Move WPA cipher information into a shared location
Try to share most of the cipher information like key and RSC lengths and suite selector conversions, etc. in wpa_common.c to avoid having similar code throughout the WPA implementation for handling cipher specific behavior. Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
7b1aa4fe30
commit
c3550295fb
9 changed files with 256 additions and 510 deletions
|
@ -278,28 +278,6 @@ static void wpa_auth_pmksa_free_cb(struct rsn_pmksa_cache_entry *entry,
|
|||
}
|
||||
|
||||
|
||||
static void wpa_group_set_key_len(struct wpa_group *group, int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
group->GTK_len = 16;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
group->GTK_len = 16;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
group->GTK_len = 32;
|
||||
break;
|
||||
case WPA_CIPHER_WEP104:
|
||||
group->GTK_len = 13;
|
||||
break;
|
||||
case WPA_CIPHER_WEP40:
|
||||
group->GTK_len = 5;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static int wpa_group_init_gmk_and_counter(struct wpa_authenticator *wpa_auth,
|
||||
struct wpa_group *group)
|
||||
{
|
||||
|
@ -341,8 +319,7 @@ static struct wpa_group * wpa_group_init(struct wpa_authenticator *wpa_auth,
|
|||
|
||||
group->GTKAuthenticator = TRUE;
|
||||
group->vlan_id = vlan_id;
|
||||
|
||||
wpa_group_set_key_len(group, wpa_auth->conf.wpa_group);
|
||||
group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
|
||||
|
||||
if (random_pool_ready() != 1) {
|
||||
wpa_printf(MSG_INFO, "WPA: Not enough entropy in random pool "
|
||||
|
@ -517,7 +494,7 @@ int wpa_reconfig(struct wpa_authenticator *wpa_auth,
|
|||
* configuration.
|
||||
*/
|
||||
group = wpa_auth->group;
|
||||
wpa_group_set_key_len(group, wpa_auth->conf.wpa_group);
|
||||
group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
|
||||
group->GInit = TRUE;
|
||||
wpa_group_sm_step(wpa_auth, group);
|
||||
group->GInit = FALSE;
|
||||
|
@ -1291,23 +1268,7 @@ void __wpa_send_eapol(struct wpa_authenticator *wpa_auth,
|
|||
WPA_PUT_BE16(key->key_info, key_info);
|
||||
|
||||
alg = pairwise ? sm->pairwise : wpa_auth->conf.wpa_group;
|
||||
switch (alg) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
WPA_PUT_BE16(key->key_length, 16);
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
WPA_PUT_BE16(key->key_length, 16);
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
WPA_PUT_BE16(key->key_length, 32);
|
||||
break;
|
||||
case WPA_CIPHER_WEP40:
|
||||
WPA_PUT_BE16(key->key_length, 5);
|
||||
break;
|
||||
case WPA_CIPHER_WEP104:
|
||||
WPA_PUT_BE16(key->key_length, 13);
|
||||
break;
|
||||
}
|
||||
WPA_PUT_BE16(key->key_length, wpa_cipher_key_len(alg));
|
||||
if (key_info & WPA_KEY_INFO_SMK_MESSAGE)
|
||||
WPA_PUT_BE16(key->key_length, 0);
|
||||
|
||||
|
@ -1540,24 +1501,6 @@ int wpa_auth_sm_event(struct wpa_state_machine *sm, wpa_event event)
|
|||
}
|
||||
|
||||
|
||||
static enum wpa_alg wpa_alg_enum(int alg)
|
||||
{
|
||||
switch (alg) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
return WPA_ALG_CCMP;
|
||||
case WPA_CIPHER_GCMP:
|
||||
return WPA_ALG_GCMP;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return WPA_ALG_TKIP;
|
||||
case WPA_CIPHER_WEP104:
|
||||
case WPA_CIPHER_WEP40:
|
||||
return WPA_ALG_WEP;
|
||||
default:
|
||||
return WPA_ALG_NONE;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
SM_STATE(WPA_PTK, INITIALIZE)
|
||||
{
|
||||
SM_ENTRY_MA(WPA_PTK, INITIALIZE, wpa_ptk);
|
||||
|
@ -2097,18 +2040,8 @@ SM_STATE(WPA_PTK, PTKINITDONE)
|
|||
SM_ENTRY_MA(WPA_PTK, PTKINITDONE, wpa_ptk);
|
||||
sm->EAPOLKeyReceived = FALSE;
|
||||
if (sm->Pair) {
|
||||
enum wpa_alg alg;
|
||||
int klen;
|
||||
if (sm->pairwise == WPA_CIPHER_TKIP) {
|
||||
alg = WPA_ALG_TKIP;
|
||||
klen = 32;
|
||||
} else if (sm->pairwise == WPA_CIPHER_GCMP) {
|
||||
alg = WPA_ALG_GCMP;
|
||||
klen = 16;
|
||||
} else {
|
||||
alg = WPA_ALG_CCMP;
|
||||
klen = 16;
|
||||
}
|
||||
enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
|
||||
int klen = wpa_cipher_key_len(sm->pairwise);
|
||||
if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0,
|
||||
sm->PTK.tk1, klen)) {
|
||||
wpa_sta_disconnect(sm->wpa_auth, sm->addr);
|
||||
|
@ -2657,7 +2590,7 @@ static int wpa_group_config_group_keys(struct wpa_authenticator *wpa_auth,
|
|||
int ret = 0;
|
||||
|
||||
if (wpa_auth_set_key(wpa_auth, group->vlan_id,
|
||||
wpa_alg_enum(wpa_auth->conf.wpa_group),
|
||||
wpa_cipher_to_alg(wpa_auth->conf.wpa_group),
|
||||
broadcast_ether_addr, group->GN,
|
||||
group->GTK[group->GN - 1], group->GTK_len) < 0)
|
||||
ret = -1;
|
||||
|
@ -2797,25 +2730,6 @@ static const char * wpa_bool_txt(int bool)
|
|||
}
|
||||
|
||||
|
||||
static int wpa_cipher_bits(int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
return 128;
|
||||
case WPA_CIPHER_GCMP:
|
||||
return 128;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return 256;
|
||||
case WPA_CIPHER_WEP104:
|
||||
return 104;
|
||||
case WPA_CIPHER_WEP40:
|
||||
return 40;
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
#define RSN_SUITE "%02x-%02x-%02x-%d"
|
||||
#define RSN_SUITE_ARG(s) \
|
||||
((s) >> 24) & 0xff, ((s) >> 16) & 0xff, ((s) >> 8) & 0xff, (s) & 0xff
|
||||
|
@ -2878,7 +2792,7 @@ int wpa_get_mib(struct wpa_authenticator *wpa_auth, char *buf, size_t buflen)
|
|||
!!wpa_auth->conf.wpa_strict_rekey,
|
||||
dot11RSNAConfigGroupUpdateCount,
|
||||
dot11RSNAConfigPairwiseUpdateCount,
|
||||
wpa_cipher_bits(wpa_auth->conf.wpa_group),
|
||||
wpa_cipher_key_len(wpa_auth->conf.wpa_group) * 8,
|
||||
dot11RSNAConfigPMKLifetime,
|
||||
dot11RSNAConfigPMKReauthThreshold,
|
||||
dot11RSNAConfigSATimeout,
|
||||
|
@ -2921,31 +2835,10 @@ int wpa_get_mib_sta(struct wpa_state_machine *sm, char *buf, size_t buflen)
|
|||
|
||||
/* dot11RSNAStatsEntry */
|
||||
|
||||
if (sm->wpa == WPA_VERSION_WPA) {
|
||||
if (sm->pairwise == WPA_CIPHER_CCMP)
|
||||
pairwise = WPA_CIPHER_SUITE_CCMP;
|
||||
else if (sm->pairwise == WPA_CIPHER_TKIP)
|
||||
pairwise = WPA_CIPHER_SUITE_TKIP;
|
||||
else if (sm->pairwise == WPA_CIPHER_WEP104)
|
||||
pairwise = WPA_CIPHER_SUITE_WEP104;
|
||||
else if (sm->pairwise == WPA_CIPHER_WEP40)
|
||||
pairwise = WPA_CIPHER_SUITE_WEP40;
|
||||
else if (sm->pairwise == WPA_CIPHER_NONE)
|
||||
pairwise = WPA_CIPHER_SUITE_NONE;
|
||||
} else if (sm->wpa == WPA_VERSION_WPA2) {
|
||||
if (sm->pairwise == WPA_CIPHER_CCMP)
|
||||
pairwise = RSN_CIPHER_SUITE_CCMP;
|
||||
else if (sm->pairwise == WPA_CIPHER_GCMP)
|
||||
pairwise = RSN_CIPHER_SUITE_GCMP;
|
||||
else if (sm->pairwise == WPA_CIPHER_TKIP)
|
||||
pairwise = RSN_CIPHER_SUITE_TKIP;
|
||||
else if (sm->pairwise == WPA_CIPHER_WEP104)
|
||||
pairwise = RSN_CIPHER_SUITE_WEP104;
|
||||
else if (sm->pairwise == WPA_CIPHER_WEP40)
|
||||
pairwise = RSN_CIPHER_SUITE_WEP40;
|
||||
else if (sm->pairwise == WPA_CIPHER_NONE)
|
||||
pairwise = RSN_CIPHER_SUITE_NONE;
|
||||
} else
|
||||
pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
|
||||
WPA_PROTO_RSN : WPA_PROTO_WPA,
|
||||
sm->pairwise);
|
||||
if (pairwise == 0)
|
||||
return 0;
|
||||
|
||||
ret = os_snprintf(
|
||||
|
|
|
@ -754,16 +754,9 @@ void wpa_ft_install_ptk(struct wpa_state_machine *sm)
|
|||
int klen;
|
||||
|
||||
/* MLME-SETKEYS.request(PTK) */
|
||||
if (sm->pairwise == WPA_CIPHER_TKIP) {
|
||||
alg = WPA_ALG_TKIP;
|
||||
klen = 32;
|
||||
} else if (sm->pairwise == WPA_CIPHER_CCMP) {
|
||||
alg = WPA_ALG_CCMP;
|
||||
klen = 16;
|
||||
} else if (sm->pairwise == WPA_CIPHER_GCMP) {
|
||||
alg = WPA_ALG_GCMP;
|
||||
klen = 16;
|
||||
} else {
|
||||
alg = wpa_cipher_to_alg(sm->pairwise);
|
||||
klen = wpa_cipher_key_len(sm->pairwise);
|
||||
if (!wpa_cipher_valid_pairwise(sm->pairwise)) {
|
||||
wpa_printf(MSG_DEBUG, "FT: Unknown pairwise alg 0x%x - skip "
|
||||
"PTK configuration", sm->pairwise);
|
||||
return;
|
||||
|
|
|
@ -29,6 +29,7 @@ static int wpa_write_wpa_ie(struct wpa_auth_config *conf, u8 *buf, size_t len)
|
|||
struct wpa_ie_hdr *hdr;
|
||||
int num_suites;
|
||||
u8 *pos, *count;
|
||||
u32 suite;
|
||||
|
||||
hdr = (struct wpa_ie_hdr *) buf;
|
||||
hdr->elem_id = WLAN_EID_VENDOR_SPECIFIC;
|
||||
|
@ -36,46 +37,25 @@ static int wpa_write_wpa_ie(struct wpa_auth_config *conf, u8 *buf, size_t len)
|
|||
WPA_PUT_LE16(hdr->version, WPA_VERSION);
|
||||
pos = (u8 *) (hdr + 1);
|
||||
|
||||
if (conf->wpa_group == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_WEP104) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP104);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_WEP40) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP40);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_WPA, conf->wpa_group);
|
||||
if (suite == 0) {
|
||||
wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
|
||||
conf->wpa_group);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
|
||||
num_suites = 0;
|
||||
count = pos;
|
||||
pos += 2;
|
||||
|
||||
if (conf->wpa_pairwise & WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (conf->wpa_pairwise & WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (conf->wpa_pairwise & WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_NONE);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
|
||||
num_suites = wpa_cipher_put_suites(pos, conf->wpa_pairwise);
|
||||
if (num_suites == 0) {
|
||||
wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
|
||||
conf->wpa_pairwise);
|
||||
return -1;
|
||||
}
|
||||
pos += num_suites * WPA_SELECTOR_LEN;
|
||||
WPA_PUT_LE16(count, num_suites);
|
||||
|
||||
num_suites = 0;
|
||||
|
@ -112,30 +92,23 @@ int wpa_write_rsn_ie(struct wpa_auth_config *conf, u8 *buf, size_t len,
|
|||
const u8 *pmkid)
|
||||
{
|
||||
struct rsn_ie_hdr *hdr;
|
||||
int num_suites;
|
||||
int num_suites, res;
|
||||
u8 *pos, *count;
|
||||
u16 capab;
|
||||
u32 suite;
|
||||
|
||||
hdr = (struct rsn_ie_hdr *) buf;
|
||||
hdr->elem_id = WLAN_EID_RSN;
|
||||
WPA_PUT_LE16(hdr->version, RSN_VERSION);
|
||||
pos = (u8 *) (hdr + 1);
|
||||
|
||||
if (conf->wpa_group == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_WEP104) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP104);
|
||||
} else if (conf->wpa_group == WPA_CIPHER_WEP40) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP40);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_RSN, conf->wpa_group);
|
||||
if (suite == 0) {
|
||||
wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
|
||||
conf->wpa_group);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
num_suites = 0;
|
||||
|
@ -150,26 +123,9 @@ int wpa_write_rsn_ie(struct wpa_auth_config *conf, u8 *buf, size_t len,
|
|||
}
|
||||
#endif /* CONFIG_RSN_TESTING */
|
||||
|
||||
if (conf->rsn_pairwise & WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (conf->rsn_pairwise & WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (conf->rsn_pairwise & WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (conf->rsn_pairwise & WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_NONE);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
res = rsn_cipher_put_suites(pos, conf->rsn_pairwise);
|
||||
num_suites += res;
|
||||
pos += res * RSN_SELECTOR_LEN;
|
||||
|
||||
#ifdef CONFIG_RSN_TESTING
|
||||
if (rsn_testing) {
|
||||
|
@ -457,34 +413,16 @@ int wpa_validate_wpa_ie(struct wpa_authenticator *wpa_auth,
|
|||
selector = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
|
||||
wpa_auth->dot11RSNAAuthenticationSuiteSelected = selector;
|
||||
|
||||
selector = RSN_CIPHER_SUITE_CCMP;
|
||||
if (data.pairwise_cipher & WPA_CIPHER_CCMP)
|
||||
selector = wpa_cipher_to_suite(WPA_PROTO_RSN,
|
||||
data.pairwise_cipher);
|
||||
if (!selector)
|
||||
selector = RSN_CIPHER_SUITE_CCMP;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_GCMP)
|
||||
selector = RSN_CIPHER_SUITE_GCMP;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_TKIP)
|
||||
selector = RSN_CIPHER_SUITE_TKIP;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_WEP104)
|
||||
selector = RSN_CIPHER_SUITE_WEP104;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_WEP40)
|
||||
selector = RSN_CIPHER_SUITE_WEP40;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_NONE)
|
||||
selector = RSN_CIPHER_SUITE_NONE;
|
||||
wpa_auth->dot11RSNAPairwiseCipherSelected = selector;
|
||||
|
||||
selector = RSN_CIPHER_SUITE_CCMP;
|
||||
if (data.group_cipher & WPA_CIPHER_CCMP)
|
||||
selector = wpa_cipher_to_suite(WPA_PROTO_RSN,
|
||||
data.group_cipher);
|
||||
if (!selector)
|
||||
selector = RSN_CIPHER_SUITE_CCMP;
|
||||
else if (data.group_cipher & WPA_CIPHER_GCMP)
|
||||
selector = RSN_CIPHER_SUITE_GCMP;
|
||||
else if (data.group_cipher & WPA_CIPHER_TKIP)
|
||||
selector = RSN_CIPHER_SUITE_TKIP;
|
||||
else if (data.group_cipher & WPA_CIPHER_WEP104)
|
||||
selector = RSN_CIPHER_SUITE_WEP104;
|
||||
else if (data.group_cipher & WPA_CIPHER_WEP40)
|
||||
selector = RSN_CIPHER_SUITE_WEP40;
|
||||
else if (data.group_cipher & WPA_CIPHER_NONE)
|
||||
selector = RSN_CIPHER_SUITE_NONE;
|
||||
wpa_auth->dot11RSNAGroupCipherSelected = selector;
|
||||
} else {
|
||||
res = wpa_parse_wpa_ie_wpa(wpa_ie, wpa_ie_len, &data);
|
||||
|
@ -496,30 +434,16 @@ int wpa_validate_wpa_ie(struct wpa_authenticator *wpa_auth,
|
|||
selector = WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X;
|
||||
wpa_auth->dot11RSNAAuthenticationSuiteSelected = selector;
|
||||
|
||||
selector = WPA_CIPHER_SUITE_TKIP;
|
||||
if (data.pairwise_cipher & WPA_CIPHER_CCMP)
|
||||
selector = WPA_CIPHER_SUITE_CCMP;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_TKIP)
|
||||
selector = WPA_CIPHER_SUITE_TKIP;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_WEP104)
|
||||
selector = WPA_CIPHER_SUITE_WEP104;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_WEP40)
|
||||
selector = WPA_CIPHER_SUITE_WEP40;
|
||||
else if (data.pairwise_cipher & WPA_CIPHER_NONE)
|
||||
selector = WPA_CIPHER_SUITE_NONE;
|
||||
selector = wpa_cipher_to_suite(WPA_PROTO_WPA,
|
||||
data.pairwise_cipher);
|
||||
if (!selector)
|
||||
selector = RSN_CIPHER_SUITE_TKIP;
|
||||
wpa_auth->dot11RSNAPairwiseCipherSelected = selector;
|
||||
|
||||
selector = WPA_CIPHER_SUITE_TKIP;
|
||||
if (data.group_cipher & WPA_CIPHER_CCMP)
|
||||
selector = WPA_CIPHER_SUITE_CCMP;
|
||||
else if (data.group_cipher & WPA_CIPHER_TKIP)
|
||||
selector = wpa_cipher_to_suite(WPA_PROTO_WPA,
|
||||
data.group_cipher);
|
||||
if (!selector)
|
||||
selector = WPA_CIPHER_SUITE_TKIP;
|
||||
else if (data.group_cipher & WPA_CIPHER_WEP104)
|
||||
selector = WPA_CIPHER_SUITE_WEP104;
|
||||
else if (data.group_cipher & WPA_CIPHER_WEP40)
|
||||
selector = WPA_CIPHER_SUITE_WEP40;
|
||||
else if (data.group_cipher & WPA_CIPHER_NONE)
|
||||
selector = WPA_CIPHER_SUITE_NONE;
|
||||
wpa_auth->dot11RSNAGroupCipherSelected = selector;
|
||||
}
|
||||
if (res) {
|
||||
|
|
|
@ -1073,3 +1073,138 @@ int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid)
|
|||
return added;
|
||||
}
|
||||
#endif /* CONFIG_IEEE80211R */
|
||||
|
||||
|
||||
int wpa_cipher_key_len(int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
case WPA_CIPHER_GCMP:
|
||||
return 16;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return 32;
|
||||
case WPA_CIPHER_WEP104:
|
||||
return 13;
|
||||
case WPA_CIPHER_WEP40:
|
||||
return 5;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int wpa_cipher_rsc_len(int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
case WPA_CIPHER_GCMP:
|
||||
case WPA_CIPHER_TKIP:
|
||||
return 6;
|
||||
case WPA_CIPHER_WEP104:
|
||||
case WPA_CIPHER_WEP40:
|
||||
return 0;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int wpa_cipher_to_alg(int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
return WPA_ALG_CCMP;
|
||||
case WPA_CIPHER_GCMP:
|
||||
return WPA_ALG_GCMP;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return WPA_ALG_TKIP;
|
||||
case WPA_CIPHER_WEP104:
|
||||
case WPA_CIPHER_WEP40:
|
||||
return WPA_ALG_WEP;
|
||||
}
|
||||
return WPA_ALG_NONE;
|
||||
}
|
||||
|
||||
|
||||
int wpa_cipher_valid_pairwise(int cipher)
|
||||
{
|
||||
return cipher == WPA_CIPHER_CCMP ||
|
||||
cipher == WPA_CIPHER_GCMP ||
|
||||
cipher == WPA_CIPHER_TKIP;
|
||||
}
|
||||
|
||||
|
||||
u32 wpa_cipher_to_suite(int proto, int cipher)
|
||||
{
|
||||
if (cipher & WPA_CIPHER_CCMP)
|
||||
return (proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_CCMP : WPA_CIPHER_SUITE_CCMP);
|
||||
if (cipher & WPA_CIPHER_GCMP)
|
||||
return RSN_CIPHER_SUITE_GCMP;
|
||||
if (cipher & WPA_CIPHER_TKIP)
|
||||
return (proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_TKIP : WPA_CIPHER_SUITE_TKIP);
|
||||
if (cipher & WPA_CIPHER_WEP104)
|
||||
return (proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_WEP104 : WPA_CIPHER_SUITE_WEP104);
|
||||
if (cipher & WPA_CIPHER_WEP40)
|
||||
return (proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_WEP40 : WPA_CIPHER_SUITE_WEP40);
|
||||
if (cipher & WPA_CIPHER_NONE)
|
||||
return (proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_NONE : WPA_CIPHER_SUITE_NONE);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int rsn_cipher_put_suites(u8 *pos, int ciphers)
|
||||
{
|
||||
int num_suites = 0;
|
||||
|
||||
if (ciphers & WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (ciphers & WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (ciphers & WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (ciphers & WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_NONE);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
|
||||
return num_suites;
|
||||
}
|
||||
|
||||
|
||||
int wpa_cipher_put_suites(u8 *pos, int ciphers)
|
||||
{
|
||||
int num_suites = 0;
|
||||
|
||||
if (ciphers & WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (ciphers & WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
if (ciphers & WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_NONE);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
num_suites++;
|
||||
}
|
||||
|
||||
return num_suites;
|
||||
}
|
||||
|
|
|
@ -379,4 +379,12 @@ struct wpa_ft_ies {
|
|||
|
||||
int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
|
||||
|
||||
int wpa_cipher_key_len(int cipher);
|
||||
int wpa_cipher_rsc_len(int cipher);
|
||||
int wpa_cipher_to_alg(int cipher);
|
||||
int wpa_cipher_valid_pairwise(int cipher);
|
||||
u32 wpa_cipher_to_suite(int proto, int cipher);
|
||||
int rsn_cipher_put_suites(u8 *pos, int ciphers);
|
||||
int wpa_cipher_put_suites(u8 *pos, int ciphers);
|
||||
|
||||
#endif /* WPA_COMMON_H */
|
||||
|
|
|
@ -270,12 +270,7 @@ static int wpa_supplicant_process_smk_m2(
|
|||
/* Include only the selected cipher in pairwise cipher suite */
|
||||
WPA_PUT_LE16(pos, 1);
|
||||
pos += 2;
|
||||
if (cipher == WPA_CIPHER_CCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
else if (cipher == WPA_CIPHER_GCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
else if (cipher == WPA_CIPHER_TKIP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN, cipher));
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
hdr->len = (pos - peerkey->rsnie_p) - 2;
|
||||
|
@ -1063,22 +1058,8 @@ int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|||
count_pos = pos;
|
||||
pos += 2;
|
||||
|
||||
count = 0;
|
||||
if (sm->allowed_pairwise_cipher & WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
count++;
|
||||
}
|
||||
if (sm->allowed_pairwise_cipher & WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
count++;
|
||||
}
|
||||
if (sm->allowed_pairwise_cipher & WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
count++;
|
||||
}
|
||||
count = rsn_cipher_put_suites(pos, sm->allowed_pairwise_cipher);
|
||||
pos += count * RSN_SELECTOR_LEN;
|
||||
WPA_PUT_LE16(count_pos, count);
|
||||
|
||||
hdr->len = (pos - peerkey->rsnie_i) - 2;
|
||||
|
|
|
@ -520,33 +520,23 @@ static int wpa_supplicant_install_ptk(struct wpa_sm *sm,
|
|||
wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
|
||||
"WPA: Installing PTK to the driver");
|
||||
|
||||
switch (sm->pairwise_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
alg = WPA_ALG_CCMP;
|
||||
keylen = 16;
|
||||
rsclen = 6;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
alg = WPA_ALG_GCMP;
|
||||
keylen = 16;
|
||||
rsclen = 6;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
alg = WPA_ALG_TKIP;
|
||||
keylen = 32;
|
||||
rsclen = 6;
|
||||
break;
|
||||
case WPA_CIPHER_NONE:
|
||||
if (sm->pairwise_cipher == WPA_CIPHER_NONE) {
|
||||
wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Pairwise Cipher "
|
||||
"Suite: NONE - do not use pairwise keys");
|
||||
return 0;
|
||||
default:
|
||||
}
|
||||
|
||||
if (!wpa_cipher_valid_pairwise(sm->pairwise_cipher)) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Unsupported pairwise cipher %d",
|
||||
sm->pairwise_cipher);
|
||||
return -1;
|
||||
}
|
||||
|
||||
alg = wpa_cipher_to_alg(sm->pairwise_cipher);
|
||||
keylen = wpa_cipher_key_len(sm->pairwise_cipher);
|
||||
rsclen = wpa_cipher_rsc_len(sm->pairwise_cipher);
|
||||
|
||||
if (sm->proto == WPA_PROTO_RSN) {
|
||||
key_rsc = null_rsc;
|
||||
} else {
|
||||
|
@ -579,63 +569,25 @@ static int wpa_supplicant_check_group_cipher(struct wpa_sm *sm,
|
|||
int *key_rsc_len,
|
||||
enum wpa_alg *alg)
|
||||
{
|
||||
int ret = 0;
|
||||
int klen;
|
||||
|
||||
switch (group_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
if (keylen != 16 || maxkeylen < 16) {
|
||||
ret = -1;
|
||||
break;
|
||||
}
|
||||
*key_rsc_len = 6;
|
||||
*alg = WPA_ALG_CCMP;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
if (keylen != 16 || maxkeylen < 16) {
|
||||
ret = -1;
|
||||
break;
|
||||
}
|
||||
*key_rsc_len = 6;
|
||||
*alg = WPA_ALG_GCMP;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
if (keylen != 32 || maxkeylen < 32) {
|
||||
ret = -1;
|
||||
break;
|
||||
}
|
||||
*key_rsc_len = 6;
|
||||
*alg = WPA_ALG_TKIP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP104:
|
||||
if (keylen != 13 || maxkeylen < 13) {
|
||||
ret = -1;
|
||||
break;
|
||||
}
|
||||
*key_rsc_len = 0;
|
||||
*alg = WPA_ALG_WEP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP40:
|
||||
if (keylen != 5 || maxkeylen < 5) {
|
||||
ret = -1;
|
||||
break;
|
||||
}
|
||||
*key_rsc_len = 0;
|
||||
*alg = WPA_ALG_WEP;
|
||||
break;
|
||||
default:
|
||||
*alg = wpa_cipher_to_alg(group_cipher);
|
||||
if (*alg == WPA_ALG_NONE) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Unsupported Group Cipher %d",
|
||||
group_cipher);
|
||||
return -1;
|
||||
}
|
||||
*key_rsc_len = wpa_cipher_rsc_len(group_cipher);
|
||||
|
||||
if (ret < 0 ) {
|
||||
klen = wpa_cipher_key_len(group_cipher);
|
||||
if (keylen != klen || maxkeylen < klen) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Unsupported %s Group Cipher key length %d (%d)",
|
||||
wpa_cipher_txt(group_cipher), keylen, maxkeylen);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
|
@ -1135,31 +1087,12 @@ static void wpa_supplicant_process_3_of_4(struct wpa_sm *sm,
|
|||
}
|
||||
|
||||
keylen = WPA_GET_BE16(key->key_length);
|
||||
switch (sm->pairwise_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
if (keylen != 16) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid CCMP key length %d (src=" MACSTR
|
||||
")", keylen, MAC2STR(sm->bssid));
|
||||
goto failed;
|
||||
}
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
if (keylen != 16) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid GCMP key length %d (src=" MACSTR
|
||||
")", keylen, MAC2STR(sm->bssid));
|
||||
goto failed;
|
||||
}
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
if (keylen != 32) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid TKIP key length %d (src=" MACSTR
|
||||
")", keylen, MAC2STR(sm->bssid));
|
||||
goto failed;
|
||||
}
|
||||
break;
|
||||
if (keylen != wpa_cipher_key_len(sm->pairwise_cipher)) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid %s key length %d (src=" MACSTR
|
||||
")", wpa_cipher_txt(sm->pairwise_cipher), keylen,
|
||||
MAC2STR(sm->bssid));
|
||||
goto failed;
|
||||
}
|
||||
|
||||
if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
|
||||
|
@ -1880,25 +1813,6 @@ out:
|
|||
|
||||
|
||||
#ifdef CONFIG_CTRL_IFACE
|
||||
static int wpa_cipher_bits(int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
return 128;
|
||||
case WPA_CIPHER_GCMP:
|
||||
return 128;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return 256;
|
||||
case WPA_CIPHER_WEP104:
|
||||
return 104;
|
||||
case WPA_CIPHER_WEP40:
|
||||
return 40;
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static u32 wpa_key_mgmt_suite(struct wpa_sm *sm)
|
||||
{
|
||||
switch (sm->key_mgmt) {
|
||||
|
@ -1930,32 +1844,6 @@ static u32 wpa_key_mgmt_suite(struct wpa_sm *sm)
|
|||
}
|
||||
|
||||
|
||||
static u32 wpa_cipher_suite(struct wpa_sm *sm, int cipher)
|
||||
{
|
||||
switch (cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
return (sm->proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_CCMP : WPA_CIPHER_SUITE_CCMP);
|
||||
case WPA_CIPHER_GCMP:
|
||||
return RSN_CIPHER_SUITE_GCMP;
|
||||
case WPA_CIPHER_TKIP:
|
||||
return (sm->proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_TKIP : WPA_CIPHER_SUITE_TKIP);
|
||||
case WPA_CIPHER_WEP104:
|
||||
return (sm->proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_WEP104 : WPA_CIPHER_SUITE_WEP104);
|
||||
case WPA_CIPHER_WEP40:
|
||||
return (sm->proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_WEP40 : WPA_CIPHER_SUITE_WEP40);
|
||||
case WPA_CIPHER_NONE:
|
||||
return (sm->proto == WPA_PROTO_RSN ?
|
||||
RSN_CIPHER_SUITE_NONE : WPA_CIPHER_SUITE_NONE);
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
#define RSN_SUITE "%02x-%02x-%02x-%d"
|
||||
#define RSN_SUITE_ARG(s) \
|
||||
((s) >> 24) & 0xff, ((s) >> 16) & 0xff, ((s) >> 8) & 0xff, (s) & 0xff
|
||||
|
@ -2003,7 +1891,7 @@ int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen)
|
|||
rsna ? "TRUE" : "FALSE",
|
||||
rsna ? "TRUE" : "FALSE",
|
||||
RSN_VERSION,
|
||||
wpa_cipher_bits(sm->group_cipher),
|
||||
wpa_cipher_key_len(sm->group_cipher) * 8,
|
||||
sm->dot11RSNAConfigPMKLifetime,
|
||||
sm->dot11RSNAConfigPMKReauthThreshold,
|
||||
sm->dot11RSNAConfigSATimeout);
|
||||
|
@ -2023,12 +1911,16 @@ int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen)
|
|||
"dot11RSNAConfigNumberOfGTKSAReplayCounters=0\n"
|
||||
"dot11RSNA4WayHandshakeFailures=%u\n",
|
||||
RSN_SUITE_ARG(wpa_key_mgmt_suite(sm)),
|
||||
RSN_SUITE_ARG(wpa_cipher_suite(sm, sm->pairwise_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_suite(sm, sm->group_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_to_suite(sm->proto,
|
||||
sm->pairwise_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_to_suite(sm->proto,
|
||||
sm->group_cipher)),
|
||||
pmkid_txt,
|
||||
RSN_SUITE_ARG(wpa_key_mgmt_suite(sm)),
|
||||
RSN_SUITE_ARG(wpa_cipher_suite(sm, sm->pairwise_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_suite(sm, sm->group_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_to_suite(sm->proto,
|
||||
sm->pairwise_cipher)),
|
||||
RSN_SUITE_ARG(wpa_cipher_to_suite(sm->proto,
|
||||
sm->group_cipher)),
|
||||
sm->dot11RSNA4WayHandshakeFailures);
|
||||
if (ret >= 0 && (size_t) ret < buflen)
|
||||
len += ret;
|
||||
|
@ -2717,33 +2609,10 @@ int wpa_wnmsleep_install_key(struct wpa_sm *sm, u8 subelem_id, u8 *buf)
|
|||
os_memset(&igd, 0, sizeof(igd));
|
||||
#endif /* CONFIG_IEEE80211W */
|
||||
|
||||
switch (sm->group_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
keylen = 16;
|
||||
gd.key_rsc_len = 6;
|
||||
gd.alg = WPA_ALG_CCMP;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
keylen = 16;
|
||||
gd.key_rsc_len = 6;
|
||||
gd.alg = WPA_ALG_GCMP;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
keylen = 32;
|
||||
gd.key_rsc_len = 6;
|
||||
gd.alg = WPA_ALG_TKIP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP104:
|
||||
keylen = 13;
|
||||
gd.key_rsc_len = 0;
|
||||
gd.alg = WPA_ALG_WEP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP40:
|
||||
keylen = 5;
|
||||
gd.key_rsc_len = 0;
|
||||
gd.alg = WPA_ALG_WEP;
|
||||
break;
|
||||
default:
|
||||
keylen = wpa_cipher_key_len(sm->group_cipher);
|
||||
gd.key_rsc_len = wpa_cipher_rsc_len(sm->group_cipher);
|
||||
gd.alg = wpa_cipher_to_alg(sm->group_cipher);
|
||||
if (gd.alg == WPA_ALG_NONE) {
|
||||
wpa_printf(MSG_DEBUG, "Unsupported group cipher suite");
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -171,18 +171,16 @@ static u8 * wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len,
|
|||
pos = (u8 *) (rsnie + 1);
|
||||
|
||||
/* Group Suite Selector */
|
||||
if (sm->group_cipher == WPA_CIPHER_CCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
else if (sm->group_cipher == WPA_CIPHER_GCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
else if (sm->group_cipher == WPA_CIPHER_TKIP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
else {
|
||||
if (sm->group_cipher != WPA_CIPHER_CCMP &&
|
||||
sm->group_cipher != WPA_CIPHER_GCMP &&
|
||||
sm->group_cipher != WPA_CIPHER_TKIP) {
|
||||
wpa_printf(MSG_WARNING, "FT: Invalid group cipher (%d)",
|
||||
sm->group_cipher);
|
||||
os_free(buf);
|
||||
return NULL;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN,
|
||||
sm->group_cipher));
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
/* Pairwise Suite Count */
|
||||
|
@ -190,18 +188,14 @@ static u8 * wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len,
|
|||
pos += 2;
|
||||
|
||||
/* Pairwise Suite List */
|
||||
if (sm->pairwise_cipher == WPA_CIPHER_CCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
else if (sm->pairwise_cipher == WPA_CIPHER_GCMP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
else if (sm->pairwise_cipher == WPA_CIPHER_TKIP)
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
else {
|
||||
if (!wpa_cipher_valid_pairwise(sm->pairwise_cipher)) {
|
||||
wpa_printf(MSG_WARNING, "FT: Invalid pairwise cipher (%d)",
|
||||
sm->pairwise_cipher);
|
||||
os_free(buf);
|
||||
return NULL;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, wpa_cipher_to_suite(WPA_PROTO_RSN,
|
||||
sm->pairwise_cipher));
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
/* Authenticated Key Management Suite Count */
|
||||
|
@ -327,25 +321,15 @@ static int wpa_ft_install_ptk(struct wpa_sm *sm, const u8 *bssid)
|
|||
|
||||
wpa_printf(MSG_DEBUG, "FT: Installing PTK to the driver.");
|
||||
|
||||
switch (sm->pairwise_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
alg = WPA_ALG_CCMP;
|
||||
keylen = 16;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
alg = WPA_ALG_GCMP;
|
||||
keylen = 16;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
alg = WPA_ALG_TKIP;
|
||||
keylen = 32;
|
||||
break;
|
||||
default:
|
||||
if (!wpa_cipher_valid_pairwise(sm->pairwise_cipher)) {
|
||||
wpa_printf(MSG_WARNING, "FT: Unsupported pairwise cipher %d",
|
||||
sm->pairwise_cipher);
|
||||
return -1;
|
||||
}
|
||||
|
||||
alg = wpa_cipher_to_alg(sm->pairwise_cipher);
|
||||
keylen = wpa_cipher_key_len(sm->pairwise_cipher);
|
||||
|
||||
if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
|
||||
sizeof(null_rsc), (u8 *) sm->ptk.tk1, keylen) < 0) {
|
||||
wpa_printf(MSG_WARNING, "FT: Failed to set PTK to the driver");
|
||||
|
@ -579,33 +563,10 @@ static int wpa_ft_process_gtk_subelem(struct wpa_sm *sm, const u8 *gtk_elem,
|
|||
return -1;
|
||||
}
|
||||
|
||||
switch (sm->group_cipher) {
|
||||
case WPA_CIPHER_CCMP:
|
||||
keylen = 16;
|
||||
rsc_len = 6;
|
||||
alg = WPA_ALG_CCMP;
|
||||
break;
|
||||
case WPA_CIPHER_GCMP:
|
||||
keylen = 16;
|
||||
rsc_len = 6;
|
||||
alg = WPA_ALG_GCMP;
|
||||
break;
|
||||
case WPA_CIPHER_TKIP:
|
||||
keylen = 32;
|
||||
rsc_len = 6;
|
||||
alg = WPA_ALG_TKIP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP104:
|
||||
keylen = 13;
|
||||
rsc_len = 0;
|
||||
alg = WPA_ALG_WEP;
|
||||
break;
|
||||
case WPA_CIPHER_WEP40:
|
||||
keylen = 5;
|
||||
rsc_len = 0;
|
||||
alg = WPA_ALG_WEP;
|
||||
break;
|
||||
default:
|
||||
keylen = wpa_cipher_key_len(sm->group_cipher);
|
||||
rsc_len = wpa_cipher_rsc_len(sm->group_cipher);
|
||||
alg = wpa_cipher_to_alg(sm->group_cipher);
|
||||
if (alg == WPA_ALG_NONE) {
|
||||
wpa_printf(MSG_WARNING, "WPA: Unsupported Group Cipher %d",
|
||||
sm->group_cipher);
|
||||
return -1;
|
||||
|
|
|
@ -41,6 +41,7 @@ static int wpa_gen_wpa_ie_wpa(u8 *wpa_ie, size_t wpa_ie_len,
|
|||
{
|
||||
u8 *pos;
|
||||
struct wpa_ie_hdr *hdr;
|
||||
u32 suite;
|
||||
|
||||
if (wpa_ie_len < sizeof(*hdr) + WPA_SELECTOR_LEN +
|
||||
2 + WPA_SELECTOR_LEN + 2 + WPA_SELECTOR_LEN)
|
||||
|
@ -52,34 +53,26 @@ static int wpa_gen_wpa_ie_wpa(u8 *wpa_ie, size_t wpa_ie_len,
|
|||
WPA_PUT_LE16(hdr->version, WPA_VERSION);
|
||||
pos = (u8 *) (hdr + 1);
|
||||
|
||||
if (group_cipher == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
|
||||
} else if (group_cipher == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
|
||||
} else if (group_cipher == WPA_CIPHER_WEP104) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP104);
|
||||
} else if (group_cipher == WPA_CIPHER_WEP40) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP40);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_WPA, group_cipher);
|
||||
if (suite == 0) {
|
||||
wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
|
||||
group_cipher);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
|
||||
*pos++ = 1;
|
||||
*pos++ = 0;
|
||||
if (pairwise_cipher == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
|
||||
} else if (pairwise_cipher == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
|
||||
} else if (pairwise_cipher == WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_NONE);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_WPA, pairwise_cipher);
|
||||
if (suite == 0 ||
|
||||
(!wpa_cipher_valid_pairwise(pairwise_cipher) &&
|
||||
pairwise_cipher != WPA_CIPHER_NONE)) {
|
||||
wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
|
||||
pairwise_cipher);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += WPA_SELECTOR_LEN;
|
||||
|
||||
*pos++ = 1;
|
||||
|
@ -116,6 +109,7 @@ static int wpa_gen_wpa_ie_rsn(u8 *rsn_ie, size_t rsn_ie_len,
|
|||
u8 *pos;
|
||||
struct rsn_ie_hdr *hdr;
|
||||
u16 capab;
|
||||
u32 suite;
|
||||
|
||||
if (rsn_ie_len < sizeof(*hdr) + RSN_SELECTOR_LEN +
|
||||
2 + RSN_SELECTOR_LEN + 2 + RSN_SELECTOR_LEN + 2 +
|
||||
|
@ -130,38 +124,26 @@ static int wpa_gen_wpa_ie_rsn(u8 *rsn_ie, size_t rsn_ie_len,
|
|||
WPA_PUT_LE16(hdr->version, RSN_VERSION);
|
||||
pos = (u8 *) (hdr + 1);
|
||||
|
||||
if (group_cipher == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
} else if (group_cipher == WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
} else if (group_cipher == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
} else if (group_cipher == WPA_CIPHER_WEP104) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP104);
|
||||
} else if (group_cipher == WPA_CIPHER_WEP40) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP40);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_RSN, group_cipher);
|
||||
if (suite == 0) {
|
||||
wpa_printf(MSG_WARNING, "Invalid group cipher (%d).",
|
||||
group_cipher);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
*pos++ = 1;
|
||||
*pos++ = 0;
|
||||
if (pairwise_cipher == WPA_CIPHER_CCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
|
||||
} else if (pairwise_cipher == WPA_CIPHER_GCMP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_GCMP);
|
||||
} else if (pairwise_cipher == WPA_CIPHER_TKIP) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
|
||||
} else if (pairwise_cipher == WPA_CIPHER_NONE) {
|
||||
RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_NONE);
|
||||
} else {
|
||||
suite = wpa_cipher_to_suite(WPA_PROTO_RSN, pairwise_cipher);
|
||||
if (suite == 0 ||
|
||||
(!wpa_cipher_valid_pairwise(pairwise_cipher) &&
|
||||
pairwise_cipher != WPA_CIPHER_NONE)) {
|
||||
wpa_printf(MSG_WARNING, "Invalid pairwise cipher (%d).",
|
||||
pairwise_cipher);
|
||||
return -1;
|
||||
}
|
||||
RSN_SELECTOR_PUT(pos, suite);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
|
||||
*pos++ = 1;
|
||||
|
|
Loading…
Reference in a new issue