Blame SOURCES/macsec-0017-wpa_supplicant-Allow-configuring-the-MACsec-port-for.patch

6c9f0c
From e0d9fd344d20bb35efcd5c37ece0a5d67632439d Mon Sep 17 00:00:00 2001
6c9f0c
Message-Id: <e0d9fd344d20bb35efcd5c37ece0a5d67632439d.1488376602.git.dcaratti@redhat.com>
6c9f0c
From: Sabrina Dubroca <sd@queasysnail.net>
6c9f0c
Date: Wed, 2 Nov 2016 16:38:39 +0100
6c9f0c
Subject: [PATCH] wpa_supplicant: Allow configuring the MACsec port for MKA
6c9f0c
6c9f0c
Previously, wpa_supplicant only supported hardcoded port == 1 in the
6c9f0c
SCI, but users may want to choose a different port.
6c9f0c
6c9f0c
Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
6c9f0c
---
6c9f0c
 src/pae/ieee802_1x_kay.c           | 4 ++--
6c9f0c
 src/pae/ieee802_1x_kay.h           | 2 +-
6c9f0c
 wpa_supplicant/config.c            | 1 +
6c9f0c
 wpa_supplicant/config_file.c       | 1 +
6c9f0c
 wpa_supplicant/config_ssid.h       | 9 +++++++++
6c9f0c
 wpa_supplicant/wpa_cli.c           | 1 +
6c9f0c
 wpa_supplicant/wpa_supplicant.conf | 4 ++++
6c9f0c
 wpa_supplicant/wpas_kay.c          | 4 ++--
6c9f0c
 8 files changed, 21 insertions(+), 5 deletions(-)
6c9f0c
6c9f0c
diff --git a/src/pae/ieee802_1x_kay.c b/src/pae/ieee802_1x_kay.c
6c9f0c
index 7664e2d..3a495ca 100644
6c9f0c
--- a/src/pae/ieee802_1x_kay.c
6c9f0c
+++ b/src/pae/ieee802_1x_kay.c
6c9f0c
@@ -3071,7 +3071,7 @@ static void kay_l2_receive(void *ctx, const u8 *src_addr, const u8 *buf,
6c9f0c
  */
6c9f0c
 struct ieee802_1x_kay *
6c9f0c
 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
6c9f0c
-		    const char *ifname, const u8 *addr)
6c9f0c
+		    u16 port, const char *ifname, const u8 *addr)
6c9f0c
 {
6c9f0c
 	struct ieee802_1x_kay *kay;
6c9f0c
 
6c9f0c
@@ -3093,7 +3093,7 @@ ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
6c9f0c
 
6c9f0c
 	os_strlcpy(kay->if_name, ifname, IFNAMSIZ);
6c9f0c
 	os_memcpy(kay->actor_sci.addr, addr, ETH_ALEN);
6c9f0c
-	kay->actor_sci.port = host_to_be16(0x0001);
6c9f0c
+	kay->actor_sci.port = host_to_be16(port ? port : 0x0001);
6c9f0c
 	kay->actor_priority = DEFAULT_PRIO_NOT_KEY_SERVER;
6c9f0c
 
6c9f0c
 	/* While actor acts as a key server, shall distribute sakey */
6c9f0c
diff --git a/src/pae/ieee802_1x_kay.h b/src/pae/ieee802_1x_kay.h
6c9f0c
index fb49f62..ea5a0dd 100644
6c9f0c
--- a/src/pae/ieee802_1x_kay.h
6c9f0c
+++ b/src/pae/ieee802_1x_kay.h
6c9f0c
@@ -233,7 +233,7 @@ struct ieee802_1x_kay {
6c9f0c
 
6c9f0c
 struct ieee802_1x_kay *
6c9f0c
 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
6c9f0c
-		    const char *ifname, const u8 *addr);
6c9f0c
+		    u16 port, const char *ifname, const u8 *addr);
6c9f0c
 void ieee802_1x_kay_deinit(struct ieee802_1x_kay *kay);
6c9f0c
 
6c9f0c
 struct ieee802_1x_mka_participant *
6c9f0c
diff --git a/wpa_supplicant/config.c b/wpa_supplicant/config.c
6c9f0c
index afb631e..2120a6e 100644
6c9f0c
--- a/wpa_supplicant/config.c
6c9f0c
+++ b/wpa_supplicant/config.c
6c9f0c
@@ -2126,6 +2126,7 @@ static const struct parse_data ssid_fields[] = {
6c9f0c
 #ifdef CONFIG_MACSEC
6c9f0c
 	{ INT_RANGE(macsec_policy, 0, 1) },
6c9f0c
 	{ INT_RANGE(macsec_integ_only, 0, 1) },
6c9f0c
+	{ INT_RANGE(macsec_port, 1, 65534) },
6c9f0c
 	{ FUNC_KEY(mka_cak) },
6c9f0c
 	{ FUNC_KEY(mka_ckn) },
6c9f0c
 #endif /* CONFIG_MACSEC */
6c9f0c
diff --git a/wpa_supplicant/config_file.c b/wpa_supplicant/config_file.c
6c9f0c
index f605fa9..2e3d57e 100644
6c9f0c
--- a/wpa_supplicant/config_file.c
6c9f0c
+++ b/wpa_supplicant/config_file.c
6c9f0c
@@ -809,6 +809,7 @@ static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
6c9f0c
 	write_mka_cak(f, ssid);
6c9f0c
 	write_mka_ckn(f, ssid);
6c9f0c
 	INT(macsec_integ_only);
6c9f0c
+	INT(macsec_port);
6c9f0c
 #endif /* CONFIG_MACSEC */
6c9f0c
 #ifdef CONFIG_HS20
6c9f0c
 	INT(update_identifier);
6c9f0c
diff --git a/wpa_supplicant/config_ssid.h b/wpa_supplicant/config_ssid.h
6c9f0c
index b8c3192..fe0f7fa 100644
6c9f0c
--- a/wpa_supplicant/config_ssid.h
6c9f0c
+++ b/wpa_supplicant/config_ssid.h
6c9f0c
@@ -742,6 +742,15 @@ struct wpa_ssid {
6c9f0c
 	int macsec_integ_only;
6c9f0c
 
6c9f0c
 	/**
6c9f0c
+	 * macsec_port - MACsec port (in SCI)
6c9f0c
+	 *
6c9f0c
+	 * Port component of the SCI.
6c9f0c
+	 *
6c9f0c
+	 * Range: 1-65534 (default: 1)
6c9f0c
+	 */
6c9f0c
+	int macsec_port;
6c9f0c
+
6c9f0c
+	/**
6c9f0c
 	 * mka_ckn - MKA pre-shared CKN
6c9f0c
 	 */
6c9f0c
 #define MACSEC_CKN_LEN 32
6c9f0c
diff --git a/wpa_supplicant/wpa_cli.c b/wpa_supplicant/wpa_cli.c
6c9f0c
index aed95e6..f11028a 100644
6c9f0c
--- a/wpa_supplicant/wpa_cli.c
6c9f0c
+++ b/wpa_supplicant/wpa_cli.c
6c9f0c
@@ -1391,6 +1391,7 @@ static const char *network_fields[] = {
6c9f0c
 #ifdef CONFIG_MACSEC
6c9f0c
 	"macsec_policy",
6c9f0c
 	"macsec_integ_only",
6c9f0c
+	"macsec_port",
6c9f0c
 #endif /* CONFIG_MACSEC */
6c9f0c
 #ifdef CONFIG_HS20
6c9f0c
 	"update_identifier",
6c9f0c
diff --git a/wpa_supplicant/wpa_supplicant.conf b/wpa_supplicant/wpa_supplicant.conf
6c9f0c
index b23c5e6..82aa24e 100644
6c9f0c
--- a/wpa_supplicant/wpa_supplicant.conf
6c9f0c
+++ b/wpa_supplicant/wpa_supplicant.conf
6c9f0c
@@ -899,6 +899,10 @@ fast_reauth=1
6c9f0c
 # 0: Encrypt traffic (default)
6c9f0c
 # 1: Integrity only
6c9f0c
 #
6c9f0c
+# macsec_port: IEEE 802.1X/MACsec port
6c9f0c
+# Port component of the SCI
6c9f0c
+# Range: 1-65534 (default: 1)
6c9f0c
+#
6c9f0c
 # mka_cak and mka_ckn: IEEE 802.1X/MACsec pre-shared authentication mode
6c9f0c
 # This allows to configure MACsec with a pre-shared key using a (CAK,CKN) pair.
6c9f0c
 # In this mode, instances of wpa_supplicant can act as peers, one of
6c9f0c
diff --git a/wpa_supplicant/wpas_kay.c b/wpa_supplicant/wpas_kay.c
6c9f0c
index 2ff4895..d3fefda 100644
6c9f0c
--- a/wpa_supplicant/wpas_kay.c
6c9f0c
+++ b/wpa_supplicant/wpas_kay.c
6c9f0c
@@ -232,8 +232,8 @@ int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
6c9f0c
 	kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa;
6c9f0c
 	kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa;
6c9f0c
 
6c9f0c
-	res = ieee802_1x_kay_init(kay_ctx, policy, wpa_s->ifname,
6c9f0c
-				  wpa_s->own_addr);
6c9f0c
+	res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_port,
6c9f0c
+				  wpa_s->ifname, wpa_s->own_addr);
6c9f0c
 	if (res == NULL) {
6c9f0c
 		os_free(kay_ctx);
6c9f0c
 		return -1;
6c9f0c
-- 
6c9f0c
2.7.4
6c9f0c