bsd: Get rid of printf size_t warnings with 64-bit builds
[wpasupplicant] / hostapd / ieee802_1x.c
index 3430f2d..722956a 100644 (file)
@@ -220,8 +220,8 @@ ieee802_1x_group_alloc(struct hostapd_data *hapd, const char *ifname)
        wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)",
                        key->key[key->idx], key->len[key->idx]);
 
-       if (hostapd_set_encryption(ifname, hapd, "WEP", NULL, key->idx,
-                                  key->key[key->idx], key->len[key->idx], 1))
+       if (hostapd_set_key(ifname, hapd, WPA_ALG_WEP, NULL, key->idx, 1,
+                           NULL, 0, key->key[key->idx], key->len[key->idx]))
                printf("Could not set dynamic VLAN WEP encryption key.\n");
 
        hostapd_set_ieee8021x(ifname, hapd, 1);
@@ -285,6 +285,7 @@ ieee802_1x_get_group(struct hostapd_data *hapd, struct hostapd_ssid *ssid,
 
 void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
 {
+       struct eapol_authenticator *eapol = hapd->eapol_auth;
        struct eapol_state_machine *sm = sta->eapol_sm;
 #ifndef CONFIG_NO_VLAN
        struct hostapd_wep_keys *key = NULL;
@@ -310,9 +311,9 @@ void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
                                              key->len[key->idx]);
        } else
 #endif /* CONFIG_NO_VLAN */
-       if (hapd->default_wep_key) {
-               ieee802_1x_tx_key_one(hapd, sta, hapd->default_wep_key_idx, 1,
-                                     hapd->default_wep_key,
+       if (eapol->default_wep_key) {
+               ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1,
+                                     eapol->default_wep_key,
                                      hapd->conf->default_wep_key_len);
        }
 
@@ -335,10 +336,9 @@ void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
 
                /* TODO: set encryption in TX callback, i.e., only after STA
                 * has ACKed EAPOL-Key frame */
-               if (hostapd_set_encryption(hapd->conf->iface, hapd, "WEP",
-                                          sta->addr, 0, ikey,
-                                          hapd->conf->individual_wep_key_len,
-                                          1)) {
+               if (hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_WEP,
+                                   sta->addr, 0, 1, NULL, 0, ikey,
+                                   hapd->conf->individual_wep_key_len)) {
                        wpa_printf(MSG_ERROR, "Could not set individual WEP "
                                   "encryption.");
                }
@@ -1426,22 +1426,24 @@ void ieee802_1x_dump_state(FILE *f, const char *prefix, struct sta_info *sta)
 
 static int ieee802_1x_rekey_broadcast(struct hostapd_data *hapd)
 {
+       struct eapol_authenticator *eapol = hapd->eapol_auth;
+
        if (hapd->conf->default_wep_key_len < 1)
                return 0;
 
-       os_free(hapd->default_wep_key);
-       hapd->default_wep_key = os_malloc(hapd->conf->default_wep_key_len);
-       if (hapd->default_wep_key == NULL ||
-           os_get_random(hapd->default_wep_key,
+       os_free(eapol->default_wep_key);
+       eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len);
+       if (eapol->default_wep_key == NULL ||
+           os_get_random(eapol->default_wep_key,
                          hapd->conf->default_wep_key_len)) {
                printf("Could not generate random WEP key.\n");
-               os_free(hapd->default_wep_key);
-               hapd->default_wep_key = NULL;
+               os_free(eapol->default_wep_key);
+               eapol->default_wep_key = NULL;
                return -1;
        }
 
        wpa_hexdump_key(MSG_DEBUG, "IEEE 802.1X: New default WEP key",
-                       hapd->default_wep_key,
+                       eapol->default_wep_key,
                        hapd->conf->default_wep_key_len);
 
        return 0;
@@ -1462,36 +1464,37 @@ static int ieee802_1x_sta_key_available(struct hostapd_data *hapd,
 static void ieee802_1x_rekey(void *eloop_ctx, void *timeout_ctx)
 {
        struct hostapd_data *hapd = eloop_ctx;
+       struct eapol_authenticator *eapol = hapd->eapol_auth;
 
-       if (hapd->default_wep_key_idx >= 3)
-               hapd->default_wep_key_idx =
+       if (eapol->default_wep_key_idx >= 3)
+               eapol->default_wep_key_idx =
                        hapd->conf->individual_wep_key_len > 0 ? 1 : 0;
        else
-               hapd->default_wep_key_idx++;
+               eapol->default_wep_key_idx++;
 
        wpa_printf(MSG_DEBUG, "IEEE 802.1X: New default WEP key index %d",
-                  hapd->default_wep_key_idx);
+                  eapol->default_wep_key_idx);
                      
        if (ieee802_1x_rekey_broadcast(hapd)) {
                hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE8021X,
                               HOSTAPD_LEVEL_WARNING, "failed to generate a "
                               "new broadcast key");
-               os_free(hapd->default_wep_key);
-               hapd->default_wep_key = NULL;
+               os_free(eapol->default_wep_key);
+               eapol->default_wep_key = NULL;
                return;
        }
 
        /* TODO: Could setup key for RX here, but change default TX keyid only
         * after new broadcast key has been sent to all stations. */
-       if (hostapd_set_encryption(hapd->conf->iface, hapd, "WEP", NULL,
-                                  hapd->default_wep_key_idx,
-                                  hapd->default_wep_key,
-                                  hapd->conf->default_wep_key_len, 1)) {
+       if (hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_WEP, NULL,
+                           eapol->default_wep_key_idx, 1, NULL, 0,
+                           eapol->default_wep_key,
+                           hapd->conf->default_wep_key_len)) {
                hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE8021X,
                               HOSTAPD_LEVEL_WARNING, "failed to configure a "
                               "new broadcast key");
-               os_free(hapd->default_wep_key);
-               hapd->default_wep_key = NULL;
+               os_free(eapol->default_wep_key);
+               eapol->default_wep_key = NULL;
                return;
        }
 
@@ -1691,12 +1694,12 @@ int ieee802_1x_init(struct hostapd_data *hapd)
                hostapd_set_privacy(hapd, 1);
 
                for (i = 0; i < 4; i++)
-                       hostapd_set_encryption(hapd->conf->iface, hapd,
-                                              "none", NULL, i, NULL, 0, 0);
+                       hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_NONE,
+                                       NULL, i, 0, NULL, 0, NULL, 0);
 
                ieee802_1x_rekey(hapd, NULL);
 
-               if (hapd->default_wep_key == NULL)
+               if (hapd->eapol_auth->default_wep_key == NULL)
                        return -1;
        }