From: Jouni Malinen Date: Wed, 1 Nov 2017 15:14:30 +0000 (+0200) Subject: DPP: Enable PMF when adding wpa_supplicant network profile X-Git-Tag: hostap_2_7~922 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=69d8d029f5af2a1726f5a41102a08366c31d58a8;p=thirdparty%2Fhostap.git DPP: Enable PMF when adding wpa_supplicant network profile DPP AKM should really require PMF to be used, but since that is not yet explicitly required in the specification, make PMF enabled for now. For legacy PSK cases, configure PMF to be enabled as well to support both APs in no-PMF, optional-PMF, and required-PMF configuration. Signed-off-by: Jouni Malinen --- diff --git a/wpa_supplicant/dpp_supplicant.c b/wpa_supplicant/dpp_supplicant.c index 1d920b487..15e6b633b 100644 --- a/wpa_supplicant/dpp_supplicant.c +++ b/wpa_supplicant/dpp_supplicant.c @@ -936,6 +936,7 @@ static struct wpa_ssid * wpas_dpp_add_network(struct wpa_supplicant *wpa_s, if (auth->connector) { ssid->key_mgmt = WPA_KEY_MGMT_DPP; + ssid->ieee80211w = 1; ssid->dpp_connector = os_strdup(auth->connector); if (!ssid->dpp_connector) goto fail; @@ -963,7 +964,8 @@ static struct wpa_ssid * wpas_dpp_add_network(struct wpa_supplicant *wpa_s, } if (!auth->connector) { - ssid->key_mgmt = WPA_KEY_MGMT_PSK; + ssid->key_mgmt = WPA_KEY_MGMT_PSK | WPA_KEY_MGMT_PSK_SHA256; + ssid->ieee80211w = 1; if (auth->passphrase[0]) { if (wpa_config_set_quoted(ssid, "psk", auth->passphrase) < 0)