aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd
diff options
context:
space:
mode:
authorJohannes Berg <johannes.berg@intel.com>2015-09-08 09:46:32 (GMT)
committerJouni Malinen <j@w1.fi>2015-10-03 18:37:17 (GMT)
commit2b6e121676d8319044334ff9864a784b22545d67 (patch)
treef40dab241e8659bf436acb18c6d00ce62312467b /hostapd
parentfa53d74c9e74e535ad3b97a476496ad6aa042be6 (diff)
downloadhostap-2b6e121676d8319044334ff9864a784b22545d67.zip
hostap-2b6e121676d8319044334ff9864a784b22545d67.tar.gz
hostap-2b6e121676d8319044334ff9864a784b22545d67.tar.bz2
hostapd: Add testing option to use only ECSA
Some APs don't include a CSA IE when an ECSA IE is generated, and mac80211 used to fail following their channel switch. Add a testing option to hostapd to allow reproducing the behavior. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Diffstat (limited to 'hostapd')
-rw-r--r--hostapd/config_file.c2
-rw-r--r--hostapd/hostapd.conf4
2 files changed, 6 insertions, 0 deletions
diff --git a/hostapd/config_file.c b/hostapd/config_file.c
index 82ac61d..37030d0 100644
--- a/hostapd/config_file.c
+++ b/hostapd/config_file.c
@@ -3249,6 +3249,8 @@ static int hostapd_config_fill(struct hostapd_config *conf,
PARSE_TEST_PROBABILITY(ignore_assoc_probability)
PARSE_TEST_PROBABILITY(ignore_reassoc_probability)
PARSE_TEST_PROBABILITY(corrupt_gtk_rekey_mic_probability)
+ } else if (os_strcmp(buf, "ecsa_ie_only") == 0) {
+ conf->ecsa_ie_only = atoi(pos);
} else if (os_strcmp(buf, "bss_load_test") == 0) {
WPA_PUT_LE16(bss->bss_load_test, atoi(pos));
pos = os_strchr(pos, ':');
diff --git a/hostapd/hostapd.conf b/hostapd/hostapd.conf
index a0071f7..c15cc44 100644
--- a/hostapd/hostapd.conf
+++ b/hostapd/hostapd.conf
@@ -1844,6 +1844,10 @@ own_ip_addr=127.0.0.1
#
# Corrupt Key MIC in GTK rekey EAPOL-Key frames with the given probability
#corrupt_gtk_rekey_mic_probability=0.0
+#
+# Include only ECSA IE without CSA IE where possible
+# (channel switch operating class is needed)
+#ecsa_ie_only=0
##### Multiple BSSID support ##################################################
#