatim
-
-This type of error results in showing backtraces for both the location
-where the incorrect freeing happened and the location where the memory
-area was marked referenced.
-
-*/
diff --git a/doc/wpa_supplicant.fig b/doc/wpa_supplicant.fig
deleted file mode 100644
index d2c4306b8e03..000000000000
--- a/doc/wpa_supplicant.fig
+++ /dev/null
@@ -1,247 +0,0 @@
-#FIG 3.2
-Landscape
-Center
-Inches
-Letter
-100.00
-Single
--2
-1200 2
-6 1875 4050 2925 4350
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1875 4050 2925 4050 2925 4350 1875 4350 1875 4050
-4 0 0 50 -1 0 12 0.0000 4 180 735 2025 4275 l2_packet\001
--6
-6 3450 1200 4275 1500
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3450 1200 4275 1200 4275 1500 3450 1500 3450 1200
-4 0 0 50 -1 0 12 0.0000 4 180 585 3600 1425 wpa_cli\001
--6
-6 4725 1200 5925 1500
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4725 1200 5925 1200 5925 1500 4725 1500 4725 1200
-4 0 0 50 -1 0 12 0.0000 4 135 1005 4800 1425 GUI frontend\001
--6
-6 6000 2700 7200 3225
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 2700 7200 2700 7200 3225 6000 3225 6000 2700
-4 0 0 50 -1 0 12 0.0000 4 135 975 6075 2925 WPA/WPA2\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 3150 state machine\001
--6
-6 6000 4950 7200 5475
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 4950 7200 4950 7200 5475 6000 5475 6000 4950
-4 0 0 50 -1 0 12 0.0000 4 135 360 6075 5175 EAP\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 5400 state machine\001
--6
-6 8700 3000 9375 3300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8700 3000 9375 3000 9375 3300 8700 3300 8700 3000
-4 0 0 50 -1 0 12 0.0000 4 150 480 8775 3225 crypto\001
--6
-6 4350 3900 5025 4425
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4350 3900 5025 3900 5025 4425 4350 4425 4350 3900
-4 0 0 50 -1 0 12 0.0000 4 105 420 4500 4125 event\001
-4 0 0 50 -1 0 12 0.0000 4 180 315 4500 4350 loop\001
--6
-6 4275 2550 5100 2850
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4275 2550 5100 2550 5100 2850 4275 2850 4275 2550
-4 0 0 50 -1 0 12 0.0000 4 135 450 4425 2775 ctrl i/f\001
--6
-6 6000 3900 7200 4425
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6000 3900 7200 3900 7200 4425 6000 4425 6000 3900
-4 0 0 50 -1 0 12 0.0000 4 135 600 6075 4125 EAPOL\001
-4 0 0 50 -1 0 12 0.0000 4 135 1065 6075 4350 state machine\001
--6
-6 1800 6000 7800 8100
-6 1800 6000 7800 7200
-6 1800 6900 2700 7200
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1800 6900 2700 6900 2700 7200 1800 7200 1800 6900
-4 0 0 50 -1 0 12 0.0000 4 105 375 1875 7125 wext\001
--6
-6 4725 6900 5625 7200
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4725 6900 5625 6900 5625 7200 4725 7200 4725 6900
-4 0 0 50 -1 0 12 0.0000 4 135 555 4800 7125 hermes\001
--6
-6 6675 6900 7800 7200
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 6675 6900 7800 6900 7800 7200 6675 7200 6675 6900
-4 0 0 50 -1 0 12 0.0000 4 180 930 6750 7125 ndiswrapper\001
--6
-6 5700 6900 6600 7200
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 5700 6900 6600 6900 6600 7200 5700 7200 5700 6900
-4 0 0 50 -1 0 12 0.0000 4 135 420 5775 7125 atmel\001
--6
-6 4275 6000 5100 6300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 4275 6000 5100 6000 5100 6300 4275 6300 4275 6000
-4 0 0 50 -1 0 12 0.0000 4 135 630 4350 6225 driver i/f\001
--6
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 2775 6900 3675 6900 3675 7200 2775 7200 2775 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3750 6900 4650 6900 4650 7200 3750 7200 3750 6900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 4
- 2250 6900 2250 6600 7200 6600 7200 6900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 3225 6900 3225 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4200 6900 4200 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5175 6900 5175 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6150 6900 6150 6600
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 6600 4650 6300
-4 0 0 50 -1 0 12 0.0000 4 180 510 2850 7125 hostap\001
-4 0 0 50 -1 0 12 0.0000 4 135 600 3825 7125 nl80211\001
--6
-6 3525 7800 5775 8100
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 3525 7800 5775 7800 5775 8100 3525 8100 3525 7800
-4 0 0 50 -1 0 12 0.0000 4 135 2145 3600 8025 kernel network device driver\001
--6
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 2250 7200 4200 7800
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 7200 7200 5100 7800
--6
-6 9600 3000 10275 3300
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9600 3000 10275 3000 10275 3300 9600 3300 9600 3000
-4 0 0 50 -1 0 12 0.0000 4 135 315 9750 3225 TLS\001
--6
-6 8100 4425 10425 7350
-6 8175 4725 9225 5025
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 4725 9225 4725 9225 5025 8175 5025 8175 4725
-4 0 0 50 -1 0 12 0.0000 4 135 735 8250 4950 EAP-TLS\001
--6
-6 9300 4725 10350 5025
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 4725 10350 4725 10350 5025 9300 5025 9300 4725
-4 0 0 50 -1 0 12 0.0000 4 135 810 9375 4950 EAP-MD5\001
--6
-6 8175 5100 9225 5400
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5100 9225 5100 9225 5400 8175 5400 8175 5100
-4 0 0 50 -1 0 12 0.0000 4 135 885 8250 5325 EAP-PEAP\001
--6
-6 9300 5100 10350 5400
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5100 10350 5100 10350 5400 9300 5400 9300 5100
-4 0 0 50 -1 0 12 0.0000 4 135 840 9375 5325 EAP-TTLS\001
--6
-6 8175 5475 9225 5775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5475 9225 5475 9225 5775 8175 5775 8175 5475
-4 0 0 50 -1 0 12 0.0000 4 135 780 8250 5700 EAP-GTC\001
--6
-6 9300 5475 10350 5775
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5475 10350 5475 10350 5775 9300 5775 9300 5475
-4 0 0 50 -1 0 12 0.0000 4 135 765 9375 5700 EAP-OTP\001
--6
-6 8175 5850 9225 6150
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 5850 9225 5850 9225 6150 8175 6150 8175 5850
-4 0 0 50 -1 0 12 0.0000 4 135 750 8250 6075 EAP-SIM\001
--6
-6 9300 6225 10350 6525
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 6225 10350 6225 10350 6525 9300 6525 9300 6225
-4 0 0 50 -1 0 12 0.0000 4 135 465 9375 6450 LEAP\001
--6
-6 8175 6225 9225 6525
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 6225 9225 6225 9225 6525 8175 6525 8175 6225
-4 0 0 50 -1 0 12 0.0000 4 135 765 8250 6450 EAP-PSK\001
--6
-6 9300 5850 10350 6150
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 5850 10350 5850 10350 6150 9300 6150 9300 5850
-4 0 0 50 -1 0 12 0.0000 4 135 825 9375 6075 EAP-AKA\001
--6
-6 8175 6975 9675 7275
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 6975 9675 6975 9675 7275 8175 7275 8175 6975
-4 0 0 50 -1 0 12 0.0000 4 135 1365 8250 7200 EAP-MSCHAPv2\001
--6
-6 9300 6600 10350 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 9300 6600 10350 6600 10350 6900 9300 6900 9300 6600
-4 0 0 50 -1 0 12 0.0000 4 135 870 9375 6825 EAP-FAST\001
--6
-6 8175 6600 9225 6900
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8175 6600 9225 6600 9225 6900 8175 6900 8175 6600
-4 0 0 50 -1 0 12 0.0000 4 135 795 8250 6825 EAP-PAX\001
--6
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 8100 7350 10425 7350 10425 4425 8100 4425 8100 7350
-4 0 0 50 -1 0 12 0.0000 4 135 1050 8700 4650 EAP methods\001
--6
-6 2775 5025 4050 5325
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 2775 5025 4050 5025 4050 5325 2775 5325 2775 5025
-4 0 0 50 -1 0 12 0.0000 4 135 990 2925 5250 driver events\001
--6
-6 2775 3150 4050 3450
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 2775 3150 4050 3150 4050 3450 2775 3450 2775 3150
-4 0 0 50 -1 0 12 0.0000 4 180 990 2925 3375 configuration\001
--6
-2 1 1 1 0 7 50 -1 -1 3.000 0 0 -1 0 0 2
- 1275 4200 1875 4200
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 4500 2550 3900 1500
-2 1 1 1 0 7 50 -1 -1 4.000 0 0 -1 0 0 2
- 4800 2550 5400 1500
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 2925 4200 4350 4200
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5025 3900 6000 3000
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 5025 4200 6000 4200
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 6000 4650 4425
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6600 4425 6600 4950
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6600 3225 6600 3900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 5250 8100 5250
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 9075 4425 9075 3300
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 3000 8700 3150
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4650 3900 4650 2850
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 7200 4125 8700 3300
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6000 4350 5025 6000
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 6000 3150 4875 6000
-2 2 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 5
- 1500 2100 10800 2100 10800 7500 1500 7500 1500 2100
-2 1 0 1 2 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 9900 4425 9900 3300
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 1
- 4350 3900
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4350 3900 4050 3450
-2 1 0 1 0 7 50 -1 -1 0.000 0 0 -1 0 0 2
- 4350 4425 4050 5025
-4 0 0 50 -1 0 12 0.0000 4 135 915 375 3975 EAPOL and\001
-4 0 0 50 -1 0 12 0.0000 4 180 630 375 4200 pre-auth\001
-4 0 0 50 -1 0 12 0.0000 4 180 810 375 4425 ethertypes\001
-4 0 0 50 -1 0 12 0.0000 4 135 1050 375 4650 from/to kernel\001
-4 0 0 50 -1 0 12 0.0000 4 135 1920 3675 1875 frontend control interface\001
-4 0 0 50 -1 2 14 0.0000 4 210 1440 1637 2371 wpa_supplicant\001
diff --git a/eap_example/.gitignore b/eap_example/.gitignore
deleted file mode 100644
index 4d6d2d1301b2..000000000000
--- a/eap_example/.gitignore
+++ /dev/null
@@ -1,4 +0,0 @@
-*.d
-eap_example
-libeap.so
-libeap.a
diff --git a/eap_example/Makefile b/eap_example/Makefile
deleted file mode 100644
index 691466f03c9a..000000000000
--- a/eap_example/Makefile
+++ /dev/null
@@ -1,119 +0,0 @@
-ALL=eap_example
-
-include ../src/build.rules
-
-CFLAGS += -I.
-CFLAGS += -I../src
-CFLAGS += -I../src/utils
-
-
-EAP_LIBS += ../src/utils/libutils.a
-EAP_LIBS += ../src/crypto/libcrypto.a
-EAP_LIBS += ../src/tls/libtls.a
-
-OBJS_both += ../src/eap_common/eap_peap_common.o
-OBJS_both += ../src/eap_common/eap_psk_common.o
-OBJS_both += ../src/eap_common/eap_pax_common.o
-OBJS_both += ../src/eap_common/eap_sake_common.o
-OBJS_both += ../src/eap_common/eap_gpsk_common.o
-OBJS_both += ../src/eap_common/chap.o
-
-OBJS_peer += ../src/eap_peer/eap_tls.o
-OBJS_peer += ../src/eap_peer/eap_peap.o
-OBJS_peer += ../src/eap_peer/eap_ttls.o
-OBJS_peer += ../src/eap_peer/eap_md5.o
-OBJS_peer += ../src/eap_peer/eap_mschapv2.o
-OBJS_peer += ../src/eap_peer/mschapv2.o
-OBJS_peer += ../src/eap_peer/eap_otp.o
-OBJS_peer += ../src/eap_peer/eap_gtc.o
-OBJS_peer += ../src/eap_peer/eap_leap.o
-OBJS_peer += ../src/eap_peer/eap_psk.o
-OBJS_peer += ../src/eap_peer/eap_pax.o
-OBJS_peer += ../src/eap_peer/eap_sake.o
-OBJS_peer += ../src/eap_peer/eap_gpsk.o
-OBJS_peer += ../src/eap_peer/eap.o
-OBJS_peer += ../src/eap_common/eap_common.o
-OBJS_peer += ../src/eap_peer/eap_methods.o
-OBJS_peer += ../src/eap_peer/eap_tls_common.o
-
-CFLAGS += -DEAP_TLS
-CFLAGS += -DEAP_PEAP
-CFLAGS += -DEAP_TTLS
-CFLAGS += -DEAP_MD5
-CFLAGS += -DEAP_MSCHAPv2
-CFLAGS += -DEAP_GTC
-CFLAGS += -DEAP_OTP
-CFLAGS += -DEAP_LEAP
-CFLAGS += -DEAP_PSK
-CFLAGS += -DEAP_PAX
-CFLAGS += -DEAP_SAKE
-CFLAGS += -DEAP_GPSK -DEAP_GPSK_SHA256
-
-CFLAGS += -DEAP_SERVER_IDENTITY
-CFLAGS += -DEAP_SERVER_TLS
-CFLAGS += -DEAP_SERVER_PEAP
-CFLAGS += -DEAP_SERVER_TTLS
-CFLAGS += -DEAP_SERVER_MD5
-CFLAGS += -DEAP_SERVER_MSCHAPV2
-CFLAGS += -DEAP_SERVER_GTC
-CFLAGS += -DEAP_SERVER_PSK
-CFLAGS += -DEAP_SERVER_PAX
-CFLAGS += -DEAP_SERVER_SAKE
-CFLAGS += -DEAP_SERVER_GPSK -DEAP_SERVER_GPSK_SHA256
-
-CFLAGS += -DIEEE8021X_EAPOL
-
-
-# Optional components to add EAP server support
-OBJS_server += ../src/eap_server/eap_server_tls.o
-OBJS_server += ../src/eap_server/eap_server_peap.o
-OBJS_server += ../src/eap_server/eap_server_ttls.o
-OBJS_server += ../src/eap_server/eap_server_md5.o
-OBJS_server += ../src/eap_server/eap_server_mschapv2.o
-OBJS_server += ../src/eap_server/eap_server_gtc.o
-OBJS_server += ../src/eap_server/eap_server_psk.o
-OBJS_server += ../src/eap_server/eap_server_pax.o
-OBJS_server += ../src/eap_server/eap_server_sake.o
-OBJS_server += ../src/eap_server/eap_server_gpsk.o
-OBJS_server += ../src/eap_server/eap_server.o
-OBJS_server += ../src/eap_server/eap_server_identity.o
-OBJS_server += ../src/eap_server/eap_server_methods.o
-OBJS_server += ../src/eap_server/eap_server_tls_common.o
-CFLAGS += -DEAP_SERVER
-
-
-OBJS_lib=$(OBJS_both) $(OBJS_peer) $(OBJS_server)
-_OBJS_VAR := OBJS_lib
-include ../src/objs.mk
-
-OBJS_ex = eap_example.o eap_example_peer.o eap_example_server.o
-_OBJS_VAR := OBJS_ex
-include ../src/objs.mk
-
-_OBJS_VAR := EAP_LIBS
-include ../src/objs.mk
-
-
-ifneq ($(CONFIG_SOLIB), yes)
-LIBEAP = libeap.a
-libeap.a: $(EAP_LIBS) $(OBJS_lib)
- $(AR) crT libeap.a $^
- $(RANLIB) libeap.a
-
-else
-CFLAGS += -fPIC -DPIC
-LDFLAGS += -shared
-
-LIBEAP = libeap.so
-libeap.so: $(EAP_LIBS) $(OBJS_lib)
- $(LDO) $(LDFLAGS) $^ -o $(LIBEAP)
-
-endif
-
-eap_example: $(OBJS_ex) $(LIBEAP)
- $(LDO) $(LDFLAGS) -o eap_example $(OBJS_ex) -L. -leap $(LIBS)
-
-clean: common-clean
- rm -f core *~ *.o *.d libeap.a libeap.so
-
--include $(OBJS:%.o=%.d)
diff --git a/eap_example/README b/eap_example/README
deleted file mode 100644
index 0c2921e3be93..000000000000
--- a/eap_example/README
+++ /dev/null
@@ -1,42 +0,0 @@
-EAP peer/server library and example program
-Copyright (c) 2007, Jouni Malinen <j@w1.fi>
-
-This software may be distributed under the terms of the BSD license.
-See the parent directory README for more details.
-
-
-The interfaces of the EAP server/peer implementation are based on RFC
-4137 (EAP State Machines). This RFC is coordinated with the state
-machines defined in IEEE 802.1X-2004. hostapd and wpa_supplicant
-include implementation of the IEEE 802.1X EAPOL state machines and the
-interface between them and EAP. However, the EAP implementation can be
-used with other protocols, too, by providing a compatible interface
-which maps the EAPOL<->EAP variables to another protocol.
-
-This directory contains an example showing how EAP peer and server
-code from wpa_supplicant and hostapd can be used as a library. The
-example program initializes both an EAP server and an EAP peer
-entities and then runs through an EAP-PEAP/MSCHAPv2 authentication.
-
-eap_example_peer.c shows the initialization and glue code needed to
-control the EAP peer implementation. eap_example_server.c does the
-same for EAP server. eap_example.c is an example that ties in both the
-EAP server and client parts to allow an EAP authentication to be
-shown.
-
-In this example, the EAP messages are passed between the server and
-the peer are passed by direct function calls within the same process.
-In practice, server and peer functionalities would likely reside in
-separate devices and the EAP messages would be transmitted between the
-devices based on an external protocol. For example, in IEEE 802.11
-uses IEEE 802.1X EAPOL state machines to control the transmission of
-EAP messages and WiMax supports optional PMK EAP authentication
-mechanism that transmits EAP messages as defined in IEEE 802.16e.
-
-
-The EAP library links in number of helper functions from src/utils and
-src/crypto directories. Most of these are suitable as-is, but it may
-be desirable to replace the debug output code in src/utils/wpa_debug.c
-by dropping this file from the library and re-implementing the
-functions there in a way that better fits in with the main
-application.
diff --git a/eap_example/ca.pem b/eap_example/ca.pem
deleted file mode 100644
index b128893a1e7b..000000000000
--- a/eap_example/ca.pem
+++ /dev/null
@@ -1,55 +0,0 @@
-Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 15624081837803162817 (0xd8d3e3a6cbe3ccc1)
- Signature Algorithm: sha1WithRSAEncryption
- Issuer: C=FI, O=w1.fi, CN=Root CA
- Validity
- Not Before: Jun 29 16:41:22 2013 GMT
- Not After : Jun 27 16:41:22 2023 GMT
- Subject: C=FI, O=w1.fi, CN=Root CA
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (1024 bit)
- Modulus:
- 00:be:1e:86:e4:79:03:c1:d1:94:d5:d4:b3:b1:28:
- 90:76:fb:b8:a6:cd:6d:1c:d1:48:f4:08:9a:67:ff:
- f9:a6:54:b1:19:29:df:29:1b:cd:f1:6f:66:01:e7:
- db:79:ce:c0:39:2a:25:13:26:94:0c:2c:7b:5a:2c:
- 81:0f:94:ee:51:d0:75:e6:46:db:17:46:a7:15:8b:
- 0e:57:0f:b0:54:76:63:12:ca:86:18:bc:1a:c3:16:
- c0:70:09:d6:6b:43:39:b8:98:29:46:ac:cb:6a:ad:
- 38:88:3b:07:dc:81:cd:3a:f6:1d:f6:2f:ef:1d:d7:
- ae:8a:b6:d1:e7:b3:15:02:b9
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Subject Key Identifier:
- B8:92:DE:FD:8A:18:B3:30:C3:9F:55:F3:33:5D:B4:C8:29:8A:41:14
- X509v3 Authority Key Identifier:
- keyid:B8:92:DE:FD:8A:18:B3:30:C3:9F:55:F3:33:5D:B4:C8:29:8A:41:14
-
- X509v3 Basic Constraints:
- CA:TRUE
- Signature Algorithm: sha1WithRSAEncryption
- 1a:cf:77:60:44:43:c4:55:0e:99:e0:89:aa:b9:d3:7b:32:b7:
- 5c:9c:7c:ca:fe:8c:d4:94:c6:5e:f3:83:19:5f:29:59:68:a4:
- 4f:dc:04:2e:b8:71:c0:6d:3b:ae:01:e4:b9:88:99:cc:ce:82:
- be:6a:28:c2:ac:6a:94:c6:87:90:ed:85:3c:10:71:c5:ff:3c:
- 70:64:e2:41:62:31:ea:86:7b:11:8c:93:ea:c6:f3:f3:4e:f9:
- d4:f2:81:90:d7:f4:fa:a1:91:6e:d4:dd:15:3e:26:3b:ac:1e:
- c3:c2:1f:ed:bb:34:bf:cb:b2:67:c6:c6:51:e8:51:22:b4:f3:
- 92:e8
------BEGIN CERTIFICATE-----
-MIICLDCCAZWgAwIBAgIJANjT46bL48zBMA0GCSqGSIb3DQEBBQUAMC8xCzAJBgNV
-BAYTAkZJMQ4wDAYDVQQKDAV3MS5maTEQMA4GA1UEAwwHUm9vdCBDQTAeFw0xMzA2
-MjkxNjQxMjJaFw0yMzA2MjcxNjQxMjJaMC8xCzAJBgNVBAYTAkZJMQ4wDAYDVQQK
-DAV3MS5maTEQMA4GA1UEAwwHUm9vdCBDQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAw
-gYkCgYEAvh6G5HkDwdGU1dSzsSiQdvu4ps1tHNFI9AiaZ//5plSxGSnfKRvN8W9m
-Aefbec7AOSolEyaUDCx7WiyBD5TuUdB15kbbF0anFYsOVw+wVHZjEsqGGLwawxbA
-cAnWa0M5uJgpRqzLaq04iDsH3IHNOvYd9i/vHdeuirbR57MVArkCAwEAAaNQME4w
-HQYDVR0OBBYEFLiS3v2KGLMww59V8zNdtMgpikEUMB8GA1UdIwQYMBaAFLiS3v2K
-GLMww59V8zNdtMgpikEUMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEA
-Gs93YERDxFUOmeCJqrnTezK3XJx8yv6M1JTGXvODGV8pWWikT9wELrhxwG07rgHk
-uYiZzM6CvmoowqxqlMaHkO2FPBBxxf88cGTiQWIx6oZ7EYyT6sbz80751PKBkNf0
-+qGRbtTdFT4mO6wew8If7bs0v8uyZ8bGUehRIrTzkug=
------END CERTIFICATE-----
diff --git a/eap_example/dh.conf b/eap_example/dh.conf
deleted file mode 100644
index 7bc83251c592..000000000000
--- a/eap_example/dh.conf
+++ /dev/null
@@ -1,5 +0,0 @@
------BEGIN DH PARAMETERS-----
-MIGHAoGBAP3V8IHq3H2DUlYywsvjYNuS17eCdt0mJo6/os6PHqdhgkMrPxF9u4Gr
-qKXq9e6GqmZYdjta30N3FkXaV924BJ0xOqb2TntiKg4u50/l6hSUneWt6UFBaizd
-XrqjNFIme/5RXMZ7RglXliBpCepAaFLMcKhOS4ulUyYYHSy+oqRjAgEC
------END DH PARAMETERS-----
diff --git a/eap_example/eap_example.c b/eap_example/eap_example.c
deleted file mode 100644
index 8a48cd34b030..000000000000
--- a/eap_example/eap_example.c
+++ /dev/null
@@ -1,47 +0,0 @@
-/*
- * Example application showing how EAP peer and server code from
- * wpa_supplicant/hostapd can be used as a library. This example program
- * initializes both an EAP server and an EAP peer entities and then runs
- * through an EAP-PEAP/MSCHAPv2 authentication.
- * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-
-#include "common.h"
-
-
-int eap_example_peer_init(void);
-void eap_example_peer_deinit(void);
-int eap_example_peer_step(void);
-
-int eap_example_server_init(void);
-void eap_example_server_deinit(void);
-int eap_example_server_step(void);
-
-
-int main(int argc, char *argv[])
-{
- int res_s, res_p;
-
- wpa_debug_level = 0;
-
- if (eap_example_peer_init() < 0 ||
- eap_example_server_init() < 0)
- return -1;
-
- do {
- printf("---[ server ]--------------------------------\n");
- res_s = eap_example_server_step();
- printf("---[ peer ]----------------------------------\n");
- res_p = eap_example_peer_step();
- } while (res_s || res_p);
-
- eap_example_peer_deinit();
- eap_example_server_deinit();
-
- return 0;
-}
diff --git a/eap_example/eap_example_peer.c b/eap_example/eap_example_peer.c
deleted file mode 100644
index 5fe0cb7fa7f6..000000000000
--- a/eap_example/eap_example_peer.c
+++ /dev/null
@@ -1,377 +0,0 @@
-/*
- * Example application showing how EAP peer code from wpa_supplicant can be
- * used as a library.
- * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-
-#include "common.h"
-#include "eap_peer/eap.h"
-#include "eap_peer/eap_config.h"
-#include "wpabuf.h"
-
-void eap_example_server_rx(const u8 *data, size_t data_len);
-
-
-struct eap_peer_ctx {
- bool eapSuccess;
- bool eapRestart;
- bool eapFail;
- bool eapResp;
- bool eapNoResp;
- bool eapReq;
- bool portEnabled;
- bool altAccept; /* for EAP */
- bool altReject; /* for EAP */
- bool eapTriggerStart;
-
- struct wpabuf *eapReqData; /* for EAP */
-
- unsigned int idleWhile; /* for EAP state machine */
-
- struct eap_peer_config eap_config;
- struct eap_sm *eap;
-};
-
-
-static struct eap_peer_ctx eap_ctx;
-
-
-static struct eap_peer_config * peer_get_config(void *ctx)
-{
- struct eap_peer_ctx *peer = ctx;
- return &peer->eap_config;
-}
-
-
-static bool peer_get_bool(void *ctx, enum eapol_bool_var variable)
-{
- struct eap_peer_ctx *peer = ctx;
- if (peer == NULL)
- return false;
- switch (variable) {
- case EAPOL_eapSuccess:
- return peer->eapSuccess;
- case EAPOL_eapRestart:
- return peer->eapRestart;
- case EAPOL_eapFail:
- return peer->eapFail;
- case EAPOL_eapResp:
- return peer->eapResp;
- case EAPOL_eapNoResp:
- return peer->eapNoResp;
- case EAPOL_eapReq:
- return peer->eapReq;
- case EAPOL_portEnabled:
- return peer->portEnabled;
- case EAPOL_altAccept:
- return peer->altAccept;
- case EAPOL_altReject:
- return peer->altReject;
- case EAPOL_eapTriggerStart:
- return peer->eapTriggerStart;
- }
- return false;
-}
-
-
-static void peer_set_bool(void *ctx, enum eapol_bool_var variable, bool value)
-{
- struct eap_peer_ctx *peer = ctx;
- if (peer == NULL)
- return;
- switch (variable) {
- case EAPOL_eapSuccess:
- peer->eapSuccess = value;
- break;
- case EAPOL_eapRestart:
- peer->eapRestart = value;
- break;
- case EAPOL_eapFail:
- peer->eapFail = value;
- break;
- case EAPOL_eapResp:
- peer->eapResp = value;
- break;
- case EAPOL_eapNoResp:
- peer->eapNoResp = value;
- break;
- case EAPOL_eapReq:
- peer->eapReq = value;
- break;
- case EAPOL_portEnabled:
- peer->portEnabled = value;
- break;
- case EAPOL_altAccept:
- peer->altAccept = value;
- break;
- case EAPOL_altReject:
- peer->altReject = value;
- break;
- case EAPOL_eapTriggerStart:
- peer->eapTriggerStart = value;
- break;
- }
-}
-
-
-static unsigned int peer_get_int(void *ctx, enum eapol_int_var variable)
-{
- struct eap_peer_ctx *peer = ctx;
- if (peer == NULL)
- return 0;
- switch (variable) {
- case EAPOL_idleWhile:
- return peer->idleWhile;
- }
- return 0;
-}
-
-
-static void peer_set_int(void *ctx, enum eapol_int_var variable,
- unsigned int value)
-{
- struct eap_peer_ctx *peer = ctx;
- if (peer == NULL)
- return;
- switch (variable) {
- case EAPOL_idleWhile:
- peer->idleWhile = value;
- break;
- }
-}
-
-
-static struct wpabuf * peer_get_eapReqData(void *ctx)
-{
- struct eap_peer_ctx *peer = ctx;
- if (peer == NULL || peer->eapReqData == NULL)
- return NULL;
-
- return peer->eapReqData;
-}
-
-
-static void peer_set_config_blob(void *ctx, struct wpa_config_blob *blob)
-{
- printf("TODO: %s\n", __func__);
-}
-
-
-static const struct wpa_config_blob *
-peer_get_config_blob(void *ctx, const char *name)
-{
- printf("TODO: %s\n", __func__);
- return NULL;
-}
-
-
-static void peer_notify_pending(void *ctx)
-{
- printf("TODO: %s\n", __func__);
-}
-
-
-static int eap_peer_register_methods(void)
-{
- int ret = 0;
-
-#ifdef EAP_MD5
- if (ret == 0)
- ret = eap_peer_md5_register();
-#endif /* EAP_MD5 */
-
-#ifdef EAP_TLS
- if (ret == 0)
- ret = eap_peer_tls_register();
-#endif /* EAP_TLS */
-
-#ifdef EAP_MSCHAPv2
- if (ret == 0)
- ret = eap_peer_mschapv2_register();
-#endif /* EAP_MSCHAPv2 */
-
-#ifdef EAP_PEAP
- if (ret == 0)
- ret = eap_peer_peap_register();
-#endif /* EAP_PEAP */
-
-#ifdef EAP_TTLS
- if (ret == 0)
- ret = eap_peer_ttls_register();
-#endif /* EAP_TTLS */
-
-#ifdef EAP_GTC
- if (ret == 0)
- ret = eap_peer_gtc_register();
-#endif /* EAP_GTC */
-
-#ifdef EAP_OTP
- if (ret == 0)
- ret = eap_peer_otp_register();
-#endif /* EAP_OTP */
-
-#ifdef EAP_SIM
- if (ret == 0)
- ret = eap_peer_sim_register();
-#endif /* EAP_SIM */
-
-#ifdef EAP_LEAP
- if (ret == 0)
- ret = eap_peer_leap_register();
-#endif /* EAP_LEAP */
-
-#ifdef EAP_PSK
- if (ret == 0)
- ret = eap_peer_psk_register();
-#endif /* EAP_PSK */
-
-#ifdef EAP_AKA
- if (ret == 0)
- ret = eap_peer_aka_register();
-#endif /* EAP_AKA */
-
-#ifdef EAP_AKA_PRIME
- if (ret == 0)
- ret = eap_peer_aka_prime_register();
-#endif /* EAP_AKA_PRIME */
-
-#ifdef EAP_FAST
- if (ret == 0)
- ret = eap_peer_fast_register();
-#endif /* EAP_FAST */
-
-#ifdef EAP_PAX
- if (ret == 0)
- ret = eap_peer_pax_register();
-#endif /* EAP_PAX */
-
-#ifdef EAP_SAKE
- if (ret == 0)
- ret = eap_peer_sake_register();
-#endif /* EAP_SAKE */
-
-#ifdef EAP_GPSK
- if (ret == 0)
- ret = eap_peer_gpsk_register();
-#endif /* EAP_GPSK */
-
-#ifdef EAP_WSC
- if (ret == 0)
- ret = eap_peer_wsc_register();
-#endif /* EAP_WSC */
-
-#ifdef EAP_IKEV2
- if (ret == 0)
- ret = eap_peer_ikev2_register();
-#endif /* EAP_IKEV2 */
-
-#ifdef EAP_VENDOR_TEST
- if (ret == 0)
- ret = eap_peer_vendor_test_register();
-#endif /* EAP_VENDOR_TEST */
-
-#ifdef EAP_TNC
- if (ret == 0)
- ret = eap_peer_tnc_register();
-#endif /* EAP_TNC */
-
- return ret;
-}
-
-
-static struct eapol_callbacks eap_cb;
-static struct eap_config eap_conf;
-
-int eap_example_peer_init(void)
-{
- if (eap_peer_register_methods() < 0)
- return -1;
-
- os_memset(&eap_ctx, 0, sizeof(eap_ctx));
-
- eap_ctx.eap_config.identity = (u8 *) os_strdup("user");
- eap_ctx.eap_config.identity_len = 4;
- eap_ctx.eap_config.password = (u8 *) os_strdup("password");
- eap_ctx.eap_config.password_len = 8;
- eap_ctx.eap_config.cert.ca_cert = os_strdup("ca.pem");
- eap_ctx.eap_config.fragment_size = 1398;
-
- os_memset(&eap_cb, 0, sizeof(eap_cb));
- eap_cb.get_config = peer_get_config;
- eap_cb.get_bool = peer_get_bool;
- eap_cb.set_bool = peer_set_bool;
- eap_cb.get_int = peer_get_int;
- eap_cb.set_int = peer_set_int;
- eap_cb.get_eapReqData = peer_get_eapReqData;
- eap_cb.set_config_blob = peer_set_config_blob;
- eap_cb.get_config_blob = peer_get_config_blob;
- eap_cb.notify_pending = peer_notify_pending;
-
- os_memset(&eap_conf, 0, sizeof(eap_conf));
- eap_ctx.eap = eap_peer_sm_init(&eap_ctx, &eap_cb, &eap_ctx, &eap_conf);
- if (eap_ctx.eap == NULL)
- return -1;
-
- /* Enable "port" to allow authentication */
- eap_ctx.portEnabled = true;
-
- return 0;
-}
-
-
-void eap_example_peer_deinit(void)
-{
- eap_peer_sm_deinit(eap_ctx.eap);
- eap_peer_unregister_methods();
- wpabuf_free(eap_ctx.eapReqData);
- os_free(eap_ctx.eap_config.identity);
- os_free(eap_ctx.eap_config.password);
- os_free(eap_ctx.eap_config.cert.ca_cert);
-}
-
-
-int eap_example_peer_step(void)
-{
- int res;
- res = eap_peer_sm_step(eap_ctx.eap);
-
- if (eap_ctx.eapResp) {
- struct wpabuf *resp;
- printf("==> Response\n");
- eap_ctx.eapResp = false;
- resp = eap_get_eapRespData(eap_ctx.eap);
- if (resp) {
- /* Send EAP response to the server */
- eap_example_server_rx(wpabuf_head(resp),
- wpabuf_len(resp));
- wpabuf_free(resp);
- }
- }
-
- if (eap_ctx.eapSuccess) {
- res = 0;
- if (eap_key_available(eap_ctx.eap)) {
- const u8 *key;
- size_t key_len;
- key = eap_get_eapKeyData(eap_ctx.eap, &key_len);
- wpa_hexdump(MSG_DEBUG, "EAP keying material",
- key, key_len);
- }
- }
-
- return res;
-}
-
-
-void eap_example_peer_rx(const u8 *data, size_t data_len)
-{
- /* Make received EAP message available to the EAP library */
- eap_ctx.eapReq = true;
- wpabuf_free(eap_ctx.eapReqData);
- eap_ctx.eapReqData = wpabuf_alloc_copy(data, data_len);
-}
diff --git a/eap_example/eap_example_server.c b/eap_example/eap_example_server.c
deleted file mode 100644
index 3a132bb3466e..000000000000
--- a/eap_example/eap_example_server.c
+++ /dev/null
@@ -1,300 +0,0 @@
-/*
- * Example application showing how EAP server code from hostapd can be used as
- * a library.
- * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-
-#include "common.h"
-#include "crypto/tls.h"
-#include "eap_server/eap.h"
-#include "wpabuf.h"
-
-void eap_example_peer_rx(const u8 *data, size_t data_len);
-
-
-struct eap_server_ctx {
- struct eap_eapol_interface *eap_if;
- struct eap_sm *eap;
- void *tls_ctx;
-};
-
-static struct eap_server_ctx eap_ctx;
-
-
-static int server_get_eap_user(void *ctx, const u8 *identity,
- size_t identity_len, int phase2,
- struct eap_user *user)
-{
- os_memset(user, 0, sizeof(*user));
-
- if (!phase2) {
- /* Only allow EAP-PEAP as the Phase 1 method */
- user->methods[0].vendor = EAP_VENDOR_IETF;
- user->methods[0].method = EAP_TYPE_PEAP;
- return 0;
- }
-
- if (identity_len != 4 || identity == NULL ||
- os_memcmp(identity, "user", 4) != 0) {
- printf("Unknown user\n");
- return -1;
- }
-
- /* Only allow EAP-MSCHAPv2 as the Phase 2 method */
- user->methods[0].vendor = EAP_VENDOR_IETF;
- user->methods[0].method = EAP_TYPE_MSCHAPV2;
- user->password = (u8 *) os_strdup("password");
- user->password_len = 8;
-
- return 0;
-}
-
-
-static const char * server_get_eap_req_id_text(void *ctx, size_t *len)
-{
- *len = 0;
- return NULL;
-}
-
-
-static struct eapol_callbacks eap_cb;
-static struct eap_config eap_conf;
-
-static int eap_example_server_init_tls(void)
-{
- struct tls_config tconf;
- struct tls_connection_params tparams;
-
- os_memset(&tconf, 0, sizeof(tconf));
- eap_ctx.tls_ctx = tls_init(&tconf);
- if (eap_ctx.tls_ctx == NULL)
- return -1;
-
- os_memset(&tparams, 0, sizeof(tparams));
- tparams.ca_cert = "ca.pem";
- tparams.client_cert = "server.pem";
- /* tparams.private_key = "server.key"; */
- tparams.private_key = "server-key.pem";
- /* tparams.private_key_passwd = "whatever"; */
- tparams.dh_file = "dh.conf";
-
- if (tls_global_set_params(eap_ctx.tls_ctx, &tparams)) {
- printf("Failed to set TLS parameters\n");
- return -1;
- }
-
- if (tls_global_set_verify(eap_ctx.tls_ctx, 0, 1)) {
- printf("Failed to set check_crl\n");
- return -1;
- }
-
- return 0;
-}
-
-
-static int eap_server_register_methods(void)
-{
- int ret = 0;
-
-#ifdef EAP_SERVER_IDENTITY
- if (ret == 0)
- ret = eap_server_identity_register();
-#endif /* EAP_SERVER_IDENTITY */
-
-#ifdef EAP_SERVER_MD5
- if (ret == 0)
- ret = eap_server_md5_register();
-#endif /* EAP_SERVER_MD5 */
-
-#ifdef EAP_SERVER_TLS
- if (ret == 0)
- ret = eap_server_tls_register();
-#endif /* EAP_SERVER_TLS */
-
-#ifdef EAP_SERVER_MSCHAPV2
- if (ret == 0)
- ret = eap_server_mschapv2_register();
-#endif /* EAP_SERVER_MSCHAPV2 */
-
-#ifdef EAP_SERVER_PEAP
- if (ret == 0)
- ret = eap_server_peap_register();
-#endif /* EAP_SERVER_PEAP */
-
-#ifdef EAP_SERVER_TLV
- if (ret == 0)
- ret = eap_server_tlv_register();
-#endif /* EAP_SERVER_TLV */
-
-#ifdef EAP_SERVER_GTC
- if (ret == 0)
- ret = eap_server_gtc_register();
-#endif /* EAP_SERVER_GTC */
-
-#ifdef EAP_SERVER_TTLS
- if (ret == 0)
- ret = eap_server_ttls_register();
-#endif /* EAP_SERVER_TTLS */
-
-#ifdef EAP_SERVER_SIM
- if (ret == 0)
- ret = eap_server_sim_register();
-#endif /* EAP_SERVER_SIM */
-
-#ifdef EAP_SERVER_AKA
- if (ret == 0)
- ret = eap_server_aka_register();
-#endif /* EAP_SERVER_AKA */
-
-#ifdef EAP_SERVER_AKA_PRIME
- if (ret == 0)
- ret = eap_server_aka_prime_register();
-#endif /* EAP_SERVER_AKA_PRIME */
-
-#ifdef EAP_SERVER_PAX
- if (ret == 0)
- ret = eap_server_pax_register();
-#endif /* EAP_SERVER_PAX */
-
-#ifdef EAP_SERVER_PSK
- if (ret == 0)
- ret = eap_server_psk_register();
-#endif /* EAP_SERVER_PSK */
-
-#ifdef EAP_SERVER_SAKE
- if (ret == 0)
- ret = eap_server_sake_register();
-#endif /* EAP_SERVER_SAKE */
-
-#ifdef EAP_SERVER_GPSK
- if (ret == 0)
- ret = eap_server_gpsk_register();
-#endif /* EAP_SERVER_GPSK */
-
-#ifdef EAP_SERVER_VENDOR_TEST
- if (ret == 0)
- ret = eap_server_vendor_test_register();
-#endif /* EAP_SERVER_VENDOR_TEST */
-
-#ifdef EAP_SERVER_FAST
- if (ret == 0)
- ret = eap_server_fast_register();
-#endif /* EAP_SERVER_FAST */
-
-#ifdef EAP_SERVER_WSC
- if (ret == 0)
- ret = eap_server_wsc_register();
-#endif /* EAP_SERVER_WSC */
-
-#ifdef EAP_SERVER_IKEV2
- if (ret == 0)
- ret = eap_server_ikev2_register();
-#endif /* EAP_SERVER_IKEV2 */
-
-#ifdef EAP_SERVER_TNC
- if (ret == 0)
- ret = eap_server_tnc_register();
-#endif /* EAP_SERVER_TNC */
-
- return ret;
-}
-
-
-int eap_example_server_init(void)
-{
- struct eap_session_data eap_sess;
-
- if (eap_server_register_methods() < 0)
- return -1;
-
- os_memset(&eap_ctx, 0, sizeof(eap_ctx));
-
- if (eap_example_server_init_tls() < 0)
- return -1;
-
- os_memset(&eap_cb, 0, sizeof(eap_cb));
- eap_cb.get_eap_user = server_get_eap_user;
- eap_cb.get_eap_req_id_text = server_get_eap_req_id_text;
-
- os_memset(&eap_conf, 0, sizeof(eap_conf));
- eap_conf.eap_server = 1;
- eap_conf.ssl_ctx = eap_ctx.tls_ctx;
-
- os_memset(&eap_sess, 0, sizeof(eap_sess));
- eap_ctx.eap = eap_server_sm_init(&eap_ctx, &eap_cb, &eap_conf,
- &eap_sess);
- if (eap_ctx.eap == NULL)
- return -1;
-
- eap_ctx.eap_if = eap_get_interface(eap_ctx.eap);
-
- /* Enable "port" and request EAP to start authentication. */
- eap_ctx.eap_if->portEnabled = true;
- eap_ctx.eap_if->eapRestart = true;
-
- return 0;
-}
-
-
-void eap_example_server_deinit(void)
-{
- eap_server_sm_deinit(eap_ctx.eap);
- eap_server_unregister_methods();
- tls_deinit(eap_ctx.tls_ctx);
-}
-
-
-int eap_example_server_step(void)
-{
- int res, process = 0;
-
- res = eap_server_sm_step(eap_ctx.eap);
-
- if (eap_ctx.eap_if->eapReq) {
- printf("==> Request\n");
- process = 1;
- eap_ctx.eap_if->eapReq = 0;
- }
-
- if (eap_ctx.eap_if->eapSuccess) {
- printf("==> Success\n");
- process = 1;
- res = 0;
- eap_ctx.eap_if->eapSuccess = 0;
-
- if (eap_ctx.eap_if->eapKeyAvailable) {
- wpa_hexdump(MSG_DEBUG, "EAP keying material",
- eap_ctx.eap_if->eapKeyData,
- eap_ctx.eap_if->eapKeyDataLen);
- }
- }
-
- if (eap_ctx.eap_if->eapFail) {
- printf("==> Fail\n");
- process = 1;
- eap_ctx.eap_if->eapFail = 0;
- }
-
- if (process && eap_ctx.eap_if->eapReqData) {
- /* Send EAP request to the peer */
- eap_example_peer_rx(wpabuf_head(eap_ctx.eap_if->eapReqData),
- wpabuf_len(eap_ctx.eap_if->eapReqData));
- }
-
- return res;
-}
-
-
-void eap_example_server_rx(const u8 *data, size_t data_len)
-{
- /* Make received EAP message available to the EAP library */
- wpabuf_free(eap_ctx.eap_if->eapRespData);
- eap_ctx.eap_if->eapRespData = wpabuf_alloc_copy(data, data_len);
- if (eap_ctx.eap_if->eapRespData)
- eap_ctx.eap_if->eapResp = true;
-}
diff --git a/eap_example/server-key.pem b/eap_example/server-key.pem
deleted file mode 100644
index 0fe2cec47330..000000000000
--- a/eap_example/server-key.pem
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC6oHdVIhSFVWWbZCyt7ZvdZTHJ2mBQzjjWNNzovBueMOcS41Ns
-ye1IA3mBaZjOirh3RzZFz8bg8XsecYlU9wHMIq2gQrGoNZ5gqjqYUdD/H+6+jQpj
-+6I5F/JkYfZlAjJ5dOGf0YllVanDIJ6/aVaz908/qVTC2o88r/J1VPp+gQIDAQAB
-AoGAR/C5b3DOtkMgAtGPw5AXiDWNBsGOZTfJgxEnovN4Nfel64sDyqjgNeVY/kDl
-baDd0OT7j9ezU1zi1+5uQPlikFSvzgpdLgQhKkvWLzzehafb2uVaJ4VsRqS3WXK8
-RE06cYx4VQRkvQvMAXWsuua9pw36OrlpQnm3HlAbrks8Mm0CQQDgMEu2WPMWP2wj
-Q8735zbj7D0AxEFlcegPZr/QZ3qU//G0HL35FG18lsuTbDzesrf7apo3W1BBQLjS
-ZSNtyNsLAkEA1Ru6aEy/Cj2u1GYHu1u/RcshKC+W7rdVT0wDeiSTUzKafZNiwVhY
-1Epk4k5HnHB327ysTI1LiOzUMMmuNYUkIwJAKUkbmFAXLCCv5GqnYcXluOGXdl2u
-AWWRq8xrRJDZ5TihJV8pqQYXB5upj9Od/hEBir5d+hXJ2Mp3ft97P8t+cwJAGeWQ
-tXP+EySDxlPPxLjVeYnBsbx2vvOQbl5yXblsHcQcef4bFhvCT6nqsIWKtjwElLNM
-zNCuySjecD9R6DcRuQJBAJWrpgny77wP29x1WQ/29J8ZJfxe4N5wAj1SePBVNgZ3
-gfm1O+c6niNwe8RnfQimppLrrR+qK33te2SPGXiwi6g=
------END RSA PRIVATE KEY-----
diff --git a/eap_example/server.key b/eap_example/server.key
deleted file mode 100644
index 1416327bef21..000000000000
--- a/eap_example/server.key
+++ /dev/null
@@ -1,16 +0,0 @@
------BEGIN PRIVATE KEY-----
-MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALqgd1UiFIVVZZtk
-LK3tm91lMcnaYFDOONY03Oi8G54w5xLjU2zJ7UgDeYFpmM6KuHdHNkXPxuDxex5x
-iVT3AcwiraBCsag1nmCqOphR0P8f7r6NCmP7ojkX8mRh9mUCMnl04Z/RiWVVqcMg
-nr9pVrP3Tz+pVMLajzyv8nVU+n6BAgMBAAECgYBH8LlvcM62QyAC0Y/DkBeINY0G
-wY5lN8mDESei83g196XriwPKqOA15Vj+QOVtoN3Q5PuP17NTXOLX7m5A+WKQVK/O
-Cl0uBCEqS9YvPN6Fp9va5VonhWxGpLdZcrxETTpxjHhVBGS9C8wBday65r2nDfo6
-uWlCebceUBuuSzwybQJBAOAwS7ZY8xY/bCNDzvfnNuPsPQDEQWVx6A9mv9BnepT/
-8bQcvfkUbXyWy5NsPN6yt/tqmjdbUEFAuNJlI23I2wsCQQDVG7poTL8KPa7UZge7
-W79FyyEoL5but1VPTAN6JJNTMpp9k2LBWFjUSmTiTkeccHfbvKxMjUuI7NQwya41
-hSQjAkApSRuYUBcsIK/kaqdhxeW44Zd2Xa4BZZGrzGtEkNnlOKElXympBhcHm6mP
-053+EQGKvl36FcnYynd+33s/y35zAkAZ5ZC1c/4TJIPGU8/EuNV5icGxvHa+85Bu
-XnJduWwdxBx5/hsWG8JPqeqwhYq2PASUs0zM0K7JKN5wP1HoNxG5AkEAlaumCfLv
-vA/b3HVZD/b0nxkl/F7g3nACPVJ48FU2BneB+bU75zqeI3B7xGd9CKamkuutH6or
-fe17ZI8ZeLCLqA==
------END PRIVATE KEY-----
diff --git a/eap_example/server.pem b/eap_example/server.pem
deleted file mode 100644
index 93b39b9d5027..000000000000
--- a/eap_example/server.pem
+++ /dev/null
@@ -1,64 +0,0 @@
-Certificate:
- Data:
- Version: 3 (0x2)
- Serial Number: 15624081837803162903 (0xd8d3e3a6cbe3cd17)
- Signature Algorithm: sha256WithRSAEncryption
- Issuer: C=FI, O=w1.fi, CN=Root CA
- Validity
- Not Before: Oct 3 22:13:55 2018 GMT
- Not After : Oct 3 22:13:55 2019 GMT
- Subject: C=FI, O=w1.fi, CN=server.w1.fi
- Subject Public Key Info:
- Public Key Algorithm: rsaEncryption
- Public-Key: (1024 bit)
- Modulus:
- 00:ba:a0:77:55:22:14:85:55:65:9b:64:2c:ad:ed:
- 9b:dd:65:31:c9:da:60:50:ce:38:d6:34:dc:e8:bc:
- 1b:9e:30:e7:12:e3:53:6c:c9:ed:48:03:79:81:69:
- 98:ce:8a:b8:77:47:36:45:cf:c6:e0:f1:7b:1e:71:
- 89:54:f7:01:cc:22:ad:a0:42:b1:a8:35:9e:60:aa:
- 3a:98:51:d0:ff:1f:ee:be:8d:0a:63:fb:a2:39:17:
- f2:64:61:f6:65:02:32:79:74:e1:9f:d1:89:65:55:
- a9:c3:20:9e:bf:69:56:b3:f7:4f:3f:a9:54:c2:da:
- 8f:3c:af:f2:75:54:fa:7e:81
- Exponent: 65537 (0x10001)
- X509v3 extensions:
- X509v3 Basic Constraints:
- CA:FALSE
- X509v3 Subject Key Identifier:
- 31:4F:10:5C:67:9F:BE:4E:88:D6:DC:C5:AB:9E:12:88:86:69:02:4F
- X509v3 Authority Key Identifier:
- keyid:B8:92:DE:FD:8A:18:B3:30:C3:9F:55:F3:33:5D:B4:C8:29:8A:41:14
-
- Authority Information Access:
- OCSP - URI:http://server.w1.fi:8888/
-
- X509v3 Subject Alternative Name:
- DNS:server.w1.fi
- X509v3 Extended Key Usage:
- TLS Web Server Authentication
- Signature Algorithm: sha256WithRSAEncryption
- b6:98:ae:d9:9b:9a:44:49:b2:06:ee:af:36:83:cb:cd:cb:c9:
- f3:38:6d:65:cb:e9:81:d2:25:dd:76:12:5c:da:3f:a1:0e:11:
- a5:04:ed:05:29:2d:66:94:82:a2:80:67:d1:d8:78:71:72:5f:
- 10:c3:51:a2:7b:f5:0b:5f:ec:70:12:99:cb:65:6f:50:7f:2b:
- 05:7c:b4:d7:1b:21:77:66:47:33:f3:a7:d6:fb:ce:97:fe:5f:
- fd:df:1f:1d:6f:ef:22:5a:c6:78:d2:2b:07:1e:55:ec:80:62:
- 06:7a:be:6a:0d:4d:96:c2:d5:df:76:56:b0:85:6a:f8:a0:27:
- 62:31
------BEGIN CERTIFICATE-----
-MIIClTCCAf6gAwIBAgIJANjT46bL480XMA0GCSqGSIb3DQEBCwUAMC8xCzAJBgNV
-BAYTAkZJMQ4wDAYDVQQKDAV3MS5maTEQMA4GA1UEAwwHUm9vdCBDQTAeFw0xODEw
-MDMyMjEzNTVaFw0xOTEwMDMyMjEzNTVaMDQxCzAJBgNVBAYTAkZJMQ4wDAYDVQQK
-DAV3MS5maTEVMBMGA1UEAwwMc2VydmVyLncxLmZpMIGfMA0GCSqGSIb3DQEBAQUA
-A4GNADCBiQKBgQC6oHdVIhSFVWWbZCyt7ZvdZTHJ2mBQzjjWNNzovBueMOcS41Ns
-ye1IA3mBaZjOirh3RzZFz8bg8XsecYlU9wHMIq2gQrGoNZ5gqjqYUdD/H+6+jQpj
-+6I5F/JkYfZlAjJ5dOGf0YllVanDIJ6/aVaz908/qVTC2o88r/J1VPp+gQIDAQAB
-o4GzMIGwMAkGA1UdEwQCMAAwHQYDVR0OBBYEFDFPEFxnn75OiNbcxaueEoiGaQJP
-MB8GA1UdIwQYMBaAFLiS3v2KGLMww59V8zNdtMgpikEUMDUGCCsGAQUFBwEBBCkw
-JzAlBggrBgEFBQcwAYYZaHR0cDovL3NlcnZlci53MS5maTo4ODg4LzAXBgNVHREE
-EDAOggxzZXJ2ZXIudzEuZmkwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcN
-AQELBQADgYEAtpiu2ZuaREmyBu6vNoPLzcvJ8zhtZcvpgdIl3XYSXNo/oQ4RpQTt
-BSktZpSCooBn0dh4cXJfEMNRonv1C1/scBKZy2VvUH8rBXy01xshd2ZHM/On1vvO
-l/5f/d8fHW/vIlrGeNIrBx5V7IBiBnq+ag1NlsLV33ZWsIVq+KAnYjE=
------END CERTIFICATE-----
diff --git a/hostapd/ChangeLog b/hostapd/ChangeLog
index 34a8a081879d..279298e4d4d4 100644
--- a/hostapd/ChangeLog
+++ b/hostapd/ChangeLog
@@ -1,5 +1,48 @@
ChangeLog for hostapd
+2022-01-16 - v2.10
+ * SAE changes
+ - improved protection against side channel attacks
+ [https://w1.fi/security/2022-1/]
+ - added option send SAE Confirm immediately (sae_config_immediate=1)
+ after SAE Commit
+ - added support for the hash-to-element mechanism (sae_pwe=1 or
+ sae_pwe=2)
+ - fixed PMKSA caching with OKC
+ - added support for SAE-PK
+ * EAP-pwd changes
+ - improved protection against side channel attacks
+ [https://w1.fi/security/2022-1/]
+ * fixed WPS UPnP SUBSCRIBE handling of invalid operations
+ [https://w1.fi/security/2020-1/]
+ * fixed PMF disconnection protection bypass
+ [https://w1.fi/security/2019-7/]
+ * added support for using OpenSSL 3.0
+ * fixed various issues in experimental support for EAP-TEAP server
+ * added configuration (max_auth_rounds, max_auth_rounds_short) to
+ increase the maximum number of EAP message exchanges (mainly to
+ support cases with very large certificates) for the EAP server
+ * added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
+ * extended HE (IEEE 802.11ax) support, including 6 GHz support
+ * removed obsolete IAPP functionality
+ * fixed EAP-FAST server with TLS GCM/CCM ciphers
+ * dropped support for libnl 1.1
+ * added support for nl80211 control port for EAPOL frame TX/RX
+ * fixed OWE key derivation with groups 20 and 21; this breaks backwards
+ compatibility for these groups while the default group 19 remains
+ backwards compatible; owe_ptk_workaround=1 can be used to enabled a
+ a workaround for the group 20/21 backwards compatibility
+ * added support for Beacon protection
+ * added support for Extended Key ID for pairwise keys
+ * removed WEP support from the default build (CONFIG_WEP=y can be used
+ to enable it, if really needed)
+ * added a build option to remove TKIP support (CONFIG_NO_TKIP=y)
+ * added support for Transition Disable mechanism to allow the AP to
+ automatically disable transition mode to improve security
+ * added support for PASN
+ * added EAP-TLS server support for TLS 1.3 (disabled by default for now)
+ * a large number of other fixes, cleanup, and extensions
+
2019-08-07 - v2.9
* SAE changes
- disable use of groups using Brainpool curves
diff --git a/hostapd/README b/hostapd/README
index 1f30d7ea39fa..739c964d44d8 100644
--- a/hostapd/README
+++ b/hostapd/README
@@ -2,7 +2,7 @@ hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
Authenticator and RADIUS authentication server
================================================================
-Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
This program is licensed under the BSD license (the one with
diff --git a/hostapd/hostapd_cli.c b/hostapd/hostapd_cli.c
index 0e7fdd6bccfb..2609121116b5 100644
--- a/hostapd/hostapd_cli.c
+++ b/hostapd/hostapd_cli.c
@@ -1,6 +1,6 @@
/*
* hostapd - command line interface for hostapd daemon
- * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
@@ -21,7 +21,7 @@
static const char *const hostapd_cli_version =
"hostapd_cli v" VERSION_STR "\n"
-"Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi> and contributors";
+"Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> and contributors";
static struct wpa_ctrl *ctrl_conn;
static int hostapd_cli_quit = 0;
diff --git a/hostapd/main.c b/hostapd/main.c
index 4f2d1f21659e..c9ec38d19f88 100644
--- a/hostapd/main.c
+++ b/hostapd/main.c
@@ -1,6 +1,6 @@
/*
* hostapd / main()
- * Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi>
+ * Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
@@ -454,7 +454,7 @@ static void show_version(void)
"hostapd v%s\n"
"User space daemon for IEEE 802.11 AP management,\n"
"IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator\n"
- "Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> "
+ "Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> "
"and contributors\n",
VERSION_STR);
}
diff --git a/hs20/client/.gitignore b/hs20/client/.gitignore
deleted file mode 100644
index f6c13d3e5dfa..000000000000
--- a/hs20/client/.gitignore
+++ /dev/null
@@ -1,4 +0,0 @@
-hs20-osu-client
-SP
-osu-ca.pem
-spp.xsd
diff --git a/hs20/client/Android.mk b/hs20/client/Android.mk
deleted file mode 100644
index e4db32208d50..000000000000
--- a/hs20/client/Android.mk
+++ /dev/null
@@ -1,81 +0,0 @@
-LOCAL_PATH := $(call my-dir)
-
-INCLUDES = $(LOCAL_PATH)
-INCLUDES += $(LOCAL_PATH)/../../src/utils
-INCLUDES += $(LOCAL_PATH)/../../src/common
-INCLUDES += $(LOCAL_PATH)/../../src
-INCLUDES += external/libxml2/include
-INCLUDES += external/curl/include
-INCLUDES += external/webkit/Source/WebKit/gtk
-
-# We try to keep this compiling against older platform versions.
-# The new icu location (external/icu) exports its own headers, but
-# the older versions in external/icu4c don't, and we need to add those
-# headers to the include path by hand.
-ifeq ($(wildcard external/icu),)
-INCLUDES += external/icu4c/common
-else
-# The LOCAL_EXPORT_C_INCLUDE_DIRS from ICU did not seem to fully resolve the
-# build (e.g., "mm -B" failed to build, but following that with "mm" allowed
-# the build to complete). For now, add the include directory manually here for
-# Android 5.0.
-ver = $(filter 5.0%,$(PLATFORM_VERSION))
-ifneq (,$(strip $(ver)))
-INCLUDES += external/icu/icu4c/source/common
-endif
-endif
-
-
-L_CFLAGS += -DCONFIG_CTRL_IFACE
-L_CFLAGS += -DCONFIG_CTRL_IFACE_UNIX
-L_CFLAGS += -DCONFIG_CTRL_IFACE_CLIENT_DIR=\"/data/misc/wifi/sockets\"
-
-OBJS = spp_client.c
-OBJS += oma_dm_client.c
-OBJS += osu_client.c
-OBJS += est.c
-OBJS += ../../src/common/wpa_ctrl.c
-OBJS += ../../src/common/wpa_helpers.c
-OBJS += ../../src/utils/xml-utils.c
-#OBJS += ../../src/utils/browser-android.c
-OBJS += ../../src/utils/browser-wpadebug.c
-OBJS += ../../src/utils/wpabuf.c
-OBJS += ../../src/utils/eloop.c
-OBJS += ../../src/wps/httpread.c
-OBJS += ../../src/wps/http_server.c
-OBJS += ../../src/utils/xml_libxml2.c
-OBJS += ../../src/utils/http_curl.c
-OBJS += ../../src/utils/base64.c
-OBJS += ../../src/utils/os_unix.c
-L_CFLAGS += -DCONFIG_DEBUG_FILE
-OBJS += ../../src/utils/wpa_debug.c
-OBJS += ../../src/utils/common.c
-OBJS += ../../src/crypto/crypto_internal.c
-OBJS += ../../src/crypto/md5-internal.c
-OBJS += ../../src/crypto/sha1-internal.c
-OBJS += ../../src/crypto/sha256-internal.c
-OBJS += ../../src/crypto/tls_openssl_ocsp.c
-
-L_CFLAGS += -DEAP_TLS_OPENSSL
-
-L_CFLAGS += -Wno-unused-parameter
-
-
-########################
-include $(CLEAR_VARS)
-LOCAL_MODULE := hs20-osu-client
-LOCAL_MODULE_TAGS := optional
-
-LOCAL_SHARED_LIBRARIES := libc libcutils
-LOCAL_SHARED_LIBRARIES += libcrypto libssl
-#LOCAL_SHARED_LIBRARIES += libxml2
-LOCAL_STATIC_LIBRARIES += libxml2
-LOCAL_SHARED_LIBRARIES += libicuuc
-LOCAL_SHARED_LIBRARIES += libcurl
-
-LOCAL_CFLAGS := $(L_CFLAGS)
-LOCAL_SRC_FILES := $(OBJS)
-LOCAL_C_INCLUDES := $(INCLUDES)
-include $(BUILD_EXECUTABLE)
-
-########################
diff --git a/hs20/client/Makefile b/hs20/client/Makefile
deleted file mode 100644
index 4dcfe2d3bf2c..000000000000
--- a/hs20/client/Makefile
+++ /dev/null
@@ -1,81 +0,0 @@
-ALL=hs20-osu-client
-
-include ../../src/build.rules
-
-CFLAGS += -I../../src/utils
-CFLAGS += -I../../src/common
-CFLAGS += -I../../src
-
-ifndef CONFIG_NO_BROWSER
-ifndef CONFIG_BROWSER_SYSTEM
-TEST_WK := $(shell pkg-config --silence-errors --cflags webkitgtk-3.0)
-ifeq ($(TEST_WK),)
-# Try webkit2
-GTKCFLAGS := $(shell pkg-config --cflags gtk+-3.0 webkit2gtk-4.0)
-GTKLIBS := $(shell pkg-config --libs gtk+-3.0 webkit2gtk-4.0)
-CFLAGS += -DUSE_WEBKIT2
-else
-GTKCFLAGS := $(shell pkg-config --cflags gtk+-3.0 webkitgtk-3.0)
-GTKLIBS := $(shell pkg-config --libs gtk+-3.0 webkitgtk-3.0)
-endif
-
-CFLAGS += $(GTKCFLAGS)
-LIBS += $(GTKLIBS)
-endif
-endif
-
-OBJS=spp_client.o
-OBJS += oma_dm_client.o
-OBJS += osu_client.o
-OBJS += est.o
-OBJS += ../../src/utils/xml-utils.o
-CFLAGS += -DCONFIG_CTRL_IFACE
-CFLAGS += -DCONFIG_CTRL_IFACE_UNIX
-OBJS += ../../src/common/wpa_ctrl.o ../../src/common/wpa_helpers.o
-ifdef CONFIG_NO_BROWSER
-CFLAGS += -DCONFIG_NO_BROWSER
-else
-ifdef CONFIG_BROWSER_SYSTEM
-OBJS += ../../src/utils/eloop.o
-OBJS += ../../src/utils/wpabuf.o
-OBJS += ../../src/wps/httpread.o
-OBJS += ../../src/wps/http_server.o
-OBJS += ../../src/utils/browser-system.o
-else
-OBJS += ../../src/utils/browser.o
-endif
-endif
-OBJS += ../../src/utils/xml_libxml2.o
-OBJS += ../../src/utils/http_curl.o
-OBJS += ../../src/utils/base64.o
-OBJS += ../../src/utils/os_unix.o
-CFLAGS += -DCONFIG_DEBUG_FILE
-OBJS += ../../src/utils/wpa_debug.o
-OBJS += ../../src/utils/common.o
-OBJS += ../../src/crypto/crypto_internal.o
-OBJS += ../../src/crypto/md5-internal.o
-OBJS += ../../src/crypto/sha1-internal.o
-OBJS += ../../src/crypto/sha256-internal.o
-
-CFLAGS += $(shell xml2-config --cflags)
-LIBS += $(shell xml2-config --libs)
-
-# Allow static/custom linking of libcurl.
-ifdef CUST_CURL_LINKAGE
-LIBS += ${CUST_CURL_LINKAGE}
-else
-LIBS += -lcurl
-endif
-
-CFLAGS += -DEAP_TLS_OPENSSL
-OBJS += ../../src/crypto/tls_openssl_ocsp.o
-LIBS += -lssl -lcrypto
-
-_OBJS_VAR := OBJS
-include ../../src/objs.mk
-hs20-osu-client: $(OBJS)
- $(Q)$(LDO) $(LDFLAGS) -o hs20-osu-client $(OBJS) $(LIBS)
- @$(E) " LD " $@
-
-clean: common-clean
- rm -f core *~
diff --git a/hs20/client/devdetail.xml b/hs20/client/devdetail.xml
deleted file mode 100644
index 6d0389e8a133..000000000000
--- a/hs20/client/devdetail.xml
+++ /dev/null
@@ -1,47 +0,0 @@
-<DevDetail xmlns="urn:oma:mo:oma-dm-devdetail:1.0">
- <Ext>
- <org.wi-fi>
- <Wi-Fi>
- <EAPMethodList>
- <EAPMethod1>
- <EAPType>13</EAPType>
- </EAPMethod1>
- <EAPMethod2>
- <EAPType>21</EAPType>
- <InnerMethod>MS-CHAP-V2</InnerMethod>
- </EAPMethod2>
- <EAPMethod3>
- <EAPType>18</EAPType>
- </EAPMethod3>
- <EAPMethod4>
- <EAPType>23</EAPType>
- </EAPMethod4>
- <EAPMethod5>
- <EAPType>50</EAPType>
- </EAPMethod5>
- </EAPMethodList>
- <ManufacturingCertificate>false</ManufacturingCertificate>
- <Wi-FiMACAddress>020102030405</Wi-FiMACAddress>
- <IMSI>310026000000000</IMSI>
- <IMEI_MEID>imei:490123456789012</IMEI_MEID>
- <ClientTriggerRedirectURI>http://localhost:12345/</ClientTriggerRedirectURI>
- <Ops>
- <launchBrowserToURI></launchBrowserToURI>
- <negotiateClientCertTLS></negotiateClientCertTLS>
- <getCertificate></getCertificate>
- </Ops>
- </Wi-Fi>
- </org.wi-fi>
- </Ext>
- <URI>
- <MaxDepth>0</MaxDepth>
- <MaxTotLen>0</MaxTotLen>
- <MaxSegLen>0</MaxSegLen>
- </URI>
- <DevType>MobilePhone</DevType>
- <OEM>Manufacturer</OEM>
- <FwV>1.0</FwV>
- <SwV>1.0</SwV>
- <HwV>1.0</HwV>
- <LrgObj>false</LrgObj>
-</DevDetail>
diff --git a/hs20/client/devinfo.xml b/hs20/client/devinfo.xml
deleted file mode 100644
index d48a520a98a1..000000000000
--- a/hs20/client/devinfo.xml
+++ /dev/null
@@ -1,7 +0,0 @@
-<DevInfo xmlns="urn:oma:mo:oma-dm-devinfo:1.0">
- <DevId>urn:Example:HS20-station:123456</DevId>
- <Man>Manufacturer</Man>
- <Mod>HS20-station</Mod>
- <DmV>1.2</DmV>
- <Lang>en</Lang>
-</DevInfo>
diff --git a/hs20/client/est.c b/hs20/client/est.c
deleted file mode 100644
index 97f9132100c4..000000000000
--- a/hs20/client/est.c
+++ /dev/null
@@ -1,769 +0,0 @@
-/*
- * Hotspot 2.0 OSU client - EST client
- * Copyright (c) 2012-2014, Qualcomm Atheros, Inc.
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-#include <openssl/err.h>
-#include <openssl/evp.h>
-#include <openssl/pem.h>
-#include <openssl/pkcs7.h>
-#include <openssl/rsa.h>
-#include <openssl/asn1.h>
-#include <openssl/asn1t.h>
-#include <openssl/x509.h>
-#include <openssl/x509v3.h>
-#include <openssl/opensslv.h>
-#ifdef OPENSSL_IS_BORINGSSL
-#include <openssl/buf.h>
-#endif /* OPENSSL_IS_BORINGSSL */
-
-#include "common.h"
-#include "utils/base64.h"
-#include "utils/xml-utils.h"
-#include "utils/http-utils.h"
-#include "osu_client.h"
-
-
-static int pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7,
- size_t len, char *pem_file, char *der_file)
-{
-#ifdef OPENSSL_IS_BORINGSSL
- CBS pkcs7_cbs;
-#else /* OPENSSL_IS_BORINGSSL */
- PKCS7 *p7 = NULL;
- const unsigned char *p = pkcs7;
-#endif /* OPENSSL_IS_BORINGSSL */
- STACK_OF(X509) *certs;
- int i, num, ret = -1;
- BIO *out = NULL;
-
-#ifdef OPENSSL_IS_BORINGSSL
- certs = sk_X509_new_null();
- if (!certs)
- goto fail;
- CBS_init(&pkcs7_cbs, pkcs7, len);
- if (!PKCS7_get_certificates(certs, &pkcs7_cbs)) {
- wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s",
- ERR_error_string(ERR_get_error(), NULL));
- write_result(ctx, "Could not parse PKCS#7 object from EST");
- goto fail;
- }
-#else /* OPENSSL_IS_BORINGSSL */
- p7 = d2i_PKCS7(NULL, &p, len);
- if (p7 == NULL) {
- wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s",
- ERR_error_string(ERR_get_error(), NULL));
- write_result(ctx, "Could not parse PKCS#7 object from EST");
- goto fail;
- }
-
- switch (OBJ_obj2nid(p7->type)) {
- case NID_pkcs7_signed:
- certs = p7->d.sign->cert;
- break;
- case NID_pkcs7_signedAndEnveloped:
- certs = p7->d.signed_and_enveloped->cert;
- break;
- default:
- certs = NULL;
- break;
- }
-#endif /* OPENSSL_IS_BORINGSSL */
-
- if (!certs || ((num = sk_X509_num(certs)) == 0)) {
- wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object");
- write_result(ctx, "No certificates found in PKCS#7 object");
- goto fail;
- }
-
- if (der_file) {
- FILE *f = fopen(der_file, "wb");
- if (f == NULL)
- goto fail;
- i2d_X509_fp(f, sk_X509_value(certs, 0));
- fclose(f);
- }
-
- if (pem_file) {
- out = BIO_new(BIO_s_file());
- if (out == NULL ||
- BIO_write_filename(out, pem_file) <= 0)
- goto fail;
-
- for (i = 0; i < num; i++) {
- X509 *cert = sk_X509_value(certs, i);
- X509_print(out, cert);
- PEM_write_bio_X509(out, cert);
- BIO_puts(out, "\n");
- }
- }
-
- ret = 0;
-
-fail:
-#ifdef OPENSSL_IS_BORINGSSL
- if (certs)
- sk_X509_pop_free(certs, X509_free);
-#else /* OPENSSL_IS_BORINGSSL */
- PKCS7_free(p7);
-#endif /* OPENSSL_IS_BORINGSSL */
- if (out)
- BIO_free_all(out);
-
- return ret;
-}
-
-
-int est_load_cacerts(struct hs20_osu_client *ctx, const char *url)
-{
- char *buf, *resp;
- size_t buflen;
- unsigned char *pkcs7;
- size_t pkcs7_len, resp_len;
- int res;
-
- buflen = os_strlen(url) + 100;
- buf = os_malloc(buflen);
- if (buf == NULL)
- return -1;
-
- os_snprintf(buf, buflen, "%s/cacerts", url);
- wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf);
- write_summary(ctx, "Download EST cacerts from %s", buf);
- ctx->no_osu_cert_validation = 1;
- http_ocsp_set(ctx->http, 1);
- res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt",
- ctx->ca_fname);
- http_ocsp_set(ctx->http,
- (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2);
- ctx->no_osu_cert_validation = 0;
- if (res < 0) {
- wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s",
- buf);
- write_result(ctx, "Failed to download EST cacerts from %s",
- buf);
- os_free(buf);
- return -1;
- }
- os_free(buf);
-
- resp = os_readfile("Cert/est-cacerts.txt", &resp_len);
- if (resp == NULL) {
- wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt");
- write_result(ctx, "Could not read EST cacerts");
- return -1;
- }
-
- pkcs7 = base64_decode(resp, resp_len, &pkcs7_len);
- if (pkcs7 && pkcs7_len < resp_len / 2) {
- wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary",
- (unsigned int) pkcs7_len, (unsigned int) resp_len);
- os_free(pkcs7);
- pkcs7 = NULL;
- }
- if (pkcs7 == NULL) {
- wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
- pkcs7 = os_malloc(resp_len);
- if (pkcs7) {
- os_memcpy(pkcs7, resp, resp_len);
- pkcs7_len = resp_len;
- }
- }
- os_free(resp);
-
- if (pkcs7 == NULL) {
- wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts");
- write_result(ctx, "Could not fetch EST PKCS#7 cacerts");
- return -1;
- }
-
- res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem",
- NULL);
- os_free(pkcs7);
- if (res < 0) {
- wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response");
- write_result(ctx, "Could not parse CA certs from EST PKCS#7 cacerts response");
- return -1;
- }
- unlink("Cert/est-cacerts.txt");
-
- return 0;
-}
-
-
-/*
- * CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID
- *
- * AttrOrOID ::= CHOICE {
- * oid OBJECT IDENTIFIER,
- * attribute Attribute }
- *
- * Attribute ::= SEQUENCE {
- * type OBJECT IDENTIFIER,
- * values SET SIZE(1..MAX) OF OBJECT IDENTIFIER }
- */
-
-typedef struct {
- ASN1_OBJECT *type;
- STACK_OF(ASN1_OBJECT) *values;
-} Attribute;
-
-typedef struct {
- int type;
- union {
- ASN1_OBJECT *oid;
- Attribute *attribute;
- } d;
-} AttrOrOID;
-
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL)
-DEFINE_STACK_OF(AttrOrOID)
-#endif
-
-typedef struct {
- int type;
- STACK_OF(AttrOrOID) *attrs;
-} CsrAttrs;
-
-ASN1_SEQUENCE(Attribute) = {
- ASN1_SIMPLE(Attribute, type, ASN1_OBJECT),
- ASN1_SET_OF(Attribute, values, ASN1_OBJECT)
-} ASN1_SEQUENCE_END(Attribute);
-
-ASN1_CHOICE(AttrOrOID) = {
- ASN1_SIMPLE(AttrOrOID, d.oid, ASN1_OBJECT),
- ASN1_SIMPLE(AttrOrOID, d.attribute, Attribute)
-} ASN1_CHOICE_END(AttrOrOID);
-
-ASN1_CHOICE(CsrAttrs) = {
- ASN1_SEQUENCE_OF(CsrAttrs, attrs, AttrOrOID)
-} ASN1_CHOICE_END(CsrAttrs);
-
-IMPLEMENT_ASN1_FUNCTIONS(CsrAttrs);
-
-
-static void add_csrattrs_oid(struct hs20_osu_client *ctx, ASN1_OBJECT *oid,
- STACK_OF(X509_EXTENSION) *exts)
-{
- char txt[100];
- int res;
-
- if (!oid)
- return;
-
- res = OBJ_obj2txt(txt, sizeof(txt), oid, 1);
- if (res < 0 || res >= (int) sizeof(txt))
- return;
-
- if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) {
- wpa_printf(MSG_INFO, "TODO: csrattr challengePassword");
- } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) {
- wpa_printf(MSG_INFO, "csrattr sha256WithRSAEncryption");
- } else {
- wpa_printf(MSG_INFO, "Ignore unsupported csrattr oid %s", txt);
- }
-}
-
-
-static void add_csrattrs_ext_req(struct hs20_osu_client *ctx,
- STACK_OF(ASN1_OBJECT) *values,
- STACK_OF(X509_EXTENSION) *exts)
-{
- char txt[100];
- int i, num, res;
-
- num = sk_ASN1_OBJECT_num(values);
- for (i = 0; i < num; i++) {
- ASN1_OBJECT *oid = sk_ASN1_OBJECT_value(values, i);
-
- res = OBJ_obj2txt(txt, sizeof(txt), oid, 1);
- if (res < 0 || res >= (int) sizeof(txt))
- continue;
-
- if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) {
- wpa_printf(MSG_INFO, "TODO: extReq macAddress");
- } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.3") == 0) {
- wpa_printf(MSG_INFO, "TODO: extReq imei");
- } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.4") == 0) {
- wpa_printf(MSG_INFO, "TODO: extReq meid");
- } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.5") == 0) {
- wpa_printf(MSG_INFO, "TODO: extReq DevId");
- } else {
- wpa_printf(MSG_INFO, "Ignore unsupported cstattr extensionsRequest %s",
- txt);
- }
- }
-}
-
-
-static void add_csrattrs_attr(struct hs20_osu_client *ctx, Attribute *attr,
- STACK_OF(X509_EXTENSION) *exts)
-{
- char txt[100], txt2[100];
- int i, num, res;
-
- if (!attr || !attr->type || !attr->values)
- return;
-
- res = OBJ_obj2txt(txt, sizeof(txt), attr->type, 1);
- if (res < 0 || res >= (int) sizeof(txt))
- return;
-
- if (os_strcmp(txt, "1.2.840.113549.1.9.14") == 0) {
- add_csrattrs_ext_req(ctx, attr->values, exts);
- return;
- }
-
- num = sk_ASN1_OBJECT_num(attr->values);
- for (i = 0; i < num; i++) {
- ASN1_OBJECT *oid = sk_ASN1_OBJECT_value(attr->values, i);
-
- res = OBJ_obj2txt(txt2, sizeof(txt2), oid, 1);
- if (res < 0 || res >= (int) sizeof(txt2))
- continue;
-
- wpa_printf(MSG_INFO, "Ignore unsupported cstattr::attr %s oid %s",
- txt, txt2);
- }
-}
-
-
-static void add_csrattrs(struct hs20_osu_client *ctx, CsrAttrs *csrattrs,
- STACK_OF(X509_EXTENSION) *exts)
-{
- int i, num;
-
- if (!csrattrs || ! csrattrs->attrs)
- return;
-
-#ifdef OPENSSL_IS_BORINGSSL
- num = sk_num(CHECKED_CAST(_STACK *, STACK_OF(AttrOrOID) *,
- csrattrs->attrs));
- for (i = 0; i < num; i++) {
- AttrOrOID *ao = sk_value(
- CHECKED_CAST(_STACK *, const STACK_OF(AttrOrOID) *,
- csrattrs->attrs), i);
- switch (ao->type) {
- case 0:
- add_csrattrs_oid(ctx, ao->d.oid, exts);
- break;
- case 1:
- add_csrattrs_attr(ctx, ao->d.attribute, exts);
- break;
- }
- }
-#else /* OPENSSL_IS_BORINGSSL */
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL)
- num = sk_AttrOrOID_num(csrattrs->attrs);
-#else
- num = SKM_sk_num(AttrOrOID, csrattrs->attrs);
-#endif
- for (i = 0; i < num; i++) {
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL)
- AttrOrOID *ao = sk_AttrOrOID_value(csrattrs->attrs, i);
-#else
- AttrOrOID *ao = SKM_sk_value(AttrOrOID, csrattrs->attrs, i);
-#endif
- switch (ao->type) {
- case 0:
- add_csrattrs_oid(ctx, ao->d.oid, exts);
- break;
- case 1:
- add_csrattrs_attr(ctx, ao->d.attribute, exts);
- break;
- }
- }
-#endif /* OPENSSL_IS_BORINGSSL */
-}
-
-
-static int generate_csr(struct hs20_osu_client *ctx, char *key_pem,
- char *csr_pem, char *est_req, char *old_cert,
- CsrAttrs *csrattrs)
-{
- EVP_PKEY_CTX *pctx = NULL;
- EVP_PKEY *pkey = NULL;
- RSA *rsa;
- X509_REQ *req = NULL;
- int ret = -1;
- unsigned int val;
- X509_NAME *subj = NULL;
- char name[100];
- STACK_OF(X509_EXTENSION) *exts = NULL;
- X509_EXTENSION *ex;
- BIO *out;
- CONF *ctmp = NULL;
-
- wpa_printf(MSG_INFO, "Generate RSA private key");
- write_summary(ctx, "Generate RSA private key");
- pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL);
- if (!pctx)
- return -1;
-
- if (EVP_PKEY_keygen_init(pctx) <= 0)
- goto fail;
-
- if (EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048) <= 0)
- goto fail;
-
- if (EVP_PKEY_keygen(pctx, &pkey) <= 0)
- goto fail;
- EVP_PKEY_CTX_free(pctx);
- pctx = NULL;
-
- rsa = EVP_PKEY_get1_RSA(pkey);
- if (rsa == NULL)
- goto fail;
-
- if (key_pem) {
- FILE *f = fopen(key_pem, "wb");
- if (f == NULL)
- goto fail;
- if (!PEM_write_RSAPrivateKey(f, rsa, NULL, NULL, 0, NULL,
- NULL)) {
- wpa_printf(MSG_INFO, "Could not write private key: %s",
- ERR_error_string(ERR_get_error(), NULL));
- fclose(f);
- goto fail;
- }
- fclose(f);
- }
-
- wpa_printf(MSG_INFO, "Generate CSR");
- write_summary(ctx, "Generate CSR");
- req = X509_REQ_new();
- if (req == NULL)
- goto fail;
-
- if (old_cert) {
- FILE *f;
- X509 *cert;
- int res;
-
- f = fopen(old_cert, "r");
- if (f == NULL)
- goto fail;
- cert = PEM_read_X509(f, NULL, NULL, NULL);
- fclose(f);
-
- if (cert == NULL)
- goto fail;
- res = X509_REQ_set_subject_name(req,
- X509_get_subject_name(cert));
- X509_free(cert);
- if (!res)
- goto fail;
- } else {
- os_get_random((u8 *) &val, sizeof(val));
- os_snprintf(name, sizeof(name), "cert-user-%u", val);
- subj = X509_NAME_new();
- if (subj == NULL ||
- !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC,
- (unsigned char *) name,
- -1, -1, 0) ||
- !X509_REQ_set_subject_name(req, subj))
- goto fail;
- X509_NAME_free(subj);
- subj = NULL;
- }
-
- if (!X509_REQ_set_pubkey(req, pkey))
- goto fail;
-
- exts = sk_X509_EXTENSION_new_null();
- if (!exts)
- goto fail;
-
- ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_basic_constraints,
- "CA:FALSE");
- if (ex == NULL ||
- !sk_X509_EXTENSION_push(exts, ex))
- goto fail;
-
- ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_key_usage,
- "nonRepudiation,digitalSignature,keyEncipherment");
- if (ex == NULL ||
- !sk_X509_EXTENSION_push(exts, ex))
- goto fail;
-
- ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_ext_key_usage,
- "1.3.6.1.4.1.40808.1.1.2");
- if (ex == NULL ||
- !sk_X509_EXTENSION_push(exts, ex))
- goto fail;
-
- add_csrattrs(ctx, csrattrs, exts);
-
- if (!X509_REQ_add_extensions(req, exts))
- goto fail;
- sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
- exts = NULL;
-
- if (!X509_REQ_sign(req, pkey, EVP_sha256()))
- goto fail;
-
- out = BIO_new(BIO_s_mem());
- if (out) {
- char *txt;
- size_t rlen;
-
-#if !defined(ANDROID) || !defined(OPENSSL_IS_BORINGSSL)
- X509_REQ_print(out, req);
-#endif
- rlen = BIO_ctrl_pending(out);
- txt = os_malloc(rlen + 1);
- if (txt) {
- int res = BIO_read(out, txt, rlen);
- if (res > 0) {
- txt[res] = '\0';
- wpa_printf(MSG_MSGDUMP, "OpenSSL: Certificate request:\n%s",
- txt);
- }
- os_free(txt);
- }
- BIO_free(out);
- }
-
- if (csr_pem) {
- FILE *f = fopen(csr_pem, "w");
- if (f == NULL)
- goto fail;
-#if !defined(ANDROID) || !defined(OPENSSL_IS_BORINGSSL)
- X509_REQ_print_fp(f, req);
-#endif
- if (!PEM_write_X509_REQ(f, req)) {
- fclose(f);
- goto fail;
- }
- fclose(f);
- }
-
- if (est_req) {
- BIO *mem = BIO_new(BIO_s_mem());
- BUF_MEM *ptr;
- char *pos, *end, *buf_end;
- FILE *f;
-
- if (mem == NULL)
- goto fail;
- if (!PEM_write_bio_X509_REQ(mem, req)) {
- BIO_free(mem);
- goto fail;
- }
-
- BIO_get_mem_ptr(mem, &ptr);
- pos = ptr->data;
- buf_end = pos + ptr->length;
-
- /* Remove START/END lines */
- while (pos < buf_end && *pos != '\n')
- pos++;
- if (pos == buf_end) {
- BIO_free(mem);
- goto fail;
- }
- pos++;
-
- end = pos;
- while (end < buf_end && *end != '-')
- end++;
-
- f = fopen(est_req, "w");
- if (f == NULL) {
- BIO_free(mem);
- goto fail;
- }
- fwrite(pos, end - pos, 1, f);
- fclose(f);
-
- BIO_free(mem);
- }
-
- ret = 0;
-fail:
- if (exts)
- sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
- if (subj)
- X509_NAME_free(subj);
- if (req)
- X509_REQ_free(req);
- if (pkey)
- EVP_PKEY_free(pkey);
- if (pctx)
- EVP_PKEY_CTX_free(pctx);
- return ret;
-}
-
-
-int est_build_csr(struct hs20_osu_client *ctx, const char *url)
-{
- char *buf;
- size_t buflen;
- int res;
- char old_cert_buf[200];
- char *old_cert = NULL;
- CsrAttrs *csrattrs = NULL;
-
- buflen = os_strlen(url) + 100;
- buf = os_malloc(buflen);
- if (buf == NULL)
- return -1;
-
- os_snprintf(buf, buflen, "%s/csrattrs", url);
- wpa_printf(MSG_INFO, "Download csrattrs from %s", buf);
- write_summary(ctx, "Download EST csrattrs from %s", buf);
- ctx->no_osu_cert_validation = 1;
- http_ocsp_set(ctx->http, 1);
- res = http_download_file(ctx->http, buf, "Cert/est-csrattrs.txt",
- ctx->ca_fname);
- http_ocsp_set(ctx->http,
- (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2);
- ctx->no_osu_cert_validation = 0;
- os_free(buf);
- if (res < 0) {
- wpa_printf(MSG_INFO, "Failed to download EST csrattrs - assume no extra attributes are needed");
- } else {
- size_t resp_len;
- char *resp;
- unsigned char *attrs;
- const unsigned char *pos;
- size_t attrs_len;
-
- resp = os_readfile("Cert/est-csrattrs.txt", &resp_len);
- if (resp == NULL) {
- wpa_printf(MSG_INFO, "Could not read csrattrs");
- return -1;
- }
-
- attrs = base64_decode(resp, resp_len, &attrs_len);
- os_free(resp);
-
- if (attrs == NULL) {
- wpa_printf(MSG_INFO, "Could not base64 decode csrattrs");
- return -1;
- }
- unlink("Cert/est-csrattrs.txt");
-
- pos = attrs;
- csrattrs = d2i_CsrAttrs(NULL, &pos, attrs_len);
- os_free(attrs);
- if (csrattrs == NULL) {
- wpa_printf(MSG_INFO, "Failed to parse csrattrs ASN.1");
- /* Continue assuming no additional requirements */
- }
- }
-
- if (ctx->client_cert_present) {
- os_snprintf(old_cert_buf, sizeof(old_cert_buf),
- "SP/%s/client-cert.pem", ctx->fqdn);
- old_cert = old_cert_buf;
- }
-
- res = generate_csr(ctx, "Cert/privkey-plain.pem", "Cert/est-req.pem",
- "Cert/est-req.b64", old_cert, csrattrs);
- if (csrattrs)
- CsrAttrs_free(csrattrs);
-
- return res;
-}
-
-
-int est_simple_enroll(struct hs20_osu_client *ctx, const char *url,
- const char *user, const char *pw)
-{
- char *buf, *resp, *req, *req2;
- size_t buflen, resp_len, len, pkcs7_len;
- unsigned char *pkcs7;
- char client_cert_buf[200];
- char client_key_buf[200];
- const char *client_cert = NULL, *client_key = NULL;
- int res;
-
- req = os_readfile("Cert/est-req.b64", &len);
- if (req == NULL) {
- wpa_printf(MSG_INFO, "Could not read Cert/req.b64");
- return -1;
- }
- req2 = os_realloc(req, len + 1);
- if (req2 == NULL) {
- os_free(req);
- return -1;
- }
- req2[len] = '\0';
- req = req2;
- wpa_printf(MSG_DEBUG, "EST simpleenroll request: %s", req);
-
- buflen = os_strlen(url) + 100;
- buf = os_malloc(buflen);
- if (buf == NULL) {
- os_free(req);
- return -1;
- }
-
- if (ctx->client_cert_present) {
- os_snprintf(buf, buflen, "%s/simplereenroll", url);
- os_snprintf(client_cert_buf, sizeof(client_cert_buf),
- "SP/%s/client-cert.pem", ctx->fqdn);
- client_cert = client_cert_buf;
- os_snprintf(client_key_buf, sizeof(client_key_buf),
- "SP/%s/client-key.pem", ctx->fqdn);
- client_key = client_key_buf;
- } else
- os_snprintf(buf, buflen, "%s/simpleenroll", url);
- wpa_printf(MSG_INFO, "EST simpleenroll URL: %s", buf);
- write_summary(ctx, "EST simpleenroll URL: %s", buf);
- ctx->no_osu_cert_validation = 1;
- http_ocsp_set(ctx->http, 1);
- resp = http_post(ctx->http, buf, req, "application/pkcs10",
- "Content-Transfer-Encoding: base64",
- ctx->ca_fname, user, pw, client_cert, client_key,
- &resp_len);
- http_ocsp_set(ctx->http,
- (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2);
- ctx->no_osu_cert_validation = 0;
- os_free(buf);
- if (resp == NULL) {
- wpa_printf(MSG_INFO, "EST certificate enrollment failed");
- write_result(ctx, "EST certificate enrollment failed");
- return -1;
- }
- wpa_printf(MSG_DEBUG, "EST simpleenroll response: %s", resp);
-
- pkcs7 = base64_decode(resp, resp_len, &pkcs7_len);
- if (pkcs7 == NULL) {
- wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
- pkcs7 = os_malloc(resp_len);
- if (pkcs7) {
- os_memcpy(pkcs7, resp, resp_len);
- pkcs7_len = resp_len;
- }
- }
- os_free(resp);
-
- if (pkcs7 == NULL) {
- wpa_printf(MSG_INFO, "Failed to parse simpleenroll base64 response");
- write_result(ctx, "Failed to parse EST simpleenroll base64 response");
- return -1;
- }
-
- res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est_cert.pem",
- "Cert/est_cert.der");
- os_free(pkcs7);
-
- if (res < 0) {
- wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file");
- write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file");
- return -1;
- }
-
- wpa_printf(MSG_INFO, "EST simple%senroll completed successfully",
- ctx->client_cert_present ? "re" : "");
- write_summary(ctx, "EST simple%senroll completed successfully",
- ctx->client_cert_present ? "re" : "");
-
- return 0;
-}
diff --git a/hs20/client/oma_dm_client.c b/hs20/client/oma_dm_client.c
deleted file mode 100644
index bcd68b8775d5..000000000000
--- a/hs20/client/oma_dm_client.c
+++ /dev/null
@@ -1,1398 +0,0 @@
-/*
- * Hotspot 2.0 - OMA DM client
- * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-
-#include "common.h"
-#include "wpa_helpers.h"
-#include "xml-utils.h"
-#include "http-utils.h"
-#include "utils/browser.h"
-#include "osu_client.h"
-
-
-#define DM_SERVER_INITIATED_MGMT 1200
-#define DM_CLIENT_INITIATED_MGMT 1201
-#define DM_GENERIC_ALERT 1226
-
-/* OMA-TS-SyncML-RepPro-V1_2_2 - 10. Response Status Codes */
-#define DM_RESP_OK 200
-#define DM_RESP_AUTH_ACCEPTED 212
-#define DM_RESP_CHUNKED_ITEM_ACCEPTED 213
-#define DM_RESP_NOT_EXECUTED 215
-#define DM_RESP_ATOMIC_ROLL_BACK_OK 216
-#define DM_RESP_NOT_MODIFIED 304
-#define DM_RESP_BAD_REQUEST 400
-#define DM_RESP_UNAUTHORIZED 401
-#define DM_RESP_FORBIDDEN 403
-#define DM_RESP_NOT_FOUND 404
-#define DM_RESP_COMMAND_NOT_ALLOWED 405
-#define DM_RESP_OPTIONAL_FEATURE_NOT_SUPPORTED 406
-#define DM_RESP_MISSING_CREDENTIALS 407
-#define DM_RESP_CONFLICT 409
-#define DM_RESP_GONE 410
-#define DM_RESP_INCOMPLETE_COMMAND 412
-#define DM_RESP_REQ_ENTITY_TOO_LARGE 413
-#define DM_RESP_URI_TOO_LONG 414
-#define DM_RESP_UNSUPPORTED_MEDIA_TYPE_OR_FORMAT 415
-#define DM_RESP_REQ_TOO_BIG 416
-#define DM_RESP_ALREADY_EXISTS 418
-#define DM_RESP_DEVICE_FULL 420
-#define DM_RESP_SIZE_MISMATCH 424
-#define DM_RESP_PERMISSION_DENIED 425
-#define DM_RESP_COMMAND_FAILED 500
-#define DM_RESP_COMMAND_NOT_IMPLEMENTED 501
-#define DM_RESP_ATOMIC_ROLL_BACK_FAILED 516
-
-#define DM_HS20_SUBSCRIPTION_CREATION \
- "org.wi-fi.hotspot2dot0.SubscriptionCreation"
-#define DM_HS20_SUBSCRIPTION_PROVISIONING \
- "org.wi-fi.hotspot2dot0.SubscriptionProvisioning"
-#define DM_HS20_SUBSCRIPTION_REMEDIATION \
- "org.wi-fi.hotspot2dot0.SubscriptionRemediation"
-#define DM_HS20_POLICY_UPDATE \
- "org.wi-fi.hotspot2dot0.PolicyUpdate"
-
-#define DM_URI_PPS "./Wi-Fi/org.wi-fi/PerProviderSubscription"
-#define DM_URI_LAUNCH_BROWSER \
- "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/launchBrowserToURI"
-
-
-static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
- const char *locuri, const char *data);
-
-
-static const char * int2str(int val)
-{
- static char buf[20];
- snprintf(buf, sizeof(buf), "%d", val);
- return buf;
-}
-
-
-static char * oma_dm_get_target_locuri(struct hs20_osu_client *ctx,
- xml_node_t *node)
-{
- xml_node_t *locuri;
- char *uri, *ret = NULL;
-
- locuri = get_node(ctx->xml, node, "Item/Target/LocURI");
- if (locuri == NULL)
- return NULL;
-
- uri = xml_node_get_text(ctx->xml, locuri);
- if (uri)
- ret = os_strdup(uri);
- xml_node_get_text_free(ctx->xml, uri);
- return ret;
-}
-
-
-static void oma_dm_add_locuri(struct hs20_osu_client *ctx, xml_node_t *parent,
- const char *element, const char *uri)
-{
- xml_node_t *node;
-
- node = xml_node_create(ctx->xml, parent, NULL, element);
- if (node == NULL)
- return;
- xml_node_create_text(ctx->xml, node, NULL, "LocURI", uri);
-}
-
-
-static xml_node_t * oma_dm_build_hdr(struct hs20_osu_client *ctx,
- const char *url, int msgid)
-{
- xml_node_t *syncml, *synchdr;
- xml_namespace_t *ns;
-
- if (!ctx->devid) {
- wpa_printf(MSG_ERROR,
- "DevId from devinfo.xml is not available - cannot use OMA DM");
- return NULL;
- }
-
- syncml = xml_node_create_root(ctx->xml, "SYNCML:SYNCML1.2", NULL, &ns,
- "SyncML");
-
- synchdr = xml_node_create(ctx->xml, syncml, NULL, "SyncHdr");
- xml_node_create_text(ctx->xml, synchdr, NULL, "VerDTD", "1.2");
- xml_node_create_text(ctx->xml, synchdr, NULL, "VerProto", "DM/1.2");
- xml_node_create_text(ctx->xml, synchdr, NULL, "SessionID", "1");
- xml_node_create_text(ctx->xml, synchdr, NULL, "MsgID", int2str(msgid));
-
- oma_dm_add_locuri(ctx, synchdr, "Target", url);
- oma_dm_add_locuri(ctx, synchdr, "Source", ctx->devid);
-
- return syncml;
-}
-
-
-static void oma_dm_add_cmdid(struct hs20_osu_client *ctx, xml_node_t *parent,
- int cmdid)
-{
- xml_node_create_text(ctx->xml, parent, NULL, "CmdID", int2str(cmdid));
-}
-
-
-static xml_node_t * add_alert(struct hs20_osu_client *ctx, xml_node_t *parent,
- int cmdid, int data)
-{
- xml_node_t *node;
-
- node = xml_node_create(ctx->xml, parent, NULL, "Alert");
- if (node == NULL)
- return NULL;
- oma_dm_add_cmdid(ctx, node, cmdid);
- xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
-
- return node;
-}
-
-
-static xml_node_t * add_status(struct hs20_osu_client *ctx, xml_node_t *parent,
- int msgref, int cmdref, int cmdid,
- const char *cmd, int data, const char *targetref)
-{
- xml_node_t *node;
-
- node = xml_node_create(ctx->xml, parent, NULL, "Status");
- if (node == NULL)
- return NULL;
- oma_dm_add_cmdid(ctx, node, cmdid);
- xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
- if (cmdref)
- xml_node_create_text(ctx->xml, node, NULL, "CmdRef",
- int2str(cmdref));
- xml_node_create_text(ctx->xml, node, NULL, "Cmd", cmd);
- xml_node_create_text(ctx->xml, node, NULL, "Data", int2str(data));
- if (targetref) {
- xml_node_create_text(ctx->xml, node, NULL, "TargetRef",
- targetref);
- }
-
- return node;
-}
-
-
-static xml_node_t * add_results(struct hs20_osu_client *ctx, xml_node_t *parent,
- int msgref, int cmdref, int cmdid,
- const char *locuri, const char *data)
-{
- xml_node_t *node;
-
- node = xml_node_create(ctx->xml, parent, NULL, "Results");
- if (node == NULL)
- return NULL;
-
- oma_dm_add_cmdid(ctx, node, cmdid);
- xml_node_create_text(ctx->xml, node, NULL, "MsgRef", int2str(msgref));
- xml_node_create_text(ctx->xml, node, NULL, "CmdRef", int2str(cmdref));
- add_item(ctx, node, locuri, data);
-
- return node;
-}
-
-
-static char * mo_str(struct hs20_osu_client *ctx, const char *urn,
- const char *fname)
-{
- xml_node_t *fnode, *tnds;
- char *str;
-
- fnode = node_from_file(ctx->xml, fname);
- if (!fnode)
- return NULL;
- tnds = mo_to_tnds(ctx->xml, fnode, 0, urn, "syncml:dmddf1.2");
- xml_node_free(ctx->xml, fnode);
- if (!tnds)
- return NULL;
-
- str = xml_node_to_str(ctx->xml, tnds);
- xml_node_free(ctx->xml, tnds);
- if (str == NULL)
- return NULL;
- wpa_printf(MSG_INFO, "MgmtTree: %s", str);
-
- return str;
-}
-
-
-static void add_item(struct hs20_osu_client *ctx, xml_node_t *parent,
- const char *locuri, const char *data)
-{
- xml_node_t *item, *node;
-
- item = xml_node_create(ctx->xml, parent, NULL, "Item");
- oma_dm_add_locuri(ctx, item, "Source", locuri);
- node = xml_node_create(ctx->xml, item, NULL, "Meta");
- xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
- "Chr");
- xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type",
- "text/plain");
- xml_node_create_text(ctx->xml, item, NULL, "Data", data);
-}
-
-
-static void add_replace_devinfo(struct hs20_osu_client *ctx, xml_node_t *parent,
- int cmdid)
-{
- xml_node_t *info, *child, *replace;
- const char *name;
- char locuri[200], *txt;
-
- info = node_from_file(ctx->xml, "devinfo.xml");
- if (info == NULL) {
- wpa_printf(MSG_INFO, "Could not read devinfo.xml");
- return;
- }
-
- replace = xml_node_create(ctx->xml, parent, NULL, "Replace");
- if (replace == NULL) {
- xml_node_free(ctx->xml, info);
- return;
- }
- oma_dm_add_cmdid(ctx, replace, cmdid);
-
- xml_node_for_each_child(ctx->xml, child, info) {
- xml_node_for_each_check(ctx->xml, child);
- name = xml_node_get_localname(ctx->xml, child);
- os_snprintf(locuri, sizeof(locuri), "./DevInfo/%s", name);
- txt = xml_node_get_text(ctx->xml, child);
- if (txt) {
- add_item(ctx, replace, locuri, txt);
- xml_node_get_text_free(ctx->xml, txt);
- }
- }
-
- xml_node_free(ctx->xml, info);
-}
-
-
-static void oma_dm_add_hs20_generic_alert(struct hs20_osu_client *ctx,
- xml_node_t *syncbody,
- int cmdid, const char *oper,
- const char *data)
-{
- xml_node_t *node, *item;
- char buf[200];
-
- node = add_alert(ctx, syncbody, cmdid, DM_GENERIC_ALERT);
-
- item = xml_node_create(ctx->xml, node, NULL, "Item");
- oma_dm_add_locuri(ctx, item, "Source", DM_URI_PPS);
- node = xml_node_create(ctx->xml, item, NULL, "Meta");
- snprintf(buf, sizeof(buf), "Reversed-Domain-Name: %s", oper);
- xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Type", buf);
- xml_node_create_text_ns(ctx->xml, node, "syncml:metinf", "Format",
- "xml");
- xml_node_create_text(ctx->xml, item, NULL, "Data", data);
-}
-
-
-static xml_node_t * build_oma_dm_1(struct hs20_osu_client *ctx,
- const char *url, int msgid, const char *oper)
-{
- xml_node_t *syncml, *syncbody;
- char *str;
- int cmdid = 0;
-
- syncml = oma_dm_build_hdr(ctx, url, msgid);
- if (syncml == NULL)
- return NULL;
-
- syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
- if (syncbody == NULL) {
- xml_node_free(ctx->xml, syncml);
- return NULL;
- }
-
- cmdid++;
- add_alert(ctx, syncbody, cmdid, DM_CLIENT_INITIATED_MGMT);
-
- str = mo_str(ctx, NULL, "devdetail.xml");
- if (str == NULL) {
- xml_node_free(ctx->xml, syncml);
- return NULL;
- }
- cmdid++;
- oma_dm_add_hs20_generic_alert(ctx, syncbody, cmdid, oper, str);
- os_free(str);
-
- cmdid++;
- add_replace_devinfo(ctx, syncbody, cmdid);
-
- xml_node_create(ctx->xml, syncbody, NULL, "Final");
-
- return syncml;
-}
-
-
-static xml_node_t * build_oma_dm_1_sub_reg(struct hs20_osu_client *ctx,
- const char *url, int msgid)
-{
- xml_node_t *syncml;
-
- syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_SUBSCRIPTION_CREATION);
- if (syncml)
- debug_dump_node(ctx, "OMA-DM Package 1 (sub reg)", syncml);
-
- return syncml;
-}
-
-
-static xml_node_t * build_oma_dm_1_sub_prov(struct hs20_osu_client *ctx,
- const char *url, int msgid)
-{
- xml_node_t *syncml;
-
- syncml = build_oma_dm_1(ctx, url, msgid,
- DM_HS20_SUBSCRIPTION_PROVISIONING);
- if (syncml)
- debug_dump_node(ctx, "OMA-DM Package 1 (sub prov)", syncml);
-
- return syncml;
-}
-
-
-static xml_node_t * build_oma_dm_1_pol_upd(struct hs20_osu_client *ctx,
- const char *url, int msgid)
-{
- xml_node_t *syncml;
-
- syncml = build_oma_dm_1(ctx, url, msgid, DM_HS20_POLICY_UPDATE);
- if (syncml)
- debug_dump_node(ctx, "OMA-DM Package 1 (pol upd)", syncml);
-
- return syncml;
-}
-
-
-static xml_node_t * build_oma_dm_1_sub_rem(struct hs20_osu_client *ctx,
- const char *url, int msgid)
-{
- xml_node_t *syncml;
-
- syncml = build_oma_dm_1(ctx, url, msgid,
- DM_HS20_SUBSCRIPTION_REMEDIATION);
- if (syncml)
- debug_dump_node(ctx, "OMA-DM Package 1 (sub rem)", syncml);
-
- return syncml;
-}
-
-
-static int oma_dm_exec_browser(struct hs20_osu_client *ctx, xml_node_t *exec)
-{
- xml_node_t *node;
- char *data;
- int res;
-
- node = get_node(ctx->xml, exec, "Item/Data");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Data node found");
- return DM_RESP_BAD_REQUEST;
- }
-
- data = xml_node_get_text(ctx->xml, node);
- if (data == NULL) {
- wpa_printf(MSG_INFO, "Invalid data");
- return DM_RESP_BAD_REQUEST;
- }
- wpa_printf(MSG_INFO, "Data: %s", data);
- wpa_printf(MSG_INFO, "Launch browser to URI '%s'", data);
- write_summary(ctx, "Launch browser to URI '%s'", data);
- res = hs20_web_browser(data, 1);
- xml_node_get_text_free(ctx->xml, data);
- if (res > 0) {
- wpa_printf(MSG_INFO, "User response in browser completed successfully");
- write_summary(ctx, "User response in browser completed successfully");
- return DM_RESP_OK;
- } else {
- wpa_printf(MSG_INFO, "Failed to receive user response");
- write_summary(ctx, "Failed to receive user response");
- return DM_RESP_COMMAND_FAILED;
- }
-}
-
-
-static int oma_dm_exec_get_cert(struct hs20_osu_client *ctx, xml_node_t *exec)
-{
- xml_node_t *node, *getcert;
- char *data;
- const char *name;
- int res;
-
- wpa_printf(MSG_INFO, "Client certificate enrollment");
- write_summary(ctx, "Client certificate enrollment");
-
- node = get_node(ctx->xml, exec, "Item/Data");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Data node found");
- return DM_RESP_BAD_REQUEST;
- }
-
- data = xml_node_get_text(ctx->xml, node);
- if (data == NULL) {
- wpa_printf(MSG_INFO, "Invalid data");
- return DM_RESP_BAD_REQUEST;
- }
- wpa_printf(MSG_INFO, "Data: %s", data);
- getcert = xml_node_from_buf(ctx->xml, data);
- xml_node_get_text_free(ctx->xml, data);
-
- if (getcert == NULL) {
- wpa_printf(MSG_INFO, "Could not parse Item/Data node contents");
- return DM_RESP_BAD_REQUEST;
- }
-
- debug_dump_node(ctx, "OMA-DM getCertificate", getcert);
-
- name = xml_node_get_localname(ctx->xml, getcert);
- if (name == NULL || os_strcasecmp(name, "getCertificate") != 0) {
- wpa_printf(MSG_INFO, "Unexpected getCertificate node name '%s'",
- name);
- return DM_RESP_BAD_REQUEST;
- }
-
- res = osu_get_certificate(ctx, getcert);
-
- xml_node_free(ctx->xml, getcert);
-
- return res == 0 ? DM_RESP_OK : DM_RESP_COMMAND_FAILED;
-}
-
-
-static int oma_dm_exec(struct hs20_osu_client *ctx, xml_node_t *exec)
-{
- char *locuri;
- int ret;
-
- locuri = oma_dm_get_target_locuri(ctx, exec);
- if (locuri == NULL) {
- wpa_printf(MSG_INFO, "No Target LocURI node found");
- return DM_RESP_BAD_REQUEST;
- }
-
- wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
-
- if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
- "launchBrowserToURI") == 0) {
- ret = oma_dm_exec_browser(ctx, exec);
- } else if (os_strcasecmp(locuri, "./DevDetail/Ext/org.wi-fi/Wi-Fi/Ops/"
- "getCertificate") == 0) {
- ret = oma_dm_exec_get_cert(ctx, exec);
- } else {
- wpa_printf(MSG_INFO, "Unsupported exec Target LocURI");
- ret = DM_RESP_NOT_FOUND;
- }
- os_free(locuri);
-
- return ret;
-}
-
-
-static int oma_dm_run_add(struct hs20_osu_client *ctx, const char *locuri,
- xml_node_t *add, xml_node_t *pps,
- const char *pps_fname)
-{
- const char *pos;
- size_t fqdn_len;
- xml_node_t *node, *tnds, *unode, *pps_node;
- char *data, *uri, *upos, *end;
- int use_tnds = 0;
- size_t uri_len;
-
- wpa_printf(MSG_INFO, "Add command target LocURI: %s", locuri);
-
- if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
- wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi");
- return DM_RESP_PERMISSION_DENIED;
- }
- pos = locuri + 8;
-
- if (ctx->fqdn == NULL)
- return DM_RESP_COMMAND_FAILED;
- fqdn_len = os_strlen(ctx->fqdn);
- if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
- pos[fqdn_len] != '/') {
- wpa_printf(MSG_INFO, "Do not allow Add outside ./Wi-Fi/%s",
- ctx->fqdn);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += fqdn_len + 1;
-
- if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
- wpa_printf(MSG_INFO,
- "Do not allow Add outside ./Wi-Fi/%s/PerProviderSubscription",
- ctx->fqdn);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += 24;
-
- wpa_printf(MSG_INFO, "Add command for PPS node %s", pos);
-
- pps_node = get_node(ctx->xml, pps, pos);
- if (pps_node) {
- wpa_printf(MSG_INFO, "Specified PPS node exists already");
- return DM_RESP_ALREADY_EXISTS;
- }
-
- uri = os_strdup(pos);
- if (uri == NULL)
- return DM_RESP_COMMAND_FAILED;
- while (!pps_node) {
- upos = os_strrchr(uri, '/');
- if (!upos)
- break;
- upos[0] = '\0';
- pps_node = get_node(ctx->xml, pps, uri);
- wpa_printf(MSG_INFO, "Node %s %s", uri,
- pps_node ? "exists" : "does not exist");
- }
-
- wpa_printf(MSG_INFO, "Parent URI: %s", uri);
-
- if (!pps_node) {
- /* Add at root of PPS MO */
- pps_node = pps;
- }
-
- uri_len = os_strlen(uri);
- os_strlcpy(uri, pos + uri_len, os_strlen(pos));
- upos = uri;
- while (*upos == '/')
- upos++;
- wpa_printf(MSG_INFO, "Nodes to add: %s", upos);
-
- for (;;) {
- end = os_strchr(upos, '/');
- if (!end)
- break;
- *end = '\0';
- wpa_printf(MSG_INFO, "Adding interim node %s", upos);
- pps_node = xml_node_create(ctx->xml, pps_node, NULL, upos);
- if (pps_node == NULL) {
- os_free(uri);
- return DM_RESP_COMMAND_FAILED;
- }
- upos = end + 1;
- }
-
- wpa_printf(MSG_INFO, "Adding node %s", upos);
-
- node = get_node(ctx->xml, add, "Item/Meta/Type");
- if (node) {
- char *type;
- type = xml_node_get_text(ctx->xml, node);
- if (type == NULL) {
- wpa_printf(MSG_ERROR, "Could not find type text");
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
- use_tnds = node &&
- os_strstr(type, "application/vnd.syncml.dmtnds+xml");
- }
-
- node = get_node(ctx->xml, add, "Item/Data");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Add/Item/Data found");
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
-
- data = xml_node_get_text(ctx->xml, node);
- if (data == NULL) {
- wpa_printf(MSG_INFO, "Could not get Add/Item/Data text");
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
-
- wpa_printf(MSG_DEBUG, "Add/Item/Data: %s", data);
-
- if (use_tnds) {
- tnds = xml_node_from_buf(ctx->xml, data);
- xml_node_get_text_free(ctx->xml, data);
- if (tnds == NULL) {
- wpa_printf(MSG_INFO,
- "Could not parse Add/Item/Data text");
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
-
- unode = tnds_to_mo(ctx->xml, tnds);
- xml_node_free(ctx->xml, tnds);
- if (unode == NULL) {
- wpa_printf(MSG_INFO, "Could not parse TNDS text");
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
-
- debug_dump_node(ctx, "Parsed TNDS", unode);
-
- xml_node_add_child(ctx->xml, pps_node, unode);
- } else {
- /* TODO: What to do here? */
- os_free(uri);
- return DM_RESP_BAD_REQUEST;
- }
-
- os_free(uri);
-
- if (update_pps_file(ctx, pps_fname, pps) < 0)
- return DM_RESP_COMMAND_FAILED;
-
- ctx->pps_updated = 1;
-
- return DM_RESP_OK;
-}
-
-
-static int oma_dm_add(struct hs20_osu_client *ctx, xml_node_t *add,
- xml_node_t *pps, const char *pps_fname)
-{
- xml_node_t *node;
- char *locuri;
- char fname[300];
- int ret;
-
- node = get_node(ctx->xml, add, "Item/Target/LocURI");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Target LocURI node found");
- return DM_RESP_BAD_REQUEST;
- }
- locuri = xml_node_get_text(ctx->xml, node);
- if (locuri == NULL) {
- wpa_printf(MSG_ERROR, "No LocURI node text found");
- return DM_RESP_BAD_REQUEST;
- }
- wpa_printf(MSG_INFO, "Target LocURI: %s", locuri);
- if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
- wpa_printf(MSG_INFO, "Unsupported Add Target LocURI");
- xml_node_get_text_free(ctx->xml, locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
-
- node = get_node(ctx->xml, add, "Item/Data");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Data node found");
- xml_node_get_text_free(ctx->xml, locuri);
- return DM_RESP_BAD_REQUEST;
- }
-
- if (pps_fname && os_file_exists(pps_fname)) {
- ret = oma_dm_run_add(ctx, locuri, add, pps, pps_fname);
- if (ret != DM_RESP_OK) {
- xml_node_get_text_free(ctx->xml, locuri);
- return ret;
- }
- ret = 0;
- os_strlcpy(fname, pps_fname, sizeof(fname));
- } else
- ret = hs20_add_pps_mo(ctx, locuri, node, fname, sizeof(fname));
- xml_node_get_text_free(ctx->xml, locuri);
- if (ret < 0)
- return ret == -2 ? DM_RESP_ALREADY_EXISTS :
- DM_RESP_COMMAND_FAILED;
-
- if (ctx->no_reconnect == 2) {
- os_snprintf(ctx->pps_fname, sizeof(ctx->pps_fname), "%s",
- fname);
- ctx->pps_cred_set = 1;
- return DM_RESP_OK;
- }
-
- wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
- cmd_set_pps(ctx, fname);
-
- if (ctx->no_reconnect)
- return DM_RESP_OK;
-
- wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
- if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0)
- wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
-
- return DM_RESP_OK;
-}
-
-
-static int oma_dm_replace(struct hs20_osu_client *ctx, xml_node_t *replace,
- xml_node_t *pps, const char *pps_fname)
-{
- char *locuri, *pos;
- size_t fqdn_len;
- xml_node_t *node, *tnds, *unode, *pps_node, *parent;
- char *data;
- int use_tnds = 0;
-
- locuri = oma_dm_get_target_locuri(ctx, replace);
- if (locuri == NULL)
- return DM_RESP_BAD_REQUEST;
-
- wpa_printf(MSG_INFO, "Replace command target LocURI: %s", locuri);
- if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
- wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi");
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos = locuri + 8;
-
- if (ctx->fqdn == NULL) {
- os_free(locuri);
- return DM_RESP_COMMAND_FAILED;
- }
- fqdn_len = os_strlen(ctx->fqdn);
- if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
- pos[fqdn_len] != '/') {
- wpa_printf(MSG_INFO, "Do not allow Replace outside ./Wi-Fi/%s",
- ctx->fqdn);
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += fqdn_len + 1;
-
- if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
- wpa_printf(MSG_INFO,
- "Do not allow Replace outside ./Wi-Fi/%s/PerProviderSubscription",
- ctx->fqdn);
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += 24;
-
- wpa_printf(MSG_INFO, "Replace command for PPS node %s", pos);
-
- pps_node = get_node(ctx->xml, pps, pos);
- if (pps_node == NULL) {
- wpa_printf(MSG_INFO, "Specified PPS node not found");
- os_free(locuri);
- return DM_RESP_NOT_FOUND;
- }
-
- node = get_node(ctx->xml, replace, "Item/Meta/Type");
- if (node) {
- char *type;
- type = xml_node_get_text(ctx->xml, node);
- if (type == NULL) {
- wpa_printf(MSG_INFO, "Could not find type text");
- os_free(locuri);
- return DM_RESP_BAD_REQUEST;
- }
- use_tnds = node &&
- os_strstr(type, "application/vnd.syncml.dmtnds+xml");
- }
-
- node = get_node(ctx->xml, replace, "Item/Data");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Replace/Item/Data found");
- os_free(locuri);
- return DM_RESP_BAD_REQUEST;
- }
-
- data = xml_node_get_text(ctx->xml, node);
- if (data == NULL) {
- wpa_printf(MSG_INFO, "Could not get Replace/Item/Data text");
- os_free(locuri);
- return DM_RESP_BAD_REQUEST;
- }
-
- wpa_printf(MSG_DEBUG, "Replace/Item/Data: %s", data);
-
- if (use_tnds) {
- tnds = xml_node_from_buf(ctx->xml, data);
- xml_node_get_text_free(ctx->xml, data);
- if (tnds == NULL) {
- wpa_printf(MSG_INFO,
- "Could not parse Replace/Item/Data text");
- os_free(locuri);
- return DM_RESP_BAD_REQUEST;
- }
-
- unode = tnds_to_mo(ctx->xml, tnds);
- xml_node_free(ctx->xml, tnds);
- if (unode == NULL) {
- wpa_printf(MSG_INFO, "Could not parse TNDS text");
- os_free(locuri);
- return DM_RESP_BAD_REQUEST;
- }
-
- debug_dump_node(ctx, "Parsed TNDS", unode);
-
- parent = xml_node_get_parent(ctx->xml, pps_node);
- xml_node_detach(ctx->xml, pps_node);
- xml_node_add_child(ctx->xml, parent, unode);
- } else {
- xml_node_set_text(ctx->xml, pps_node, data);
- xml_node_get_text_free(ctx->xml, data);
- }
-
- os_free(locuri);
-
- if (update_pps_file(ctx, pps_fname, pps) < 0)
- return DM_RESP_COMMAND_FAILED;
-
- ctx->pps_updated = 1;
-
- return DM_RESP_OK;
-}
-
-
-static int oma_dm_get(struct hs20_osu_client *ctx, xml_node_t *get,
- xml_node_t *pps, const char *pps_fname, char **value)
-{
- char *locuri, *pos;
- size_t fqdn_len;
- xml_node_t *pps_node;
- const char *name;
-
- *value = NULL;
-
- locuri = oma_dm_get_target_locuri(ctx, get);
- if (locuri == NULL)
- return DM_RESP_BAD_REQUEST;
-
- wpa_printf(MSG_INFO, "Get command target LocURI: %s", locuri);
- if (os_strncasecmp(locuri, "./Wi-Fi/", 8) != 0) {
- wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi");
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos = locuri + 8;
-
- if (ctx->fqdn == NULL)
- return DM_RESP_COMMAND_FAILED;
- fqdn_len = os_strlen(ctx->fqdn);
- if (os_strncasecmp(pos, ctx->fqdn, fqdn_len) != 0 ||
- pos[fqdn_len] != '/') {
- wpa_printf(MSG_INFO, "Do not allow Get outside ./Wi-Fi/%s",
- ctx->fqdn);
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += fqdn_len + 1;
-
- if (os_strncasecmp(pos, "PerProviderSubscription/", 24) != 0) {
- wpa_printf(MSG_INFO,
- "Do not allow Get outside ./Wi-Fi/%s/PerProviderSubscription",
- ctx->fqdn);
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
- pos += 24;
-
- wpa_printf(MSG_INFO, "Get command for PPS node %s", pos);
-
- pps_node = get_node(ctx->xml, pps, pos);
- if (pps_node == NULL) {
- wpa_printf(MSG_INFO, "Specified PPS node not found");
- os_free(locuri);
- return DM_RESP_NOT_FOUND;
- }
-
- name = xml_node_get_localname(ctx->xml, pps_node);
- wpa_printf(MSG_INFO, "Get command returned node with name '%s'", name);
- if (os_strcasecmp(name, "Password") == 0) {
- wpa_printf(MSG_INFO, "Do not allow Get for Password node");
- os_free(locuri);
- return DM_RESP_PERMISSION_DENIED;
- }
-
- /*
- * TODO: No support for DMTNDS, so if interior node, reply with a
- * list of children node names in Results element. The child list type is
- * defined in [DMTND].
- */
-
- *value = xml_node_get_text(ctx->xml, pps_node);
- if (*value == NULL)
- return DM_RESP_COMMAND_FAILED;
-
- return DM_RESP_OK;
-}
-
-
-static int oma_dm_get_cmdid(struct hs20_osu_client *ctx, xml_node_t *node)
-{
- xml_node_t *cnode;
- char *str;
- int ret;
-
- cnode = get_node(ctx->xml, node, "CmdID");
- if (cnode == NULL)
- return 0;
-
- str = xml_node_get_text(ctx->xml, cnode);
- if (str == NULL)
- return 0;
- ret = atoi(str);
- xml_node_get_text_free(ctx->xml, str);
- return ret;
-}
-
-
-static xml_node_t * oma_dm_send_recv(struct hs20_osu_client *ctx,
- const char *url, xml_node_t *syncml,
- const char *ext_hdr,
- const char *username, const char *password,
- const char *client_cert,
- const char *client_key)
-{
- xml_node_t *resp;
- char *str, *res;
- char *resp_uri = NULL;
-
- str = xml_node_to_str(ctx->xml, syncml);
- xml_node_free(ctx->xml, syncml);
- if (str == NULL)
- return NULL;
-
- wpa_printf(MSG_INFO, "Send OMA DM Package");
- write_summary(ctx, "Send OMA DM Package");
- os_free(ctx->server_url);
- ctx->server_url = os_strdup(url);
- res = http_post(ctx->http, url, str, "application/vnd.syncml.dm+xml",
- ext_hdr, ctx->ca_fname, username, password,
- client_cert, client_key, NULL);
- os_free(str);
- os_free(resp_uri);
- resp_uri = NULL;
-
- if (res == NULL) {
- const char *err = http_get_err(ctx->http);
- if (err) {
- wpa_printf(MSG_INFO, "HTTP error: %s", err);
- write_result(ctx, "HTTP error: %s", err);
- } else {
- write_summary(ctx, "Failed to send OMA DM Package");
- }
- return NULL;
- }
- wpa_printf(MSG_DEBUG, "Server response: %s", res);
-
- wpa_printf(MSG_INFO, "Process OMA DM Package");
- write_summary(ctx, "Process received OMA DM Package");
- resp = xml_node_from_buf(ctx->xml, res);
- os_free(res);
- if (resp == NULL) {
- wpa_printf(MSG_INFO, "Failed to parse OMA DM response");
- return NULL;
- }
-
- debug_dump_node(ctx, "OMA DM Package", resp);
-
- return resp;
-}
-
-
-static xml_node_t * oma_dm_process(struct hs20_osu_client *ctx, const char *url,
- xml_node_t *resp, int msgid,
- char **ret_resp_uri,
- xml_node_t *pps, const char *pps_fname)
-{
- xml_node_t *syncml, *syncbody, *hdr, *body, *child;
- const char *name;
- char *resp_uri = NULL;
- int server_msgid = 0;
- int cmdid = 0;
- int server_cmdid;
- int resp_needed = 0;
- char *tmp;
- int final = 0;
- char *locuri;
-
- *ret_resp_uri = NULL;
-
- name = xml_node_get_localname(ctx->xml, resp);
- if (name == NULL || os_strcasecmp(name, "SyncML") != 0) {
- wpa_printf(MSG_INFO, "SyncML node not found");
- return NULL;
- }
-
- hdr = get_node(ctx->xml, resp, "SyncHdr");
- body = get_node(ctx->xml, resp, "SyncBody");
- if (hdr == NULL || body == NULL) {
- wpa_printf(MSG_INFO, "Could not find SyncHdr or SyncBody");
- return NULL;
- }
-
- xml_node_for_each_child(ctx->xml, child, hdr) {
- xml_node_for_each_check(ctx->xml, child);
- name = xml_node_get_localname(ctx->xml, child);
- wpa_printf(MSG_INFO, "SyncHdr %s", name);
- if (os_strcasecmp(name, "RespURI") == 0) {
- tmp = xml_node_get_text(ctx->xml, child);
- if (tmp)
- resp_uri = os_strdup(tmp);
- xml_node_get_text_free(ctx->xml, tmp);
- } else if (os_strcasecmp(name, "MsgID") == 0) {
- tmp = xml_node_get_text(ctx->xml, child);
- if (tmp)
- server_msgid = atoi(tmp);
- xml_node_get_text_free(ctx->xml, tmp);
- }
- }
-
- wpa_printf(MSG_INFO, "Server MsgID: %d", server_msgid);
- if (resp_uri)
- wpa_printf(MSG_INFO, "RespURI: %s", resp_uri);
-
- syncml = oma_dm_build_hdr(ctx, resp_uri ? resp_uri : url, msgid);
- if (syncml == NULL) {
- os_free(resp_uri);
- return NULL;
- }
-
- syncbody = xml_node_create(ctx->xml, syncml, NULL, "SyncBody");
- cmdid++;
- add_status(ctx, syncbody, server_msgid, 0, cmdid, "SyncHdr",
- DM_RESP_AUTH_ACCEPTED, NULL);
-
- xml_node_for_each_child(ctx->xml, child, body) {
- xml_node_for_each_check(ctx->xml, child);
- server_cmdid = oma_dm_get_cmdid(ctx, child);
- name = xml_node_get_localname(ctx->xml, child);
- wpa_printf(MSG_INFO, "SyncBody CmdID=%d - %s",
- server_cmdid, name);
- if (os_strcasecmp(name, "Exec") == 0) {
- int res = oma_dm_exec(ctx, child);
- cmdid++;
- locuri = oma_dm_get_target_locuri(ctx, child);
- if (locuri == NULL)
- res = DM_RESP_BAD_REQUEST;
- add_status(ctx, syncbody, server_msgid, server_cmdid,
- cmdid, name, res, locuri);
- os_free(locuri);
- resp_needed = 1;
- } else if (os_strcasecmp(name, "Add") == 0) {
- int res = oma_dm_add(ctx, child, pps, pps_fname);
- cmdid++;
- locuri = oma_dm_get_target_locuri(ctx, child);
- if (locuri == NULL)
- res = DM_RESP_BAD_REQUEST;
- add_status(ctx, syncbody, server_msgid, server_cmdid,
- cmdid, name, res, locuri);
- os_free(locuri);
- resp_needed = 1;
- } else if (os_strcasecmp(name, "Replace") == 0) {
- int res;
- res = oma_dm_replace(ctx, child, pps, pps_fname);
- cmdid++;
- locuri = oma_dm_get_target_locuri(ctx, child);
- if (locuri == NULL)
- res = DM_RESP_BAD_REQUEST;
- add_status(ctx, syncbody, server_msgid, server_cmdid,
- cmdid, name, res, locuri);
- os_free(locuri);
- resp_needed = 1;
- } else if (os_strcasecmp(name, "Status") == 0) {
- /* TODO: Verify success */
- } else if (os_strcasecmp(name, "Get") == 0) {
- int res;
- char *value;
- res = oma_dm_get(ctx, child, pps, pps_fname, &value);
- cmdid++;
- locuri = oma_dm_get_target_locuri(ctx, child);
- if (locuri == NULL)
- res = DM_RESP_BAD_REQUEST;
- add_status(ctx, syncbody, server_msgid, server_cmdid,
- cmdid, name, res, locuri);
- if (res == DM_RESP_OK && value) {
- cmdid++;
- add_results(ctx, syncbody, server_msgid,
- server_cmdid, cmdid, locuri, value);
- }
- os_free(locuri);
- xml_node_get_text_free(ctx->xml, value);
- resp_needed = 1;
-#if 0 /* TODO: MUST support */
- } else if (os_strcasecmp(name, "Delete") == 0) {
-#endif
-#if 0 /* TODO: MUST support */
- } else if (os_strcasecmp(name, "Sequence") == 0) {
-#endif
- } else if (os_strcasecmp(name, "Final") == 0) {
- final = 1;
- break;
- } else {
- locuri = oma_dm_get_target_locuri(ctx, child);
- add_status(ctx, syncbody, server_msgid, server_cmdid,
- cmdid, name, DM_RESP_COMMAND_NOT_IMPLEMENTED,
- locuri);
- os_free(locuri);
- resp_needed = 1;
- }
- }
-
- if (!final) {
- wpa_printf(MSG_INFO, "Final node not found");
- xml_node_free(ctx->xml, syncml);
- os_free(resp_uri);
- return NULL;
- }
-
- if (!resp_needed) {
- wpa_printf(MSG_INFO, "Exchange completed - no response needed");
- xml_node_free(ctx->xml, syncml);
- os_free(resp_uri);
- return NULL;
- }
-
- xml_node_create(ctx->xml, syncbody, NULL, "Final");
-
- debug_dump_node(ctx, "OMA-DM Package 3", syncml);
-
- *ret_resp_uri = resp_uri;
- return syncml;
-}
-
-
-int cmd_oma_dm_prov(struct hs20_osu_client *ctx, const char *url)
-{
- xml_node_t *syncml, *resp;
- char *resp_uri = NULL;
- int msgid = 0;
-
- if (url == NULL) {
- wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
- return -1;
- }
-
- wpa_printf(MSG_INFO, "OMA-DM credential provisioning requested");
- write_summary(ctx, "OMA-DM credential provisioning");
-
- msgid++;
- syncml = build_oma_dm_1_sub_reg(ctx, url, msgid);
- if (syncml == NULL)
- return -1;
-
- while (syncml) {
- resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
- syncml, NULL, NULL, NULL, NULL, NULL);
- if (resp == NULL)
- return -1;
-
- msgid++;
- syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
- NULL, NULL);
- xml_node_free(ctx->xml, resp);
- }
-
- os_free(resp_uri);
-
- return ctx->pps_cred_set ? 0 : -1;
-}
-
-
-int cmd_oma_dm_sim_prov(struct hs20_osu_client *ctx, const char *url)
-{
- xml_node_t *syncml, *resp;
- char *resp_uri = NULL;
- int msgid = 0;
-
- if (url == NULL) {
- wpa_printf(MSG_INFO, "Invalid prov command (missing URL)");
- return -1;
- }
-
- wpa_printf(MSG_INFO, "OMA-DM SIM provisioning requested");
- ctx->no_reconnect = 2;
-
- wpa_printf(MSG_INFO, "Wait for IP address before starting SIM provisioning");
- write_summary(ctx, "Wait for IP address before starting SIM provisioning");
-
- if (wait_ip_addr(ctx->ifname, 15) < 0) {
- wpa_printf(MSG_INFO, "Could not get IP address for WLAN - try connection anyway");
- }
- write_summary(ctx, "OMA-DM SIM provisioning");
-
- msgid++;
- syncml = build_oma_dm_1_sub_prov(ctx, url, msgid);
- if (syncml == NULL)
- return -1;
-
- while (syncml) {
- resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : url,
- syncml, NULL, NULL, NULL, NULL, NULL);
- if (resp == NULL)
- return -1;
-
- msgid++;
- syncml = oma_dm_process(ctx, url, resp, msgid, &resp_uri,
- NULL, NULL);
- xml_node_free(ctx->xml, resp);
- }
-
- os_free(resp_uri);
-
- if (ctx->pps_cred_set) {
- wpa_printf(MSG_INFO, "Updating wpa_supplicant credentials");
- cmd_set_pps(ctx, ctx->pps_fname);
-
- wpa_printf(MSG_INFO, "Requesting reconnection with updated configuration");
- write_summary(ctx, "Requesting reconnection with updated configuration");
- if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
- wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
- write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
- return -1;
- }
- }
-
- return ctx->pps_cred_set ? 0 : -1;
-}
-
-
-void oma_dm_pol_upd(struct hs20_osu_client *ctx, const char *address,
- const char *pps_fname,
- const char *client_cert, const char *client_key,
- const char *cred_username, const char *cred_password,
- xml_node_t *pps)
-{
- xml_node_t *syncml, *resp;
- char *resp_uri = NULL;
- int msgid = 0;
-
- wpa_printf(MSG_INFO, "OMA-DM policy update");
- write_summary(ctx, "OMA-DM policy update");
-
- msgid++;
- syncml = build_oma_dm_1_pol_upd(ctx, address, msgid);
- if (syncml == NULL)
- return;
-
- while (syncml) {
- resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
- syncml, NULL, cred_username,
- cred_password, client_cert, client_key);
- if (resp == NULL)
- return;
-
- msgid++;
- syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
- pps, pps_fname);
- xml_node_free(ctx->xml, resp);
- }
-
- os_free(resp_uri);
-
- if (ctx->pps_updated) {
- wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO");
- write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request connection");
- cmd_set_pps(ctx, pps_fname);
- if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
- wpa_printf(MSG_INFO,
- "Failed to request wpa_supplicant to reconnect");
- write_summary(ctx,
- "Failed to request wpa_supplicant to reconnect");
- }
- }
-}
-
-
-void oma_dm_sub_rem(struct hs20_osu_client *ctx, const char *address,
- const char *pps_fname,
- const char *client_cert, const char *client_key,
- const char *cred_username, const char *cred_password,
- xml_node_t *pps)
-{
- xml_node_t *syncml, *resp;
- char *resp_uri = NULL;
- int msgid = 0;
-
- wpa_printf(MSG_INFO, "OMA-DM subscription remediation");
- write_summary(ctx, "OMA-DM subscription remediation");
-
- msgid++;
- syncml = build_oma_dm_1_sub_rem(ctx, address, msgid);
- if (syncml == NULL)
- return;
-
- while (syncml) {
- resp = oma_dm_send_recv(ctx, resp_uri ? resp_uri : address,
- syncml, NULL, cred_username,
- cred_password, client_cert, client_key);
- if (resp == NULL)
- return;
-
- msgid++;
- syncml = oma_dm_process(ctx, address, resp, msgid, &resp_uri,
- pps, pps_fname);
- xml_node_free(ctx->xml, resp);
- }
-
- os_free(resp_uri);
-
- wpa_printf(MSG_INFO, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
- write_summary(ctx, "Update wpa_supplicant credential based on updated PPS MO and request reconnection");
- cmd_set_pps(ctx, pps_fname);
- if (wpa_command(ctx->ifname, "INTERWORKING_SELECT auto") < 0) {
- wpa_printf(MSG_INFO, "Failed to request wpa_supplicant to reconnect");
- write_summary(ctx, "Failed to request wpa_supplicant to reconnect");
- }
-}
-
-
-void cmd_oma_dm_add(struct hs20_osu_client *ctx, const char *pps_fname,
- const char *add_fname)
-{
- xml_node_t *pps, *add;
- int res;
-
- ctx->fqdn = os_strdup("wi-fi.org");
-
- pps = node_from_file(ctx->xml, pps_fname);
- if (pps == NULL) {
- wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
- pps_fname);
- return;
- }
-
- add = node_from_file(ctx->xml, add_fname);
- if (add == NULL) {
- wpa_printf(MSG_INFO, "Add file %s could not be parsed",
- add_fname);
- xml_node_free(ctx->xml, pps);
- return;
- }
-
- res = oma_dm_add(ctx, add, pps, pps_fname);
- wpa_printf(MSG_INFO, "oma_dm_add --> %d", res);
-
- xml_node_free(ctx->xml, pps);
- xml_node_free(ctx->xml, add);
-}
-
-
-void cmd_oma_dm_replace(struct hs20_osu_client *ctx, const char *pps_fname,
- const char *replace_fname)
-{
- xml_node_t *pps, *replace;
- int res;
-
- ctx->fqdn = os_strdup("wi-fi.org");
-
- pps = node_from_file(ctx->xml, pps_fname);
- if (pps == NULL) {
- wpa_printf(MSG_INFO, "PPS file %s could not be parsed",
- pps_fname);
- return;
- }
-
- replace = node_from_file(ctx->xml, replace_fname);
- if (replace == NULL) {
- wpa_printf(MSG_INFO, "Replace file %s could not be parsed",
- replace_fname);
- xml_node_free(ctx->xml, pps);
- return;
- }
-
- res = oma_dm_replace(ctx, replace, pps, pps_fname);
- wpa_printf(MSG_INFO, "oma_dm_replace --> %d", res);
-
- xml_node_free(ctx->xml, pps);
- xml_node_free(ctx->xml, replace);
-}
diff --git a/hs20/client/osu_client.c b/hs20/client/osu_client.c
deleted file mode 100644
index 11bf0db35e93..000000000000
--- a/hs20/client/osu_client.c
+++ /dev/null
@@ -1,3431 +0,0 @@
-/*
- * Hotspot 2.0 OSU client
- * Copyright (c) 2012-2014, Qualcomm Atheros, Inc.
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
-
-#include "includes.h"
-#include <time.h>
-#include <sys/stat.h>
-#ifdef ANDROID
-#include "private/android_filesystem_config.h"
-#endif /* ANDROID */
-
-#include "common.h"
-#include "utils/browser.h"
-#include "utils/base64.h"
-#include "utils/xml-utils.h"
-#include "utils/http-utils.h"
-#include "common/wpa_ctrl.h"
-#include "common/wpa_helpers.h"
-#include "eap_common/eap_defs.h"
-#include "crypto/crypto.h"
-#include "crypto/sha256.h"
-#include "osu_client.h"
-
-const char *spp_xsd_fname = "spp.xsd";
-
-
-void write_result(struct hs20_osu_client *ctx, const char *fmt, ...)
-{
- va_list ap;
- FILE *f;
- char buf[500];
-
- va_start(ap, fmt);
- vsnprintf(buf, sizeof(buf), fmt, ap);
- va_end(ap);
- write_summary(ctx, "%s", buf);
-
- if (!ctx->result_file)
- return;
-
- f = fopen(ctx->result_file, "w");
- if (f == NULL)
- return;
-
- va_start(ap, fmt);
- vfprintf(f, fmt, ap);
- va_end(ap);
- fprintf(f, "\n");
- fclose(f);
-}
-
-
-void write_summary(struct hs20_osu_client *ctx, const char *fmt, ...)
-{
- va_list ap;
- FILE *f;
-
- if (!ctx->summary_file)
- return;
-
- f = fopen(ctx->summary_file, "a");
- if (f == NULL)
- return;
-
- va_start(ap, fmt);
- vfprintf(f, fmt, ap);
- va_end(ap);
- fprintf(f, "\n");
- fclose(f);
-}
-
-
-void debug_dump_node(struct hs20_osu_client *ctx, const char *title,
- xml_node_t *node)
-{
- char *str = xml_node_to_str(ctx->xml, node);
- wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str);
- free(str);
-}
-
-
-static int valid_fqdn(const char *fqdn)
-{
- const char *pos;
-
- /* TODO: could make this more complete.. */
- if (strchr(fqdn, '.') == 0 || strlen(fqdn) > 255)
- return 0;
- for (pos = fqdn; *pos; pos++) {
- if (*pos >= 'a' && *pos <= 'z')
- continue;
- if (*pos >= 'A' && *pos <= 'Z')
- continue;
- if (*pos >= '0' && *pos <= '9')
- continue;
- if (*pos == '-' || *pos == '.' || *pos == '_')
- continue;
- return 0;
- }
- return 1;
-}
-
-
-static int android_update_permission(const char *path, mode_t mode)
-{
-#ifdef ANDROID
- /* we need to change file/folder permission for Android */
-
- if (!path) {
- wpa_printf(MSG_ERROR, "file path null");
- return -1;
- }
-
- /* Allow processes running with Group ID as AID_WIFI,
- * to read files from SP, SP/<fqdn>, Cert and osu-info directories */
- if (lchown(path, -1, AID_WIFI)) {
- wpa_printf(MSG_INFO, "CTRL: Could not lchown directory: %s",
- strerror(errno));
- return -1;
- }
-
- if (chmod(path, mode) < 0) {
- wpa_printf(MSG_INFO, "CTRL: Could not chmod directory: %s",
- strerror(errno));
- return -1;
- }
-#endif /* ANDROID */
-
- return 0;
-}
-
-
-int osu_get_certificate(struct hs20_osu_client *ctx, xml_node_t *getcert)
-{
- xml_node_t *node;
- char *url, *user = NULL, *pw = NULL;
- char *proto;
- int ret = -1;
-
- proto = xml_node_get_attr_value(ctx->xml, getcert,
- "enrollmentProtocol");
- if (!proto)
- return -1;
- wpa_printf(MSG_INFO, "getCertificate - enrollmentProtocol=%s", proto);
- write_summary(ctx, "getCertificate - enrollmentProtocol=%s", proto);
- if (os_strcasecmp(proto, "EST") != 0) {
- wpa_printf(MSG_INFO, "Unsupported enrollmentProtocol");
- xml_node_get_attr_value_free(ctx->xml, proto);
- return -1;
- }
- xml_node_get_attr_value_free(ctx->xml, proto);
-
- node = get_node(ctx->xml, getcert, "enrollmentServerURI");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "Could not find enrollmentServerURI node");
- xml_node_get_attr_value_free(ctx->xml, proto);
- return -1;
- }
- url = xml_node_get_text(ctx->xml, node);
- if (url == NULL) {
- wpa_printf(MSG_INFO, "Could not get URL text");
- return -1;
- }
- wpa_printf(MSG_INFO, "enrollmentServerURI: %s", url);
- write_summary(ctx, "enrollmentServerURI: %s", url);
-
- node = get_node(ctx->xml, getcert, "estUserID");
- if (node == NULL && !ctx->client_cert_present) {
- wpa_printf(MSG_INFO, "Could not find estUserID node");
- goto fail;
- }
- if (node) {
- user = xml_node_get_text(ctx->xml, node);
- if (user == NULL) {
- wpa_printf(MSG_INFO, "Could not get estUserID text");
- goto fail;
- }
- wpa_printf(MSG_INFO, "estUserID: %s", user);
- write_summary(ctx, "estUserID: %s", user);
- }
-
- node = get_node(ctx->xml, getcert, "estPassword");
- if (node == NULL && !ctx->client_cert_present) {
- wpa_printf(MSG_INFO, "Could not find estPassword node");
- goto fail;
- }
- if (node) {
- pw = xml_node_get_base64_text(ctx->xml, node, NULL);
- if (pw == NULL) {
- wpa_printf(MSG_INFO, "Could not get estPassword text");
- goto fail;
- }
- wpa_printf(MSG_INFO, "estPassword: %s", pw);
- }
-
- mkdir("Cert", S_IRWXU);
- android_update_permission("Cert", S_IRWXU | S_IRWXG);
-
- if (est_load_cacerts(ctx, url) < 0 ||
- est_build_csr(ctx, url) < 0 ||
- est_simple_enroll(ctx, url, user, pw) < 0)
- goto fail;
-
- ret = 0;
-fail:
- xml_node_get_text_free(ctx->xml, url);
- xml_node_get_text_free(ctx->xml, user);
- xml_node_get_text_free(ctx->xml, pw);
-
- return ret;
-}
-
-
-static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert,
- const char *fqdn)
-{
- u8 digest1[SHA256_MAC_LEN], digest2[SHA256_MAC_LEN];
- char *der, *pem;
- size_t der_len, pem_len;
- char *fingerprint;
- char buf[200];
-
- wpa_printf(MSG_INFO, "PPS for certificate credential - fqdn=%s", fqdn);
-
- fingerprint = xml_node_get_text(ctx->xml, cert);
- if (fingerprint == NULL)
- return -1;
- if (hexstr2bin(fingerprint, digest1, SHA256_MAC_LEN) < 0) {
- wpa_printf(MSG_INFO, "Invalid SHA256 hash value");
- write_result(ctx, "Invalid client certificate SHA256 hash value in PPS");
- xml_node_get_text_free(ctx->xml, fingerprint);
- return -1;
- }
- xml_node_get_text_free(ctx->xml, fingerprint);
-
- der = os_readfile("Cert/est_cert.der", &der_len);
- if (der == NULL) {
- wpa_printf(MSG_INFO, "Could not find client certificate from EST");
- write_result(ctx, "Could not find client certificate from EST");
- return -1;
- }
-
- if (sha256_vector(1, (const u8 **) &der, &der_len, digest2) < 0) {
- os_free(der);
- return -1;
- }
- os_free(der);
-
- if (os_memcmp(digest1, digest2, sizeof(digest1)) != 0) {
- wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO");
- write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO");
- return -1;
- }
-
- wpa_printf(MSG_INFO, "Client certificate from EST matches PPS MO");
- unlink("Cert/est_cert.der");
-
- os_snprintf(buf, sizeof(buf), "SP/%s/client-ca.pem", fqdn);
- if (rename("Cert/est-cacerts.pem", buf) < 0) {
- wpa_printf(MSG_INFO, "Could not move est-cacerts.pem to client-ca.pem: %s",
- strerror(errno));
- return -1;
- }
- pem = os_readfile(buf, &pem_len);
-
- os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn);
- if (rename("Cert/est_cert.pem", buf) < 0) {
- wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s",
- strerror(errno));
- os_free(pem);
- return -1;
- }
-
- if (pem) {
- FILE *f = fopen(buf, "a");
- if (f) {
- fwrite(pem, pem_len, 1, f);
- fclose(f);
- }
- os_free(pem);
- }
-
- os_snprintf(buf, sizeof(buf), "SP/%s/client-key.pem", fqdn);
- if (rename("Cert/privkey-plain.pem", buf) < 0) {
- wpa_printf(MSG_INFO, "Could not move privkey-plain.pem to client-key.pem: %s",
- strerror(errno));
- return -1;
- }
-
- unlink("Cert/est-req.b64");
- unlink("Cert/est-req.pem");
- rmdir("Cert");
-
- return 0;
-}
-
-
-#define TMP_CERT_DL_FILE "tmp-cert-download"
-
-static int download_cert(struct hs20_osu_client *ctx, xml_node_t *params,
- const char *fname)
-{
- xml_node_t *url_node, *hash_node;
- char *url, *hash;
- char *cert;
- size_t len;
- u8 digest1[SHA256_MAC_LEN], digest2[SHA256_MAC_LEN];
- int res;
- char *b64;
- FILE *f;
-
- url_node = get_node(ctx->xml, params, "CertURL");
- hash_node = get_node(ctx->xml, params, "CertSHA256Fingerprint");
- if (url_node == NULL || hash_node == NULL)
- return -1;
- url = xml_node_get_text(ctx->xml, url_node);
- hash = xml_node_get_text(ctx->xml, hash_node);
- if (url == NULL || hash == NULL) {
- xml_node_get_text_free(ctx->xml, url);
- xml_node_get_text_free(ctx->xml, hash);
- return -1;
- }
-
- wpa_printf(MSG_INFO, "CertURL: %s", url);
- wpa_printf(MSG_INFO, "SHA256 hash: %s", hash);
-
- if (hexstr2bin(hash, digest1, SHA256_MAC_LEN) < 0) {
- wpa_printf(MSG_INFO, "Invalid SHA256 hash value");
- write_result(ctx, "Invalid SHA256 hash value for downloaded certificate");
- xml_node_get_text_free(ctx->xml, hash);
- return -1;
- }
- xml_node_get_text_free(ctx->xml, hash);
-
- write_summary(ctx, "Download certificate from %s", url);
- ctx->no_osu_cert_validation = 1;
- http_ocsp_set(ctx->http, 1);
- res = http_download_file(ctx->http, url, TMP_CERT_DL_FILE, NULL);
- http_ocsp_set(ctx->http,
- (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2);
- ctx->no_osu_cert_validation = 0;
- xml_node_get_text_free(ctx->xml, url);
- if (res < 0)
- return -1;
-
- cert = os_readfile(TMP_CERT_DL_FILE, &len);
- remove(TMP_CERT_DL_FILE);
- if (cert == NULL)
- return -1;
-
- if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) {
- os_free(cert);
- return -1;
- }
-
- if (os_memcmp(digest1, digest2, sizeof(digest1)) != 0) {
- wpa_printf(MSG_INFO, "Downloaded certificate fingerprint did not match");
- write_result(ctx, "Downloaded certificate fingerprint did not match");
- os_free(cert);
- return -1;
- }
-
- b64 = base64_encode(cert, len, NULL);
- os_free(cert);
- if (b64 == NULL)
- return -1;
-
- f = fopen(fname, "wb");
- if (f == NULL) {
- os_free(b64);
- return -1;
- }
-
- fprintf(f, "-----BEGIN CERTIFICATE-----\n"
- "%s"
- "-----END CERTIFICATE-----\n",
- b64);
-
- os_free(b64);
- fclose(f);
-
- wpa_printf(MSG_INFO, "Downloaded certificate into %s and validated fingerprint",
- fname);
- write_summary(ctx, "Downloaded certificate into %s and validated fingerprint",
- fname);
-
- return 0;
-}
-
-
-static int cmd_dl_osu_ca(struct hs20_osu_client *ctx, const char *pps_fname,
- const char *ca_fname)
-{
- xml_node_t *pps, *node;
- int ret;
-
- pps = node_from_file(ctx->xml, pps_fname);
- if (pps == NULL) {
- wpa_printf(MSG_INFO, "Could not read or parse '%s'", pps_fname);
- return -1;
- }
-
- node = get_child_node(ctx->xml, pps,
- "SubscriptionUpdate/TrustRoot");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No SubscriptionUpdate/TrustRoot/CertURL found from PPS");
- xml_node_free(ctx->xml, pps);
- return -1;
- }
-
- ret = download_cert(ctx, node, ca_fname);
- xml_node_free(ctx->xml, pps);
-
- return ret;
-}
-
-
-static int cmd_dl_polupd_ca(struct hs20_osu_client *ctx, const char *pps_fname,
- const char *ca_fname)
-{
- xml_node_t *pps, *node;
- int ret;
-
- pps = node_from_file(ctx->xml, pps_fname);
- if (pps == NULL) {
- wpa_printf(MSG_INFO, "Could not read or parse '%s'", pps_fname);
- return -1;
- }
-
- node = get_child_node(ctx->xml, pps,
- "Policy/PolicyUpdate/TrustRoot");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No Policy/PolicyUpdate/TrustRoot/CertURL found from PPS");
- xml_node_free(ctx->xml, pps);
- return -2;
- }
-
- ret = download_cert(ctx, node, ca_fname);
- xml_node_free(ctx->xml, pps);
-
- return ret;
-}
-
-
-static int cmd_dl_aaa_ca(struct hs20_osu_client *ctx, const char *pps_fname,
- const char *ca_fname)
-{
- xml_node_t *pps, *node, *aaa;
- int ret;
-
- pps = node_from_file(ctx->xml, pps_fname);
- if (pps == NULL) {
- wpa_printf(MSG_INFO, "Could not read or parse '%s'", pps_fname);
- return -1;
- }
-
- node = get_child_node(ctx->xml, pps,
- "AAAServerTrustRoot");
- if (node == NULL) {
- wpa_printf(MSG_INFO, "No AAAServerTrustRoot/CertURL found from PPS");
- xml_node_free(ctx->xml, pps);
- return -2;
- }
-
- aaa = xml_node_first_child(ctx->xml, node);
- if (aaa == NULL) {
- wpa_printf(MSG_INFO, "No AAAServerTrustRoot/CertURL found from PPS");
- xml_node_free(ctx->xml, pps);
- return -1;
- }
-
- ret = download_cert(ctx, aaa, ca_fname);
- xml_node_free(ctx->xml, pps);
-
- return ret;
-}
-
-
-static int download_trust_roots(struct hs20_osu_client *ctx,
- const char *pps_fname)
-{
- char *dir, *pos;
- char fname[300];
- int ret, ret1;
-
- dir = os_strdup(pps_fname);
- if (dir == NULL)
- return -1;
- pos = os_strrchr(dir, '/');
- if (pos == NULL) {
- os_free(dir);
- return -1;
- }
- *pos = '\0';
-
- snprintf(fname, sizeof(fname), "%s/ca.pem", dir);
- ret = cmd_dl_osu_ca(ctx, pps_fname, fname);
- snprintf(fname, sizeof(fname), "%s/polupd-ca.pem", dir);
- ret1 = cmd_dl_polupd_ca(ctx, pps_fname, fname);
- if (ret == 0 && ret1 == -1)
- ret = -1;
- snprintf(fname, sizeof(fname), "%s/aaa-ca.pem", dir);
- ret1 = cmd_dl_aaa_ca(ctx, pps_fname, fname);
- if (ret == 0 && ret1 == -1)
- ret = -1;
-
- os_free(dir);
-
- return ret;
-}
-
-
-static int server_dnsname_suffix_match(struct hs20_osu_client *ctx,
- const char *fqdn)
-{
- size_t match_len, len, i;
- const char *val;
-
- match_len = os_strlen(fqdn);
-
- for (i = 0; i < ctx->server_dnsname_count; i++) {
- wpa_printf(MSG_INFO,
- "Checking suffix match against server dNSName %s",
- ctx->server_dnsname[i]);
- val = ctx->server_dnsname[i];
- len = os_strlen(val);
-
- if (match_len > len)
- continue;
-
- if (os_strncasecmp(val + len - match_len, fqdn, match_len) != 0)
- continue; /* no match */
-
- if (match_len == len)
- return 1; /* exact match */
-
- if (val[len - match_len - 1] == '.')
- return 1; /* full label match completes suffix match */
-
- /* Reject due to incomplete label match */
- }
-
- /* None of the dNSName(s) matched */
- return 0;
-}
-
-
-int hs20_add_pps_mo(struct hs20_osu_client *ctx, const char *uri,
- xml_node_t *add_mo, char *fname, size_t fname_len)
-{
- char *str;
- char *fqdn, *pos;
- xml_node_t *tnds, *mo, *cert;
- const char *name;
- int ret;
-
- if (strncmp(uri, "./Wi-Fi/", 8) != 0) {
- wpa_printf(MSG_INFO, "Unsupported location for addMO to add PPS MO: '%s'",
- uri);
- write_result(ctx, "Unsupported location for addMO to add PPS MO: '%s'",
- uri);
- return -1;
- }
-
- fqdn = strdup(uri + 8);
- if (fqdn == NULL)
- return -1;
- pos = strchr(fqdn, '/');
- if (pos) {
- if (os_strcasecmp(pos, "/PerProviderSubscription") != 0) {
- wpa_printf(MSG_INFO, "Unsupported location for addMO to add PPS MO (extra directory): '%s'",
- uri);
- write_result(ctx, "Unsupported location for addMO to "
- "add PPS MO (extra directory): '%s'", uri);
- free(fqdn);
- return -1;
- }
- *pos = '\0'; /* remove trailing slash and PPS node name */
- }
- wpa_printf(MSG_INFO, "SP FQDN: %s", fqdn);
-
- if (!server_dnsname_suffix_match(ctx, fqdn)) {
- wpa_printf(MSG_INFO,
- "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values, count: %d",
- fqdn, (int) ctx->server_dnsname_count);
- write_result(ctx, "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values",
- fqdn);
- free(fqdn);
- return -1;
- }
-
- if (!valid_fqdn(fqdn)) {
- wpa_printf(MSG_INFO, "Invalid FQDN '%s'", fqdn);
- write_result(ctx, "Invalid FQDN '%s'", fqdn);
- free(fqdn);
- return -1;
- }
-
- mkdir("SP", S_IRWXU);
- snprintf(fname, fname_len, "SP/%s", fqdn);
- if (mkdir(fname, S_IRWXU) < 0) {
- if (errno != EEXIST) {
- int err = errno;
- wpa_printf(MSG_INFO, "mkdir(%s) failed: %s",
- fname, strerror(err));
- free(fqdn);
- return -1;
- }
- }
-
- android_update_permission("SP", S_IRWXU | S_IRWXG);
- android_update_permission(fname, S_IRWXU | S_IRWXG);
-
- snprintf(fname, fname_len, "SP/%s/pps.xml", fqdn);
-
- if (os_file_exists(fname)) {
- wpa_printf(MSG_INFO, "PPS file '%s' exists - reject addMO",
- fname);
- write_result(ctx, "PPS file '%s' exists - reject addMO",
- fname);
- free(fqdn);
- return -2;
- }
- wpa_printf(MSG_INFO, "Using PPS file: %s", fname);
-
- str = xml_node_get_text(ctx->xml, add_mo);
- if (str == NULL) {
- wpa_printf(MSG_INFO, "Could not extract MO text");
- free(fqdn);
- return -1;
- }
- wpa_printf(MSG_DEBUG, "[hs20] addMO text: '%s'", str);
-
- tnds = xml_node_from_buf(ctx->xml, str);
- xml_node_get_text_free(ctx->xml, str);
- if (tnds == NULL) {
- wpa_printf(MSG_INFO, "[hs20] Could not parse addMO text");
- free(fqdn);
- return -1;
- }
-
- mo = tnds_to_mo(ctx->xml, tnds);
- if (mo == NULL) {
- wpa_printf(MSG_INFO, "[hs20] Could not parse addMO TNDS text");
- free(fqdn);
- return -1;
- }
-
- debug_dump_node(ctx, "Parsed TNDS", mo);
-
- name = xml_node_get_localname(ctx->xml, mo);
- if (os_strcasecmp(name, "PerProviderSubscription") != 0) {
- wpa_printf(MSG_INFO, "[hs20] Unexpected PPS MO root node name '%s'",
- name);
- free(fqdn);
- return -1;
- }
-
- cert = get_child_node(ctx->xml, mo,
- "Credential/DigitalCertificate/"
- "CertSHA256Fingerprint");
- if (cert && process_est_cert(ctx, cert, fqdn) < 0) {
- xml_node_free(ctx->xml, mo);
- free(fqdn);
- return -1;
- }
- free(fqdn);
-
- if (node_to_file(ctx->xml, fname, mo) < 0) {
- wpa_printf(MSG_INFO, "Could not write MO to file");
- xml_node_free(ctx->xml, mo);
- return -1;
- }
- xml_node_free(ctx->xml, mo);
-
- wpa_printf(MSG_INFO, "A new PPS MO added as '%s'", fname);
- write_summary(ctx, "A new PPS MO added as '%s'", fname);
-
- ret = download_trust_roots(ctx, fname);
- if (ret < 0) {
- wpa_printf(MSG_INFO, "Remove invalid PPS MO file");
- write_summary(ctx, "Remove invalid PPS MO file");
- unlink(fname);
- }
-
- return ret;
-}
-
-
-int update_pps_file(struct hs20_osu_client *ctx, const char *pps_fname,
- xml_node_t *pps)
-{
- char *str;
- FILE *f;
- char backup[300];
-
- if (ctx->client_cert_present) {
- xml_node_t *cert;
- cert = get_child_node(ctx->xml, pps,
- "Credential/DigitalCertificate/"
- "CertSHA256Fingerprint");
- if (cert && os_file_exists("Cert/est_cert.der") &&
- process_est_cert(ctx, cert, ctx->fqdn) < 0) {
- wpa_printf(MSG_INFO, "EST certificate update processing failed on PPS MO update");
- return -1;
- }
- }
-
- wpa_printf(MSG_INFO, "Updating PPS MO %s", pps_fname);
-
- str = xml_node_to_str(ctx->xml, pps);
- if (str == NULL) {
- wpa_printf(MSG_ERROR, "No node found");
- return -1;
- }
- wpa_printf(MSG_MSGDUMP, "[hs20] Updated PPS: '%s'", str);
-
- snprintf(backup, sizeof(backup), "%s.bak", pps_fname);
- rename(pps_fname, backup);
- f = fopen(pps_fname, "w");
- if (f == NULL) {
- wpa_printf(MSG_INFO, "Could not write PPS");
- rename(backup, pps_fname);
- free(str);
- return -1;
- }
- fprintf(f, "%s\n", str);
- fclose(f);
-
- free(str);
-
- return 0;
-}
-
-
-void get_user_pw(struct hs20_osu_client *ctx, xml_node_t *pps,
- const char *alt_loc, char **user, char **pw)
-{
- xml_node_t *node;
-
- node = get_child_node(ctx->xml, pps,
- "Credential/UsernamePassword/Username");
- if (node)
- *user = xml_node_get_text(ctx->xml, node);
-
- node = get_child_node(ctx->xml, pps,
- "Credential/UsernamePassword/Password");
- if (node)
- *pw = xml_node_get_base64_text(ctx->xml, node, NULL);
-
- node = get_child_node(ctx->xml, pps, alt_loc);
- if (node) {
- xml_node_t *a;
- a = get_node(ctx->xml, node, "Username");
- if (a) {
- xml_node_get_text_free(ctx->xml, *user);
- *user = xml_node_get_text(ctx->xml, a);
- wpa_printf(MSG_INFO, "Use OSU username '%s'", *user);
- }
-
- a = get_node(ctx->xml, node, "Password");
- if (a) {
- free(*pw);
- *pw = xml_node_get_base64_text(ctx->xml, a, NULL);
- wpa_printf(MSG_INFO, "Use OSU password");
- }
- }
-}
-
-
-/* Remove old credentials based on HomeSP/FQDN */
-static void remove_sp_creds(struct hs20_osu_client *ctx, const char *fqdn)
-{
- char cmd[300];
- os_snprintf(cmd, sizeof(cmd), "REMOVE_CRED provisioning_sp=%s", fqdn);
- if (wpa_command(ctx->ifname, cmd) < 0)
- wpa_printf(MSG_INFO, "Failed to remove old credential(s)");
-}
-
-
-static void set_pps_cred_policy_spe(struct hs20_osu_client *ctx, int id,
- xml_node_t *spe)