Fix AP mode key_mgmt configuration in wpa_supplicant default case
If the network profile key_mgmt parameter was not set, wpa_supplicant defaulted to enabling both WPA-PSK and WPA-EAP. This is not correct for AP mode operations, so remove WPA-EAP in such a case to fix WPA-PSK without explicit key_mgmt parameter. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
ad6cee3fa0
commit
6641954321
1 changed files with 4 additions and 1 deletions
|
@ -294,6 +294,9 @@ static int wpa_supplicant_conf_ap(struct wpa_supplicant *wpa_s,
|
||||||
|
|
||||||
if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt))
|
if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt))
|
||||||
bss->wpa = ssid->proto;
|
bss->wpa = ssid->proto;
|
||||||
|
if (ssid->key_mgmt == DEFAULT_KEY_MGMT)
|
||||||
|
bss->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
|
||||||
|
else
|
||||||
bss->wpa_key_mgmt = ssid->key_mgmt;
|
bss->wpa_key_mgmt = ssid->key_mgmt;
|
||||||
bss->wpa_pairwise = ssid->pairwise_cipher;
|
bss->wpa_pairwise = ssid->pairwise_cipher;
|
||||||
if (ssid->psk_set) {
|
if (ssid->psk_set) {
|
||||||
|
|
Loading…
Reference in a new issue