FT: Allow wpa_supplicant to be configured to prepend PMKR1Name
The standard is somewhat unclear on whether the PMKIDs used in (Re)Association Request frame (i.e., potential PMKIDs that could be used for PMKSA caching during the initial mobility domain association) are to be retained or removed when generating EAPOL-Key msg 2/4. wpa_supplicant has replaced the PMKID List contents from (Re)Association Request frame with PMKR1Name when generating EAPOL-Key msg 2/4 for FT. Allow it to be configured (ft_prepend_pmkid=1) to prepend the PMKR1Name without removing the PMKIDs from (Re)Association Request frame. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
9929426b92
commit
8fa52a7974
13 changed files with 38 additions and 12 deletions
|
@ -2028,7 +2028,7 @@ prepare_auth_resp_fils(struct hostapd_data *hapd,
|
|||
}
|
||||
|
||||
os_memcpy(ie_buf, ie, ielen);
|
||||
if (wpa_insert_pmkid(ie_buf, &ielen, pmksa->pmkid) < 0) {
|
||||
if (wpa_insert_pmkid(ie_buf, &ielen, pmksa->pmkid, true) < 0) {
|
||||
*resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||
goto fail;
|
||||
}
|
||||
|
|
|
@ -4448,7 +4448,7 @@ SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
|
|||
size_t elen;
|
||||
|
||||
elen = pos - kde;
|
||||
res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name);
|
||||
res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
|
||||
if (res < 0) {
|
||||
wpa_printf(MSG_ERROR,
|
||||
"FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
|
||||
|
@ -6577,7 +6577,7 @@ int wpa_auth_resend_m3(struct wpa_state_machine *sm,
|
|||
size_t elen;
|
||||
|
||||
elen = pos - kde;
|
||||
res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name);
|
||||
res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
|
||||
if (res < 0) {
|
||||
wpa_printf(MSG_ERROR,
|
||||
"FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue