>From 0b414af02a42a66dbd97fee33a7445771e13dc7a Mon Sep 17 00:00:00 2001 From: David Downey <david.downey@xxxxxxxxx> Date: Thu, 27 Apr 2023 20:57:40 -0700 Subject: [PATCH] wpa_supplicant: prohibit open network security for 6 GHz. Our product initially failed Wi-Fi CERTIFIED 6 Test Plan Version 2.2, test case 5.2.4, Scenario A. This patch fixes this. Signed-off-by: David Downey <david.downey@xxxxxxxxx> --- wpa_supplicant/events.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c index 2184ea093..08684db13 100644 --- a/wpa_supplicant/events.c +++ b/wpa_supplicant/events.c @@ -628,6 +628,11 @@ static int wpa_supplicant_ssid_bss_match(struct wpa_supplicant *wpa_s, if (ret >= 0) return ret; + if (is_6ghz_bss && (ssid->key_mgmt & WPA_KEY_MGMT_NONE)) { + wpa_dbg(wpa_s, MSG_DEBUG, " skip - 6 GHz open network illegal"); + return 0; + } + #ifdef CONFIG_WEP /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */ wep_ok = !wpa_key_mgmt_wpa(ssid->key_mgmt) && -- 2.26.2 _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap