Allow group cipher selection to be overridden
The new hostapd configuration parameter group_cipher can now be used to override the automatic cipher selection based on enabled pairwise ciphers. It should be noted that selecting an unexpected group cipher can result in interoperability issues and this new capability is mainly for testing purposes. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
aab6612836
commit
27781c0ab5
4 changed files with 37 additions and 5 deletions
|
@ -1046,8 +1046,12 @@ void hostapd_set_security_params(struct hostapd_bss_config *bss,
|
|||
|
||||
if ((bss->wpa & 2) && bss->rsn_pairwise == 0)
|
||||
bss->rsn_pairwise = bss->wpa_pairwise;
|
||||
bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa, bss->wpa_pairwise,
|
||||
bss->rsn_pairwise);
|
||||
if (bss->group_cipher)
|
||||
bss->wpa_group = bss->group_cipher;
|
||||
else
|
||||
bss->wpa_group = wpa_select_ap_group_cipher(bss->wpa,
|
||||
bss->wpa_pairwise,
|
||||
bss->rsn_pairwise);
|
||||
if (!bss->wpa_group_rekey_set)
|
||||
bss->wpa_group_rekey = bss->wpa_group == WPA_CIPHER_TKIP ?
|
||||
600 : 86400;
|
||||
|
|
|
@ -325,6 +325,7 @@ struct hostapd_bss_config {
|
|||
PSK_RADIUS_REQUIRED = 2
|
||||
} wpa_psk_radius;
|
||||
int wpa_pairwise;
|
||||
int group_cipher; /* wpa_group value override from configuation */
|
||||
int wpa_group;
|
||||
int wpa_group_rekey;
|
||||
int wpa_group_rekey_set;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue