On 2018年08月22日 13:39, Peter Oh wrote:
Hi,
I'm trying to debug HWSIM mesh_forwarding_secure test case failure.
This test case always returns fail with non-changed upstream hostap code.
I'm also using untouched example-wpa_supplicant.config and
example-hostapd.config.
The test passes with latest Linux kernel and hostap.
So it looks not an issue of the test itself.
My Linux kernel is Linux Wireless 4.18.0-wt.
commit c9cd161770dd1866207b70d41ec03c9a26eea94f
Author: Bob Copeland <me@xxxxxxxxxxxxxxx>
Date: Mon Aug 13 14:20:35 2018 -0400
Add localversion to identify builds from this tree
My hostap is upstream.
commit 1ff8605775c89f4ad1e4c9e5aaef3cba210c6d3b
Author: xiaofeis <xiaofeis@xxxxxxxxxxxxxx>
Date: Wed Aug 1 01:27:22 2018 -0700
mka: Support GCM-AES-256
GCM-AES-256 cipher suite is defined in IEEE Std 802.1AEbn-2011.
If authenticator configured as GCM-AES-256, the distributed SAK will be
256 bits indicated by the GCM-AES-256 ID in the MKA packet.
This patch will make AES Key Unwrap to 32 bytes of SAK when
identify the
ID.
Signed-off-by: xiaofeis <xiaofeis@xxxxxxxxxxxxxx>
My .config is unmodified example-wpa_supplicant.config.
Regards,
Masashi Honma.
_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap