aboutsummaryrefslogtreecommitdiffstats
path: root/src/ap/wpa_auth_ft.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2013-12-28 11:41:02 (GMT)
committerJouni Malinen <j@w1.fi>2013-12-29 08:00:31 (GMT)
commitaa189ac9ddb4219ddb2ca372f24964a954fe0b19 (patch)
tree2971b725c615666bdd23762411d133d4812582cb /src/ap/wpa_auth_ft.c
parent2b005194317a519bee041ea6bcfc549f41a174ed (diff)
downloadhostap-aa189ac9ddb4219ddb2ca372f24964a954fe0b19.zip
hostap-aa189ac9ddb4219ddb2ca372f24964a954fe0b19.tar.gz
hostap-aa189ac9ddb4219ddb2ca372f24964a954fe0b19.tar.bz2
Enable FT with SAE
It was already possible to configure hostapd and wpa_supplicant to use FT-SAE for the key management, but number of places were missing proper AKM checks to allow FT to be used with the new AKM. Signed-hostap: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'src/ap/wpa_auth_ft.c')
-rw-r--r--src/ap/wpa_auth_ft.c3
1 files changed, 1 insertions, 2 deletions
diff --git a/src/ap/wpa_auth_ft.c b/src/ap/wpa_auth_ft.c
index 29d9d29..b9e8b3d 100644
--- a/src/ap/wpa_auth_ft.c
+++ b/src/ap/wpa_auth_ft.c
@@ -633,8 +633,7 @@ u8 * wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos,
conf = &sm->wpa_auth->conf;
- if (sm->wpa_key_mgmt != WPA_KEY_MGMT_FT_IEEE8021X &&
- sm->wpa_key_mgmt != WPA_KEY_MGMT_FT_PSK)
+ if (!wpa_key_mgmt_ft(sm->wpa_key_mgmt))
return pos;
end = pos + max_len;