modules: hostap: Fix checks for Enterprise security
Enterprise security doesn't have either SAE or PSK, so, using a blanker else throws a false warning. Fix the checks to proper handler enterprise mode. Signed-off-by: Chaitanya Tata <Chaitanya.Tata@nordicsemi.no>
This commit is contained in:
parent
6cac9540ec
commit
48916d66e7
|
@ -511,17 +511,7 @@ static int wpas_add_and_config_network(struct wpa_supplicant *wpa_s,
|
|||
}
|
||||
|
||||
if (params->security != WIFI_SECURITY_TYPE_NONE) {
|
||||
if (params->sae_password) {
|
||||
if ((params->sae_password_length < WIFI_PSK_MIN_LEN) ||
|
||||
(params->sae_password_length > WIFI_SAE_PSWD_MAX_LEN)) {
|
||||
wpa_printf(MSG_ERROR,
|
||||
"Passphrase should be in range (%d-%d) characters",
|
||||
WIFI_PSK_MIN_LEN, WIFI_SAE_PSWD_MAX_LEN);
|
||||
goto out;
|
||||
}
|
||||
strncpy(sae_null_terminated, params->sae_password, WIFI_SAE_PSWD_MAX_LEN);
|
||||
sae_null_terminated[params->sae_password_length] = '\0';
|
||||
} else {
|
||||
if (params->psk) {
|
||||
if ((params->psk_length < WIFI_PSK_MIN_LEN) ||
|
||||
(params->psk_length > WIFI_PSK_MAX_LEN)) {
|
||||
wpa_printf(MSG_ERROR,
|
||||
|
@ -553,6 +543,16 @@ static int wpas_add_and_config_network(struct wpa_supplicant *wpa_s,
|
|||
params->security == WIFI_SECURITY_TYPE_SAE_H2E ||
|
||||
params->security == WIFI_SECURITY_TYPE_SAE_AUTO) {
|
||||
if (params->sae_password) {
|
||||
if ((params->sae_password_length < WIFI_PSK_MIN_LEN) ||
|
||||
(params->sae_password_length > WIFI_SAE_PSWD_MAX_LEN)) {
|
||||
wpa_printf(MSG_ERROR,
|
||||
"Passphrase should be in range (%d-%d) characters",
|
||||
WIFI_PSK_MIN_LEN, WIFI_SAE_PSWD_MAX_LEN);
|
||||
goto out;
|
||||
}
|
||||
strncpy(sae_null_terminated, params->sae_password,
|
||||
WIFI_SAE_PSWD_MAX_LEN);
|
||||
sae_null_terminated[params->sae_password_length] = '\0';
|
||||
if (!wpa_cli_cmd_v("set_network %d sae_password \"%s\"",
|
||||
resp.network_id, sae_null_terminated)) {
|
||||
goto out;
|
||||
|
|
Loading…
Reference in New Issue