[PATCH 1/2] SME: Do not send RSNXE for WPA 1 connections
Benjamin Berg
benjamin at sipsolutions.net
Thu Dec 18 08:19:33 PST 2025
From: Benjamin Berg <benjamin.berg at intel.com>
The element is not applicable to WPA 1 and it will not be included in
the KDE later on. However, hostapd checks that the KDE and the
association request match and deauthenticates the station if it sent the
RSNXE in the association request.
So omit sending it if the protocol is WPA_PROTO_WPA.
Signed-off-by: Benjamin Berg <benjamin.berg at intel.com>
---
wpa_supplicant/sme.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/wpa_supplicant/sme.c b/wpa_supplicant/sme.c
index 860b75f923..b12344881d 100644
--- a/wpa_supplicant/sme.c
+++ b/wpa_supplicant/sme.c
@@ -810,6 +810,7 @@ static void sme_send_authentication(struct wpa_supplicant *wpa_s,
if (wpa_s->wpa_proto == WPA_PROTO_WPA) {
wpa_ie = os_memdup(wpa_s->sme.assoc_req_ie,
wpa_s->sme.assoc_req_ie_len);
+ omit_rsnxe = 1;
if (wpa_ie) {
wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Storing WPA IE");
@@ -858,8 +859,8 @@ static void sme_send_authentication(struct wpa_supplicant *wpa_s,
wpa_sm_has_ft_keys(wpa_s->wpa, md)) {
wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
"over-the-air");
- omit_rsnxe = !wpa_bss_get_rsnxe(wpa_s, bss, ssid,
- false);
+ omit_rsnxe |= !wpa_bss_get_rsnxe(wpa_s, bss, ssid,
+ false);
params.auth_alg = WPA_AUTH_ALG_FT;
params.ie = wpa_s->sme.ft_ies;
params.ie_len = wpa_s->sme.ft_ies_len;
--
2.51.1
More information about the Hostap
mailing list