Skip to content

Commit 64a1477

Browse files
Rex-Chen-NXPfabiobaltieri
authored andcommitted
modules: hostap: Fix connection failed with TLS cipher RSA3K
The TLS cipher RSA3K ciphersuites ECDHE-RSA-AES256-GCM-SHA384 and DHE-RSA-AES256-GCM-SHA384 only support TLS1.2, but TLS1.3 enabled, version check failed in ssl_tls13_validate_peer_ciphersuite during parse client hello. Disable TLS1.3 for TLS cipher RSA3K to fix this issue. Signed-off-by: Rex Chen <[email protected]>
1 parent 0d4856b commit 64a1477

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/hostap/src/supp_api.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -905,7 +905,8 @@ static int wpas_add_and_config_network(struct wpa_supplicant *wpa_s,
905905
goto out;
906906
}
907907
} else if (params->TLS_cipher == WIFI_EAP_TLS_RSA_3K) {
908-
snprintf(phase1, sizeof(phase1), "tls_suiteb=1");
908+
snprintf(phase1, sizeof(phase1), "tls_suiteb=1 "
909+
"tls_disable_tlsv1_3=1");
909910
if (!wpa_cli_cmd_v("set_network %d phase1 \"%s\"",
910911
resp.network_id, &phase1[0])) {
911912
goto out;

0 commit comments

Comments
 (0)