blob: d9a4f15f03097c8c6907814ccb9c3d04e3e1acbd [file] [log] [blame]
developer29c4d2d2022-12-26 19:41:22 +08001--- a/hostapd/config_file.c
2+++ b/hostapd/config_file.c
3@@ -3000,6 +3000,8 @@ static int hostapd_config_fill(struct ho
4 wpa_printf(MSG_INFO,
5 "Line %d: Obsolete peerkey parameter ignored", line);
6 #ifdef CONFIG_IEEE80211R_AP
7+ } else if (os_strcmp(buf, "ft_iface") == 0) {
8+ os_strlcpy(bss->ft_iface, pos, sizeof(bss->ft_iface));
9 } else if (os_strcmp(buf, "mobility_domain") == 0) {
10 if (os_strlen(pos) != 2 * MOBILITY_DOMAIN_ID_LEN ||
11 hexstr2bin(pos, bss->mobility_domain,
12--- a/src/ap/ap_config.h
13+++ b/src/ap/ap_config.h
14@@ -283,6 +283,7 @@ struct airtime_sta_weight {
15 struct hostapd_bss_config {
16 char iface[IFNAMSIZ + 1];
17 char bridge[IFNAMSIZ + 1];
18+ char ft_iface[IFNAMSIZ + 1];
19 char vlan_bridge[IFNAMSIZ + 1];
20 char wds_bridge[IFNAMSIZ + 1];
21
22--- a/src/ap/wpa_auth_glue.c
23+++ b/src/ap/wpa_auth_glue.c
24@@ -1595,8 +1595,12 @@ int hostapd_setup_wpa(struct hostapd_dat
25 wpa_key_mgmt_ft(hapd->conf->wpa_key_mgmt)) {
26 const char *ft_iface;
27
28- ft_iface = hapd->conf->bridge[0] ? hapd->conf->bridge :
29- hapd->conf->iface;
30+ if (hapd->conf->ft_iface[0])
31+ ft_iface = hapd->conf->ft_iface;
32+ else if (hapd->conf->bridge[0])
33+ ft_iface = hapd->conf->bridge;
34+ else
35+ ft_iface = hapd->conf->iface;
36 hapd->l2 = l2_packet_init(ft_iface, NULL, ETH_P_RRB,
37 hostapd_rrb_receive, hapd, 1);
38 if (!hapd->l2) {