Suite B: Select EAPOL-Key integrity and key-wrap algorithms based on AKM
This adds support for AKM 00-0F-AC:11 to specify the integrity and key-wrap algorithms for EAPOL-Key frames using the new design where descriptor version is set to 0 and algorithms are determined based on AKM. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
087a1f4efd
commit
929a2ea5df
6 changed files with 90 additions and 38 deletions
|
@ -327,8 +327,8 @@ struct rsn_rdie {
|
|||
#endif /* _MSC_VER */
|
||||
|
||||
|
||||
int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len,
|
||||
u8 *mic);
|
||||
int wpa_eapol_key_mic(const u8 *key, int akmp, int ver, const u8 *buf,
|
||||
size_t len, u8 *mic);
|
||||
void wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label,
|
||||
const u8 *addr1, const u8 *addr2,
|
||||
const u8 *nonce1, const u8 *nonce2,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue