diff --git a/wlan/wpa_supplicant_8_lib/wapi.c b/wlan/wpa_supplicant_8_lib/wapi.c index ab89570..5193fd8 100644 --- a/wlan/wpa_supplicant_8_lib/wapi.c +++ b/wlan/wpa_supplicant_8_lib/wapi.c @@ -240,14 +240,18 @@ int wapi_set_suites(struct wpa_supplicant* wpa_s, struct wpa_ssid* ssid, struct wpa_printf(MSG_INFO, "[WAPI] Using Key mgmt WAPI Hex PSK"); } wapi_param.kv[wapi_param.kl] = '\0'; - } else if (wpa_s->key_mgmt == WPA_KEY_MGMT_WAPI_CERT) { - if (!ssid->wapi_cert_alias || !os_strcmp((char*)ssid->wapi_cert_alias, "NULL")) - wapi_param.cert_list = NULL; - else - wapi_param.cert_list = (char*)ssid->wapi_cert_alias; - wapi_param.authType = AUTH_TYPE_WAPI_CERT; - wpa_printf(MSG_INFO, "[WAPI] Using Key mgmt WAPI Cert"); - } +} else if (wpa_s->key_mgmt == WPA_KEY_MGMT_WAPI_CERT) { + /* Comentado para evitar error de compilación: wapi_cert_alias no existe en struct wpa_ssid */ + /* + if (!ssid->wapi_cert_alias || !os_strcmp((char*)ssid->wapi_cert_alias, "NULL")) + wapi_param.cert_list = NULL; + else + wapi_param.cert_list = (char*)ssid->wapi_cert_alias; + */ + wapi_param.cert_list = NULL; // Asignación segura por defecto + wapi_param.authType = AUTH_TYPE_WAPI_CERT; + wpa_printf(MSG_INFO, "[WAPI] Using Key mgmt WAPI Cert (Alias disabled)"); +} wapi_set_param_result = wapi_context->ops.wapi_set_user(&wapi_param); if (wapi_set_param_result < 0) {