diff options
author | Johannes Berg <johannes.berg@intel.com> | 2015-09-08 09:46:32 (GMT) |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2015-10-03 18:37:17 (GMT) |
commit | 2b6e121676d8319044334ff9864a784b22545d67 (patch) | |
tree | f40dab241e8659bf436acb18c6d00ce62312467b /hostapd | |
parent | fa53d74c9e74e535ad3b97a476496ad6aa042be6 (diff) | |
download | hostap-2b6e121676d8319044334ff9864a784b22545d67.zip hostap-2b6e121676d8319044334ff9864a784b22545d67.tar.gz hostap-2b6e121676d8319044334ff9864a784b22545d67.tar.bz2 |
hostapd: Add testing option to use only ECSA
Some APs don't include a CSA IE when an ECSA IE is generated,
and mac80211 used to fail following their channel switch. Add
a testing option to hostapd to allow reproducing the behavior.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'hostapd')
-rw-r--r-- | hostapd/config_file.c | 2 | ||||
-rw-r--r-- | hostapd/hostapd.conf | 4 |
2 files changed, 6 insertions, 0 deletions
diff --git a/hostapd/config_file.c b/hostapd/config_file.c index 82ac61d..37030d0 100644 --- a/hostapd/config_file.c +++ b/hostapd/config_file.c @@ -3249,6 +3249,8 @@ static int hostapd_config_fill(struct hostapd_config *conf, PARSE_TEST_PROBABILITY(ignore_assoc_probability) PARSE_TEST_PROBABILITY(ignore_reassoc_probability) PARSE_TEST_PROBABILITY(corrupt_gtk_rekey_mic_probability) + } else if (os_strcmp(buf, "ecsa_ie_only") == 0) { + conf->ecsa_ie_only = atoi(pos); } else if (os_strcmp(buf, "bss_load_test") == 0) { WPA_PUT_LE16(bss->bss_load_test, atoi(pos)); pos = os_strchr(pos, ':'); diff --git a/hostapd/hostapd.conf b/hostapd/hostapd.conf index a0071f7..c15cc44 100644 --- a/hostapd/hostapd.conf +++ b/hostapd/hostapd.conf @@ -1844,6 +1844,10 @@ own_ip_addr=127.0.0.1 # # Corrupt Key MIC in GTK rekey EAPOL-Key frames with the given probability #corrupt_gtk_rekey_mic_probability=0.0 +# +# Include only ECSA IE without CSA IE where possible +# (channel switch operating class is needed) +#ecsa_ie_only=0 ##### Multiple BSSID support ################################################## # |