|
|
@@ -104,6 +104,9 @@ wifi_cipher_type_t cipher_type_map_supp_to_public(unsigned wpa_cipher)
|
|
|
case WPA_CIPHER_AES_128_CMAC:
|
|
|
return WIFI_CIPHER_TYPE_AES_CMAC128;
|
|
|
|
|
|
+ case WPA_CIPHER_SMS4:
|
|
|
+ return WIFI_CIPHER_TYPE_SMS4;
|
|
|
+
|
|
|
default:
|
|
|
return WIFI_CIPHER_TYPE_UNKNOWN;
|
|
|
}
|
|
|
@@ -133,6 +136,9 @@ unsigned cipher_type_map_public_to_supp(wifi_cipher_type_t cipher)
|
|
|
case WIFI_CIPHER_TYPE_AES_CMAC128:
|
|
|
return WPA_CIPHER_AES_128_CMAC;
|
|
|
|
|
|
+ case WIFI_CIPHER_TYPE_SMS4:
|
|
|
+ return WPA_CIPHER_SMS4;
|
|
|
+
|
|
|
default:
|
|
|
return WPA_CIPHER_NONE;
|
|
|
}
|
|
|
@@ -663,11 +669,11 @@ int wpa_supplicant_install_ptk(struct wpa_sm *sm)
|
|
|
|
|
|
switch (sm->pairwise_cipher) {
|
|
|
case WPA_CIPHER_CCMP:
|
|
|
- alg = WPA_ALG_CCMP;
|
|
|
+ alg = WIFI_WPA_ALG_CCMP;
|
|
|
keylen = 16;
|
|
|
break;
|
|
|
case WPA_CIPHER_TKIP:
|
|
|
- alg = WPA_ALG_TKIP;
|
|
|
+ alg = WIFI_WPA_ALG_TKIP;
|
|
|
keylen = 32;
|
|
|
break;
|
|
|
case WPA_CIPHER_NONE:
|
|
|
@@ -720,7 +726,7 @@ int wpa_supplicant_check_group_cipher(int group_cipher,
|
|
|
break;
|
|
|
}
|
|
|
*key_rsc_len = 6;
|
|
|
- *alg = WPA_ALG_CCMP;
|
|
|
+ *alg = WIFI_WPA_ALG_CCMP;
|
|
|
break;
|
|
|
case WPA_CIPHER_TKIP:
|
|
|
if (keylen != 32 || maxkeylen < 32) {
|
|
|
@@ -728,7 +734,7 @@ int wpa_supplicant_check_group_cipher(int group_cipher,
|
|
|
break;
|
|
|
}
|
|
|
*key_rsc_len = 6;
|
|
|
- *alg = WPA_ALG_TKIP;
|
|
|
+ *alg = WIFI_WPA_ALG_TKIP;
|
|
|
break;
|
|
|
case WPA_CIPHER_WEP104:
|
|
|
if (keylen != 13 || maxkeylen < 13) {
|
|
|
@@ -736,7 +742,7 @@ int wpa_supplicant_check_group_cipher(int group_cipher,
|
|
|
break;
|
|
|
}
|
|
|
*key_rsc_len = 0;
|
|
|
- *alg = WPA_ALG_WEP104;
|
|
|
+ *alg = WIFI_WPA_ALG_WEP104;
|
|
|
break;
|
|
|
case WPA_CIPHER_WEP40:
|
|
|
if (keylen != 5 || maxkeylen < 5) {
|
|
|
@@ -744,7 +750,7 @@ int wpa_supplicant_check_group_cipher(int group_cipher,
|
|
|
break;
|
|
|
}
|
|
|
*key_rsc_len = 0;
|
|
|
- *alg = WPA_ALG_WEP40;
|
|
|
+ *alg = WIFI_WPA_ALG_WEP40;
|
|
|
break;
|
|
|
default:
|
|
|
#ifdef DEBUG_PRINT
|
|
|
@@ -2113,6 +2119,8 @@ void wpa_set_profile(u32 wpa_proto, u8 auth_mode)
|
|
|
sm->key_mgmt = WPA_KEY_MGMT_PSK_SHA256;
|
|
|
} else if (auth_mode == WPA3_AUTH_PSK) {
|
|
|
sm->key_mgmt = WPA_KEY_MGMT_SAE; /* for WPA3 PSK */
|
|
|
+ } else if (auth_mode == WAPI_AUTH_PSK) {
|
|
|
+ sm->key_mgmt = WPA_KEY_MGMT_WAPI_PSK; /* for WAPI PSK */
|
|
|
} else {
|
|
|
sm->key_mgmt = WPA_KEY_MGMT_PSK; /* fixed to PSK for now */
|
|
|
}
|
|
|
@@ -2251,7 +2259,7 @@ wpa_sm_set_key(struct install_key *key_sm, enum wpa_alg alg,
|
|
|
struct wpa_sm *sm = &gWpaSm;
|
|
|
|
|
|
/*gtk or ptk both need check countermeasures*/
|
|
|
- if (alg == WPA_ALG_TKIP && key_len == 32) {
|
|
|
+ if (alg == WIFI_WPA_ALG_TKIP && key_len == 32) {
|
|
|
/* Clear the MIC error counter when setting a new PTK. */
|
|
|
key_sm->mic_errors_seen = 0;
|
|
|
}
|