]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
nl80211: Make KCK attribute optional in rekey data
authorVidyullatha Kanchanapally <vkanchan@qti.qualcomm.com>
Tue, 13 Jun 2017 13:39:08 +0000 (19:09 +0530)
committerJouni Malinen <j@w1.fi>
Fri, 23 Jun 2017 15:58:24 +0000 (18:58 +0300)
New AKM suites like FILS-SHA256 do not use KCK and hence KCK length can
be zero. Add changes to include KCK attribute in rekey data only if the
length is non-zero.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
src/drivers/driver_nl80211.c

index 87776401b2004ee041015b82fe1e449f13484c9e..d18cdeb890844d8ce06befdafc3695db0bd18e6d 100644 (file)
@@ -7755,7 +7755,7 @@ static void nl80211_set_rekey_info(void *priv, const u8 *kek, size_t kek_len,
        if (!(msg = nl80211_bss_msg(bss, 0, NL80211_CMD_SET_REKEY_OFFLOAD)) ||
            !(replay_nested = nla_nest_start(msg, NL80211_ATTR_REKEY_DATA)) ||
            nla_put(msg, NL80211_REKEY_DATA_KEK, kek_len, kek) ||
-           nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck) ||
+           (kck_len && nla_put(msg, NL80211_REKEY_DATA_KCK, kck_len, kck)) ||
            nla_put(msg, NL80211_REKEY_DATA_REPLAY_CTR, NL80211_REPLAY_CTR_LEN,
                    replay_ctr)) {
                nl80211_nlmsg_clear(msg);