mesh: Clear wpa_s cipher selection on starting mesh
This is needed to avoid hitting WEP/TKIP detection in ibss_mesh_setup_freq() if the previous connection used WEP or TKIP. Previously, that could have resulted in VHT and HT getting disabled for the mesh connection. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
1d6955e668
commit
0530eb1086
1 changed files with 10 additions and 0 deletions
|
@ -318,6 +318,16 @@ int wpa_supplicant_join_mesh(struct wpa_supplicant *wpa_s,
|
|||
|
||||
wpa_supplicant_mesh_deinit(wpa_s);
|
||||
|
||||
if (ssid->key_mgmt & WPA_KEY_MGMT_SAE) {
|
||||
wpa_s->pairwise_cipher = WPA_CIPHER_CCMP;
|
||||
wpa_s->group_cipher = WPA_CIPHER_CCMP;
|
||||
wpa_s->mgmt_group_cipher = 0;
|
||||
} else {
|
||||
wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
|
||||
wpa_s->group_cipher = WPA_CIPHER_NONE;
|
||||
wpa_s->mgmt_group_cipher = 0;
|
||||
}
|
||||
|
||||
os_memset(¶ms, 0, sizeof(params));
|
||||
params.meshid = ssid->ssid;
|
||||
params.meshid_len = ssid->ssid_len;
|
||||
|
|
Loading…
Reference in a new issue