Home | History | Annotate | Line # | Download | only in wpa_supplicant
wpas_kay.c revision 1.1.1.2.18.1
      1           1.1  christos /*
      2           1.1  christos  * IEEE 802.1X-2010 KaY Interface
      3           1.1  christos  * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
      4           1.1  christos  *
      5           1.1  christos  * This software may be distributed under the terms of the BSD license.
      6           1.1  christos  * See README for more details.
      7           1.1  christos  */
      8  1.1.1.2.18.1  pgoyette 
      9           1.1  christos #include "utils/includes.h"
     10           1.1  christos 
     11           1.1  christos #include "utils/common.h"
     12           1.1  christos #include "eap_peer/eap.h"
     13           1.1  christos #include "eap_peer/eap_i.h"
     14           1.1  christos #include "eapol_supp/eapol_supp_sm.h"
     15           1.1  christos #include "pae/ieee802_1x_key.h"
     16           1.1  christos #include "pae/ieee802_1x_kay.h"
     17           1.1  christos #include "wpa_supplicant_i.h"
     18           1.1  christos #include "config.h"
     19           1.1  christos #include "config_ssid.h"
     20           1.1  christos #include "driver_i.h"
     21           1.1  christos #include "wpas_kay.h"
     22           1.1  christos 
     23           1.1  christos 
     24           1.1  christos #define DEFAULT_KEY_LEN		16
     25           1.1  christos /* secure Connectivity Association Key Name (CKN) */
     26           1.1  christos #define DEFAULT_CKN_LEN		16
     27           1.1  christos 
     28           1.1  christos 
     29           1.1  christos static int wpas_macsec_init(void *priv, struct macsec_init_params *params)
     30           1.1  christos {
     31           1.1  christos 	return wpa_drv_macsec_init(priv, params);
     32           1.1  christos }
     33           1.1  christos 
     34           1.1  christos 
     35           1.1  christos static int wpas_macsec_deinit(void *priv)
     36           1.1  christos {
     37           1.1  christos 	return wpa_drv_macsec_deinit(priv);
     38           1.1  christos }
     39           1.1  christos 
     40           1.1  christos 
     41  1.1.1.2.18.1  pgoyette static int wpas_macsec_get_capability(void *priv, enum macsec_cap *cap)
     42  1.1.1.2.18.1  pgoyette {
     43  1.1.1.2.18.1  pgoyette 	return wpa_drv_macsec_get_capability(priv, cap);
     44  1.1.1.2.18.1  pgoyette }
     45  1.1.1.2.18.1  pgoyette 
     46  1.1.1.2.18.1  pgoyette 
     47           1.1  christos static int wpas_enable_protect_frames(void *wpa_s, Boolean enabled)
     48           1.1  christos {
     49           1.1  christos 	return wpa_drv_enable_protect_frames(wpa_s, enabled);
     50           1.1  christos }
     51           1.1  christos 
     52           1.1  christos 
     53  1.1.1.2.18.1  pgoyette static int wpas_enable_encrypt(void *wpa_s, Boolean enabled)
     54  1.1.1.2.18.1  pgoyette {
     55  1.1.1.2.18.1  pgoyette 	return wpa_drv_enable_encrypt(wpa_s, enabled);
     56  1.1.1.2.18.1  pgoyette }
     57  1.1.1.2.18.1  pgoyette 
     58  1.1.1.2.18.1  pgoyette 
     59           1.1  christos static int wpas_set_replay_protect(void *wpa_s, Boolean enabled, u32 window)
     60           1.1  christos {
     61           1.1  christos 	return wpa_drv_set_replay_protect(wpa_s, enabled, window);
     62           1.1  christos }
     63           1.1  christos 
     64           1.1  christos 
     65       1.1.1.2  christos static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs)
     66           1.1  christos {
     67       1.1.1.2  christos 	return wpa_drv_set_current_cipher_suite(wpa_s, cs);
     68           1.1  christos }
     69           1.1  christos 
     70           1.1  christos 
     71           1.1  christos static int wpas_enable_controlled_port(void *wpa_s, Boolean enabled)
     72           1.1  christos {
     73           1.1  christos 	return wpa_drv_enable_controlled_port(wpa_s, enabled);
     74           1.1  christos }
     75           1.1  christos 
     76           1.1  christos 
     77  1.1.1.2.18.1  pgoyette static int wpas_get_receive_lowest_pn(void *wpa_s, struct receive_sa *sa)
     78           1.1  christos {
     79  1.1.1.2.18.1  pgoyette 	return wpa_drv_get_receive_lowest_pn(wpa_s, sa);
     80           1.1  christos }
     81           1.1  christos 
     82           1.1  christos 
     83  1.1.1.2.18.1  pgoyette static int wpas_get_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     84           1.1  christos {
     85  1.1.1.2.18.1  pgoyette 	return wpa_drv_get_transmit_next_pn(wpa_s, sa);
     86           1.1  christos }
     87           1.1  christos 
     88           1.1  christos 
     89  1.1.1.2.18.1  pgoyette static int wpas_set_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     90           1.1  christos {
     91  1.1.1.2.18.1  pgoyette 	return wpa_drv_set_transmit_next_pn(wpa_s, sa);
     92           1.1  christos }
     93           1.1  christos 
     94           1.1  christos 
     95           1.1  christos static unsigned int conf_offset_val(enum confidentiality_offset co)
     96           1.1  christos {
     97           1.1  christos 	switch (co) {
     98           1.1  christos 	case CONFIDENTIALITY_OFFSET_30:
     99           1.1  christos 		return 30;
    100           1.1  christos 		break;
    101           1.1  christos 	case CONFIDENTIALITY_OFFSET_50:
    102           1.1  christos 		return 50;
    103           1.1  christos 	default:
    104           1.1  christos 		return 0;
    105           1.1  christos 	}
    106           1.1  christos }
    107           1.1  christos 
    108           1.1  christos 
    109  1.1.1.2.18.1  pgoyette static int wpas_create_receive_sc(void *wpa_s, struct receive_sc *sc,
    110           1.1  christos 				  enum validate_frames vf,
    111           1.1  christos 				  enum confidentiality_offset co)
    112           1.1  christos {
    113  1.1.1.2.18.1  pgoyette 	return wpa_drv_create_receive_sc(wpa_s, sc, conf_offset_val(co), vf);
    114           1.1  christos }
    115           1.1  christos 
    116           1.1  christos 
    117  1.1.1.2.18.1  pgoyette static int wpas_delete_receive_sc(void *wpa_s, struct receive_sc *sc)
    118           1.1  christos {
    119  1.1.1.2.18.1  pgoyette 	return wpa_drv_delete_receive_sc(wpa_s, sc);
    120           1.1  christos }
    121           1.1  christos 
    122           1.1  christos 
    123  1.1.1.2.18.1  pgoyette static int wpas_create_receive_sa(void *wpa_s, struct receive_sa *sa)
    124           1.1  christos {
    125  1.1.1.2.18.1  pgoyette 	return wpa_drv_create_receive_sa(wpa_s, sa);
    126           1.1  christos }
    127           1.1  christos 
    128           1.1  christos 
    129  1.1.1.2.18.1  pgoyette static int wpas_delete_receive_sa(void *wpa_s, struct receive_sa *sa)
    130           1.1  christos {
    131  1.1.1.2.18.1  pgoyette 	return wpa_drv_delete_receive_sa(wpa_s, sa);
    132           1.1  christos }
    133           1.1  christos 
    134           1.1  christos 
    135  1.1.1.2.18.1  pgoyette static int wpas_enable_receive_sa(void *wpa_s, struct receive_sa *sa)
    136           1.1  christos {
    137  1.1.1.2.18.1  pgoyette 	return wpa_drv_enable_receive_sa(wpa_s, sa);
    138           1.1  christos }
    139           1.1  christos 
    140           1.1  christos 
    141  1.1.1.2.18.1  pgoyette static int wpas_disable_receive_sa(void *wpa_s, struct receive_sa *sa)
    142           1.1  christos {
    143  1.1.1.2.18.1  pgoyette 	return wpa_drv_disable_receive_sa(wpa_s, sa);
    144           1.1  christos }
    145           1.1  christos 
    146           1.1  christos 
    147           1.1  christos static int
    148  1.1.1.2.18.1  pgoyette wpas_create_transmit_sc(void *wpa_s, struct transmit_sc *sc,
    149           1.1  christos 			enum confidentiality_offset co)
    150           1.1  christos {
    151  1.1.1.2.18.1  pgoyette 	return wpa_drv_create_transmit_sc(wpa_s, sc, conf_offset_val(co));
    152  1.1.1.2.18.1  pgoyette }
    153  1.1.1.2.18.1  pgoyette 
    154  1.1.1.2.18.1  pgoyette 
    155  1.1.1.2.18.1  pgoyette static int wpas_delete_transmit_sc(void *wpa_s, struct transmit_sc *sc)
    156  1.1.1.2.18.1  pgoyette {
    157  1.1.1.2.18.1  pgoyette 	return wpa_drv_delete_transmit_sc(wpa_s, sc);
    158           1.1  christos }
    159           1.1  christos 
    160           1.1  christos 
    161  1.1.1.2.18.1  pgoyette static int wpas_create_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    162           1.1  christos {
    163  1.1.1.2.18.1  pgoyette 	return wpa_drv_create_transmit_sa(wpa_s, sa);
    164           1.1  christos }
    165           1.1  christos 
    166           1.1  christos 
    167  1.1.1.2.18.1  pgoyette static int wpas_delete_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    168           1.1  christos {
    169  1.1.1.2.18.1  pgoyette 	return wpa_drv_delete_transmit_sa(wpa_s, sa);
    170           1.1  christos }
    171           1.1  christos 
    172           1.1  christos 
    173  1.1.1.2.18.1  pgoyette static int wpas_enable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    174           1.1  christos {
    175  1.1.1.2.18.1  pgoyette 	return wpa_drv_enable_transmit_sa(wpa_s, sa);
    176           1.1  christos }
    177           1.1  christos 
    178           1.1  christos 
    179  1.1.1.2.18.1  pgoyette static int wpas_disable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    180           1.1  christos {
    181  1.1.1.2.18.1  pgoyette 	return wpa_drv_disable_transmit_sa(wpa_s, sa);
    182           1.1  christos }
    183           1.1  christos 
    184           1.1  christos 
    185           1.1  christos int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
    186           1.1  christos {
    187           1.1  christos 	struct ieee802_1x_kay_ctx *kay_ctx;
    188           1.1  christos 	struct ieee802_1x_kay *res = NULL;
    189           1.1  christos 	enum macsec_policy policy;
    190           1.1  christos 
    191           1.1  christos 	ieee802_1x_dealloc_kay_sm(wpa_s);
    192           1.1  christos 
    193           1.1  christos 	if (!ssid || ssid->macsec_policy == 0)
    194           1.1  christos 		return 0;
    195           1.1  christos 
    196  1.1.1.2.18.1  pgoyette 	if (ssid->macsec_policy == 1) {
    197  1.1.1.2.18.1  pgoyette 		if (ssid->macsec_integ_only == 1)
    198  1.1.1.2.18.1  pgoyette 			policy = SHOULD_SECURE;
    199  1.1.1.2.18.1  pgoyette 		else
    200  1.1.1.2.18.1  pgoyette 			policy = SHOULD_ENCRYPT;
    201  1.1.1.2.18.1  pgoyette 	} else {
    202  1.1.1.2.18.1  pgoyette 		policy = DO_NOT_SECURE;
    203  1.1.1.2.18.1  pgoyette 	}
    204           1.1  christos 
    205           1.1  christos 	kay_ctx = os_zalloc(sizeof(*kay_ctx));
    206           1.1  christos 	if (!kay_ctx)
    207           1.1  christos 		return -1;
    208           1.1  christos 
    209           1.1  christos 	kay_ctx->ctx = wpa_s;
    210           1.1  christos 
    211           1.1  christos 	kay_ctx->macsec_init = wpas_macsec_init;
    212           1.1  christos 	kay_ctx->macsec_deinit = wpas_macsec_deinit;
    213  1.1.1.2.18.1  pgoyette 	kay_ctx->macsec_get_capability = wpas_macsec_get_capability;
    214           1.1  christos 	kay_ctx->enable_protect_frames = wpas_enable_protect_frames;
    215  1.1.1.2.18.1  pgoyette 	kay_ctx->enable_encrypt = wpas_enable_encrypt;
    216           1.1  christos 	kay_ctx->set_replay_protect = wpas_set_replay_protect;
    217           1.1  christos 	kay_ctx->set_current_cipher_suite = wpas_set_current_cipher_suite;
    218           1.1  christos 	kay_ctx->enable_controlled_port = wpas_enable_controlled_port;
    219           1.1  christos 	kay_ctx->get_receive_lowest_pn = wpas_get_receive_lowest_pn;
    220           1.1  christos 	kay_ctx->get_transmit_next_pn = wpas_get_transmit_next_pn;
    221           1.1  christos 	kay_ctx->set_transmit_next_pn = wpas_set_transmit_next_pn;
    222           1.1  christos 	kay_ctx->create_receive_sc = wpas_create_receive_sc;
    223           1.1  christos 	kay_ctx->delete_receive_sc = wpas_delete_receive_sc;
    224           1.1  christos 	kay_ctx->create_receive_sa = wpas_create_receive_sa;
    225  1.1.1.2.18.1  pgoyette 	kay_ctx->delete_receive_sa = wpas_delete_receive_sa;
    226           1.1  christos 	kay_ctx->enable_receive_sa = wpas_enable_receive_sa;
    227           1.1  christos 	kay_ctx->disable_receive_sa = wpas_disable_receive_sa;
    228           1.1  christos 	kay_ctx->create_transmit_sc = wpas_create_transmit_sc;
    229           1.1  christos 	kay_ctx->delete_transmit_sc = wpas_delete_transmit_sc;
    230           1.1  christos 	kay_ctx->create_transmit_sa = wpas_create_transmit_sa;
    231  1.1.1.2.18.1  pgoyette 	kay_ctx->delete_transmit_sa = wpas_delete_transmit_sa;
    232           1.1  christos 	kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa;
    233           1.1  christos 	kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa;
    234           1.1  christos 
    235  1.1.1.2.18.1  pgoyette 	res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_port,
    236  1.1.1.2.18.1  pgoyette 				  ssid->mka_priority, wpa_s->ifname,
    237           1.1  christos 				  wpa_s->own_addr);
    238  1.1.1.2.18.1  pgoyette 	/* ieee802_1x_kay_init() frees kay_ctx on failure */
    239  1.1.1.2.18.1  pgoyette 	if (res == NULL)
    240           1.1  christos 		return -1;
    241           1.1  christos 
    242           1.1  christos 	wpa_s->kay = res;
    243           1.1  christos 
    244           1.1  christos 	return 0;
    245           1.1  christos }
    246           1.1  christos 
    247           1.1  christos 
    248           1.1  christos void ieee802_1x_dealloc_kay_sm(struct wpa_supplicant *wpa_s)
    249           1.1  christos {
    250           1.1  christos 	if (!wpa_s->kay)
    251           1.1  christos 		return;
    252           1.1  christos 
    253           1.1  christos 	ieee802_1x_kay_deinit(wpa_s->kay);
    254           1.1  christos 	wpa_s->kay = NULL;
    255           1.1  christos }
    256           1.1  christos 
    257           1.1  christos 
    258           1.1  christos static int ieee802_1x_auth_get_session_id(struct wpa_supplicant *wpa_s,
    259           1.1  christos 					  const u8 *addr, u8 *sid, size_t *len)
    260           1.1  christos {
    261           1.1  christos 	const u8 *session_id;
    262           1.1  christos 	size_t id_len, need_len;
    263           1.1  christos 
    264           1.1  christos 	session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
    265           1.1  christos 	if (session_id == NULL) {
    266           1.1  christos 		wpa_printf(MSG_DEBUG,
    267           1.1  christos 			   "Failed to get SessionID from EAPOL state machines");
    268           1.1  christos 		return -1;
    269           1.1  christos 	}
    270           1.1  christos 
    271  1.1.1.2.18.1  pgoyette 	need_len = 1 + 2 * 32 /* random size */;
    272           1.1  christos 	if (need_len > id_len) {
    273           1.1  christos 		wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
    274           1.1  christos 		return -1;
    275           1.1  christos 	}
    276           1.1  christos 
    277           1.1  christos 	os_memcpy(sid, session_id, need_len);
    278           1.1  christos 	*len = need_len;
    279           1.1  christos 
    280           1.1  christos 	return 0;
    281           1.1  christos }
    282           1.1  christos 
    283           1.1  christos 
    284           1.1  christos static int ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr,
    285           1.1  christos 				   u8 *msk, size_t *len)
    286           1.1  christos {
    287           1.1  christos 	u8 key[EAP_MSK_LEN];
    288           1.1  christos 	size_t keylen;
    289           1.1  christos 	struct eapol_sm *sm;
    290           1.1  christos 	int res;
    291           1.1  christos 
    292           1.1  christos 	sm = wpa_s->eapol;
    293           1.1  christos 	if (sm == NULL)
    294           1.1  christos 		return -1;
    295           1.1  christos 
    296           1.1  christos 	keylen = EAP_MSK_LEN;
    297           1.1  christos 	res = eapol_sm_get_key(sm, key, keylen);
    298           1.1  christos 	if (res) {
    299           1.1  christos 		wpa_printf(MSG_DEBUG,
    300           1.1  christos 			   "Failed to get MSK from EAPOL state machines");
    301           1.1  christos 		return -1;
    302           1.1  christos 	}
    303           1.1  christos 
    304           1.1  christos 	if (keylen > *len)
    305           1.1  christos 		keylen = *len;
    306           1.1  christos 	os_memcpy(msk, key, keylen);
    307           1.1  christos 	*len = keylen;
    308           1.1  christos 
    309           1.1  christos 	return 0;
    310           1.1  christos }
    311           1.1  christos 
    312           1.1  christos 
    313           1.1  christos void * ieee802_1x_notify_create_actor(struct wpa_supplicant *wpa_s,
    314           1.1  christos 				      const u8 *peer_addr)
    315           1.1  christos {
    316           1.1  christos 	u8 *sid;
    317           1.1  christos 	size_t sid_len = 128;
    318           1.1  christos 	struct mka_key_name *ckn;
    319           1.1  christos 	struct mka_key *cak;
    320           1.1  christos 	struct mka_key *msk;
    321           1.1  christos 	void *res = NULL;
    322           1.1  christos 
    323           1.1  christos 	if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
    324           1.1  christos 		return NULL;
    325           1.1  christos 
    326           1.1  christos 	wpa_printf(MSG_DEBUG,
    327           1.1  christos 		   "IEEE 802.1X: External notification - Create MKA for "
    328           1.1  christos 		   MACSTR, MAC2STR(peer_addr));
    329           1.1  christos 
    330           1.1  christos 	msk = os_zalloc(sizeof(*msk));
    331           1.1  christos 	sid = os_zalloc(sid_len);
    332           1.1  christos 	ckn = os_zalloc(sizeof(*ckn));
    333           1.1  christos 	cak = os_zalloc(sizeof(*cak));
    334           1.1  christos 	if (!msk || !sid || !ckn || !cak)
    335           1.1  christos 		goto fail;
    336           1.1  christos 
    337           1.1  christos 	msk->len = DEFAULT_KEY_LEN;
    338           1.1  christos 	if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) {
    339           1.1  christos 		wpa_printf(MSG_ERROR, "IEEE 802.1X: Could not get MSK");
    340           1.1  christos 		goto fail;
    341           1.1  christos 	}
    342           1.1  christos 
    343           1.1  christos 	if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len))
    344           1.1  christos 	{
    345           1.1  christos 		wpa_printf(MSG_ERROR,
    346           1.1  christos 			   "IEEE 802.1X: Could not get EAP Session Id");
    347           1.1  christos 		goto fail;
    348           1.1  christos 	}
    349           1.1  christos 
    350           1.1  christos 	/* Derive CAK from MSK */
    351           1.1  christos 	cak->len = DEFAULT_KEY_LEN;
    352           1.1  christos 	if (ieee802_1x_cak_128bits_aes_cmac(msk->key, wpa_s->own_addr,
    353           1.1  christos 					    peer_addr, cak->key)) {
    354           1.1  christos 		wpa_printf(MSG_ERROR,
    355           1.1  christos 			   "IEEE 802.1X: Deriving CAK failed");
    356           1.1  christos 		goto fail;
    357           1.1  christos 	}
    358           1.1  christos 	wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len);
    359           1.1  christos 
    360           1.1  christos 	/* Derive CKN from MSK */
    361           1.1  christos 	ckn->len = DEFAULT_CKN_LEN;
    362           1.1  christos 	if (ieee802_1x_ckn_128bits_aes_cmac(msk->key, wpa_s->own_addr,
    363           1.1  christos 					    peer_addr, sid, sid_len,
    364           1.1  christos 					    ckn->name)) {
    365           1.1  christos 		wpa_printf(MSG_ERROR,
    366           1.1  christos 			   "IEEE 802.1X: Deriving CKN failed");
    367           1.1  christos 		goto fail;
    368           1.1  christos 	}
    369           1.1  christos 	wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
    370           1.1  christos 
    371           1.1  christos 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
    372           1.1  christos 					EAP_EXCHANGE, FALSE);
    373           1.1  christos 
    374           1.1  christos fail:
    375           1.1  christos 	if (msk) {
    376           1.1  christos 		os_memset(msk, 0, sizeof(*msk));
    377           1.1  christos 		os_free(msk);
    378           1.1  christos 	}
    379           1.1  christos 	os_free(sid);
    380           1.1  christos 	os_free(ckn);
    381           1.1  christos 	if (cak) {
    382           1.1  christos 		os_memset(cak, 0, sizeof(*cak));
    383           1.1  christos 		os_free(cak);
    384           1.1  christos 	}
    385           1.1  christos 
    386           1.1  christos 	return res;
    387           1.1  christos }
    388  1.1.1.2.18.1  pgoyette 
    389  1.1.1.2.18.1  pgoyette 
    390  1.1.1.2.18.1  pgoyette void * ieee802_1x_create_preshared_mka(struct wpa_supplicant *wpa_s,
    391  1.1.1.2.18.1  pgoyette 				       struct wpa_ssid *ssid)
    392  1.1.1.2.18.1  pgoyette {
    393  1.1.1.2.18.1  pgoyette 	struct mka_key *cak;
    394  1.1.1.2.18.1  pgoyette 	struct mka_key_name *ckn;
    395  1.1.1.2.18.1  pgoyette 	void *res = NULL;
    396  1.1.1.2.18.1  pgoyette 
    397  1.1.1.2.18.1  pgoyette 	if ((ssid->mka_psk_set & MKA_PSK_SET) != MKA_PSK_SET)
    398  1.1.1.2.18.1  pgoyette 		goto end;
    399  1.1.1.2.18.1  pgoyette 
    400  1.1.1.2.18.1  pgoyette 	ckn = os_zalloc(sizeof(*ckn));
    401  1.1.1.2.18.1  pgoyette 	if (!ckn)
    402  1.1.1.2.18.1  pgoyette 		goto end;
    403  1.1.1.2.18.1  pgoyette 
    404  1.1.1.2.18.1  pgoyette 	cak = os_zalloc(sizeof(*cak));
    405  1.1.1.2.18.1  pgoyette 	if (!cak)
    406  1.1.1.2.18.1  pgoyette 		goto free_ckn;
    407  1.1.1.2.18.1  pgoyette 
    408  1.1.1.2.18.1  pgoyette 	if (ieee802_1x_alloc_kay_sm(wpa_s, ssid) < 0 || !wpa_s->kay)
    409  1.1.1.2.18.1  pgoyette 		goto free_cak;
    410  1.1.1.2.18.1  pgoyette 
    411  1.1.1.2.18.1  pgoyette 	if (wpa_s->kay->policy == DO_NOT_SECURE)
    412  1.1.1.2.18.1  pgoyette 		goto dealloc;
    413  1.1.1.2.18.1  pgoyette 
    414  1.1.1.2.18.1  pgoyette 	cak->len = MACSEC_CAK_LEN;
    415  1.1.1.2.18.1  pgoyette 	os_memcpy(cak->key, ssid->mka_cak, cak->len);
    416  1.1.1.2.18.1  pgoyette 
    417  1.1.1.2.18.1  pgoyette 	ckn->len = MACSEC_CKN_LEN;
    418  1.1.1.2.18.1  pgoyette 	os_memcpy(ckn->name, ssid->mka_ckn, ckn->len);
    419  1.1.1.2.18.1  pgoyette 
    420  1.1.1.2.18.1  pgoyette 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, FALSE);
    421  1.1.1.2.18.1  pgoyette 	if (res)
    422  1.1.1.2.18.1  pgoyette 		goto free_cak;
    423  1.1.1.2.18.1  pgoyette 
    424  1.1.1.2.18.1  pgoyette dealloc:
    425  1.1.1.2.18.1  pgoyette 	/* Failed to create MKA */
    426  1.1.1.2.18.1  pgoyette 	ieee802_1x_dealloc_kay_sm(wpa_s);
    427  1.1.1.2.18.1  pgoyette free_cak:
    428  1.1.1.2.18.1  pgoyette 	os_free(cak);
    429  1.1.1.2.18.1  pgoyette free_ckn:
    430  1.1.1.2.18.1  pgoyette 	os_free(ckn);
    431  1.1.1.2.18.1  pgoyette end:
    432  1.1.1.2.18.1  pgoyette 	return res;
    433  1.1.1.2.18.1  pgoyette }
    434