aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/config_winreg.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2012-08-03 17:56:18 (GMT)
committerJouni Malinen <j@w1.fi>2012-08-03 19:15:42 (GMT)
commit2518aad3e83a842ff8452f9ecf6365edd0527368 (patch)
tree48f72ad0e2a923bc151f056d11e0166ccd89d8f4 /wpa_supplicant/config_winreg.c
parent1ecd2ada33fa6fad1046a30da80a34bbc2f968d3 (diff)
downloadhostap-2518aad3e83a842ff8452f9ecf6365edd0527368.zip
hostap-2518aad3e83a842ff8452f9ecf6365edd0527368.tar.gz
hostap-2518aad3e83a842ff8452f9ecf6365edd0527368.tar.bz2
Move PSK/passphrase configuration check into use time from parsing
Instead of rejecting network blocks without PSK/passphrase at the time the configuration file is read, allow such configuration to be loaded and only behave as if the network block with missing PSK/passphrase is disabled. Signed-hostap: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'wpa_supplicant/config_winreg.c')
-rw-r--r--wpa_supplicant/config_winreg.c7
1 files changed, 0 insertions, 7 deletions
diff --git a/wpa_supplicant/config_winreg.c b/wpa_supplicant/config_winreg.c
index de2ec58..6d9876c 100644
--- a/wpa_supplicant/config_winreg.c
+++ b/wpa_supplicant/config_winreg.c
@@ -344,13 +344,6 @@ static struct wpa_ssid * wpa_config_read_network(HKEY hk, const TCHAR *netw,
wpa_config_update_psk(ssid);
}
- if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt) && !ssid->psk_set) {
- wpa_printf(MSG_ERROR, "WPA-PSK accepted for key management, "
- "but no PSK configured for network '" TSTR "'.",
- netw);
- errors++;
- }
-
if ((ssid->group_cipher & WPA_CIPHER_CCMP) &&
!(ssid->pairwise_cipher & WPA_CIPHER_CCMP) &&
!(ssid->pairwise_cipher & WPA_CIPHER_NONE)) {