Revert "Cumulative patch from commit 4ec1fd8e42bad9390f14a58225b6e5f6fb691950"
This reverts commit 78a5dac804c22aa6e4ec8226a864d3b0d6ccddbb.
Test: None
diff --git a/wpa_supplicant/sme.c b/wpa_supplicant/sme.c
index ab71f6d..61fd3b2 100644
--- a/wpa_supplicant/sme.c
+++ b/wpa_supplicant/sme.c
@@ -543,37 +543,12 @@
wpas_connection_failed(wpa_s, bss->bssid);
return;
}
- params.auth_data = wpabuf_head(resp);
- params.auth_data_len = wpabuf_len(resp);
+ params.sae_data = wpabuf_head(resp);
+ params.sae_data_len = wpabuf_len(resp);
wpa_s->sme.sae.state = start ? SAE_COMMITTED : SAE_CONFIRMED;
}
#endif /* CONFIG_SAE */
- old_ssid = wpa_s->current_ssid;
- wpa_s->current_ssid = ssid;
- wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
- wpa_supplicant_initiate_eapol(wpa_s);
-
-#ifdef CONFIG_FILS
- /* TODO: FILS operations can in some cases be done between different
- * network_ctx (i.e., same credentials can be used with multiple
- * networks). */
- if (params.auth_alg == WPA_AUTH_ALG_OPEN &&
- wpa_key_mgmt_fils(ssid->key_mgmt)) {
- if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
- ssid, 0) == 0)
- wpa_printf(MSG_DEBUG,
- "SME: Try to use FILS with PMKSA caching");
- resp = fils_build_auth(wpa_s->wpa);
- if (resp) {
- params.auth_alg = WPA_AUTH_ALG_FILS;
- params.auth_data = wpabuf_head(resp);
- params.auth_data_len = wpabuf_len(resp);
- wpa_s->sme.auth_alg = WPA_AUTH_ALG_FILS;
- }
- }
-#endif /* CONFIG_FILS */
-
wpa_supplicant_cancel_sched_scan(wpa_s);
wpa_supplicant_cancel_scan(wpa_s);
@@ -583,6 +558,10 @@
wpa_clear_keys(wpa_s, bss->bssid);
wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
+ old_ssid = wpa_s->current_ssid;
+ wpa_s->current_ssid = ssid;
+ wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
+ wpa_supplicant_initiate_eapol(wpa_s);
if (old_ssid != wpa_s->current_ssid)
wpas_notify_network_changed(wpa_s);
@@ -671,10 +650,6 @@
return;
}
- /* Starting new connection, so clear the possibly used WPA IE from the
- * previous association. */
- wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
-
sme_send_authentication(wpa_s, cwork->bss, cwork->ssid, 1);
}
@@ -958,24 +933,6 @@
}
#endif /* CONFIG_IEEE80211R */
-#ifdef CONFIG_FILS
- if (data->auth.auth_type == WLAN_AUTH_FILS_SK) {
- if (fils_process_auth(wpa_s->wpa, data->auth.ies,
- data->auth.ies_len) < 0) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "SME: FILS Authentication response processing failed");
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_DISCONNECTED "bssid="
- MACSTR
- " reason=%d locally_generated=1",
- MAC2STR(wpa_s->pending_bssid),
- WLAN_REASON_DEAUTH_LEAVING);
- wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
- wpa_supplicant_mark_disassoc(wpa_s);
- return;
- }
- }
-#endif /* CONFIG_FILS */
-
sme_associate(wpa_s, ssid->mode, data->auth.peer,
data->auth.auth_type);
}
@@ -986,9 +943,6 @@
{
struct wpa_driver_associate_params params;
struct ieee802_11_elems elems;
-#ifdef CONFIG_FILS
- u8 nonces[2 * FILS_NONCE_LEN];
-#endif /* CONFIG_FILS */
#ifdef CONFIG_HT_OVERRIDES
struct ieee80211_ht_capabilities htcaps;
struct ieee80211_ht_capabilities htcaps_mask;
@@ -999,37 +953,6 @@
#endif /* CONFIG_VHT_OVERRIDES */
os_memset(¶ms, 0, sizeof(params));
-
-#ifdef CONFIG_FILS
- if (auth_type == WLAN_AUTH_FILS_SK) {
- struct wpabuf *buf;
- const u8 *snonce, *anonce;
-
- buf = fils_build_assoc_req(wpa_s->wpa, ¶ms.fils_kek,
- ¶ms.fils_kek_len, &snonce,
- &anonce);
- if (!buf)
- return;
- /* TODO: Make wpa_s->sme.assoc_req_ie use dynamic allocation */
- if (wpa_s->sme.assoc_req_ie_len + wpabuf_len(buf) >
- sizeof(wpa_s->sme.assoc_req_ie)) {
- wpa_printf(MSG_ERROR,
- "FILS: Not enough buffer room for own AssocReq elements");
- wpabuf_free(buf);
- return;
- }
- os_memcpy(wpa_s->sme.assoc_req_ie + wpa_s->sme.assoc_req_ie_len,
- wpabuf_head(buf), wpabuf_len(buf));
- wpa_s->sme.assoc_req_ie_len += wpabuf_len(buf);
- wpabuf_free(buf);
-
- os_memcpy(nonces, snonce, FILS_NONCE_LEN);
- os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN);
- params.fils_nonces = nonces;
- params.fils_nonces_len = sizeof(nonces);
- }
-#endif /* CONFIG_FILS */
-
params.bssid = bssid;
params.ssid = wpa_s->sme.ssid;
params.ssid_len = wpa_s->sme.ssid_len;