|
@@ -329,6 +329,7 @@ static int wpa_ft_pull_pmk_r1(struct wpa_authenticator *wpa_auth,
|
|
|
os_memcpy(f.pmk_r0_name, pmk_r0_name, WPA_PMK_NAME_LEN);
|
|
|
os_memcpy(f.r1kh_id, wpa_auth->conf.r1_key_holder, FT_R1KH_ID_LEN);
|
|
|
os_memcpy(f.s1kh_id, s1kh_id, ETH_ALEN);
|
|
|
+ os_memset(f.pad, 0, sizeof(f.pad));
|
|
|
|
|
|
if (aes_wrap(r0kh->key, (FT_R0KH_R1KH_PULL_DATA_LEN + 7) / 8,
|
|
|
f.nonce, frame.nonce) < 0)
|
|
@@ -1317,6 +1318,7 @@ static int wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth,
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: PMKR1Name", r.pmk_r1_name,
|
|
|
WPA_PMK_NAME_LEN);
|
|
|
r.pairwise = host_to_le16(pairwise);
|
|
|
+ os_memset(r.pad, 0, sizeof(r.pad));
|
|
|
|
|
|
if (aes_wrap(r1kh->key, (FT_R0KH_R1KH_RESP_DATA_LEN + 7) / 8,
|
|
|
r.nonce, resp.nonce) < 0) {
|
|
@@ -1620,6 +1622,7 @@ static void wpa_ft_generate_pmk_r1(struct wpa_authenticator *wpa_auth,
|
|
|
os_get_time(&now);
|
|
|
WPA_PUT_LE32(f.timestamp, now.sec);
|
|
|
f.pairwise = host_to_le16(pairwise);
|
|
|
+ os_memset(f.pad, 0, sizeof(f.pad));
|
|
|
if (aes_wrap(r1kh->key, (FT_R0KH_R1KH_PUSH_DATA_LEN + 7) / 8,
|
|
|
f.timestamp, frame.timestamp) < 0)
|
|
|
return;
|