PATCH: inform upper over layers which peer has accepted config

Eliot Lear lear at lear.ch
Mon Nov 28 04:36:12 PST 2022


Thank you for your response Jouni.  Please see below:

On 27.11.22 08:16, Jouni Malinen wrote:
> On Tue, Aug 02, 2022 at 03:16:08PM +0200, Eliot Lear wrote:
>> This patch might require some discussion and some edits.  It is possible that two or more
>> devices might get configured at the same time.  In this case, the upper layers may wish > to the status of respective devices.  I have tested the dpp_tcp.c code.  I have NOT
>> unit tested the dpp_supplicant code (I don't have a test setup for that).
> This way of identifying a peer is problematic since there is no separate
> bootstrapping information entry for a peer when acting as a DPP
> Responder (well, ignoring the mutual authentication case here) since no
> QR Code (etc.) was actually read on the Responder device. As such, the
> upper layers would not really have any context for determining what the
> particular peer bootstrapping information identifier might be in such
> cases.

Forgive my confusion, but the code above what you quoted indicates that 
clearly we are providing a conf result, which means that we are the 
configurator and we have already authenticated the peer with the public 
key from the enrollee's qrcode. Am I misusing / misinterpreting the struct?

Eliot
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <http://lists.infradead.org/pipermail/hostap/attachments/20221128/c930e072/attachment.sig>


More information about the Hostap mailing list