Home | History | Annotate | Line # | Download | only in wpa_supplicant
wpas_kay.c revision 1.1.1.4.8.1
      1          1.1  christos /*
      2          1.1  christos  * IEEE 802.1X-2010 KaY Interface
      3          1.1  christos  * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
      4          1.1  christos  *
      5          1.1  christos  * This software may be distributed under the terms of the BSD license.
      6          1.1  christos  * See README for more details.
      7          1.1  christos  */
      8      1.1.1.3  christos 
      9          1.1  christos #include "utils/includes.h"
     10          1.1  christos 
     11          1.1  christos #include "utils/common.h"
     12          1.1  christos #include "eap_peer/eap.h"
     13          1.1  christos #include "eap_peer/eap_i.h"
     14          1.1  christos #include "eapol_supp/eapol_supp_sm.h"
     15          1.1  christos #include "pae/ieee802_1x_key.h"
     16          1.1  christos #include "pae/ieee802_1x_kay.h"
     17          1.1  christos #include "wpa_supplicant_i.h"
     18          1.1  christos #include "config.h"
     19          1.1  christos #include "config_ssid.h"
     20          1.1  christos #include "driver_i.h"
     21          1.1  christos #include "wpas_kay.h"
     22          1.1  christos 
     23          1.1  christos 
     24          1.1  christos #define DEFAULT_KEY_LEN		16
     25          1.1  christos /* secure Connectivity Association Key Name (CKN) */
     26          1.1  christos #define DEFAULT_CKN_LEN		16
     27          1.1  christos 
     28          1.1  christos 
     29          1.1  christos static int wpas_macsec_init(void *priv, struct macsec_init_params *params)
     30          1.1  christos {
     31          1.1  christos 	return wpa_drv_macsec_init(priv, params);
     32          1.1  christos }
     33          1.1  christos 
     34          1.1  christos 
     35          1.1  christos static int wpas_macsec_deinit(void *priv)
     36          1.1  christos {
     37          1.1  christos 	return wpa_drv_macsec_deinit(priv);
     38          1.1  christos }
     39          1.1  christos 
     40          1.1  christos 
     41      1.1.1.3  christos static int wpas_macsec_get_capability(void *priv, enum macsec_cap *cap)
     42      1.1.1.3  christos {
     43      1.1.1.3  christos 	return wpa_drv_macsec_get_capability(priv, cap);
     44      1.1.1.3  christos }
     45      1.1.1.3  christos 
     46      1.1.1.3  christos 
     47  1.1.1.4.8.1  perseant static int wpas_enable_protect_frames(void *wpa_s, bool enabled)
     48          1.1  christos {
     49          1.1  christos 	return wpa_drv_enable_protect_frames(wpa_s, enabled);
     50          1.1  christos }
     51          1.1  christos 
     52          1.1  christos 
     53  1.1.1.4.8.1  perseant static int wpas_enable_encrypt(void *wpa_s, bool enabled)
     54      1.1.1.3  christos {
     55      1.1.1.3  christos 	return wpa_drv_enable_encrypt(wpa_s, enabled);
     56      1.1.1.3  christos }
     57      1.1.1.3  christos 
     58      1.1.1.3  christos 
     59  1.1.1.4.8.1  perseant static int wpas_set_replay_protect(void *wpa_s, bool enabled, u32 window)
     60          1.1  christos {
     61          1.1  christos 	return wpa_drv_set_replay_protect(wpa_s, enabled, window);
     62          1.1  christos }
     63          1.1  christos 
     64          1.1  christos 
     65      1.1.1.2  christos static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs)
     66          1.1  christos {
     67      1.1.1.2  christos 	return wpa_drv_set_current_cipher_suite(wpa_s, cs);
     68          1.1  christos }
     69          1.1  christos 
     70          1.1  christos 
     71  1.1.1.4.8.1  perseant static int wpas_enable_controlled_port(void *wpa_s, bool enabled)
     72          1.1  christos {
     73          1.1  christos 	return wpa_drv_enable_controlled_port(wpa_s, enabled);
     74          1.1  christos }
     75          1.1  christos 
     76          1.1  christos 
     77      1.1.1.3  christos static int wpas_get_receive_lowest_pn(void *wpa_s, struct receive_sa *sa)
     78          1.1  christos {
     79      1.1.1.3  christos 	return wpa_drv_get_receive_lowest_pn(wpa_s, sa);
     80          1.1  christos }
     81          1.1  christos 
     82          1.1  christos 
     83      1.1.1.3  christos static int wpas_get_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     84          1.1  christos {
     85      1.1.1.3  christos 	return wpa_drv_get_transmit_next_pn(wpa_s, sa);
     86          1.1  christos }
     87          1.1  christos 
     88          1.1  christos 
     89      1.1.1.3  christos static int wpas_set_transmit_next_pn(void *wpa_s, struct transmit_sa *sa)
     90          1.1  christos {
     91      1.1.1.3  christos 	return wpa_drv_set_transmit_next_pn(wpa_s, sa);
     92          1.1  christos }
     93          1.1  christos 
     94          1.1  christos 
     95      1.1.1.4  christos static int wpas_set_receive_lowest_pn(void *wpa_s, struct receive_sa *sa)
     96      1.1.1.4  christos {
     97      1.1.1.4  christos 	return wpa_drv_set_receive_lowest_pn(wpa_s, sa);
     98      1.1.1.4  christos }
     99      1.1.1.4  christos 
    100      1.1.1.4  christos 
    101  1.1.1.4.8.1  perseant static int wpas_set_offload(void *wpa_s, u8 offload)
    102  1.1.1.4.8.1  perseant {
    103  1.1.1.4.8.1  perseant 	return wpa_drv_set_offload(wpa_s, offload);
    104  1.1.1.4.8.1  perseant }
    105  1.1.1.4.8.1  perseant 
    106  1.1.1.4.8.1  perseant 
    107          1.1  christos static unsigned int conf_offset_val(enum confidentiality_offset co)
    108          1.1  christos {
    109          1.1  christos 	switch (co) {
    110          1.1  christos 	case CONFIDENTIALITY_OFFSET_30:
    111          1.1  christos 		return 30;
    112          1.1  christos 	case CONFIDENTIALITY_OFFSET_50:
    113          1.1  christos 		return 50;
    114          1.1  christos 	default:
    115          1.1  christos 		return 0;
    116          1.1  christos 	}
    117          1.1  christos }
    118          1.1  christos 
    119          1.1  christos 
    120      1.1.1.3  christos static int wpas_create_receive_sc(void *wpa_s, struct receive_sc *sc,
    121          1.1  christos 				  enum validate_frames vf,
    122          1.1  christos 				  enum confidentiality_offset co)
    123          1.1  christos {
    124      1.1.1.3  christos 	return wpa_drv_create_receive_sc(wpa_s, sc, conf_offset_val(co), vf);
    125          1.1  christos }
    126          1.1  christos 
    127          1.1  christos 
    128      1.1.1.3  christos static int wpas_delete_receive_sc(void *wpa_s, struct receive_sc *sc)
    129          1.1  christos {
    130      1.1.1.3  christos 	return wpa_drv_delete_receive_sc(wpa_s, sc);
    131          1.1  christos }
    132          1.1  christos 
    133          1.1  christos 
    134      1.1.1.3  christos static int wpas_create_receive_sa(void *wpa_s, struct receive_sa *sa)
    135          1.1  christos {
    136      1.1.1.3  christos 	return wpa_drv_create_receive_sa(wpa_s, sa);
    137          1.1  christos }
    138          1.1  christos 
    139          1.1  christos 
    140      1.1.1.3  christos static int wpas_delete_receive_sa(void *wpa_s, struct receive_sa *sa)
    141          1.1  christos {
    142      1.1.1.3  christos 	return wpa_drv_delete_receive_sa(wpa_s, sa);
    143          1.1  christos }
    144          1.1  christos 
    145          1.1  christos 
    146      1.1.1.3  christos static int wpas_enable_receive_sa(void *wpa_s, struct receive_sa *sa)
    147          1.1  christos {
    148      1.1.1.3  christos 	return wpa_drv_enable_receive_sa(wpa_s, sa);
    149          1.1  christos }
    150          1.1  christos 
    151          1.1  christos 
    152      1.1.1.3  christos static int wpas_disable_receive_sa(void *wpa_s, struct receive_sa *sa)
    153          1.1  christos {
    154      1.1.1.3  christos 	return wpa_drv_disable_receive_sa(wpa_s, sa);
    155          1.1  christos }
    156          1.1  christos 
    157          1.1  christos 
    158          1.1  christos static int
    159      1.1.1.3  christos wpas_create_transmit_sc(void *wpa_s, struct transmit_sc *sc,
    160          1.1  christos 			enum confidentiality_offset co)
    161          1.1  christos {
    162      1.1.1.3  christos 	return wpa_drv_create_transmit_sc(wpa_s, sc, conf_offset_val(co));
    163      1.1.1.3  christos }
    164      1.1.1.3  christos 
    165      1.1.1.3  christos 
    166      1.1.1.3  christos static int wpas_delete_transmit_sc(void *wpa_s, struct transmit_sc *sc)
    167      1.1.1.3  christos {
    168      1.1.1.3  christos 	return wpa_drv_delete_transmit_sc(wpa_s, sc);
    169          1.1  christos }
    170          1.1  christos 
    171          1.1  christos 
    172      1.1.1.3  christos static int wpas_create_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    173          1.1  christos {
    174      1.1.1.3  christos 	return wpa_drv_create_transmit_sa(wpa_s, sa);
    175          1.1  christos }
    176          1.1  christos 
    177          1.1  christos 
    178      1.1.1.3  christos static int wpas_delete_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    179          1.1  christos {
    180      1.1.1.3  christos 	return wpa_drv_delete_transmit_sa(wpa_s, sa);
    181          1.1  christos }
    182          1.1  christos 
    183          1.1  christos 
    184      1.1.1.3  christos static int wpas_enable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    185          1.1  christos {
    186      1.1.1.3  christos 	return wpa_drv_enable_transmit_sa(wpa_s, sa);
    187          1.1  christos }
    188          1.1  christos 
    189          1.1  christos 
    190      1.1.1.3  christos static int wpas_disable_transmit_sa(void *wpa_s, struct transmit_sa *sa)
    191          1.1  christos {
    192      1.1.1.3  christos 	return wpa_drv_disable_transmit_sa(wpa_s, sa);
    193          1.1  christos }
    194          1.1  christos 
    195          1.1  christos 
    196          1.1  christos int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
    197          1.1  christos {
    198          1.1  christos 	struct ieee802_1x_kay_ctx *kay_ctx;
    199          1.1  christos 	struct ieee802_1x_kay *res = NULL;
    200          1.1  christos 	enum macsec_policy policy;
    201          1.1  christos 
    202          1.1  christos 	ieee802_1x_dealloc_kay_sm(wpa_s);
    203          1.1  christos 
    204          1.1  christos 	if (!ssid || ssid->macsec_policy == 0)
    205          1.1  christos 		return 0;
    206          1.1  christos 
    207      1.1.1.3  christos 	if (ssid->macsec_policy == 1) {
    208      1.1.1.3  christos 		if (ssid->macsec_integ_only == 1)
    209      1.1.1.3  christos 			policy = SHOULD_SECURE;
    210      1.1.1.3  christos 		else
    211      1.1.1.3  christos 			policy = SHOULD_ENCRYPT;
    212      1.1.1.3  christos 	} else {
    213      1.1.1.3  christos 		policy = DO_NOT_SECURE;
    214      1.1.1.3  christos 	}
    215          1.1  christos 
    216          1.1  christos 	kay_ctx = os_zalloc(sizeof(*kay_ctx));
    217          1.1  christos 	if (!kay_ctx)
    218          1.1  christos 		return -1;
    219          1.1  christos 
    220          1.1  christos 	kay_ctx->ctx = wpa_s;
    221          1.1  christos 
    222          1.1  christos 	kay_ctx->macsec_init = wpas_macsec_init;
    223          1.1  christos 	kay_ctx->macsec_deinit = wpas_macsec_deinit;
    224      1.1.1.3  christos 	kay_ctx->macsec_get_capability = wpas_macsec_get_capability;
    225          1.1  christos 	kay_ctx->enable_protect_frames = wpas_enable_protect_frames;
    226      1.1.1.3  christos 	kay_ctx->enable_encrypt = wpas_enable_encrypt;
    227          1.1  christos 	kay_ctx->set_replay_protect = wpas_set_replay_protect;
    228  1.1.1.4.8.1  perseant 	kay_ctx->set_offload = wpas_set_offload;
    229          1.1  christos 	kay_ctx->set_current_cipher_suite = wpas_set_current_cipher_suite;
    230          1.1  christos 	kay_ctx->enable_controlled_port = wpas_enable_controlled_port;
    231          1.1  christos 	kay_ctx->get_receive_lowest_pn = wpas_get_receive_lowest_pn;
    232          1.1  christos 	kay_ctx->get_transmit_next_pn = wpas_get_transmit_next_pn;
    233          1.1  christos 	kay_ctx->set_transmit_next_pn = wpas_set_transmit_next_pn;
    234      1.1.1.4  christos 	kay_ctx->set_receive_lowest_pn = wpas_set_receive_lowest_pn;
    235          1.1  christos 	kay_ctx->create_receive_sc = wpas_create_receive_sc;
    236          1.1  christos 	kay_ctx->delete_receive_sc = wpas_delete_receive_sc;
    237          1.1  christos 	kay_ctx->create_receive_sa = wpas_create_receive_sa;
    238      1.1.1.3  christos 	kay_ctx->delete_receive_sa = wpas_delete_receive_sa;
    239          1.1  christos 	kay_ctx->enable_receive_sa = wpas_enable_receive_sa;
    240          1.1  christos 	kay_ctx->disable_receive_sa = wpas_disable_receive_sa;
    241          1.1  christos 	kay_ctx->create_transmit_sc = wpas_create_transmit_sc;
    242          1.1  christos 	kay_ctx->delete_transmit_sc = wpas_delete_transmit_sc;
    243          1.1  christos 	kay_ctx->create_transmit_sa = wpas_create_transmit_sa;
    244      1.1.1.3  christos 	kay_ctx->delete_transmit_sa = wpas_delete_transmit_sa;
    245          1.1  christos 	kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa;
    246          1.1  christos 	kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa;
    247          1.1  christos 
    248      1.1.1.4  christos 	res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_replay_protect,
    249  1.1.1.4.8.1  perseant 				  ssid->macsec_replay_window,
    250  1.1.1.4.8.1  perseant 				  ssid->macsec_offload, ssid->macsec_port,
    251  1.1.1.4.8.1  perseant 				  ssid->mka_priority, ssid->macsec_csindex,
    252  1.1.1.4.8.1  perseant 				  wpa_s->ifname, wpa_s->own_addr);
    253      1.1.1.3  christos 	/* ieee802_1x_kay_init() frees kay_ctx on failure */
    254      1.1.1.3  christos 	if (res == NULL)
    255          1.1  christos 		return -1;
    256          1.1  christos 
    257          1.1  christos 	wpa_s->kay = res;
    258          1.1  christos 
    259          1.1  christos 	return 0;
    260          1.1  christos }
    261          1.1  christos 
    262          1.1  christos 
    263          1.1  christos void ieee802_1x_dealloc_kay_sm(struct wpa_supplicant *wpa_s)
    264          1.1  christos {
    265          1.1  christos 	if (!wpa_s->kay)
    266          1.1  christos 		return;
    267          1.1  christos 
    268          1.1  christos 	ieee802_1x_kay_deinit(wpa_s->kay);
    269          1.1  christos 	wpa_s->kay = NULL;
    270          1.1  christos }
    271          1.1  christos 
    272          1.1  christos 
    273          1.1  christos static int ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr,
    274          1.1  christos 				   u8 *msk, size_t *len)
    275          1.1  christos {
    276          1.1  christos 	u8 key[EAP_MSK_LEN];
    277          1.1  christos 	size_t keylen;
    278          1.1  christos 	struct eapol_sm *sm;
    279          1.1  christos 	int res;
    280          1.1  christos 
    281          1.1  christos 	sm = wpa_s->eapol;
    282          1.1  christos 	if (sm == NULL)
    283          1.1  christos 		return -1;
    284          1.1  christos 
    285          1.1  christos 	keylen = EAP_MSK_LEN;
    286          1.1  christos 	res = eapol_sm_get_key(sm, key, keylen);
    287          1.1  christos 	if (res) {
    288          1.1  christos 		wpa_printf(MSG_DEBUG,
    289          1.1  christos 			   "Failed to get MSK from EAPOL state machines");
    290          1.1  christos 		return -1;
    291          1.1  christos 	}
    292          1.1  christos 
    293          1.1  christos 	if (keylen > *len)
    294          1.1  christos 		keylen = *len;
    295          1.1  christos 	os_memcpy(msk, key, keylen);
    296          1.1  christos 	*len = keylen;
    297          1.1  christos 
    298          1.1  christos 	return 0;
    299          1.1  christos }
    300          1.1  christos 
    301          1.1  christos 
    302          1.1  christos void * ieee802_1x_notify_create_actor(struct wpa_supplicant *wpa_s,
    303          1.1  christos 				      const u8 *peer_addr)
    304          1.1  christos {
    305  1.1.1.4.8.1  perseant 	const u8 *sid;
    306  1.1.1.4.8.1  perseant 	size_t sid_len;
    307          1.1  christos 	struct mka_key_name *ckn;
    308          1.1  christos 	struct mka_key *cak;
    309          1.1  christos 	struct mka_key *msk;
    310          1.1  christos 	void *res = NULL;
    311          1.1  christos 
    312          1.1  christos 	if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
    313          1.1  christos 		return NULL;
    314          1.1  christos 
    315          1.1  christos 	wpa_printf(MSG_DEBUG,
    316          1.1  christos 		   "IEEE 802.1X: External notification - Create MKA for "
    317          1.1  christos 		   MACSTR, MAC2STR(peer_addr));
    318          1.1  christos 
    319          1.1  christos 	msk = os_zalloc(sizeof(*msk));
    320          1.1  christos 	ckn = os_zalloc(sizeof(*ckn));
    321          1.1  christos 	cak = os_zalloc(sizeof(*cak));
    322  1.1.1.4.8.1  perseant 	if (!msk || !ckn || !cak)
    323          1.1  christos 		goto fail;
    324          1.1  christos 
    325          1.1  christos 	msk->len = DEFAULT_KEY_LEN;
    326          1.1  christos 	if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) {
    327          1.1  christos 		wpa_printf(MSG_ERROR, "IEEE 802.1X: Could not get MSK");
    328          1.1  christos 		goto fail;
    329          1.1  christos 	}
    330          1.1  christos 
    331  1.1.1.4.8.1  perseant 	sid = eapol_sm_get_session_id(wpa_s->eapol, &sid_len);
    332  1.1.1.4.8.1  perseant 	if (!sid) {
    333          1.1  christos 		wpa_printf(MSG_ERROR,
    334          1.1  christos 			   "IEEE 802.1X: Could not get EAP Session Id");
    335          1.1  christos 		goto fail;
    336          1.1  christos 	}
    337          1.1  christos 
    338          1.1  christos 	/* Derive CAK from MSK */
    339          1.1  christos 	cak->len = DEFAULT_KEY_LEN;
    340      1.1.1.4  christos 	if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr,
    341      1.1.1.4  christos 				    peer_addr, cak->key, cak->len)) {
    342          1.1  christos 		wpa_printf(MSG_ERROR,
    343          1.1  christos 			   "IEEE 802.1X: Deriving CAK failed");
    344          1.1  christos 		goto fail;
    345          1.1  christos 	}
    346          1.1  christos 	wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len);
    347          1.1  christos 
    348          1.1  christos 	/* Derive CKN from MSK */
    349          1.1  christos 	ckn->len = DEFAULT_CKN_LEN;
    350      1.1.1.4  christos 	if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr,
    351      1.1.1.4  christos 				    peer_addr, sid, sid_len, ckn->name)) {
    352          1.1  christos 		wpa_printf(MSG_ERROR,
    353          1.1  christos 			   "IEEE 802.1X: Deriving CKN failed");
    354          1.1  christos 		goto fail;
    355          1.1  christos 	}
    356          1.1  christos 	wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len);
    357          1.1  christos 
    358          1.1  christos 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0,
    359  1.1.1.4.8.1  perseant 					EAP_EXCHANGE, false);
    360          1.1  christos 
    361          1.1  christos fail:
    362          1.1  christos 	if (msk) {
    363          1.1  christos 		os_memset(msk, 0, sizeof(*msk));
    364          1.1  christos 		os_free(msk);
    365          1.1  christos 	}
    366          1.1  christos 	os_free(ckn);
    367          1.1  christos 	if (cak) {
    368          1.1  christos 		os_memset(cak, 0, sizeof(*cak));
    369          1.1  christos 		os_free(cak);
    370          1.1  christos 	}
    371          1.1  christos 
    372          1.1  christos 	return res;
    373          1.1  christos }
    374      1.1.1.3  christos 
    375      1.1.1.3  christos 
    376      1.1.1.3  christos void * ieee802_1x_create_preshared_mka(struct wpa_supplicant *wpa_s,
    377      1.1.1.3  christos 				       struct wpa_ssid *ssid)
    378      1.1.1.3  christos {
    379      1.1.1.3  christos 	struct mka_key *cak;
    380      1.1.1.3  christos 	struct mka_key_name *ckn;
    381      1.1.1.3  christos 	void *res = NULL;
    382      1.1.1.3  christos 
    383      1.1.1.3  christos 	if ((ssid->mka_psk_set & MKA_PSK_SET) != MKA_PSK_SET)
    384      1.1.1.3  christos 		goto end;
    385      1.1.1.3  christos 
    386      1.1.1.3  christos 	ckn = os_zalloc(sizeof(*ckn));
    387      1.1.1.3  christos 	if (!ckn)
    388      1.1.1.3  christos 		goto end;
    389      1.1.1.3  christos 
    390      1.1.1.3  christos 	cak = os_zalloc(sizeof(*cak));
    391      1.1.1.3  christos 	if (!cak)
    392      1.1.1.3  christos 		goto free_ckn;
    393      1.1.1.3  christos 
    394      1.1.1.3  christos 	if (ieee802_1x_alloc_kay_sm(wpa_s, ssid) < 0 || !wpa_s->kay)
    395      1.1.1.3  christos 		goto free_cak;
    396      1.1.1.3  christos 
    397      1.1.1.3  christos 	if (wpa_s->kay->policy == DO_NOT_SECURE)
    398      1.1.1.3  christos 		goto dealloc;
    399      1.1.1.3  christos 
    400      1.1.1.4  christos 	cak->len = ssid->mka_cak_len;
    401      1.1.1.3  christos 	os_memcpy(cak->key, ssid->mka_cak, cak->len);
    402      1.1.1.3  christos 
    403      1.1.1.4  christos 	ckn->len = ssid->mka_ckn_len;
    404      1.1.1.3  christos 	os_memcpy(ckn->name, ssid->mka_ckn, ckn->len);
    405      1.1.1.3  christos 
    406  1.1.1.4.8.1  perseant 	res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, false);
    407      1.1.1.3  christos 	if (res)
    408      1.1.1.3  christos 		goto free_cak;
    409      1.1.1.3  christos 
    410      1.1.1.3  christos dealloc:
    411      1.1.1.3  christos 	/* Failed to create MKA */
    412      1.1.1.3  christos 	ieee802_1x_dealloc_kay_sm(wpa_s);
    413      1.1.1.3  christos free_cak:
    414      1.1.1.3  christos 	os_free(cak);
    415      1.1.1.3  christos free_ckn:
    416      1.1.1.3  christos 	os_free(ckn);
    417      1.1.1.3  christos end:
    418      1.1.1.3  christos 	return res;
    419      1.1.1.3  christos }
    420