FT: EAPOL-Key MIC calculation using SHA384-based AKM
Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
9f12271b2a
commit
c49a9d6b99
1 changed files with 9 additions and 0 deletions
|
@ -296,6 +296,15 @@ int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver,
|
||||||
os_memcpy(mic, hash, key_len);
|
os_memcpy(mic, hash, key_len);
|
||||||
break;
|
break;
|
||||||
#endif /* CONFIG_DPP */
|
#endif /* CONFIG_DPP */
|
||||||
|
#if defined(CONFIG_IEEE80211R) && defined(CONFIG_SHA384)
|
||||||
|
case WPA_KEY_MGMT_FT_IEEE8021X_SHA384:
|
||||||
|
wpa_printf(MSG_DEBUG,
|
||||||
|
"WPA: EAPOL-Key MIC using HMAC-SHA384 (AKM-defined - FT 802.1X SHA384)");
|
||||||
|
if (hmac_sha384(key, key_len, buf, len, hash))
|
||||||
|
return -1;
|
||||||
|
os_memcpy(mic, hash, 24);
|
||||||
|
break;
|
||||||
|
#endif /* CONFIG_IEEE80211R && CONFIG_SHA384 */
|
||||||
default:
|
default:
|
||||||
wpa_printf(MSG_DEBUG,
|
wpa_printf(MSG_DEBUG,
|
||||||
"WPA: EAPOL-Key MIC algorithm not known (AKM-defined - akmp=0x%x)",
|
"WPA: EAPOL-Key MIC algorithm not known (AKM-defined - akmp=0x%x)",
|
||||||
|
|
Loading…
Reference in a new issue