|
@@ -8714,6 +8714,154 @@ static void wpas_ctrl_iface_pmksa_flush(struct wpa_supplicant *wpa_s)
|
|
|
}
|
|
|
|
|
|
|
|
|
+#ifdef CONFIG_PMKSA_CACHE_EXTERNAL
|
|
|
+
|
|
|
+static int wpas_ctrl_iface_pmksa_get(struct wpa_supplicant *wpa_s,
|
|
|
+ const char *cmd, char *buf, size_t buflen)
|
|
|
+{
|
|
|
+ struct rsn_pmksa_cache_entry *entry;
|
|
|
+ struct wpa_ssid *ssid;
|
|
|
+ char *pos, *pos2, *end;
|
|
|
+ int ret;
|
|
|
+ struct os_reltime now;
|
|
|
+
|
|
|
+ ssid = wpa_config_get_network(wpa_s->conf, atoi(cmd));
|
|
|
+ if (!ssid)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = buf;
|
|
|
+ end = buf + buflen;
|
|
|
+
|
|
|
+ os_get_reltime(&now);
|
|
|
+
|
|
|
+ /*
|
|
|
+ * Entry format:
|
|
|
+ * <BSSID> <PMKID> <PMK> <reauth_time in seconds>
|
|
|
+ * <expiration in seconds> <akmp> <opportunistic>
|
|
|
+ */
|
|
|
+
|
|
|
+ for (entry = wpa_sm_pmksa_cache_head(wpa_s->wpa); entry;
|
|
|
+ entry = entry->next) {
|
|
|
+ if (entry->network_ctx != ssid)
|
|
|
+ continue;
|
|
|
+
|
|
|
+ pos2 = pos;
|
|
|
+ ret = os_snprintf(pos2, end - pos2, MACSTR " ",
|
|
|
+ MAC2STR(entry->aa));
|
|
|
+ if (os_snprintf_error(end - pos2, ret))
|
|
|
+ break;
|
|
|
+ pos2 += ret;
|
|
|
+
|
|
|
+ pos2 += wpa_snprintf_hex(pos2, end - pos2, entry->pmkid,
|
|
|
+ PMKID_LEN);
|
|
|
+
|
|
|
+ ret = os_snprintf(pos2, end - pos2, " ");
|
|
|
+ if (os_snprintf_error(end - pos2, ret))
|
|
|
+ break;
|
|
|
+ pos2 += ret;
|
|
|
+
|
|
|
+ pos2 += wpa_snprintf_hex(pos2, end - pos2, entry->pmk,
|
|
|
+ entry->pmk_len);
|
|
|
+
|
|
|
+ ret = os_snprintf(pos2, end - pos2, " %d %d %d %d",
|
|
|
+ (int) (entry->reauth_time - now.sec),
|
|
|
+ (int) (entry->expiration - now.sec),
|
|
|
+ entry->akmp,
|
|
|
+ entry->opportunistic);
|
|
|
+ if (os_snprintf_error(end - pos2, ret))
|
|
|
+ break;
|
|
|
+ pos2 += ret;
|
|
|
+
|
|
|
+ ret = os_snprintf(pos2, end - pos2, "\n");
|
|
|
+ if (os_snprintf_error(end - pos2, ret))
|
|
|
+ break;
|
|
|
+ pos2 += ret;
|
|
|
+
|
|
|
+ pos = pos2;
|
|
|
+ }
|
|
|
+
|
|
|
+ return pos - buf;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+static int wpas_ctrl_iface_pmksa_add(struct wpa_supplicant *wpa_s,
|
|
|
+ char *cmd)
|
|
|
+{
|
|
|
+ struct rsn_pmksa_cache_entry *entry;
|
|
|
+ struct wpa_ssid *ssid;
|
|
|
+ char *pos, *pos2;
|
|
|
+ int ret = -1;
|
|
|
+ struct os_reltime now;
|
|
|
+ int reauth_time = 0, expiration = 0;
|
|
|
+
|
|
|
+ /*
|
|
|
+ * Entry format:
|
|
|
+ * <network_id> <BSSID> <PMKID> <PMK> <reauth_time in seconds>
|
|
|
+ * <expiration in seconds> <akmp> <opportunistic>
|
|
|
+ */
|
|
|
+
|
|
|
+ ssid = wpa_config_get_network(wpa_s->conf, atoi(cmd));
|
|
|
+ if (!ssid)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = os_strchr(cmd, ' ');
|
|
|
+ if (!pos)
|
|
|
+ return -1;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ entry = os_zalloc(sizeof(*entry));
|
|
|
+ if (!entry)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ if (hwaddr_aton(pos, entry->aa))
|
|
|
+ goto fail;
|
|
|
+
|
|
|
+ pos = os_strchr(pos, ' ');
|
|
|
+ if (!pos)
|
|
|
+ goto fail;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ if (hexstr2bin(pos, entry->pmkid, PMKID_LEN) < 0)
|
|
|
+ goto fail;
|
|
|
+
|
|
|
+ pos = os_strchr(pos, ' ');
|
|
|
+ if (!pos)
|
|
|
+ goto fail;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ pos2 = os_strchr(pos, ' ');
|
|
|
+ if (!pos2)
|
|
|
+ goto fail;
|
|
|
+ entry->pmk_len = (pos2 - pos) / 2;
|
|
|
+ if (entry->pmk_len < PMK_LEN || entry->pmk_len > PMK_LEN_MAX ||
|
|
|
+ hexstr2bin(pos, entry->pmk, entry->pmk_len) < 0)
|
|
|
+ goto fail;
|
|
|
+
|
|
|
+ pos = os_strchr(pos, ' ');
|
|
|
+ if (!pos)
|
|
|
+ goto fail;
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ if (sscanf(pos, "%d %d %d %d", &reauth_time, &expiration,
|
|
|
+ &entry->akmp, &entry->opportunistic) != 4)
|
|
|
+ goto fail;
|
|
|
+ os_get_reltime(&now);
|
|
|
+ entry->expiration = now.sec + expiration;
|
|
|
+ entry->reauth_time = now.sec + reauth_time;
|
|
|
+
|
|
|
+ entry->network_ctx = ssid;
|
|
|
+
|
|
|
+ wpa_sm_pmksa_cache_add_entry(wpa_s->wpa, entry);
|
|
|
+ entry = NULL;
|
|
|
+ ret = 0;
|
|
|
+fail:
|
|
|
+ os_free(entry);
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+
|
|
|
+#endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
|
|
|
+
|
|
|
+
|
|
|
static int wpas_ctrl_cmd_debug_level(const char *cmd)
|
|
|
{
|
|
|
if (os_strcmp(cmd, "PING") == 0 ||
|
|
@@ -8788,6 +8936,14 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
|
|
|
reply_len = wpas_ctrl_iface_pmksa(wpa_s, reply, reply_size);
|
|
|
} else if (os_strcmp(buf, "PMKSA_FLUSH") == 0) {
|
|
|
wpas_ctrl_iface_pmksa_flush(wpa_s);
|
|
|
+#ifdef CONFIG_PMKSA_CACHE_EXTERNAL
|
|
|
+ } else if (os_strncmp(buf, "PMKSA_GET ", 10) == 0) {
|
|
|
+ reply_len = wpas_ctrl_iface_pmksa_get(wpa_s, buf + 10,
|
|
|
+ reply, reply_size);
|
|
|
+ } else if (os_strncmp(buf, "PMKSA_ADD ", 10) == 0) {
|
|
|
+ if (wpas_ctrl_iface_pmksa_add(wpa_s, buf + 10) < 0)
|
|
|
+ reply_len = -1;
|
|
|
+#endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
|
|
|
} else if (os_strncmp(buf, "SET ", 4) == 0) {
|
|
|
if (wpa_supplicant_ctrl_iface_set(wpa_s, buf + 4))
|
|
|
reply_len = -1;
|