summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid Bauer2024-12-07 13:47:29 +0000
committerDavid Bauer2024-12-20 00:20:00 +0000
commit5289460fd0281f653cb3701e777b6be3fcd43ca4 (patch)
tree25f03156d64b285810fb94a47ef1e8de747aa463
parent9f76cda3781e06e3a59c70f35b6cc6f81da6ce5f (diff)
downloadopenwrt-5289460fd0281f653cb3701e777b6be3fcd43ca4.tar.gz
wifi-scripts: don't fail on unset PSK
Don't fail wireless interface bringup on empty PSK set. This is a valid configuration, resulting in a PSK network which can't be connected to. It does not fail the bringup of the hostapd process. Keep failing the interface setup in case a password with invalid length is used. This is also beneficial when intending to configure a PPSK network. It allows to create a network where no PPSK is yet set. Signed-off-by: David Bauer <mail@david-bauer.net> (cherry picked from commit 17a71f0c154cebd2e52cd8407531a9a88c931474)
-rw-r--r--package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh2
1 files changed, 1 insertions, 1 deletions
diff --git a/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh b/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh
index 817ead71af..7d4c41d3b5 100644
--- a/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh
+++ b/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh
@@ -697,7 +697,7 @@ hostapd_set_bss_options() {
append bss_conf "wpa_psk=$key" "$N"
elif [ ${#key} -ge 8 ] && [ ${#key} -le 63 ]; then
append bss_conf "wpa_passphrase=$key" "$N"
- elif [ -n "$key" ] || [ -z "$wpa_psk_file" ]; then
+ elif [ -n "$key" ]; then
wireless_setup_vif_failed INVALID_WPA_PSK
return 1
fi