Identity or passphrase information should not be unconditionally
removed for 802.1x WiFi networks on error. The error value is
used in other parts of the code to detect whether the supplied
passphrase caused an authentication error.
---
Hi,
Please check if this helps your situation. Something else may have
broken instead...
Cheers,
Patrik
src/service.c | 19 -------------------
1 file changed, 19 deletions(-)
diff --git a/src/service.c b/src/service.c
index 7538bdd..29a632e 100644
--- a/src/service.c
+++ b/src/service.c
@@ -2886,16 +2886,6 @@ const char *__connman_service_get_passphrase(struct
connman_service *service)
return service->passphrase;
}
-static void clear_passphrase(struct connman_service *service)
-{
- g_free(service->passphrase);
- service->passphrase = NULL;
-
- if (service->network)
- connman_network_set_string(service->network, "WiFi.Passphrase",
- service->passphrase);
-}
-
static DBusMessage *get_properties(DBusConnection *conn,
DBusMessage *msg, void *user_data)
{
@@ -5457,15 +5447,6 @@ int __connman_service_indicate_error(struct
connman_service *service,
set_error(service, error);
- /*
- * Supplicant does not always return invalid key error for
- * WPA-EAP so clear the credentials always.
- */
- if (service->security == CONNMAN_SERVICE_SECURITY_8021X)
- clear_passphrase(service);
-
- __connman_service_set_agent_identity(service, NULL);
-
__connman_service_ipconfig_indicate_state(service,
CONNMAN_SERVICE_STATE_FAILURE,
CONNMAN_IPCONFIG_TYPE_IPV4);
--
2.1.4
_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman