Do not clear RSN parameters before full configuration
authorJouni Malinen <j@w1.fi>
Sun, 27 Sep 2015 10:25:00 +0000 (13:25 +0300)
committerJouni Malinen <j@w1.fi>
Sun, 27 Sep 2015 12:55:11 +0000 (15:55 +0300)
This fixes an issue where hostapd SET command is used to configure RSN
parameters and the wpa parameter is sent after the other parameters.
Previously, the default case here ended up clearing rsn_pairwise and
wpa_pairwise values and once wpa=2 was finally set, the cipher
configuration had already been lost.

Signed-off-by: Jouni Malinen <j@w1.fi>
src/ap/ap_config.c

index 75804a0..9a96e50 100644 (file)
@@ -975,10 +975,11 @@ void hostapd_set_security_params(struct hostapd_bss_config *bss,
                bss->rsn_pairwise = WPA_CIPHER_CCMP;
        } else {
                bss->ssid.security_policy = SECURITY_PLAINTEXT;
-               bss->wpa_group = WPA_CIPHER_NONE;
-               bss->wpa_pairwise = WPA_CIPHER_NONE;
-               bss->rsn_pairwise = WPA_CIPHER_NONE;
-               if (full_config)
+               if (full_config) {
+                       bss->wpa_group = WPA_CIPHER_NONE;
+                       bss->wpa_pairwise = WPA_CIPHER_NONE;
+                       bss->rsn_pairwise = WPA_CIPHER_NONE;
                        bss->wpa_key_mgmt = WPA_KEY_MGMT_NONE;
+               }
        }
 }