aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2014-01-07 18:14:53 (GMT)
committerJouni Malinen <j@w1.fi>2014-01-07 18:23:56 (GMT)
commit08081ad8efbf43eeea15969f9b2c487f9f7f25b8 (patch)
treec302ec5b6f8ea45bf6d959dfb51748e99c47ef93 /hostapd
parentf19ee5b7f7262cad4c0082014b8102fa87bdf3fb (diff)
downloadhostap-08081ad8efbf43eeea15969f9b2c487f9f7f25b8.zip
hostap-08081ad8efbf43eeea15969f9b2c487f9f7f25b8.tar.gz
hostap-08081ad8efbf43eeea15969f9b2c487f9f7f25b8.tar.bz2
hostapd: Skip full AP configuration validation on SET command
It is possible for the configuration to be temporarily invalid when adding a new AP through SET commands followed by ENABLE. Avoid this issue by using less strict validation on SET commands and perform full configuration validation only on ENABLE. Use cases with configuration file maintain their previous behavior, i.e., full validation after the file has been read. Signed-hostap: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'hostapd')
-rw-r--r--hostapd/config_file.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index 4198834..54e4af9 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -2989,7 +2989,7 @@ struct hostapd_config * hostapd_config_read(const char *fname)
for (i = 0; i < conf->num_bss; i++)
hostapd_set_security_params(conf->bss[i]);
- if (hostapd_config_check(conf))
+ if (hostapd_config_check(conf, 1))
errors++;
#ifndef WPA_IGNORE_CONFIG_ERRORS
@@ -3021,7 +3021,7 @@ int hostapd_set_iface(struct hostapd_config *conf,
for (i = 0; i < conf->num_bss; i++)
hostapd_set_security_params(conf->bss[i]);
- if (hostapd_config_check(conf)) {
+ if (hostapd_config_check(conf, 0)) {
wpa_printf(MSG_ERROR, "Configuration check failed");
return -1;
}