Home | History | Annotate | Line # | Download | only in wpa_supplicant
wpas_kay.c revision 1.1.1.4
      1      1.1  christos /*
      2      1.1  christos  * IEEE 802.1X-2010 KaY Interface
      3      1.1  christos  * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
      4      1.1  christos  *
      5      1.1  christos  * This software may be distributed under the terms of the BSD license.
      6      1.1  christos  * See README for more details.
      7      1.1  christos  */
      8  1.1.1.3  christos 
      9      1.1  christos #include "utils/includes.h"
     10      1.1  christos 
     11      1.1  christos #include "utils/common.h"
     12      1.1  christos #include "eap_peer/eap.h"
     13      1.1  christos #include "eap_peer/eap_i.h"
     14      1.1  christos #include "eapol_supp/eapol_supp_sm.h"
     15      1.1  christos #include "pae/ieee802_1x_key.h"
     16      1.1  christos #include "pae/ieee802_1x_kay.h"
     17      1.1  christos #include "wpa_supplicant_i.h"
     18      1.1  christos #include "config.h"
     19      1.1  christos #include "config_ssid.h"
     20      1.1  christos #include "driver_i.h"
     21      1.1  christos #include "wpas_kay.h"
     22      1.1  christos 
     23      1.1  christos 
     24      1.1  christos #define DEFAULT_KEY_LEN		16
     25      1.1  christos /* secure Connectivity Association Key Name (CKN) */
     26      1.1  christos #define DEFAULT_CKN_LEN		16
     27      1.1  christos 
     28      1.1  christos 
     29      1.1  christos static int wpas_macsec_init(void *priv, struct macsec_init_params *params)
     30      1.1  christos {
     31      1.1  christos 	return wpa_drv_macsec_init(priv, params);
     32      1.1  christos }
     33      1.1  christos 
     34      1.1  christos 
     35      1.1  christos static int wpas_macsec_deinit(void *priv)
     36      1.1  christos {
     37      1.1  christos 	return wpa_drv_macsec_deinit(priv);
     38      1.1  christos }
     39      1.1  christos 
     40      1.1  christos 
     41  1.1.1.3  christos static int wpas_macsec_get_capability(void *priv, enum macsec_cap *cap)
     42  1.1.1.3  christos {
     43  1.1.1.3  christos 	return wpa_drv_macsec_get_capability(priv, cap);
     44  1.1.1.3  christos }
     45  1.1.1.3  christos 
     46  1.1.1.3  christos 
     47      1.1  christos static int wpas_enable_protect_frames(void *wpa_s, Boolean enabled)
     48      1.1  christos {
     49      1.1  christos 	return wpa_drv_enable_protect_frames(wpa_s, enabled);
     50      1.1  christos }
     51      1.1  christos 
     52      1.1  christos 
     53  1.1.1.3  christos static int wpas_enable_encrypt(void *wpa_s, Boolean enabled)
     54  1.1.1.3  christos {
     55  1.1.1.3  christos 	return wpa_drv_enable_encrypt(wpa_s, enabled);
     56  1.1.1.3  christos }
     57  1.1.1.3  christos 
     58  1.1.1.3  christos 
     59      1.1  christos static int wpas_set_replay_protect(void *wpa_s, Boolean enabled, u32 window)
     60      1.1  christos {
     61      1.1  christos 	return wpa_drv_set_replay_protect(wpa_s, enabled, window);
     62      1.1  christos }
     63      1.1  christos 
     64      1.1  christos 
     65  1.1.1.2  christos static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs)
     66      1.1  christos {
     67  1.1.1.2  christos 	return wpa_drv_set_current_cipher_suite(wpa_s, cs);
     68      1.1  christos }
     69      1.1  christos 
     70      1.1  christos 
     71      1.1  christos static int wpas_enable_controlled_port(void *wpa_s, Boolean enabled)
     72      1.1  christos {
     73      1.1  christos 	return wpa_drv_enable_controlled_port(wpa_s, enabled);
     74      1.1  christos }
     75      1.1  christos 
     76      1.1  christos 
     77  1.1.1.3  christos static int wpas_get_receive_lowest_pn(void *wpa_s, struct receive_sa *sa)
     78      1.1  christos {
     79  1.1.1.3  christos 	return wpa_drv_get_receive_lowest_pn(wpa_s, sa);
     80      1.1  christos }
     81      1.1  christos 
     82      1.1  christos 
     83  1.1.1.3  christos static int wpas_get_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     84      1.1  christos {
     85  1.1.1.3  christos 	return wpa_drv_get_transmit_next_pn(wpa_s, sa);
     86      1.1  christos }
     87      1.1  christos 
     88      1.1  christos 
     89  1.1.1.3  christos static int wpas_set_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     90      1.1  christos {
     91  1.1.1.3  christos 	return wpa_drv_set_transmit_next_pn(wpa_s, sa);
     92      1.1  christos }
     93      1.1  christos 
     94      1.1  christos 
     95  1.1.1.4  christos static int wpas_set_receive_lowest_pn(void *wpa_s, struct receive_sa *sa)
     96  1.1.1.4  christos {
     97  1.1.1.4  christos 	return wpa_drv_set_receive_lowest_pn(wpa_s, sa);
     98  1.1.1.4  christos }
     99  1.1.1.4  christos 
    100  1.1.1.4  christos 
    101      1.1  christos static unsigned int conf_offset_val(enum confidentiality_offset co)
    102      1.1  christos {
    103      1.1  christos 	switch (co) {
    104      1.1  christos 	case CONFIDENTIALITY_OFFSET_30:
    105      1.1  christos 		return 30;
    106      1.1  christos 		break;
    107      1.1  christos 	case CONFIDENTIALITY_OFFSET_50:
    108      1.1  christos 		return 50;
    109      1.1  christos 	default:
    110      1.1  christos 		return 0;
    111      1.1  christos 	}
    112      1.1  christos }
    113      1.1  christos 
    114      1.1  christos 
    115  1.1.1.3  christos static int wpas_create_receive_sc(void *wpa_s, struct receive_sc *sc,
    116      1.1  christos 				  enum validate_frames vf,
    117      1.1  christos 				  enum confidentiality_offset co)
    118      1.1  christos {
    119  1.1.1.3  christos 	return wpa_drv_create_receive_sc(wpa_s, sc, conf_offset_val(co), vf);
    120      1.1  christos }
    121      1.1  christos 
    122      1.1  christos 
    123  1.1.1.3  christos static int wpas_delete_receive_sc(void *wpa_s, struct receive_sc *sc)
    124      1.1  christos {
    125  1.1.1.3  christos 	return wpa_drv_delete_receive_sc(wpa_s, sc);
    126      1.1  christos }
    127      1.1  christos 
    128      1.1  christos 
    129  1.1.1.3  christos static int wpas_create_receive_sa(void *wpa_s, struct receive_sa *sa)
    130      1.1  christos {
    131  1.1.1.3  christos 	return wpa_drv_create_receive_sa(wpa_s, sa);
    132      1.1  christos }
    133      1.1  christos 
    134      1.1  christos 
    135  1.1.1.3  christos static int wpas_delete_receive_sa(void *wpa_s, struct receive_sa *sa)
    136      1.1  christos {
    137  1.1.1.3  christos 	return wpa_drv_delete_receive_sa(wpa_s, sa);
    138      1.1  christos }
    139      1.1  christos 
    140      1.1  christos 
    141  1.1.1.3  christos static int wpas_enable_receive_sa(void *wpa_s, struct receive_sa *sa)
    142      1.1  christos {
    143  1.1.1.3  christos 	return wpa_drv_enable_receive_sa(wpa_s, sa);
    144      1.1  christos }
    145      1.1  christos 
    146      1.1  christos 
    147  1.1.1.3  christos static int wpas_disable_receive_sa(void *wpa_s, struct receive_sa *sa)
    148      1.1  christos {
    149  1.1.1.3  christos 	return wpa_drv_disable_receive_sa(wpa_s, sa);
    150      1.1  christos }
    151      1.1  christos 
    152      1.1  christos 
    153      1.1  christos static int
    154  1.1.1.3  christos wpas_create_transmit_sc(void *wpa_s, struct transmit_sc *sc,
    155      1.1  christos 			enum confidentiality_offset co)
    156      1.1  christos {
    157  1.1.1.3  christos 	return wpa_drv_create_transmit_sc(wpa_s, sc, conf_offset_val(co));
    158  1.1.1.3  christos }
    159  1.1.1.3  christos 
    160  1.1.1.3  christos 
    161  1.1.1.3  christos static int wpas_delete_transmit_sc(void *wpa_s, struct transmit_sc *sc)
    162  1.1.1.3  christos {
    163  1.1.1.3  christos 	return wpa_drv_delete_transmit_sc(wpa_s, sc);
    164      1.1  christos }
    165      1.1  christos 
    166      1.1  christos 
    167  1.1.1.3  christos static int wpas_create_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    168      1.1  christos {
    169  1.1.1.3  christos 	return wpa_drv_create_transmit_sa(wpa_s, sa);
    170      1.1  christos }
    171      1.1  christos 
    172      1.1  christos 
    173  1.1.1.3  christos static int wpas_delete_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    174      1.1  christos {
    175  1.1.1.3  christos 	return wpa_drv_delete_transmit_sa(wpa_s, sa);
    176      1.1  christos }
    177      1.1  christos 
    178      1.1  christos 
    179  1.1.1.3  christos static int wpas_enable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    180      1.1  christos {
    181  1.1.1.3  christos 	return wpa_drv_enable_transmit_sa(wpa_s, sa);
    182      1.1  christos }
    183      1.1  christos 
    184      1.1  christos 
    185  1.1.1.3  christos static int wpas_disable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    186      1.1  christos {
    187  1.1.1.3  christos 	return wpa_drv_disable_transmit_sa(wpa_s, sa);
    188      1.1  christos }
    189      1.1  christos 
    190      1.1  christos 
    191      1.1  christos int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
    192      1.1  christos {
    193      1.1  christos 	struct ieee802_1x_kay_ctx *kay_ctx;
    194      1.1  christos 	struct ieee802_1x_kay *res = NULL;
    195      1.1  christos 	enum macsec_policy policy;
    196      1.1  christos 
    197      1.1  christos 	ieee802_1x_dealloc_kay_sm(wpa_s);
    198      1.1  christos 
    199      1.1  christos 	if (!ssid || ssid->macsec_policy == 0)
    200      1.1  christos 		return 0;
    201      1.1  christos 
    202  1.1.1.3  christos 	if (ssid->macsec_policy == 1) {
    203  1.1.1.3  christos 		if (ssid->macsec_integ_only == 1)
    204  1.1.1.3  christos 			policy = SHOULD_SECURE;
    205  1.1.1.3  christos 		else
    206  1.1.1.3  christos 			policy = SHOULD_ENCRYPT;
    207  1.1.1.3  christos 	} else {
    208  1.1.1.3  christos 		policy = DO_NOT_SECURE;
    209  1.1.1.3  christos 	}
    210      1.1  christos 
    211      1.1  christos 	kay_ctx = os_zalloc(sizeof(*kay_ctx));
    212      1.1  christos 	if (!kay_ctx)
    213      1.1  christos 		return -1;
    214      1.1  christos 
    215      1.1  christos 	kay_ctx->ctx = wpa_s;
    216      1.1  christos 
    217      1.1  christos 	kay_ctx->macsec_init = wpas_macsec_init;
    218      1.1  christos 	kay_ctx->macsec_deinit = wpas_macsec_deinit;
    219  1.1.1.3  christos 	kay_ctx->macsec_get_capability = wpas_macsec_get_capability;
    220      1.1  christos 	kay_ctx->enable_protect_frames = wpas_enable_protect_frames;
    221  1.1.1.3  christos 	kay_ctx->enable_encrypt = wpas_enable_encrypt;
    222      1.1  christos 	kay_ctx->set_replay_protect = wpas_set_replay_protect;
    223      1.1  christos 	kay_ctx->set_current_cipher_suite = wpas_set_current_cipher_suite;
    224      1.1  christos 	kay_ctx->enable_controlled_port = wpas_enable_controlled_port;
    225      1.1  christos 	kay_ctx->get_receive_lowest_pn = wpas_get_receive_lowest_pn;
    226      1.1  christos 	kay_ctx->get_transmit_next_pn = wpas_get_transmit_next_pn;
    227      1.1  christos 	kay_ctx->set_transmit_next_pn = wpas_set_transmit_next_pn;
    228  1.1.1.4  christos 	kay_ctx->set_receive_lowest_pn = wpas_set_receive_lowest_pn;
    229      1.1  christos 	kay_ctx->create_receive_sc = wpas_create_receive_sc;
    230      1.1  christos 	kay_ctx->delete_receive_sc = wpas_delete_receive_sc;
    231      1.1  christos 	kay_ctx->create_receive_sa = wpas_create_receive_sa;
    232  1.1.1.3  christos 	kay_ctx->delete_receive_sa = wpas_delete_receive_sa;
    233      1.1  christos 	kay_ctx->enable_receive_sa = wpas_enable_receive_sa;
    234      1.1  christos 	kay_ctx->disable_receive_sa = wpas_disable_receive_sa;
    235      1.1  christos 	kay_ctx->create_transmit_sc = wpas_create_transmit_sc;
    236      1.1  christos 	kay_ctx->delete_transmit_sc = wpas_delete_transmit_sc;
    237      1.1  christos 	kay_ctx->create_transmit_sa = wpas_create_transmit_sa;
    238  1.1.1.3  christos 	kay_ctx->delete_transmit_sa = wpas_delete_transmit_sa;
    239      1.1  christos 	kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa;
    240      1.1  christos 	kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa;
    241      1.1  christos 
    242  1.1.1.4  christos 	res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_replay_protect,
    243  1.1.1.4  christos 				  ssid->macsec_replay_window, ssid->macsec_port,
    244  1.1.1.3  christos 				  ssid->mka_priority, wpa_s->ifname,
    245      1.1  christos 				  wpa_s->own_addr);
    246  1.1.1.3  christos 	/* ieee802_1x_kay_init() frees kay_ctx on failure */
    247  1.1.1.3  christos 	if (res == NULL)
    248      1.1  christos 		return -1;
    249      1.1  christos 
    250      1.1  christos 	wpa_s->kay = res;
    251      1.1  christos 
    252      1.1  christos 	return 0;
    253      1.1  christos }
    254      1.1  christos 
    255      1.1  christos 
    256      1.1  christos void ieee802_1x_dealloc_kay_sm(struct wpa_supplicant *wpa_s)
    257      1.1  christos {
    258      1.1  christos 	if (!wpa_s->kay)
    259      1.1  christos 		return;
    260      1.1  christos 
    261      1.1  christos 	ieee802_1x_kay_deinit(wpa_s->kay);
    262      1.1  christos 	wpa_s->kay = NULL;
    263      1.1  christos }
    264      1.1  christos 
    265      1.1  christos 
    266      1.1  christos static int ieee802_1x_auth_get_session_id(struct wpa_supplicant *wpa_s,
    267      1.1  christos 					  const u8 *addr, u8 *sid, size_t *len)
    268      1.1  christos {
    269      1.1  christos 	const u8 *session_id;
    270      1.1  christos 	size_t id_len, need_len;
    271      1.1  christos 
    272      1.1  christos 	session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
    273      1.1  christos 	if (session_id == NULL) {
    274      1.1  christos 		wpa_printf(MSG_DEBUG,
    275      1.1  christos 			   "Failed to get SessionID from EAPOL state machines");
    276      1.1  christos 		return -1;
    277      1.1  christos 	}
    278      1.1  christos 
    279  1.1.1.3  christos 	need_len = 1 + 2 * 32 /* random size */;
    280      1.1  christos 	if (need_len > id_len) {
    281      1.1  christos 		wpa_printf(MSG_DEBUG, "EAP Session-Id not long enough");
    282      1.1  christos 		return -1;
    283      1.1  christos 	}
    284      1.1  christos 
    285      1.1  christos 	os_memcpy(sid, session_id, need_len);
    286      1.1  christos 	*len = need_len;
    287      1.1  christos 
    288      1.1  christos 	return 0;
    289      1.1  christos }
    290      1.1  christos 
    291      1.1  christos 
    292      1.1  christos static int ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr,
    293      1.1  christos 				   u8 *msk, size_t *len)
    294      1.1  christos {
    295      1.1  christos 	u8 key[EAP_MSK_LEN];
    296      1.1  christos 	size_t keylen;
    297      1.1  christos 	struct eapol_sm *sm;
    298      1.1  christos 	int res;
    299      1.1  christos 
    300      1.1  christos 	sm = wpa_s->eapol;
    301      1.1  christos 	if (sm == NULL)
    302      1.1  christos 		return -1;
    303      1.1  christos 
    304      1.1  christos 	keylen = EAP_MSK_LEN;
    305      1.1  christos 	res = eapol_sm_get_key(sm, key, keylen);
    306      1.1  christos 	if (res) {
    307      1.1  christos 		wpa_printf(MSG_DEBUG,
    308      1.1  christos 			   "Failed to get MSK from EAPOL state machines");
    309      1.1  christos 		return -1;
    310      1.1  christos 	}
    311      1.1  christos 
    312      1.1  christos 	if (keylen > *len)
    313      1.1  christos 		keylen = *len;
    314      1.1  christos 	os_memcpy(msk, key, keylen);
    315      1.1  christos 	*len = keylen;
    316      1.1  christos 
    317      1.1  christos 	return 0;
    318      1.1  christos }
    319      1.1  christos 
    320      1.1  christos 
    321      1.1  christos void * ieee802_1x_notify_create_actor(struct wpa_supplicant *wpa_s,
    322      1.1  christos 				      const u8 *peer_addr)
    323      1.1  christos {
    324      1.1  christos 	u8 *sid;
    325      1.1  christos 	size_t sid_len = 128;
    326      1.1  christos 	struct mka_key_name *ckn;
    327      1.1  christos 	struct mka_key *cak;
    328      1.1  christos 	struct mka_key *msk;
    329      1.1  christos 	void *res = NULL;
    330      1.1  christos 
    331      1.1  christos 	if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
    332      1.1  christos 		return NULL;
    333      1.1  christos 
    334      1.1  christos 	wpa_printf(MSG_DEBUG,
    335      1.1  christos 		   "IEEE 802.1X: External notification - Create MKA for "
    336      1.1  christos 		   MACSTR, MAC2STR(peer_addr));
    337      1.1  christos 
    338      1.1  christos 	msk = os_zalloc(sizeof(*msk));
    339      1.1  christos 	sid = os_zalloc(sid_len);
    340      1.1  christos 	ckn = os_zalloc(sizeof(*ckn));
    341      1.1  christos 	cak = os_zalloc(sizeof(*cak));
    342      1.1  christos 	if (!msk || !sid || !ckn || !cak)
    343      1.1  christos 		goto fail;
    344      1.1  christos 
    345      1.1  christos 	msk->len = DEFAULT_KEY_LEN;
    346      1.1  christos 	if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) {
    347      1.1  christos 		wpa_printf(MSG_ERROR, "IEEE 802.1X: Could not get MSK");
    348      1.1  christos 		goto fail;
    349      1.1  christos 	}
    350      1.1  christos 
    351      1.1  christos 	if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len))
    352      1.1  christos 	{
    353      1.1  christos 		wpa_printf(MSG_ERROR,
    354      1.1  christos 			   "IEEE 802.1X: Could not get EAP Session Id");
    355      1.1  christos 		goto fail;
    356      1.1  christos 	}
    357      1.1  christos 
    358      1.1  christos 	/* Derive CAK from MSK */
    359      1.1  christos 	cak->len = DEFAULT_KEY_LEN;
    360  1.1.1.4  christos 	if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr,
    361  1.1.1.4  christos 				    peer_addr, cak->key, cak->len)) {
    362      1.1  christos 		wpa_printf(MSG_ERROR,
    363      1.1  christos 			   "IEEE 802.1X: Deriving CAK failed");
    364      1.1  christos 		goto fail;
    365      1.1  christos 	}
    366      1.1  christos 	wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len);
    367      1.1  christos 
    368      1.1  christos 	/* Derive CKN from MSK */
    369      1.1  christos 	ckn->len = DEFAULT_CKN_LEN;
    370  1.1.1.4  christos 	if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr,
    371  1.1.1.4  christos 				    peer_addr, sid, sid_len, ckn->name)) {
    372      1.1  christos 		wpa_printf(MSG_ERROR,
    373      1.1  christos 			   "IEEE 802.1X: Deriving CKN failed");
    374      1.1  christos 		goto fail;
    375      1.1  christos 	}
    376      1.1  christos 	wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
    377      1.1  christos 
    378      1.1  christos 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
    379      1.1  christos 					EAP_EXCHANGE, FALSE);
    380      1.1  christos 
    381      1.1  christos fail:
    382      1.1  christos 	if (msk) {
    383      1.1  christos 		os_memset(msk, 0, sizeof(*msk));
    384      1.1  christos 		os_free(msk);
    385      1.1  christos 	}
    386      1.1  christos 	os_free(sid);
    387      1.1  christos 	os_free(ckn);
    388      1.1  christos 	if (cak) {
    389      1.1  christos 		os_memset(cak, 0, sizeof(*cak));
    390      1.1  christos 		os_free(cak);
    391      1.1  christos 	}
    392      1.1  christos 
    393      1.1  christos 	return res;
    394      1.1  christos }
    395  1.1.1.3  christos 
    396  1.1.1.3  christos 
    397  1.1.1.3  christos void * ieee802_1x_create_preshared_mka(struct wpa_supplicant *wpa_s,
    398  1.1.1.3  christos 				       struct wpa_ssid *ssid)
    399  1.1.1.3  christos {
    400  1.1.1.3  christos 	struct mka_key *cak;
    401  1.1.1.3  christos 	struct mka_key_name *ckn;
    402  1.1.1.3  christos 	void *res = NULL;
    403  1.1.1.3  christos 
    404  1.1.1.3  christos 	if ((ssid->mka_psk_set & MKA_PSK_SET) != MKA_PSK_SET)
    405  1.1.1.3  christos 		goto end;
    406  1.1.1.3  christos 
    407  1.1.1.3  christos 	ckn = os_zalloc(sizeof(*ckn));
    408  1.1.1.3  christos 	if (!ckn)
    409  1.1.1.3  christos 		goto end;
    410  1.1.1.3  christos 
    411  1.1.1.3  christos 	cak = os_zalloc(sizeof(*cak));
    412  1.1.1.3  christos 	if (!cak)
    413  1.1.1.3  christos 		goto free_ckn;
    414  1.1.1.3  christos 
    415  1.1.1.3  christos 	if (ieee802_1x_alloc_kay_sm(wpa_s, ssid) < 0 || !wpa_s->kay)
    416  1.1.1.3  christos 		goto free_cak;
    417  1.1.1.3  christos 
    418  1.1.1.3  christos 	if (wpa_s->kay->policy == DO_NOT_SECURE)
    419  1.1.1.3  christos 		goto dealloc;
    420  1.1.1.3  christos 
    421  1.1.1.4  christos 	cak->len = ssid->mka_cak_len;
    422  1.1.1.3  christos 	os_memcpy(cak->key, ssid->mka_cak, cak->len);
    423  1.1.1.3  christos 
    424  1.1.1.4  christos 	ckn->len = ssid->mka_ckn_len;
    425  1.1.1.3  christos 	os_memcpy(ckn->name, ssid->mka_ckn, ckn->len);
    426  1.1.1.3  christos 
    427  1.1.1.3  christos 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, FALSE);
    428  1.1.1.3  christos 	if (res)
    429  1.1.1.3  christos 		goto free_cak;
    430  1.1.1.3  christos 
    431  1.1.1.3  christos dealloc:
    432  1.1.1.3  christos 	/* Failed to create MKA */
    433  1.1.1.3  christos 	ieee802_1x_dealloc_kay_sm(wpa_s);
    434  1.1.1.3  christos free_cak:
    435  1.1.1.3  christos 	os_free(cak);
    436  1.1.1.3  christos free_ckn:
    437  1.1.1.3  christos 	os_free(ckn);
    438  1.1.1.3  christos end:
    439  1.1.1.3  christos 	return res;
    440  1.1.1.3  christos }
    441