Skip to content

RDKB-63887- MFPConfig is not set to "Optional" on all secure vAPs using WPA2-Personal by default when FeatureMFPConfig is enabled.#1051

Draft
Sneha3821 wants to merge 9 commits intordkcentral:developfrom
Sneha3821:mfp
Draft

RDKB-63887- MFPConfig is not set to "Optional" on all secure vAPs using WPA2-Personal by default when FeatureMFPConfig is enabled.#1051
Sneha3821 wants to merge 9 commits intordkcentral:developfrom
Sneha3821:mfp

Conversation

@Sneha3821
Copy link
Copy Markdown
Contributor

RDKB-63887- MFPConfig is not set to "Optional" on all secure vAPs using WPA2-Personal by default when FeatureMFPConfig is enabled.
Reason for change : Set MFP as optional for WPA2 personal security mode.

Test Procedure:

  1. upgrade the DUT with the custom build.
  2. verify MFP and current security mode
    dmcli eRT getv Device.WiFi.AccessPoint.1.Security.ModeEnabled
    dmcli eRT getv Device.WiFi.FeatureMFPConfig
    dmcli eRT getv Device.WiFi.AccessPoint.1.Security.MFPConfig
  3. Set Private VAP to WPA2-Personal
  4. Verify MFP for WPA2-Personal VAP from DMCLI and OTA

Priority: P1
Risks: Low
Signed-off-by: Sneha Kannansneha_kannan@comcast.com

@Sneha3821 Sneha3821 requested a review from a team as a code owner April 10, 2026 06:31
Copilot AI review requested due to automatic review settings April 10, 2026 06:31
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates TR-181 WiFi security mode handling so that when a VAP is configured for WPA2-Personal, the default Management Frame Protection (MFP/PMF) setting becomes “Optional” instead of “Disabled”, aligning with the reported RDKB-63887 behavior gap.

Changes:

  • Changes default mfp assignment for WPA/WPA2 personal security modes from Disabled to Optional when ModeEnabled is set.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread source/dml/tr_181/ml/cosa_wifi_dml.c Outdated
Comment thread source/dml/tr_181/ml/cosa_wifi_dml.c Outdated
Copilot AI review requested due to automatic review settings April 13, 2026 07:07
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 1 out of 1 changed files in this pull request and generated 2 comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment thread source/dml/tr_181/ml/cosa_wifi_dml.c
Comment on lines 9313 to +9322
case wifi_security_mode_wpa_personal:
l_security_cfg->u.key.type = wifi_security_key_type_psk;
l_security_cfg->mfp = wifi_mfp_cfg_disabled;
break;
case wifi_security_mode_wpa2_personal:
l_security_cfg->u.key.type = wifi_security_key_type_psk;
l_security_cfg->mfp = wifi_mfp_cfg_optional;
break;
case wifi_security_mode_wpa_wpa2_personal:
l_security_cfg->u.key.type = wifi_security_key_type_psk;
l_security_cfg->u.key.type = wifi_security_key_type_psk;
Copy link

Copilot AI Apr 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Indentation in the newly added case wifi_security_mode_wpa_personal / wifi_security_mode_wpa2_personal blocks uses tabs and is inconsistent with the surrounding 4-space indentation in this switch. Please reformat these lines to match the existing style to avoid churn in future diffs.

Copilot uses AI. Check for mistakes.
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@copilot apply changes based on this feedback

@Sneha3821 Sneha3821 marked this pull request as draft April 13, 2026 09:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants