Replace "dummy" with "stub" in Authenticator group keys
Replace the word "dummy" with the inclusive word "stub". Signed-off-by: Arowa Suliman <arowa@chromium.org>
This commit is contained in:
parent
fb1bae2a71
commit
77dd712432
2 changed files with 15 additions and 15 deletions
|
@ -2742,7 +2742,7 @@ static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
|
||||||
struct wpabuf *plain;
|
struct wpabuf *plain;
|
||||||
u8 *len, *tmp, *tmp2;
|
u8 *len, *tmp, *tmp2;
|
||||||
u8 hdr[2];
|
u8 hdr[2];
|
||||||
u8 *gtk, dummy_gtk[32];
|
u8 *gtk, stub_gtk[32];
|
||||||
size_t gtk_len;
|
size_t gtk_len;
|
||||||
struct wpa_group *gsm;
|
struct wpa_group *gsm;
|
||||||
size_t plain_len;
|
size_t plain_len;
|
||||||
|
@ -2785,11 +2785,11 @@ static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
|
||||||
* Provide unique random GTK to each STA to prevent use
|
* Provide unique random GTK to each STA to prevent use
|
||||||
* of GTK in the BSS.
|
* of GTK in the BSS.
|
||||||
*/
|
*/
|
||||||
if (random_get_bytes(dummy_gtk, gtk_len) < 0) {
|
if (random_get_bytes(stub_gtk, gtk_len) < 0) {
|
||||||
wpabuf_clear_free(plain);
|
wpabuf_clear_free(plain);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
gtk = dummy_gtk;
|
gtk = stub_gtk;
|
||||||
}
|
}
|
||||||
hdr[0] = gsm->GN & 0x03;
|
hdr[0] = gsm->GN & 0x03;
|
||||||
hdr[1] = 0;
|
hdr[1] = 0;
|
||||||
|
@ -3372,7 +3372,7 @@ static u8 * replace_ie(const char *name, const u8 *old_buf, size_t *len, u8 eid,
|
||||||
|
|
||||||
SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
|
SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
|
||||||
{
|
{
|
||||||
u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, dummy_gtk[32];
|
u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32];
|
||||||
size_t gtk_len, kde_len, wpa_ie_len;
|
size_t gtk_len, kde_len, wpa_ie_len;
|
||||||
struct wpa_group *gsm = sm->group;
|
struct wpa_group *gsm = sm->group;
|
||||||
u8 *wpa_ie;
|
u8 *wpa_ie;
|
||||||
|
@ -3458,9 +3458,9 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
|
||||||
* Provide unique random GTK to each STA to prevent use
|
* Provide unique random GTK to each STA to prevent use
|
||||||
* of GTK in the BSS.
|
* of GTK in the BSS.
|
||||||
*/
|
*/
|
||||||
if (random_get_bytes(dummy_gtk, gtk_len) < 0)
|
if (random_get_bytes(stub_gtk, gtk_len) < 0)
|
||||||
goto done;
|
goto done;
|
||||||
gtk = dummy_gtk;
|
gtk = stub_gtk;
|
||||||
}
|
}
|
||||||
gtkidx = gsm->GN;
|
gtkidx = gsm->GN;
|
||||||
_rsc = rsc;
|
_rsc = rsc;
|
||||||
|
@ -3853,7 +3853,7 @@ SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING)
|
||||||
const u8 *kde;
|
const u8 *kde;
|
||||||
u8 *kde_buf = NULL, *pos, hdr[2];
|
u8 *kde_buf = NULL, *pos, hdr[2];
|
||||||
size_t kde_len;
|
size_t kde_len;
|
||||||
u8 *gtk, dummy_gtk[32];
|
u8 *gtk, stub_gtk[32];
|
||||||
struct wpa_auth_config *conf = &sm->wpa_auth->conf;
|
struct wpa_auth_config *conf = &sm->wpa_auth->conf;
|
||||||
|
|
||||||
SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
|
SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
|
||||||
|
@ -3885,9 +3885,9 @@ SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING)
|
||||||
* Provide unique random GTK to each STA to prevent use
|
* Provide unique random GTK to each STA to prevent use
|
||||||
* of GTK in the BSS.
|
* of GTK in the BSS.
|
||||||
*/
|
*/
|
||||||
if (random_get_bytes(dummy_gtk, gsm->GTK_len) < 0)
|
if (random_get_bytes(stub_gtk, gsm->GTK_len) < 0)
|
||||||
return;
|
return;
|
||||||
gtk = dummy_gtk;
|
gtk = stub_gtk;
|
||||||
}
|
}
|
||||||
if (sm->wpa == WPA_VERSION_WPA2) {
|
if (sm->wpa == WPA_VERSION_WPA2) {
|
||||||
kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
|
kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
|
||||||
|
|
|
@ -2259,7 +2259,7 @@ static u8 * wpa_ft_igtk_subelem(struct wpa_state_machine *sm, size_t *len)
|
||||||
const u8 *kek, *igtk;
|
const u8 *kek, *igtk;
|
||||||
size_t kek_len;
|
size_t kek_len;
|
||||||
size_t igtk_len;
|
size_t igtk_len;
|
||||||
u8 dummy_igtk[WPA_IGTK_MAX_LEN];
|
u8 stub_igtk[WPA_IGTK_MAX_LEN];
|
||||||
|
|
||||||
if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
|
if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
|
||||||
kek = sm->PTK.kek2;
|
kek = sm->PTK.kek2;
|
||||||
|
@ -2292,11 +2292,11 @@ static u8 * wpa_ft_igtk_subelem(struct wpa_state_machine *sm, size_t *len)
|
||||||
* Provide unique random IGTK to each STA to prevent use of
|
* Provide unique random IGTK to each STA to prevent use of
|
||||||
* IGTK in the BSS.
|
* IGTK in the BSS.
|
||||||
*/
|
*/
|
||||||
if (random_get_bytes(dummy_igtk, igtk_len / 8) < 0) {
|
if (random_get_bytes(stub_igtk, igtk_len / 8) < 0) {
|
||||||
os_free(subelem);
|
os_free(subelem);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
igtk = dummy_igtk;
|
igtk = stub_igtk;
|
||||||
}
|
}
|
||||||
if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) {
|
if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) {
|
||||||
wpa_printf(MSG_DEBUG,
|
wpa_printf(MSG_DEBUG,
|
||||||
|
@ -2319,7 +2319,7 @@ static u8 * wpa_ft_bigtk_subelem(struct wpa_state_machine *sm, size_t *len)
|
||||||
const u8 *kek, *bigtk;
|
const u8 *kek, *bigtk;
|
||||||
size_t kek_len;
|
size_t kek_len;
|
||||||
size_t bigtk_len;
|
size_t bigtk_len;
|
||||||
u8 dummy_bigtk[WPA_IGTK_MAX_LEN];
|
u8 stub_bigtk[WPA_IGTK_MAX_LEN];
|
||||||
|
|
||||||
if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
|
if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
|
||||||
kek = sm->PTK.kek2;
|
kek = sm->PTK.kek2;
|
||||||
|
@ -2352,11 +2352,11 @@ static u8 * wpa_ft_bigtk_subelem(struct wpa_state_machine *sm, size_t *len)
|
||||||
* Provide unique random BIGTK to each OSEN STA to prevent use
|
* Provide unique random BIGTK to each OSEN STA to prevent use
|
||||||
* of BIGTK in the BSS.
|
* of BIGTK in the BSS.
|
||||||
*/
|
*/
|
||||||
if (random_get_bytes(dummy_bigtk, bigtk_len / 8) < 0) {
|
if (random_get_bytes(stub_bigtk, bigtk_len / 8) < 0) {
|
||||||
os_free(subelem);
|
os_free(subelem);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
bigtk = dummy_bigtk;
|
bigtk = stub_bigtk;
|
||||||
}
|
}
|
||||||
if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) {
|
if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) {
|
||||||
wpa_printf(MSG_DEBUG,
|
wpa_printf(MSG_DEBUG,
|
||||||
|
|
Loading…
Reference in a new issue