path: root/src/common/wpa_common.h
diff options
authorJouni Malinen <jouni@codeaurora.org>2018-03-24 09:24:18 (GMT)
committerJouni Malinen <j@w1.fi>2018-03-26 09:31:04 (GMT)
commit2f37387812a5afc73c3aedaed7d5a5009e391475 (patch)
treecdd7d2735f46d6e7f7cb91a1fa3bfdc60768b3a1 /src/common/wpa_common.h
parent4ddca8142eb5512211e3eb657b7bf0f261fd36b1 (diff)
FILS: Add more complete support for FT-FILS use cases
This extends the original IEEE Std 802.11ai-2016 functionality with the changes added in REVmd to describe how additional keys are derived to protect the FT protocol using keys derived through FILS authentication. This allows key_mgmt=FT-FILS-SHA256 to be used with FT protocol since the FTE MIC can now be calculated following the changes in REVmd. The FT-FILS-SHA384 case is still unsupported (it needs support for variable length MIC field in FTE). Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
Diffstat (limited to 'src/common/wpa_common.h')
1 files changed, 4 insertions, 0 deletions
diff --git a/src/common/wpa_common.h b/src/common/wpa_common.h
index 5c918a4..cb56c0c 100644
--- a/src/common/wpa_common.h
+++ b/src/common/wpa_common.h
@@ -210,9 +210,13 @@ struct wpa_ptk {
u8 kck[WPA_KCK_MAX_LEN]; /* EAPOL-Key Key Confirmation Key (KCK) */
u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */
u8 tk[WPA_TK_MAX_LEN]; /* Temporal Key (TK) */
+ u8 kck2[WPA_KCK_MAX_LEN]; /* FT reasoc Key Confirmation Key (KCK2) */
+ u8 kek2[WPA_KEK_MAX_LEN]; /* FT reassoc Key Encryption Key (KEK2) */
size_t kck_len;
size_t kek_len;
size_t tk_len;
+ size_t kck2_len;
+ size_t kek2_len;
int installed; /* 1 if key has already been installed to driver */