FT: Add key management value FT-EAP-SHA384 for hostapd
This allows hostapd to be configuted to use the SHA384-based FT AKM. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
3d9cd08410
commit
c6f2eceb8b
2 changed files with 14 additions and 2 deletions
|
@ -1,6 +1,6 @@
|
||||||
/*
|
/*
|
||||||
* hostapd / Configuration file parser
|
* hostapd / Configuration file parser
|
||||||
* Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi>
|
* Copyright (c) 2003-2018, Jouni Malinen <j@w1.fi>
|
||||||
*
|
*
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
* See README for more details.
|
* See README for more details.
|
||||||
|
@ -772,6 +772,10 @@ static int hostapd_config_parse_key_mgmt(int line, const char *value)
|
||||||
val |= WPA_KEY_MGMT_FT_PSK;
|
val |= WPA_KEY_MGMT_FT_PSK;
|
||||||
else if (os_strcmp(start, "FT-EAP") == 0)
|
else if (os_strcmp(start, "FT-EAP") == 0)
|
||||||
val |= WPA_KEY_MGMT_FT_IEEE8021X;
|
val |= WPA_KEY_MGMT_FT_IEEE8021X;
|
||||||
|
#ifdef CONFIG_SHA384
|
||||||
|
else if (os_strcmp(start, "FT-EAP-SHA384") == 0)
|
||||||
|
val |= WPA_KEY_MGMT_FT_IEEE8021X_SHA384;
|
||||||
|
#endif /* CONFIG_SHA384 */
|
||||||
#endif /* CONFIG_IEEE80211R_AP */
|
#endif /* CONFIG_IEEE80211R_AP */
|
||||||
#ifdef CONFIG_IEEE80211W
|
#ifdef CONFIG_IEEE80211W
|
||||||
else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
|
else if (os_strcmp(start, "WPA-PSK-SHA256") == 0)
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/*
|
/*
|
||||||
* hostapd / UNIX domain socket -based control interface
|
* hostapd / UNIX domain socket -based control interface
|
||||||
* Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi>
|
* Copyright (c) 2004-2018, Jouni Malinen <j@w1.fi>
|
||||||
*
|
*
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
* See README for more details.
|
* See README for more details.
|
||||||
|
@ -1031,6 +1031,14 @@ static int hostapd_ctrl_iface_get_key_mgmt(struct hostapd_data *hapd,
|
||||||
return pos - buf;
|
return pos - buf;
|
||||||
pos += ret;
|
pos += ret;
|
||||||
}
|
}
|
||||||
|
#ifdef CONFIG_SHA384
|
||||||
|
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X_SHA384) {
|
||||||
|
ret = os_snprintf(pos, end - pos, "FT-EAP-SHA384 ");
|
||||||
|
if (os_snprintf_error(end - pos, ret))
|
||||||
|
return pos - buf;
|
||||||
|
pos += ret;
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_SHA384 */
|
||||||
#ifdef CONFIG_SAE
|
#ifdef CONFIG_SAE
|
||||||
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_SAE) {
|
if (hapd->conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_SAE) {
|
||||||
ret = os_snprintf(pos, end - pos, "FT-SAE ");
|
ret = os_snprintf(pos, end - pos, "FT-SAE ");
|
||||||
|
|
Loading…
Reference in a new issue