|
@@ -641,6 +641,54 @@ void hostapd_ctrl_iface_pmksa_flush(struct hostapd_data *hapd)
|
|
|
}
|
|
|
|
|
|
|
|
|
+int hostapd_ctrl_iface_pmksa_add(struct hostapd_data *hapd, char *cmd)
|
|
|
+{
|
|
|
+ u8 spa[ETH_ALEN];
|
|
|
+ u8 pmkid[PMKID_LEN];
|
|
|
+ u8 pmk[PMK_LEN_MAX];
|
|
|
+ size_t pmk_len;
|
|
|
+ char *pos, *pos2;
|
|
|
+ int akmp = 0, expiration = 0;
|
|
|
+
|
|
|
+ /*
|
|
|
+ * Entry format:
|
|
|
+ * <STA addr> <PMKID> <PMK> <expiration in seconds> <akmp>
|
|
|
+ */
|
|
|
+
|
|
|
+ if (hwaddr_aton(cmd, spa))
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = os_strchr(cmd, ' ');
|
|
|
+ if (!pos)
|
|
|
+ return -1;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ if (hexstr2bin(pos, pmkid, PMKID_LEN) < 0)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = os_strchr(pos, ' ');
|
|
|
+ if (!pos)
|
|
|
+ return -1;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ pos2 = os_strchr(pos, ' ');
|
|
|
+ if (!pos2)
|
|
|
+ return -1;
|
|
|
+ pmk_len = (pos2 - pos) / 2;
|
|
|
+ if (pmk_len < PMK_LEN || pmk_len > PMK_LEN_MAX ||
|
|
|
+ hexstr2bin(pos, pmk, pmk_len) < 0)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = pos2 + 1;
|
|
|
+
|
|
|
+ if (sscanf(pos, "%d %d", &expiration, &akmp) != 2)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ return wpa_auth_pmksa_add2(hapd->wpa_auth, spa, pmk, pmk_len,
|
|
|
+ pmkid, expiration, akmp);
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
#ifdef CONFIG_PMKSA_CACHE_EXTERNAL
|
|
|
#ifdef CONFIG_MESH
|
|
|
|