[PATCH] To support Opportunistic Key Caching for SuiteB key management, KCK need to be stored on pmksa to derive pmkid for the new roaming AP.
Vinoth V
vinothv117 at gmail.com
Thu Apr 27 21:37:39 PDT 2023
Signed-off-by: Vinoth V <vinoth117 at gmail.com>
---
src/rsn_supp/pmksa_cache.c | 7 ++++++-
src/rsn_supp/pmksa_cache.h | 2 ++
2 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/src/rsn_supp/pmksa_cache.c b/src/rsn_supp/pmksa_cache.c
index ea83e76e6..ff69baa1a 100644
--- a/src/rsn_supp/pmksa_cache.c
+++ b/src/rsn_supp/pmksa_cache.c
@@ -222,6 +222,9 @@ pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
if (pmk_len > PMK_LEN_MAX)
return NULL;
+ if (kck_len > WPA_KCK_MAX_LEN)
+ return NULL;
+
if (wpa_key_mgmt_suite_b(akmp) && !kck)
return NULL;
@@ -230,6 +233,8 @@ pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len,
return NULL;
os_memcpy(entry->pmk, pmk, pmk_len);
entry->pmk_len = pmk_len;
+ os_memcpy(entry->kck, kck, kck_len);
+ entry->kck_len = kck_len;
if (pmkid)
os_memcpy(entry->pmkid, pmkid, PMKID_LEN);
else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
@@ -488,7 +493,7 @@ pmksa_cache_clone_entry(struct rsn_pmksa_cache *pmksa,
wpa_key_mgmt_fils(old_entry->akmp))
pmkid = old_entry->pmkid;
new_entry = pmksa_cache_add(pmksa, old_entry->pmk, old_entry->pmk_len,
- pmkid, NULL, 0,
+ pmkid, old_entry->kck, old_entry->kck_len,
aa, pmksa->sm->own_addr,
old_entry->network_ctx, old_entry->akmp,
old_entry->fils_cache_id_set ?
diff --git a/src/rsn_supp/pmksa_cache.h b/src/rsn_supp/pmksa_cache.h
index 48c9e0465..1523cae9a 100644
--- a/src/rsn_supp/pmksa_cache.h
+++ b/src/rsn_supp/pmksa_cache.h
@@ -17,6 +17,8 @@ struct rsn_pmksa_cache_entry {
u8 pmkid[PMKID_LEN];
u8 pmk[PMK_LEN_MAX];
size_t pmk_len;
+ u8 kck[WPA_KCK_MAX_LEN];
+ size_t kck_len;
os_time_t expiration;
int akmp; /* WPA_KEY_MGMT_* */
u8 aa[ETH_ALEN];
--
2.39.2 (Apple Git-143)
More information about the Hostap
mailing list