aboutsummaryrefslogtreecommitdiffstats
path: root/src/common/wpa_common.h
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2018-06-04 12:16:54 (GMT)
committerJouni Malinen <j@w1.fi>2018-06-05 16:29:52 (GMT)
commita3e18dbb6aeaac79151ea5386b3606f3c973f126 (patch)
tree64fe45472189c534d8701b1fd4abce06f0f6e3eb /src/common/wpa_common.h
parentc22bb5bba67ebff77051881c9ead7e3fef3e259b (diff)
downloadhostap-a3e18dbb6aeaac79151ea5386b3606f3c973f126.zip
hostap-a3e18dbb6aeaac79151ea5386b3606f3c973f126.tar.gz
hostap-a3e18dbb6aeaac79151ea5386b3606f3c973f126.tar.bz2
FT: Support variable length keys
This is a step in adding support for SHA384-based FT AKM. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'src/common/wpa_common.h')
-rw-r--r--src/common/wpa_common.h7
1 files changed, 4 insertions, 3 deletions
diff --git a/src/common/wpa_common.h b/src/common/wpa_common.h
index 30f6e5b..3843167 100644
--- a/src/common/wpa_common.h
+++ b/src/common/wpa_common.h
@@ -367,11 +367,12 @@ int wpa_derive_pmk_r0(const u8 *xxkey, size_t xxkey_len,
const u8 *s0kh_id, u8 *pmk_r0, u8 *pmk_r0_name);
int wpa_derive_pmk_r1_name(const u8 *pmk_r0_name, const u8 *r1kh_id,
const u8 *s1kh_id, u8 *pmk_r1_name);
-int wpa_derive_pmk_r1(const u8 *pmk_r0, const u8 *pmk_r0_name,
+int wpa_derive_pmk_r1(const u8 *pmk_r0, size_t pmk_r0_len,
+ const u8 *pmk_r0_name,
const u8 *r1kh_id, const u8 *s1kh_id,
u8 *pmk_r1, u8 *pmk_r1_name);
-int wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
- const u8 *sta_addr, const u8 *bssid,
+int wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce,
+ const u8 *anonce, const u8 *sta_addr, const u8 *bssid,
const u8 *pmk_r1_name,
struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
#endif /* CONFIG_IEEE80211R */