Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/external/bsd/wpa merge conflicts.
details: https://anonhg.NetBSD.org/src/rev/266f1ddb7a5c
branches: trunk
changeset: 337085:266f1ddb7a5c
user: christos <christos%NetBSD.org@localhost>
date: Wed Apr 01 19:45:14 2015 +0000
description:
merge conflicts.
diffstat:
external/bsd/wpa/bin/hostapd/Makefile | 11 +-
external/bsd/wpa/bin/wpa_passphrase/Makefile | 4 +-
external/bsd/wpa/bin/wpa_supplicant/Makefile | 9 +-
external/bsd/wpa/dist/hostapd/hostapd_cli.c | 94 +-
external/bsd/wpa/dist/src/ap/ap_drv_ops.c | 111 +-
external/bsd/wpa/dist/src/ap/wpa_auth.c | 344 +-
external/bsd/wpa/dist/src/crypto/crypto_nss.c | 207 -
external/bsd/wpa/dist/src/crypto/tls_nss.c | 645 --
external/bsd/wpa/dist/src/drivers/driver_bsd.c | 53 +-
external/bsd/wpa/dist/src/drivers/driver_madwifi.c | 1309 ----
external/bsd/wpa/dist/src/drivers/driver_test.c | 2683 ----------
external/bsd/wpa/dist/src/eap_server/eap_server_tls_common.c | 41 +
external/bsd/wpa/dist/src/l2_packet/l2_packet_freebsd.c | 19 +
external/bsd/wpa/dist/src/radius/radius_das.c | 13 +
external/bsd/wpa/dist/src/utils/eloop.c | 4 +-
external/bsd/wpa/dist/src/utils/os.h | 6 +
external/bsd/wpa/dist/src/utils/os_unix.c | 101 +-
external/bsd/wpa/dist/src/utils/trace.h | 1 +
external/bsd/wpa/dist/wpa_supplicant/ctrl_iface.c | 1929 ++++++-
external/bsd/wpa/dist/wpa_supplicant/events.c | 332 +-
external/bsd/wpa/dist/wpa_supplicant/wpa_cli.c | 283 +-
external/bsd/wpa/dist/wpa_supplicant/wpa_supplicant.c | 1036 +++-
22 files changed, 3643 insertions(+), 5592 deletions(-)
diffs (truncated from 12860 to 300 lines):
diff -r 1dd3e507bf5f -r 266f1ddb7a5c external/bsd/wpa/bin/hostapd/Makefile
--- a/external/bsd/wpa/bin/hostapd/Makefile Wed Apr 01 19:24:35 2015 +0000
+++ b/external/bsd/wpa/bin/hostapd/Makefile Wed Apr 01 19:45:14 2015 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.7 2015/01/23 02:57:34 christos Exp $
+# $NetBSD: Makefile,v 1.8 2015/04/01 19:45:14 christos Exp $
.include "${.CURDIR}/../Makefile.inc"
@@ -13,6 +13,7 @@
ap_mlme.c \
authsrv.c \
beacon.c \
+bss_load.c \
ctrl_iface_ap.c \
drv_callbacks.c \
eap_user_db.c \
@@ -33,6 +34,7 @@
# common
SRCS+= \
+hw_features_common.c \
ieee802_11_common.c \
wpa_common.c \
wpa_ctrl.c
@@ -85,10 +87,14 @@
# crypto
SRCS+= \
crypto_openssl.c \
-md5.c \
random.c \
sha1-prf.c
+# crypto for non-openssl
+NO_SRCS+= \
+aes-wrap.c \
+md5.c
+
.PATH.c: \
${HOSTAPD_DISTDIR} \
${WPA_DISTDIR}/src/eap_server \
@@ -144,7 +150,6 @@
aes-eax.c \
aes-encblock.c \
aes-omac1.c \
-aes-wrap.c \
dh_groups.c \
fips_prf_openssl.c \
ms_funcs.c \
diff -r 1dd3e507bf5f -r 266f1ddb7a5c external/bsd/wpa/bin/wpa_passphrase/Makefile
--- a/external/bsd/wpa/bin/wpa_passphrase/Makefile Wed Apr 01 19:24:35 2015 +0000
+++ b/external/bsd/wpa/bin/wpa_passphrase/Makefile Wed Apr 01 19:45:14 2015 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.2 2014/01/03 02:07:31 christos Exp $
+# $NetBSD: Makefile,v 1.3 2015/04/01 19:45:14 christos Exp $
.include "${.CURDIR}/../Makefile.inc"
@@ -6,7 +6,7 @@
PROG= wpa_passphrase
SRCS= \
-md5.c \
+common.c \
os_unix.c \
wpa_debug.c \
wpa_passphrase.c \
diff -r 1dd3e507bf5f -r 266f1ddb7a5c external/bsd/wpa/bin/wpa_supplicant/Makefile
--- a/external/bsd/wpa/bin/wpa_supplicant/Makefile Wed Apr 01 19:24:35 2015 +0000
+++ b/external/bsd/wpa/bin/wpa_supplicant/Makefile Wed Apr 01 19:45:14 2015 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.4 2014/10/16 19:29:29 christos Exp $
+# $NetBSD: Makefile,v 1.5 2015/04/01 19:45:14 christos Exp $
.include "${.CURDIR}/../Makefile.inc"
@@ -22,10 +22,10 @@
eapol_supp_sm.c \
eloop.c \
events.c \
+hw_features_common.c \
ieee802_11_common.c \
l2_packet_freebsd.c \
main.c \
-md5.c \
notify.c \
os_unix.c \
peerkey.c \
@@ -33,6 +33,7 @@
preauth.c \
random.c \
scan.c \
+wmm_ac.c \
wpa.c \
wpa_common.c \
wpa_debug.c \
@@ -106,7 +107,6 @@
aes-eax.c \
aes-encblock.c \
aes-omac1.c \
-aes-unwrap.c \
# NB: requires patch to openssl
#CPPFLAGS+= -DEAP_FAST
@@ -116,7 +116,8 @@
LDADD+= -lssl -lcrypto -ldes
.else
CPPFLAGS+= -DINTERNAL_AES -DINTERNAL_MD5 -DINTERNAL_SHA1 -DCONFIG_NO_PBKDF2
-SRCS+= tls_none.c sha1-internal.c md5-internal.c aes-xinternal.c rc4.c
+SRCS+= tls_none.c sha1-internal.c md5-internal.c aes-xinternal.c rc4.c
+SRCS+= aes-unwrap.c md5.c
.endif
.endif
diff -r 1dd3e507bf5f -r 266f1ddb7a5c external/bsd/wpa/dist/hostapd/hostapd_cli.c
--- a/external/bsd/wpa/dist/hostapd/hostapd_cli.c Wed Apr 01 19:24:35 2015 +0000
+++ b/external/bsd/wpa/dist/hostapd/hostapd_cli.c Wed Apr 01 19:45:14 2015 +0000
@@ -1,6 +1,6 @@
/*
* hostapd - command line interface for hostapd daemon
- * Copyright (c) 2004-2014, Jouni Malinen <j%w1.fi@localhost>
+ * Copyright (c) 2004-2015, Jouni Malinen <j%w1.fi@localhost>
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
@@ -18,7 +18,7 @@
static const char *hostapd_cli_version =
"hostapd_cli v" VERSION_STR "\n"
-"Copyright (c) 2004-2014, Jouni Malinen <j%w1.fi@localhost> and contributors";
+"Copyright (c) 2004-2015, Jouni Malinen <j%w1.fi@localhost> and contributors";
static const char *hostapd_cli_license =
@@ -393,7 +393,7 @@
else
res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s",
argv[0]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long WPS_CHECK_PIN command.\n");
return -1;
}
@@ -456,7 +456,7 @@
res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_CONFIG_TOKEN %s",
argv[0]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long WPS_NFC_CONFIG_TOKEN command.\n");
return -1;
}
@@ -477,7 +477,7 @@
}
res = os_snprintf(cmd, sizeof(cmd), "WPS_NFC_TOKEN %s", argv[0]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long WPS_NFC_TOKEN command.\n");
return -1;
}
@@ -499,7 +499,7 @@
res = os_snprintf(cmd, sizeof(cmd), "NFC_GET_HANDOVER_SEL %s %s",
argv[0], argv[1]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long NFC_GET_HANDOVER_SEL command.\n");
return -1;
}
@@ -596,7 +596,7 @@
res = os_snprintf(buf, sizeof(buf), "DISASSOC_IMMINENT %s %s",
argv[0], argv[1]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
return -1;
return wpa_ctrl_command(ctrl, buf);
}
@@ -616,8 +616,35 @@
res = os_snprintf(buf, sizeof(buf), "ESS_DISASSOC %s %s %s",
argv[0], argv[1], argv[2]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
+ return -1;
+ return wpa_ctrl_command(ctrl, buf);
+}
+
+
+static int hostapd_cli_cmd_bss_tm_req(struct wpa_ctrl *ctrl, int argc,
+ char *argv[])
+{
+ char buf[2000], *tmp;
+ int res, i, total;
+
+ if (argc < 1) {
+ printf("Invalid 'bss_tm_req' command - at least one argument (STA addr) is needed\n");
return -1;
+ }
+
+ res = os_snprintf(buf, sizeof(buf), "BSS_TM_REQ %s", argv[0]);
+ if (os_snprintf_error(sizeof(buf), res))
+ return -1;
+
+ total = res;
+ for (i = 1; i < argc; i++) {
+ tmp = &buf[total];
+ res = os_snprintf(tmp, sizeof(buf) - total, " %s", argv[i]);
+ if (os_snprintf_error(sizeof(buf) - total, res))
+ return -1;
+ total += res;
+ }
return wpa_ctrl_command(ctrl, buf);
}
@@ -709,7 +736,7 @@
}
res = os_snprintf(buf, sizeof(buf), "SET_QOS_MAP_SET %s", argv[0]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
return -1;
return wpa_ctrl_command(ctrl, buf);
}
@@ -728,7 +755,7 @@
}
res = os_snprintf(buf, sizeof(buf), "SEND_QOS_MAP_CONF %s", argv[0]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
return -1;
return wpa_ctrl_command(ctrl, buf);
}
@@ -748,7 +775,7 @@
res = os_snprintf(buf, sizeof(buf), "HS20_WNM_NOTIF %s %s",
argv[0], argv[1]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
return -1;
return wpa_ctrl_command(ctrl, buf);
}
@@ -773,7 +800,7 @@
res = os_snprintf(buf, sizeof(buf),
"HS20_DEAUTH_REQ %s %s %s",
argv[0], argv[1], argv[2]);
- if (res < 0 || res >= (int) sizeof(buf))
+ if (os_snprintf_error(sizeof(buf), res))
return -1;
return wpa_ctrl_command(ctrl, buf);
}
@@ -866,7 +893,7 @@
}
res = os_snprintf(cmd, sizeof(cmd), "SET %s %s", argv[0], argv[1]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long SET command.\n");
return -1;
}
@@ -886,7 +913,7 @@
}
res = os_snprintf(cmd, sizeof(cmd), "GET %s", argv[0]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long GET command.\n");
return -1;
}
@@ -914,7 +941,7 @@
res = os_snprintf(cmd, sizeof(cmd), "CHAN_SWITCH %s %s",
argv[0], argv[1]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - 1) {
+ if (os_snprintf_error(sizeof(cmd), res)) {
printf("Too long CHAN_SWITCH command.\n");
return -1;
}
@@ -923,7 +950,7 @@
for (i = 2; i < argc; i++) {
tmp = cmd + total;
res = os_snprintf(tmp, sizeof(cmd) - total, " %s", argv[i]);
- if (res < 0 || (size_t) res >= sizeof(cmd) - total - 1) {
+ if (os_snprintf_error(sizeof(cmd) - total, res)) {
printf("Too long CHAN_SWITCH command.\n");
return -1;
}
@@ -933,6 +960,27 @@
}
+static int hostapd_cli_cmd_enable(struct wpa_ctrl *ctrl, int argc,
+ char *argv[])
+{
+ return wpa_ctrl_command(ctrl, "ENABLE");
+}
+
+
+static int hostapd_cli_cmd_reload(struct wpa_ctrl *ctrl, int argc,
Home |
Main Index |
Thread Index |
Old Index