path: root/wpa_supplicant/ibss_rsn.c
diff options
authorLior David <liord@codeaurora.org>2019-02-06 10:33:35 (GMT)
committerJouni Malinen <j@w1.fi>2019-02-21 10:42:24 (GMT)
commit2c129a1b71c6dcaff7e4db388f4fae303d265437 (patch)
tree2f19599c611ff0a81eea8995e8fe87d4ce2e4323 /wpa_supplicant/ibss_rsn.c
parent239794018e68db670889ce96e0949e670f60054a (diff)
Fix cipher suite selector default value in RSNE for DMG
According to IEEE Std 802.11-2016, when fields of an RSNE are not included, the default values are used. The cipher suite defaults were hardcoded to CCMP in the previous implementation, but the default is actually different for DMG: GCMP (per It is not possible to find out from the RSNE if the network is non-DMG or DMG, so callers of wpa_parse_wpa_ie_rsn() need to handle this case based on context, which can be different for each caller. In order to fix this issue, add flags to the wpa_ie_data indicating whether pairwise/group ciphers were included in the RSNE. Callers can check these flags and fill in the appropriate ciphers. The wpa_parse_wpa_ie_rsn() function still initializes the ciphers to CCMP by default so existing callers will not break. This change also fixes some callers which need to handle the DMG network case. Signed-off-by: Lior David <liord@codeaurora.org>
Diffstat (limited to 'wpa_supplicant/ibss_rsn.c')
1 files changed, 1 insertions, 1 deletions
diff --git a/wpa_supplicant/ibss_rsn.c b/wpa_supplicant/ibss_rsn.c
index 187e951..e96ea65 100644
--- a/wpa_supplicant/ibss_rsn.c
+++ b/wpa_supplicant/ibss_rsn.c
@@ -459,7 +459,7 @@ static int ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn,
/* TODO: get peer RSN IE with Probe Request */
- if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth,
+ if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0,
(u8 *) "\x30\x14\x01\x00"