esp_wifi: Add support for 802.1x sha256 auth key mode

This commit is contained in:
kapil.gupta
2020-09-10 15:39:54 +05:30
committed by xiehang
parent 37ce175bb5
commit c907da0656
2 changed files with 20 additions and 5 deletions

View File

@ -65,7 +65,8 @@ enum {
WPA2_AUTH_CCKM = 0x07, WPA2_AUTH_CCKM = 0x07,
WPA2_AUTH_PSK_SHA256= 0x08, WPA2_AUTH_PSK_SHA256= 0x08,
WPA3_AUTH_PSK = 0x09, WPA3_AUTH_PSK = 0x09,
WPA2_AUTH_INVALID = 0x0a, WPA2_AUTH_ENT_SHA256= 0x0a,
WPA2_AUTH_INVALID = 0x0b,
}; };
typedef enum { typedef enum {

View File

@ -137,6 +137,20 @@ uint32_t cipher_type_map_public_to_supp(wifi_cipher_type_t cipher)
} }
} }
static bool is_wpa2_enterprise_connection(void)
{
uint8_t authmode;
if (esp_wifi_sta_prof_is_wpa2_internal()) {
authmode = esp_wifi_sta_get_prof_authmode_internal();
if ((authmode == WPA2_AUTH_ENT) || (authmode == WPA2_AUTH_ENT_SHA256)) {
return true;
}
}
return false;
}
/** /**
* get_bssid - Get the current BSSID * get_bssid - Get the current BSSID
* @priv: private driver interface data * @priv: private driver interface data
@ -588,8 +602,7 @@ void wpa_supplicant_process_1_of_4(struct wpa_sm *sm,
if (res) if (res)
goto failed; goto failed;
if (esp_wifi_sta_prof_is_wpa2_internal() && if (is_wpa2_enterprise_connection()) {
esp_wifi_sta_get_prof_authmode_internal() == WPA2_AUTH_ENT) {
pmksa_cache_set_current(sm, NULL, sm->bssid, 0, 0); pmksa_cache_set_current(sm, NULL, sm->bssid, 0, 0);
} }
@ -2087,6 +2100,8 @@ void wpa_set_profile(u32 wpa_proto, u8 auth_mode)
sm->proto = wpa_proto; sm->proto = wpa_proto;
if (auth_mode == WPA2_AUTH_ENT) { if (auth_mode == WPA2_AUTH_ENT) {
sm->key_mgmt = WPA_KEY_MGMT_IEEE8021X; /* for wpa2 enterprise */ sm->key_mgmt = WPA_KEY_MGMT_IEEE8021X; /* for wpa2 enterprise */
} else if (auth_mode == WPA2_AUTH_ENT_SHA256) {
sm->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SHA256; /* for wpa2 enterprise sha256 */
} else if (auth_mode == WPA2_AUTH_PSK_SHA256) { } else if (auth_mode == WPA2_AUTH_PSK_SHA256) {
sm->key_mgmt = WPA_KEY_MGMT_PSK_SHA256; sm->key_mgmt = WPA_KEY_MGMT_PSK_SHA256;
} else if (auth_mode == WPA3_AUTH_PSK) { } else if (auth_mode == WPA3_AUTH_PSK) {
@ -2126,8 +2141,7 @@ int wpa_set_bss(char *macddr, char * bssid, u8 pairwise_cipher, u8 group_cipher,
sm->ap_notify_completed_rsne = esp_wifi_sta_is_ap_notify_completed_rsne_internal(); sm->ap_notify_completed_rsne = esp_wifi_sta_is_ap_notify_completed_rsne_internal();
if (sm->key_mgmt == WPA_KEY_MGMT_SAE || if (sm->key_mgmt == WPA_KEY_MGMT_SAE ||
(esp_wifi_sta_prof_is_wpa2_internal() && is_wpa2_enterprise_connection()) {
esp_wifi_sta_get_prof_authmode_internal() == WPA2_AUTH_ENT)) {
if (!esp_wifi_skip_supp_pmkcaching()) { if (!esp_wifi_skip_supp_pmkcaching()) {
pmksa_cache_set_current(sm, NULL, (const u8*) bssid, 0, 0); pmksa_cache_set_current(sm, NULL, (const u8*) bssid, 0, 0);
wpa_sm_set_pmk_from_pmksa(sm); wpa_sm_set_pmk_from_pmksa(sm);