/* * wpa_supplicant - WPA2/RSN PMKSA cache functions * Copyright (c) 2003-2009, 2011-2012, Jouni Malinen * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #ifndef PMKSA_CACHE_H #define PMKSA_CACHE_H /** * struct rsn_pmksa_cache_entry - PMKSA cache entry */ struct rsn_pmksa_cache_entry { struct rsn_pmksa_cache_entry *next; u8 pmkid[PMKID_LEN]; u8 pmk[PMK_LEN_MAX]; size_t pmk_len; u8 kck[WPA_KCK_MAX_LEN]; size_t kck_len; os_time_t expiration; int akmp; /* WPA_KEY_MGMT_* */ u8 aa[ETH_ALEN]; u8 spa[ETH_ALEN]; /* * If FILS Cache Identifier is included (fils_cache_id_set), this PMKSA * cache entry is applicable to all BSSs (any BSSID/aa[]) that * advertise the same FILS Cache Identifier within the same ESS. */ u8 fils_cache_id[2]; unsigned int fils_cache_id_set:1; unsigned int dpp_pfs:1; os_time_t reauth_time; /** * network_ctx - Network configuration context * * This field is only used to match PMKSA cache entries to a specific * network configuration (e.g., a specific SSID and security policy). * This can be a pointer to the configuration entry, but PMKSA caching * code does not dereference the value and this could be any kind of * identifier. */ void *network_ctx; int opportunistic; bool external; /** * This field is used to avoid duplicate pmksa_cache_reauth() calls for * every 10 minutes during the periodic expiration check of the current * PMKSA for SAE. */ bool sae_reauth_scheduled; }; struct rsn_pmksa_cache; enum pmksa_free_reason { PMKSA_FREE, PMKSA_REPLACE, PMKSA_EXPIRE, }; struct rsn_pmksa_cache * pmksa_cache_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx, enum pmksa_free_reason reason), bool (*is_current_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx), void (*notify_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx), void *ctx, struct wpa_sm *sm); void pmksa_cache_deinit(struct rsn_pmksa_cache *pmksa); struct rsn_pmksa_cache_entry * pmksa_cache_get(struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *spa, const u8 *pmkid, const void *network_ctx, int akmp); int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len); struct rsn_pmksa_cache_entry * pmksa_cache_head(struct rsn_pmksa_cache *pmksa); struct rsn_pmksa_cache_entry * pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, const u8 *pmkid, const u8 *kck, size_t kck_len, const u8 *aa, const u8 *spa, void *network_ctx, int akmp, const u8 *cache_id); struct rsn_pmksa_cache_entry * pmksa_cache_add_entry(struct rsn_pmksa_cache *pmksa, struct rsn_pmksa_cache_entry *entry); struct rsn_pmksa_cache_entry * pmksa_cache_get_current(struct wpa_sm *sm); void pmksa_cache_clear_current(struct wpa_sm *sm); int pmksa_cache_set_current(struct wpa_sm *sm, const u8 *pmkid, const u8 *bssid, void *network_ctx, int try_opportunistic, const u8 *fils_cache_id, int akmp, bool associated); struct rsn_pmksa_cache_entry * pmksa_cache_get_opportunistic(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *aa, int akmp); void pmksa_cache_flush(struct rsn_pmksa_cache *pmksa, void *network_ctx, const u8 *pmk, size_t pmk_len, bool external_only); void pmksa_cache_remove(struct rsn_pmksa_cache *pmksa, struct rsn_pmksa_cache_entry *entry); void pmksa_cache_reconfig(struct rsn_pmksa_cache *pmksa); #endif /* PMKSA_CACHE_H */