HS 2.0R2: Fix OSEN IE parsing for in cipher setup (CID 68132)
The OSEN code path hardcodes number of struct wpa_ie_data items. However, it did not clear the full structure and some uninitialized fields could have been used (e.g., ie.mgmt_group_cipher for a debug print and ie.capabilities for checking MFPC). Fix this by clearing the ie data before filling in the hardcoded OSEN values. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
2703fb4ad9
commit
137ff332fd
1 changed files with 1 additions and 0 deletions
|
@ -984,6 +984,7 @@ int wpa_supplicant_set_suites(struct wpa_supplicant *wpa_s,
|
||||||
} else if (bss_osen && (ssid->proto & WPA_PROTO_OSEN)) {
|
} else if (bss_osen && (ssid->proto & WPA_PROTO_OSEN)) {
|
||||||
wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using OSEN");
|
wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using OSEN");
|
||||||
/* TODO: parse OSEN element */
|
/* TODO: parse OSEN element */
|
||||||
|
os_memset(&ie, 0, sizeof(ie));
|
||||||
ie.group_cipher = WPA_CIPHER_CCMP;
|
ie.group_cipher = WPA_CIPHER_CCMP;
|
||||||
ie.pairwise_cipher = WPA_CIPHER_CCMP;
|
ie.pairwise_cipher = WPA_CIPHER_CCMP;
|
||||||
ie.key_mgmt = WPA_KEY_MGMT_OSEN;
|
ie.key_mgmt = WPA_KEY_MGMT_OSEN;
|
||||||
|
|
Loading…
Reference in a new issue