mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-02-11 06:34:02 -05:00
mesh: Clear wpa_s cipher selection on starting mesh
This is needed to avoid hitting WEP/TKIP detection in ibss_mesh_setup_freq() if the previous connection used WEP or TKIP. Previously, that could have resulted in VHT and HT getting disabled for the mesh connection. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
1d6955e668
commit
0530eb1086
@ -318,6 +318,16 @@ int wpa_supplicant_join_mesh(struct wpa_supplicant *wpa_s,
|
|||||||
|
|
||||||
wpa_supplicant_mesh_deinit(wpa_s);
|
wpa_supplicant_mesh_deinit(wpa_s);
|
||||||
|
|
||||||
|
if (ssid->key_mgmt & WPA_KEY_MGMT_SAE) {
|
||||||
|
wpa_s->pairwise_cipher = WPA_CIPHER_CCMP;
|
||||||
|
wpa_s->group_cipher = WPA_CIPHER_CCMP;
|
||||||
|
wpa_s->mgmt_group_cipher = 0;
|
||||||
|
} else {
|
||||||
|
wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
|
||||||
|
wpa_s->group_cipher = WPA_CIPHER_NONE;
|
||||||
|
wpa_s->mgmt_group_cipher = 0;
|
||||||
|
}
|
||||||
|
|
||||||
os_memset(¶ms, 0, sizeof(params));
|
os_memset(¶ms, 0, sizeof(params));
|
||||||
params.meshid = ssid->ssid;
|
params.meshid = ssid->ssid;
|
||||||
params.meshid_len = ssid->ssid_len;
|
params.meshid_len = ssid->ssid_len;
|
||||||
|
Loading…
Reference in New Issue
Block a user